What is a Whitelist? - Smartpedia - t2informatik (2024)

Examples of whitelists or blacklists

In IT there are many areas of application for whitelists and blacklists. Here you will find some “technical” examples:

  • Spam filters offer the possibility of entering IP addresses, e-mail addresses or domain names of senders on a whitelist to protect their e-mails from being rejected or sent to a junk mail folder.
  • Firewalls use whitelists or blacklists.
  • Content management systems offer possibilities to block or release commentators and manage them in lists accordingly.
  • Adblockers have features to allow ads from defined sources.

In addition, companies have individual lists that do not lead directly to a technical “block”, but must be checked by organisational measures – e.g. by taking inventory:

  • A list of suppliers with whom one cooperates.
  • A list of programs that may be used in an area. Alternatively, this is also called an application whitelist.
  • A list of products (smartphones, laptops, etc.) that employees are allowed to use for their work.

There are also numerous examples of whitelists outside IT:

  • The Peta Deutschland e.V. lists various positive lists, e.g. for detergents and cleaning agents or food producers without animal testing.
  • PHINEO – a non-profit analysis and consulting company for effective social commitment – awards a seal of approval. The aim is to promote non-profit organisations. Phineo explicitly points out that there is no blacklist of companies that have tried in vain to obtain the seal.
  • The Central Committee of German Agriculture maintains a positive list for straight feeding stuff.
  • And German federal authorities are increasingly conducting bidding competitions in which the winners end up in a pool of possible suppliers (in other words, on a whitelist), who are then asked for concrete offers when individual services are called up in an accelerated procedure.

The criteria for creating a positive list

As the various examples show, positive lists are used in many areas. Depending on the area and content, the criteria that lead to an organisation, products or services being positively listed vary, of course.Companies that want to do business with other companies, for example, may have to

  • go through audits,
  • provide supporting evidence,
  • accept liability or warranty regulations,
  • agree to terms of payment,
  • guarantee reaction times,
  • store source code in bank deposit boxes,
  • or provide access to office space.

For application whitelists, for example, it might be necessary, to

  • support digital signatures,
  • use cryptographic hashes,
  • restrict the execution to defined network areas,
  • support monitoring of libraries, scripts, macros, browser plug-ins, add-ons, configuration files or registry entries

In practice, there are two procedures for Application Whitelisting:

  1. Using information from vendors that are considered trustworthy, supplemented by your own findings.
  2. The technical review of applications and, in the case of “clean” operation, the definition of a baseline.

The combination of both approaches should offer the greatest security.

It is advisable to version a whitelist so that it is clear to all parties involved from which date which version of the list is current and binding.

What is a Whitelist? - Smartpedia - t2informatik (2024)

FAQs

What is a whitelist quizlet? ›

application whitelisting. Allows applications that are in list. Software Restriction Policies. These are rules set by the network defender to restrict software from the unauthorized usage and execution in an organization.

What is the definition of a whitelist? ›

A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others.

What is an example of whitelisting? ›

By default, all the other information is barred from entering the network, and only particular applications that have been pre-approved are allowed. Gmail users, for instance, can whitelist the emails they want to receive to eliminate getting junk mail. A whitelist is a list of elements that are permitted to enter.

What is the main function of a whitelist answer? ›

Whitelisting adds an extra layer of security to protect sensitive data and keep harmful files at bay. It ensures that only pre-approved programs can run on a protected computer, blocking the entry of unwanted software, and known malicious code.

What is the term for whitelist? ›

Commonly Used Alternative Terms for Whitelist:

Another one we just heard recently is “welcome-list”.

What is the main focus of a whitelist? ›

Whitelists help prevent unauthorized access by specifying a list of approved entities, applications, or devices that are permitted access to your system or network.

How do you use whitelist? ›

Managing the Whitelist
  1. To enable the whitelist, use /whitelist on.
  2. To disable the whitelist, use /whitelist off.
  3. To add a player to the whitelist, use /whitelist add playername.
  4. To remove a player from the whitelist, use /whitelist remove playername.
  5. To show all players on the whitelist, use /whitelist list.

What happens when you get whitelist? ›

The benefits of whitelisting

Benefits include free crypto airdrop, early access to mint NFTs, discounted crypto prices, and exclusive access to features of a new project.

Why do we need to whitelist? ›

Benefits of whitelisting

By preventing unauthorized access, whitelisting can greatly reduce the risk of malware infection and cyber intrusion, giving IT security teams strict control over what can run on or access systems within the enterprise.

Where is whitelisting used? ›

A use for whitelists is in local area network (LAN) security. Many network admins set up MAC address whitelists, or a MAC address filter, to control who is allowed on their networks. This is used when encryption is not a practical solution or in tandem with encryption.

What happens when you whitelist a website? ›

Website Whitelist is a security strategy that gives access to websites that are on the 'list' and prevents any request to sites not included on that list. Whitelisting is an essential security tool to help your IT department protect vital networks. Think of a whitelist as an approved list.

What is needed for whitelisting? ›

If you want to create an IP whitelist, you would need to decide which devices and users are allowed to access your business systems. Once you have a list of approved IP addresses, web applications, or users, you can add them to your whitelist using the network settings on your computer, router or firewall.

What do you mean by whitelist? ›

a list of people or things that are considered by a particular authority or group to be acceptable and that should be trusted.

What are whitelist settings? ›

Whitelisting an email means setting your email provider to allow emails from specific senders into your inbox instead of being filtered into spam.

What is the advantage of whitelisting? ›

Advantages of Whitelisting
Whitelisting AdvantagesWhitelisting Disadvantages
• Blocks untrusted sources • Computationally efficient • Reduces false positives in threat detection • Enforces basic asset and user tracking strictly• Labor intensive • Time consuming • Can slow productivity
Nov 3, 2023

What does whitelist mean content? ›

Influencer content whitelisting occurs when an influencer grants a brand advertising permissions to their social media account. Typically, influencer whitelisting is a mutually beneficial relationship for both the brand and influencer.

What is the difference between a blacklist and a whitelist? ›

Whitelisting vs Blacklisting: What's the Difference? Whitelisting and blacklisting are common methods used in cybersecurity to control access to computer systems, networks, and data. A whitelist defines approved entities that are permitted access, while a blacklist defines prohibited entities that are denied access.

Why won't Quizlet let me log in? ›

Quizlet says I've tried to log in too many times

You'll see this message after too many unsuccessful login tries. The easiest way to get logged back in is to reset your password from the Forgot password page. If you need more help, follow these steps to reset your password.

Top Articles
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 5926

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.