Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
15
Chapter 2
Whitelisting
Sandy Bacik
Access control consists of permitting or denying the use of a particular resource. Within
networking environments, particularly at the network perimeter, enterprises have used blacklist-
ing. Blacklisting consists of banning a list of resources from access. As the unauthorized and
invalid access attempts increased, the blacklist continued to grow. is method allowed every-
thing unless explicitly denied, i.e., default allow. Enterprises are now doing the reverse, only allow-
ing authorized access, i.e., whitelisting, the “known good.” Whitelisting turns blacklisting upside
down, categorizing everything as ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467