Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
3
Chapter 1
Whitelisting for Endpoint
Defense
Rob Shein
“Whitelisting” refers to an approach for control whereby a list of “known good” activities is main-
tained. Any actions that correspond to that list are permitted, while all others are blocked or
disallowed. A classic example of this is proper firewall configuration, whereby only predefined
“acceptable” traffic is allowed to pass, and all other traffic is dropped by a default rule. ere is lit-
tle debate that, given the numerous and ever-expanding ways in which attackers learn to overcome
defensive measures, a whitelisting approach is far superior to blacklisting. e challenge, however,
is in producing ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467