Week 6 - Whitelisting and Blacklisting

In week 6, we learned two different security methods that help filter and block malicious entities from our devices. Blacklisting and whitelisting both have the goal of protecting our devices, but they have two different methods of protecting our devices. Blacklisting plays the part of blocking entities like websites and emails that have malicious codes in them that could hurt a user's device. Whitelisting has a pre-approved listing that allows entities full access to the users and blocks other entities with malicious codes.

Blacklisting is built to block websites, applications, and emails that contain malicious codes. It denies access to the user and provider to keep the device safe. Blacklisting already knows which entities are blocked, so it pays the most attention to safer websites rather than dangerous websites. Whitelisting, on the other hand, has a pre-approved list that, by default, blocks users when trying to access these hazardous entities. It also automatically pre-approves appropriate entities that are safe and secure.

Comments

Popular posts from this blog

Week 3 - Cloud Vulnerability Scans

Week 1 - Introduction

Week 2 - Vulnerability Scan