Module 22 Endpoint Protection Flashcards
Why are endpoints threats?
Malware, malicious software.
How to define endpoints?
Hosts on the network that can access or be accessed by other hosts in the network
Where do many attacks originate from - inside or outside the network?
Inside
What are the two internal LAN element to secure?
Enpoints and network infrastructure.
What is host based malware protection?
Endpoints, mobile devices can use host based antimalware software.
Antimalware programs use three diff techniques to detect malware?
Signature, heuristics-based and behavior based.
What is heuristics based
Recognizes general features shared by various types of malware
What is behavior based?
Employs analysis of suspicious behavior
What is signature based
Recognizes various characteristics of known malware files
Explain the host based firewall?
Restricts incoming and outgoing connections, it CAN prevent a host from being infected and stop hosts from spreading malware.
What are host based security suites?
Host based suite of security products. Anti-virus, anti-phishing, safe browsing, firewall, intrusion prevention sys, etc
What is network based malware protection?
AMP, ESA, WSA AND NAC
What is NAC?
Network Admission Control - permits only authorized system to connection to the network
What is ESA
Email Security appliance, provides filtering of SPAN and malicious emails.
What is WSA?
Web Security Appliance - provides filtering of websites and blacklisting