Countermeasure (computer) (original) (raw)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. The definition is as IETF RFC 2828 that is the same as CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America. According to the Glossary by InfosecToday, the meaning of countermeasure is:
| Property | Value | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ---------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | -------- | | ------------------ | | --------------------- | | ------- | | -------------------- | | ------------ | | | | ------------------- | | | -------- | ------------------------------- | | | | ----- | ------- | | | | | ------------- | | | | -------- | ------------------------------- | | | | ----- | --------- | | | | ------------------- | | ------------------- | | | | --- | | | | | | ------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | dbo:abstract | In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. The definition is as IETF RFC 2828 that is the same as CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America. According to the Glossary by InfosecToday, the meaning of countermeasure is: The deployment of a set of security services to protect against a security threat. A synonym is security control.In telecommunications, communication countermeasures are defined as security services as part of OSI Reference model by ITU-T X.800 Recommendation.X.800 and ISO ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture are technically aligned. The following picture explain the relationships between these concepts and terms: + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ | An Attack: | | Counter- | | A System Resource: | | i.e., A Threat Action | | measure | | Target of the Attack | | +----------+ | | | | +-----------------+ | | | Attacker | <==================||<========= | | | | i.e., | Passive | | | | | Vulnerability | | | | A Threat | <=================>||<========> | | | | Agent | or Active | | | | +-------|||-------+ | | +----------+ Attack | | | | VVV | | | | | | Threat Consequences | + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromises the confidentiality, integrity or availability properties of resources (potentially different that the vulnerable one) of the organization and others involved parties (customers, suppliers).The so-called CIA triad is the basis of information security. The attack can be active when it attempts to alter system resources or affect their operation: so it compromises integrity or availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources, compromising confidentiality. A threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger enabling the exploitation of a vulnerability. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, a fire, or a tornado). A set of policies concerned with information security management, the information security management systems (ISMS), has been developed to manage, according to risk management principles, the countermeasures in order to accomplish to a security strategy set up following rules and regulations applicable in a country. (en) | | dbo:wikiPageExternalLink | http://fismapedia.org/index.php%3Ftitle=Term:Countermeasure http://www.infosectoday.com | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dbo:wikiPageID | 29003801 (xsd:integer) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dbo:wikiPageLength | 9237 (xsd:nonNegativeInteger) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dbo:wikiPageRevisionID | 1110282186 (xsd:integer) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dbo:wikiPageWikiLink | dbr:Encryption dbr:Attack_(computing) dbr:Dongle dbr:Information_security dbr:Integrity dbr:Opto-isolator dbr:Computer_insecurity dbr:Computer_security dbr:Network_switch dbr:One-time_password dbr:Vulnerability_(computing) dbr:Confidentiality dbr:Vulnerability_management dbr:Committee_on_National_Security_Systems dbr:Common_Vulnerabilities_and_Exposures dbr:Common_Vulnerability_Scoring_System dbr:Full_disclosure_(computer_security) dbr:W3af dbr:Disk_encryption dbc:Computer_network_security dbr:Data_striping dbr:Security_controls dbr:Harm dbr:Countermeasure dbr:USB_Killer dbr:Threat_(computer) dbr:Month_of_Bugs dbr:Availability dbr:Booting dbr:IETF dbr:Metasploit dbr:OSI_model dbr:Random-access_memory dbr:Security_service_(telecommunication) dbr:Motherboard dbr:Information_security_management_system dbr:Risk_management dbr:Expansion_card dbr:Exploit_(computer_security) dbr:IT_risk dbr:Peripheral dbr:Biometric_authentication | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dbp:wikiPageUsesTemplate | dbt:Authority_control dbt:Div_col dbt:Div_col_end dbt:Other_uses dbt:Reflist dbt:Short_description dbt:Use_dmy_dates | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | dct:subject | dbc:Computer_network_security | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | gold:hypernym | dbr:Action | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rdf:type | owl:Thing dbo:MilitaryConflict | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rdfs:comment | In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. The definition is as IETF RFC 2828 that is the same as CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America. According to the Glossary by InfosecToday, the meaning of countermeasure is: (en) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rdfs:label | Countermeasure (computer) (en) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | owl:sameAs | freebase:Countermeasure (computer) wikidata:Countermeasure (computer) dbpedia-fa:Countermeasure (computer) https://global.dbpedia.org/id/4iNBq | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | prov:wasDerivedFrom | wikipedia-en:Countermeasure_(computer)?oldid=1110282186&ns=0 | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | foaf:isPrimaryTopicOf | wikipedia-en:Countermeasure_(computer) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | is dbo:wikiPageWikiLink of | dbr:Cyberattack dbr:Cyberwarfare dbr:Information_assurance dbr:Information_security dbr:Information_security_awareness dbr:Internet_security_awareness dbr:Computer_security dbr:Vulnerability_(computing) dbr:Web_threat dbr:Wireless_security dbr:DarkMarket dbr:Lastline dbr:European_Electronic_Crime_Task_Force dbr:Security_controls dbr:Countersurveillance dbr:Threat_(computer) dbr:Mobile_security dbr:Asset_(computer_security) dbr:New_Horizons_Computer_Learning_Centers dbr:Security_service_(telecommunication) dbr:Master_of_Science_in_Information_Assurance dbr:Risk_factor_(computing) dbr:IT_risk_management dbr:Typhoid_adware | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | is foaf:primaryTopic of | wikipedia-en:Countermeasure_(computer) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |