Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin December 2015

Stopping Malware and Unauthorized Software through Application Whitelisting

Date Published: December 2015

Author(s)

Adam Sedgewick (NIST), Murugiah Souppaya (NIST), Karen Scarfone (Scarfone Cybersecurity), Larry Feldman (G2)

Abstract

Keywords

access control; application control; application whitelisting; information security; software security; whitelisting
Control Families

Audit and Accountability; Risk Assessment; System and Communications Protection;

Documentation

Publication:
December 2015 ITL Bulletin

Supplemental Material:
None available