Page 28 - info_oct_2021_draft13
P. 28

Endpoint: The Start



          Point of Cyber Security







          Enhancing Cyber Security through advanced
          Endpoint Security






          n  the realm of cyber security, the term endpoint
          refers to connected devices on a network such
         Ias desktops, laptops, servers, mobile and IoT   Organizations of all types and sizes such as healthcare, finance and defense
         devices. Endpoints are the interface where human   are at risk from increased volume of organized cybercrime. Being the
         beings who are the weakest link in Cyber Security
         normally interact. Endpoint security, therefore,   interface where human beings who are the weakest link in Cyber Security
         is one of the prominent components of cyber
         security. It involves securing data associated   normally interact, these devices are the main targets of malicious actors.
         with endpoints from exploitation by threat actors
         through management of vulnerabilities and   Endpoint security has emerged into advanced technology from traditional
         patching of software.
                                             antivirus solutions for providing faster and comprehensive protection from
         Need of endpoint security           sophisticated malware and modern zero-day attacks.
            Endpoint security is considered as crucial for
         cybersecurity due to a variety of reasons. The
         number and variety of endpoints are increasing
         day-by-day. With the introduction of remote work
         culture and  advancement  in  the  BYOD  policies,
         perimeter security is becoming insufficient to   prominent asset for an organization in today’s   central monitoring console is also provided for
         prevent all kinds of malicious activities. The   environment, the organization can be put at the   better visibility to the administrator in managing
         threat  landscape  is  becoming  complex  due  to   risk of insolvency through illegal access and theft   the endpoint clients.
         increased capability of hackers to introduce   of that data.
         new ways of accessing the digital assets and                            Evolution of endpoint security
         manipulate the information. Data being the most   Endpoint Security Architecture  The business of endpoint security started
                                                The figure illustrates the architecture of a   in late 1980s with the introduction of antivirus
                                             typical endpoint security solution. The prime   solution which is a signature based malware
                                             component in this deployment is the Central   recognition system. With the increased popularity
                                             Endpoint Server which receives the security   of e-commerce and internet, detection of
                                             updates from the Endpoint Update Server and   malicious activities has become more complex
                                             also functions as a centralized manager. The   and can no longer rely on signatures. Traditional
                                             central  server  further  distributes  the  updates   endpoint solutions have become incapable to
                                             among a set of Endpoint Servers to which   handle sophisticated and emerging threats like
                         Diwan Hauym Khan
                         Scientist-F         the on premise client systems are connected.   file-less malware and zero day attacks. Therefore,
                         dhkhan@nic.in       Endpoints  such  as  laptops  and  mobile  devices   advancement is required in end point security
                                             that  are  outside  the organization’s  intranet are   solutions with the proposition of more integrated,
                                             connected to the Endpoint Servers through an   multistage defense system to handle the outsmart
                                             Edge Relay Server. The Endpoint Server provides   attackers.  Advanced  endpoint security requires
                                             advanced threat protection techniques combined   detection  and  correction  of  hidden  threats  in
                                             with detection and response through the agent   seconds, in place of months. This is possible only
                         Kirshna Kumar       installed in clients. It responds to attacks in   with the automation of sharing threat intelligence
                         Scientist-B         real-time and provides immediate and effective   among connected components for detection and
                         kirshna.kumar98@nic.in  protection against zero-day attacks. A web-based   correction of threats while teaming up of humans



          28  informatics.nic.in  October 2021
   23   24   25   26   27   28   29   30   31   32   33