Week 5
Week 5
✓ Laptops
✓ Tablets
✓ Desktop computers
✓ Mobile devices
✓ Internet of Things devices
✓ Wearables
✓ Digital printers
✓ Scanners
✓ Point of sale (POS) systems
✓ Medical devices
Risks of Not Implementing Endpoint Security
in Any Network.
1) Internet of Things Security: Software that protects IoT devices is one of the most
important types of endpoint security for enterprises. The more IoT devices you have,
including ones operated by customers that may interface with your network the more
thorough you have to be when it comes to your security fabric. Each one could be
used as an access point to your digital assets.
2) Network Access Control: NAC focuses on managing which users and devices gain
access to your network, as well as what they do and which segments, they interact
with.
Types of Endpoint Protection (Cont.)
3) Data Loss Prevention: DLP strategy focuses on ensuring that your most secure
data resources are protected against exfiltration. One of the best ways to safeguard
these assets is to keep employees informed about phishing tactics, as well as
installing antimalware to prevent data loss from malicious programs hackers install on
your endpoints.
4) Insider Threats Protection: Insider threats come from those within your
organization. Controlling who has access to which area of your network, monitoring
what they are doing, and ensuring all sessions are properly terminated can protect
your endpoints.
5) Uniform Resource Locator Filtering: (URL) filtering involves blocking potentially
malicious websites so internal users cannot access them. This is often accomplished
using either a hardware or software firewall.
Types of Endpoint Protection (Cont.)
VII. Use Reputable Anti-virus Software on all endpoints and ensure they are
actively running background scan: This will protect the endpoints from malware,
viruses, worms among other threats that could infect the system via network
interface or mobile storage devices (flash, external hard disk drives, CD/DVD-ROM,
etc)
Ways to Improve The Effectiveness of Endpoint
Security (Cont.)
VIII.Ensure that the host-based firewall program is always active on all network
adapters on the endpoint: This will provide a reliable protection on the endpoint
from any threat(s) that may attempt infecting them via the network.
IX. End users should practice the use of lengthy and complex passwords and
regular change of passwords: Complex passwords that are generated from the
combination of alphanumeric and special characters such as : d@$$w07D,123^_ ,
Passwords should be changed regularly to prevent password compromise.
Vulnerability Scanning
▸ What Is Vulnerability Scanning
➢ This scan is also performed by attackers who try to find points of entry into
your network.
How Does Vulnerability Scanner Work?
➢ After the software checks for possible vulnerabilities in any devices within
the scope of the engagement, the scan generates a report. The findings in
the report can then be analyzed and interpreted in order to identify
opportunities for an organization to improve their security posture.
Types of Vulnerability Scanner
➢ Network vulnerability scanners are so called because they scan your systems
across the network, by sending probes looking for open ports and services, and then
probing each service further for more information, configuration weaknesses or
known vulnerabilities.
➢ The way this works can differ, you might install a hardware appliance inside your
network, or deploy a virtual appliance on a virtual machine, and then run scans from
that machine against all others on the network.
1- Network-based vulnerability scanners
(Cont.)
➢ One obvious benefit of network vulnerability scanners is that they can be quick to
set up, simply install your scanner and get scanning. They can quickly become more
complicated when it comes to maintenance though, keeping appliances up to date,
and keeping them in-step with changes on your network.
2. Internal Network Scanning: Find weaknesses on systems which do not expose ports or
services to the internet.
2- Agent-based Vulnerability Scanners
(CyberC) [Preprint].
Scanning_Intruduction
Thank You