- Nov 17, 2016
- 1,242
How useful are application whitelists when social-engineering risks are minimal where you don't download and execute random stuff from the internet especially, path/hash based whitelisting like SRP/Bouncer? It seems some of the top 4 mitigation strategies I found from wherever - namely, application whitelisting and restriction of administrative rights are partly to prevent users from doing whatever they want risking their computers. I'm just curious as to what happens when this is not a threat and you're the one actually making your own decisions instead of trying to prevent others'.