![]() ![]() If you've implemented a whitelist, you've essentially blacklisted everything out there in the universe except the stuff that's on your list. By definition, antivirus software can't protect you against a zero-day attack.Ī whitelist is the inversion of a blacklist. Blacklists have a fairly obvious disadvantage in that they need to be constantly updated to stay ahead of the latest attacks. Many antivirus and anti- malware programs are, essentially, blacklists: they include a list of known malicious code, and automatically leap into action when those programs are detected on the protected computer. blacklistĪ blacklist is a slightly more familiar concept - a list of things that are dangerous and need to be blocked from the machines you're trying to protect. However, it can be quite inconvenient and frustrating for end-users, requires careful implementation and proper ongoing administration, and isn't a foolproof barrier to attacks. Whitelisting is a fairly extreme lockdown measure that, if implemented properly, can keep many cybersecurity problems at bay. ![]() In essence, the user has access to only a limited set of functionality, and what they can access has been deemed safe by the administrator. ![]() Instead of trying to keep one step ahead of cyberattackers to identify and block malicious code, IT staff instead compiles a list of approved applications that a computer or mobile device can access. Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. ![]()
0 Comments
Leave a Reply. |