USB-based Attacks Prevention Flashcards
Juniper Firewalls can implement device control policies that restrict or monitor the use of USB devices within the network. They can block or alert on unauthorized USB device connections.
Device Control
Juniper Firewalls can enforce access control policies that limit USB device connections to specific trusted devices or ports. They can block connections from unapproved USB devices.
Access Control Policies
Juniper Firewalls with behavior-based analysis can monitor USB device behavior for unusual activities. They can detect and alert on suspicious USB device actions.
Behavior-Based Analysis
Juniper Firewalls can inspect USB device content for malicious files or scripts. They can block or quarantine files that pose a threat when introduced via USB.
Content Inspection
Juniper Firewalls can enforce port security policies that control which devices are allowed to connect to specific USB ports. They can block unauthorized connections.
Port Security