Current location - Education and Training Encyclopedia - Education and training - White list of off-campus training
White list of off-campus training
The white list of off-campus training is as follows:

Hongjing Youjia Training School, Kepei Training School, Qin Tian Meixi Training School, Meixi Bangbang Training School, Xingtu Xiaoxing Training School, Shixiao Training School, Yingyi Education Training School, Zhu Feng Training School, Naisi Education Training School, Xiaoxing Hampton Training School, etc.

Data expansion:

The concept of white list corresponds to "blacklist". For example, in the computer system, many softwares apply the black-and-white list rule, such as operating system, firewall, antivirus software, e-mail system, application software and so on. And almost all of them apply the black-and-white list rule in control.

After the blacklist is enabled, users (or IP addresses, IP packets, emails, viruses, etc. ) the blacklist cannot be passed. If the white list is set, users (or IP addresses, IP packets, emails, etc. ) will be given priority in the white list and will not be rejected as spam, so the security and speed are greatly improved. Extend its meaning one step further, then any application with blacklist function will have whitelist function corresponding to it.

Working principle:

By identifying whether processes or files in a system have approved attributes, public process names, file names, publisher names and digital signatures, whitelisting technology can enable enterprises to approve which processes are allowed to run in a specific system.

Some vendor products only include executable files, while others include scripts and macros, which can block a wider range of files. Among them, an increasingly popular whitelisting method is called "application control", which focuses on managing the behavior of endpoint applications.

As we all know, whitelisting was once a criticized technology. Whitelisting has always been regarded as difficult to deploy and time-consuming to manage, which makes it difficult for enterprises to deal with employees who want to deploy their chosen applications. However, in recent years, the whitelist product has made great progress, which is better combined with the existing terminal security technology, eliminates the obstacles of deployment and management, and provides automatic approval for users who want to install applications quickly.

In addition, most products now provide this function, that is, using a system as a benchmark model to generate their own internal white list database, or providing templates to set acceptable benchmarks, or supporting the compliance of standards such as PCI DSS or SOX.