A O Whitelisting depends on government-certified lists of trusted software providers, whereas blacklisting needs to recognize patterns of malicious code behavior, or malware signatures, to block the malware from being installed and executed. B O C O D With blacklisting only, new malware may not be recognized as such before it installs, executes, and begins to harm your systems and information. Administering a whitelisting system can require a lot of effort, but when an unknown program is trying to execute (or be installed), you know it is not yet trusted and can prevent harm. O For most organizations, the list of applications they have chosen to trust is far smaller and easier to administer than huge lists of malware signatures and behavioral models.
A O Whitelisting depends on government-certified lists of trusted software providers, whereas blacklisting needs to recognize patterns of malicious code behavior, or malware signatures, to block the malware from being installed and executed. B O C O D With blacklisting only, new malware may not be recognized as such before it installs, executes, and begins to harm your systems and information. Administering a whitelisting system can require a lot of effort, but when an unknown program is trying to execute (or be installed), you know it is not yet trusted and can prevent harm. O For most organizations, the list of applications they have chosen to trust is far smaller and easier to administer than huge lists of malware signatures and behavioral models.
Related questions
Question
why is whitelisting a better approach to applications security than blacklisting? choose the most correct statement.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps