2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet352/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   348   349   350   351   352   353   354   355   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Application Whitelisting
Application whitelisting
is a security option that prohibits unauthorized software from 
being able to execute. Whitelisting is also known as 
deny by default
or 
implicit deny
. In 


372
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
application security, whitelisting prevents any and all software, including malware, from 
executing unless it’s on the preapproved exception list: the whitelist. This is a significant 
departure from the typical device-security stance, which is to allow by default and deny by 
exception (also known as blacklisting).
Due to the growth of malware, an application whitelisting approach is one of the few 
options remaining that shows real promise in protecting devices and data. However, no 
security solution is perfect, including whitelisting. All known whitelisting solutions can be 
circumvented with kernel-level vulnerabilities and application configuration issues.
BYOD Concerns
Bring your own device (BYOD)
is a policy that allows employees to bring their own per-
sonal mobile devices into work and use those devices to connect to (or through) the com-
pany network to business resources and/or the internet. Although BYOD may improve 
employee morale and job satisfaction, it increases security risk to the organization. If the 
BYOD policy is open-ended, any device is allowed to connect to the company network. 
Not all mobile devices have security features, and thus such a policy allows noncompliant 
devices onto the production network. A BYOD policy that mandates specific devices may 
reduce this risk, but it may in turn require the company to purchase devices for employees 
who are unable to purchase their own compliant device. Many other BYOD concerns are 
discussed in the following sections.
There are several alternatives to a BYOD policy, including COPE, CYOD, corporate 
owned, and VDI.
The concept of 
company-owned, personally enabled (COPE)
is for the organization to 
purchase devices and provide them to employees. Each user is then able to customize the 
device and use it for both work activities and personal activities. COPE allows the organi-
zation to select exactly which devices are to be allowed on the organizational network—
specifically only those devices that can be configured into compliance with the security 
policy.
The concept of 
choose your own device (CYOD)
provides users with a list of approved 
devices from which to select the device to implement. A CYOD can be implemented so that 
employees purchase their own devices from the approved list (a BYOD variant) or the com-
pany can purchase the devices for the employees (a COPE variant).

corporate-owned mobile strategy
is when the company purchases the mobile devices 
that can support security compliance with the security policy. These devices are to be used 
exclusively for company purposes, and users should not perform any personal tasks on the 
devices. This often requires workers to carry a second device for personal use.
Virtual desktop infrastructure (VDI)
is a means to reduce the security risk and per-
formance requirements of end devices by hosting virtual machines on central servers that 
are remotely accessed by users. VDI has been adopted into mobile devices and has already 
been widely used in relation to tablets and notebook computers. It is a means to retain stor-
age control on central servers, gain access to higher levels of system processing and other 
resources, and allow lower-end devices access to software and services behind their hard-
ware’s capacity.


Assess and Mitigate Vulnerabilities in Mobile Systems 
373
This has led to 
virtual mobile infrastructure (VMI)
, where the operating system of a 
mobile device is virtualized on a central server. Thus, most of the actions and activities 
of the traditional mobile device are no longer occurring on the mobile device itself. This 
remote virtualization allows an organization greater control and security than when using 
a standard mobile device platform. It can also enable personally owned devices to interact 
with the VDI without increasing the risk profile. This concept will require a dedicated iso-
lated wireless network to restrict BYOD devices from interacting directly with company 
resources other than through the VDI solution.
Users need to understand the benefits, restrictions, and consequences of using their own 
devices at work. Reading and signing off on the BYOD, COPE, CYOD, etc., policy along 
with attending an overview or training program may be sufficient to accomplish reasonable 
awareness.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   348   349   350   351   352   353   354   355   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish