Mitigation Techniques and Practical Implementation of EMET

Contributed by Ben Rain.

As the size of the internet and number of devices both on the personal and enterprise level increases, so does the number of cyber criminals. With so many devices, and so many vulnerabilities within these networks, how do we keep information safe? The answer is a endless amount of applications, physical devices, intrusion detection systems and the list goes on. Wouldn't it be nice if there was an application already loaded on most operating systems that could give a substantial amount of protection for our vulnerable programs but was not hard to implement?

The answer is EMET. EMET stands for Enhanced Mitigation Experience Toolkit and is a free Windows-based security tool that adds security defenses by using specific mitigation techniques to prevent exploits related to memory corruption. EMET defends against memory corruption vulnerabilities; EMET is easily implemented; and EMET has many practical uses.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 3.3 (3 votes)