Security Policies

Security policies are a set of allow and deny rules that dictate how traffic or files can exist within a network boundary. These rules can also apply to different aspects of the network and hosts, depending on their location.

  • Network Traffic Policies
  • Application Policies
  • User Access Control Policies
  • File Management Policies
  • DDoS Protection Policies
  • Others

There are multiple ways to match an event or object with a security policy entry:

Security PolicyDescription
Signature-based DetectionCompares network packets with known attack patterns (signatures). If there’s a match, an alert is triggered.
Heuristic / Statistical Anomaly DetectionMonitors network behavior against a baseline to detect unusual activity. Deviations from normal patterns trigger alerts.
Stateful Protocol Analysis DetectionChecks if network traffic follows expected protocol behavior. Unusual deviations raise alarms.
Live-monitoring and Alerting (SOC-based)Security analysts or automated systems monitor network activity in real time and respond to threats as needed.

Packers

A Packer compresses an executable file by bundling it with decompression code into a single file. When run, it restores the original executable, making it harder for security tools to detect. The packed file works just like the original but adds an extra layer of protection against scanning.

A list of popular packer software:

UPX packerThe Enigma ProtectorMPRESS
Alternate EXE PackerExeStealthMorphine
MEWThemida

0 items under this folder.