Created: 2022-07-21
Tags: #fleeting
An endpoint is any device that connects to a computer network.
When Bob and Alice talk on the phone,
the "endpoints" of the connection are their respective phones.
Similarly, in a network,
computerized devices have "conversations" with each other,
a computer connected to a network is one endpoint of an ongoing data exchange.
Going back to the example above,
when Bob and Alice talk on the phone,
the cell tower that transmits their conversation is NOT an endpoint for their data exchange
it is the medium by which the exchange occurs.
As a further example,
imagine a grocery store that
router that connects the store's network to the Internet, router would be considered CPE.rest of these devices are endpoints on the store's network, In a business context, attackers often target endpoints
because a COMPROMISED ENDPOINT
can be an entry point into an otherwise secure corporate network.
-> An attacker may NOT be able to get through firewall,
-> but an employee's laptop could be a slightly easier target.
IT teams have
endpoints than the internal networking infrastructureBecause this endpoints are at hands of the employee, not the IT teams
-> one employee at a company regularly update their laptop and avoid risky online behaviors, --> another might avoid software updates and download unsecure files onto their laptop
The difficulty of securing endpoints and importance of protecting endpoint,
has its own category of cyber security endpoint security