-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

CompTIA CASP+ CAS-004 Certification Guide
By :

It is important to understand all the risks that endpoints pose to an organization and implement the appropriate controls to mitigate these risks. These controls can include choosing trusted hardware and software platforms and utilizing attestation services to ensure the platforms have a strong security posture. We must also protect our systems from unauthorized changes using tools such as host intrusion detection systems (HIDSes) and host intrusion prevention systems (HIPSes). In addition, endpoint detection and response (EDR) software can help an organization where there are threats that are sophisticated and currently undocumented (such as zero day exploits). Now, we will investigate a number of techniques to secure endpoint devices.
It is important to recognize that there are many ways to strengthen the security posture of devices. In this section, we will investigate some of the hardening techniques available.
...Change the font size
Change margin width
Change background colour