Fandom

The IT Law Wiki

Stopping Malware and Unauthorized Software Through Application Whitelisting

32,196pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Citation Edit

Adam Sedgewick, Murugiah Souppaya, Karen Scarfone & Larry Feldman, Stopping Malware and Unauthorized Software Through Application Whitelisting (ITL Bulletin) (Dec. 2015) (full-text).

Overview Edit

Application whitelisting technologies control which applications may be installed or executed on a computer. These technologies are most often used to detect and stop the execution of malware and other unauthorized software. Malware infections are frequently used to steal sensitive information from a user or an organization, and to tamper with the integrity and availability of computing systems. Unauthorized software can pose multiple problems. NIST Special Publication 800-167, Guide to Application Whitelisting, explains the basics of application whitelisting technologies and shows organizations how they can plan for, implement, and use these technologies successfully.

Also on Fandom

Random Wiki