Page 1473 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1473

Many forms of malicious code take advantage of zero-day
               vulnerabilities, security flaws discovered by hackers that have not

               been thoroughly addressed by the security community. There are two
               main reasons systems are affected by these vulnerabilities:

                    The necessary delay between the discovery of a new type of
                    malicious code and the issuance of patches and antivirus updates.
                    This is known as the window of vulnerability.

                    Slowness in applying updates on the part of system administrators

               The existence of zero-day vulnerabilities makes it critical that you have

               a defense-in-depth approach to cybersecurity that incorporates a
               varied set of overlapping security controls. These should include a
               strong patch management program, current antivirus software,
               configuration management, application control, content filtering, and
               other protections. When used in conjunction with each other, these
               overlapping controls increase the likelihood that at least one control
               will detect and block attempts to install malware.
   1468   1469   1470   1471   1472   1473   1474   1475   1476   1477   1478