Читать книгу The Official (ISC)2 SSCP CBK Reference - Mike Wills - Страница 170

Are You Positive?

Оглавление

Using allowed list management for controlling software execution is a powerful defense against most of the malware infection vectors by prohibiting any software to execute if it is not on a controlled list of previously-approved tasks. If your organization is not using it, it's only a matter of time before you'll wish you had been. See Chapter 7 for more details.

The Official (ISC)2 SSCP CBK Reference

Подняться наверх