Open In App

What is an Endpoint in Security?

Last Updated : 23 May, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

An Endpoint Security or Endpoint Protection is a technique for the safety of computer networks.

How does Endpoint Security Work?

Endpoint Security control is a software program technique that facilitates to perception and manipulation of the person’s laptop to get entry into a company community. This permits the community administrator to limit positive internet sites to get entry to particular customers for you to keep and observe the organization’s rules and requirements for the additives concerned. The endpoint safety control structures encompass a digital non-public community VPN customer an OS and to date antivirus software program. 

Computer devices that are not in compliance with the organization’s coverage are provisioned with restricted get entry to a digital LAN endpoint safety gadget on a customer-server modal turned into the safety application is managed with the aid of using a centrally controlled host server pinned with a customer application this is established on all of the community drives there, but every other version is known as the software program as a provider length the safety applications, and the host server is maintained remotely with the aid of using the service provider. 

Why Are Endpoints Targeted?

Endpoints assault intention to get right of entry to company networks using endpoints as the entrance or gateway. The growing use of end-consumer gadgets like laptops, cellular phones, etc. For corporations everywhere in the global to get the right of entry to and use their assets their community remotely is likewise accelerated notably exposing endpoints to cyber threats.

 Examples of Endpoints:  

Any computing device, usually a user-end device connected to an organization’s network, is an endpoint.

  • Tablets
  • Mobile gadgets
  • Smartwatches
  • Printers
  • Servers
  • ATM machines
  • Medical gadgets

Types of Endpoint Security:

  • Internet Of Things: Securing computing gadgets at the net and the networks they are linked to from threats and breaches via way of means of protecting, identifying, and tracking risks.
  • Data Loss Prevention: Detecting and stopping statistics breaches.
  • Network Access Control:  It restricts the availability of network resources to endpoint devices.
  • URL filtering:  Technology that offers enables groups to control their users and visitors and cap potential to get the right of entry to the content on the web.
  • Browser Isolation: Isolation of a web user’s surfing interest far from their nearby networks and infrastructure.

Endpoint Security Threats:

1. Phishing: Phishing is a technique of gathering sensitive information of a target such as a username, password, etc.

How does Phishing work?

  • hacker creates a faux website.
  • the faux webpage is sent to the victim.
  • the sufferer enters credentials.
  • The hacker receives the credentials.

To read more about this, please refer to the article Phishing.

2. Malvertising: malvertising is malicious activity. Generally uses ads to send malware. Typically this happens through the injection of unwanted or malicious code into ads. 

To read more about this, please refer to the article malware and its Types.

3. Ransomware: In this type of attack, attackers use the malware to access devices, lock the encrypted data and then blackmail the victim, and demand payment to unlock and release the data.

To read more about this, please refer to the article How Ransomware Works and How to Prevent it?.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads