A O Whitelisting depends on government-certified lists of trusted software providers, whereas blacklisting needs to recognize patterns of malicious code behavior, or malware signatures, to block the malware from being installed and executed. B O C O D With blacklisting only, new malware may not be recognized as such before it installs, executes, and begins to harm your systems and information. Administering a whitelisting system can require a lot of effort, but when an unknown program is trying to execute (or be installed), you know it is not yet trusted and can prevent harm. O For most organizations, the list of applications they have chosen to trust is far smaller and easier to administer than huge lists of malware signatures and behavioral models.

icon
Related questions
Question

why is whitelisting a better approach to applications security than blacklisting? choose the most correct statement.

A
O Whitelisting depends on government-certified lists of trusted software providers, whereas blacklisting needs to recognize patterns of malicious
code behavior, or malware signatures, to block the malware from being installed and executed.
B O
с O
D
O
With blacklisting only, new malware may not be recognized as such before it installs, executes, and begins to harm your systems and information.
Administering a whitelisting system can require a lot of effort, but when an unknown program is trying to execute (or be installed), you know it is
not yet trusted and can prevent harm.
For most organizations, the list of applications they have chosen to trust is far smaller and easier to administer than huge lists of malware
signatures and behavioral models.
Transcribed Image Text:A O Whitelisting depends on government-certified lists of trusted software providers, whereas blacklisting needs to recognize patterns of malicious code behavior, or malware signatures, to block the malware from being installed and executed. B O с O D O With blacklisting only, new malware may not be recognized as such before it installs, executes, and begins to harm your systems and information. Administering a whitelisting system can require a lot of effort, but when an unknown program is trying to execute (or be installed), you know it is not yet trusted and can prevent harm. For most organizations, the list of applications they have chosen to trust is far smaller and easier to administer than huge lists of malware signatures and behavioral models.
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer