Compartmentalization
Firewalls
Firewall rules
Shallow inspection vs deep inspection
Firewalls: packet filter
Firewalls: proxy
Firewalls: stateful inspection
Stateful inspection process
DMZ
Sinkholes
Content filter
IDS/IPS
All-in-one security appliance
Sniffer
Port scanners
Vulnerability Scanning
Exploit software
Penetration testing
Offensive countermeasures and active defence
Threat hunting
Application whitelisting
The idea of application whitelisting has been around for a long time. It has never really caught on as a ubiquitous security measure. With proper implementation and careful management, it does have the potential to be a solid security step – but great care is warranted. With whitelisting, you define a list of every legitimate, authorized piece of software on the computer. Then the whitelisting software only allows that authorized software to execute. Because malware is not on the whitelist, it is blocked and cannot impact you. Some argue that with properly tuned whitelisting software, it is no longer necessary to run anti-virus software.
* The devil is in the details here. You must identify every authorized software, including all of the operating system services and so on, that are necessary to make your computer function. Missing any at all can cause problems, and if you miss the wrong ones, your computer may not even be able to boot up
* Also, this becomes a potential target for attackers, first, as a form of denial of service. If they can edit your authorized list and remove some critical software from the list, they can stop your computer from running. Think about this when you implement whitelisting across your entire enterprise. An attacker manages to remove one small program from the authorized list – something like svchost.exe. Suddenly, no computer in your entire organization will boot. Second, attackers who can edit the whitelist can try to add their malware to the authorized list. Bit9 experienced precisely this issue. The company sold a whitelisting product that was very popular. Attackers broke into the Bit9 network (which was not running Bit9’s software) and added their malware to the authorized list for all Bit9 customers. The attackers then used the Bit9 update feature to install their malware at all customer sites. Incidentally, Bit9 no longer exists – the company is now called CarbonBlack.