Practical Network Scanning (2024)

The primary advantage of blacklisting is its simplicity. You can exclude known threats from the system and the intelligence lies with the software vendor. Its effectiveness totally depends on how often the vendor releases or updates the known threat database. From a user's point of view, all of the updates are fetched automatically. Users do not have an option to differentiate between good and bad data traffic until the software says it's bad. The major drawback of blacklisting architecture is knowing how to deal with unknown threats. For example, ransomware continues to evolve with new patterns and variants that have not been seen before.

Practical Network Scanning (2024)
Top Articles
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6563

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.