Network Security - endpoint security
1. Antivirus / Anti-Malware
Definition:
Software that detects, prevents, and removes malicious software (malware) from devices. Malware includes viruses, worms, trojans, ransomware, spyware, and adware.
Functions:
-
Real-time scanning: Monitors files, downloads, and emails for malware.
-
On-demand scanning: Allows manual scanning of files or drives.
-
Quarantine and removal: Isolates infected files and removes threats.
-
Signature and heuristic detection:
-
Signature-based: Detects known malware using predefined patterns.
-
Heuristic-based: Detects unknown malware by analyzing suspicious behavior.
-
Importance:
-
Protects endpoints from infections that can compromise data, applications, and network security.
-
Stops malware from spreading to other devices in the network.
Example:
-
Detecting and removing a ransomware file before it encrypts all documents on a laptop.
2. Endpoint Detection and Response (EDR)
Definition:
Advanced security tools that continuously monitor endpoint activity to detect, investigate, and respond to sophisticated threats.
Functions:
-
Behavior monitoring: Detects unusual activity such as unauthorized file access or suspicious network connections.
-
Threat detection and analysis: Identifies malware, zero-day exploits, or lateral movement attempts.
-
Automated response: Can isolate compromised endpoints or terminate malicious processes.
-
Forensics: Logs and stores detailed data for post-attack analysis.
Importance:
-
Provides real-time protection and visibility beyond traditional antivirus.
-
Helps detect advanced persistent threats (APTs) that evade standard security measures.
Example:
-
An EDR tool detects unusual attempts to access multiple sensitive files and automatically quarantines the affected device.
3. Patch Management
Definition:
The process of regularly updating operating systems, software, and firmware to fix vulnerabilities and improve security.
Functions:
-
Vulnerability identification: Detects outdated software or missing patches.
-
Patch deployment: Installs updates to endpoints automatically or manually.
-
Compliance tracking: Ensures systems meet security and regulatory standards.
Importance:
-
Prevents attackers from exploiting known vulnerabilities.
-
Keeps systems up-to-date with the latest security enhancements.
Example:
-
Installing a security patch for Windows that fixes a flaw allowing remote code execution.
4. Device Encryption
Definition:
The process of converting data on a device into unreadable code to prevent unauthorized access if the device is lost or stolen.
Functions:
-
Full-disk encryption: Encrypts the entire hard drive of the endpoint.
-
File/folder encryption: Encrypts specific sensitive files or directories.
-
Key management: Securely stores encryption keys for authorized access.
Importance:
-
Protects sensitive data at rest on endpoints.
-
Ensures confidentiality even if the device is physically compromised.
Example:
-
Encrypting all files on a company laptop so that if it is stolen, attackers cannot access confidential documents.