How application whitelisting works

The implementation of application whitelisting begins with creating a list of approved applications. In its simplest form, the application whitelisting program looks at the predefined file attributes associated with whitelisted applications, such as the file name, file path, and file size, to determine whether an application is allowed to run and, optionally, by which user. Attackers can quite easily replace whitelisted applications with malicious apps that have the same size and the same filename as a permitted application if the application whitelisting program is only using simple attributes to verify the program that is requesting to run. Therefore, it is advisable that the application whitelisting software ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.