The IT Law Wiki
Line 28: Line 28:
 
== See also ==
 
== See also ==
   
<div style="column-count:2;-moz-column-count:2;">
+
<div style="{{column-count|2}}">
   
 
* [[Command, control, and communications countermeasures]]
 
* [[Command, control, and communications countermeasures]]

Revision as of 01:54, 26 January 2015

Definitions

Computing

Countermeasures (also called security controls and safeguards) are

actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.[1]
[d]efensive security programs and activities which seek to protect against both foreign intelligence collection efforts and unauthorized access to, or disclosure of, protected facilities, information, and material.[2]

Military

Countermeasures (also called security controls and safeguards) are

[a]nything which effectively negates or mitigates an adversary's ability to exploit vulnerabilities.[3]
[t]hat form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity.[4]

Overview

"They can be deployed preemptively or reactively. Devices and techniques used for EW countermeasures include electro-optical-infrared countermeasures and radio frequency countermeasures."[5]

"A countermeasure can reduce any component of riskthreat, vulnerability, or consequence."[6]

References

  1. CNSSI 4009.
  2. AR 381-20, at 49.
  3. OPSEC Glossary of Terms.
  4. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
  5. FM 3-36, at 1-7.
  6. DHS Risk Lexicon, App. A, at 44.

See also