๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Issues in endpoint security

โœ Scribed by Miles Clement


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
162 KB
Volume
2007
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


Security 17

The first control areas were discussed in the previous article. In this second part we focus on the last five: network configuration, network traffic filtering, system integrity protection, back up and asset protection.

Network configuration

Most endpoint devices are connected to a network, which tends to be a standard vector for attacks against the endpoint. Personal firewalls have become a standard control in this area. Another control that has been available for a while, but not widely used, is authentication of the connecting devices. Most major operating systems now support mutual authentication between endpoint devices and servers.

Typically, device authentication relies on certificates. This requires the organisation to establish a PKI to issue and manage certificates. Each endpoint device and server that will be authenticated needs to be issued the certificate.

So how does mutual authentication of devices work? The following simplified process illustrates how the mutual authentication takes place.


๐Ÿ“œ SIMILAR VOLUMES


Issues in homeland security
โœ Denise P. Sokol ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons โš– 42 KB

## Abstract This chapter provides a framework for the volume by discussing ways that legislative mandates affect higher education institutions with regard to homeland security and the resulting cultural changes necessary at postsecondary institutions.

Ethics issues in security hospitals
โœ Henry C. Weinstein ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 112 KB ๐Ÿ‘ 1 views