m (→See also) |
|||
Line 28: | Line 28: | ||
== See also == |
== See also == |
||
− | <div style="column-count |
+ | <div style="{{column-count|2}}"> |
* [[Command, control, and communications countermeasures]] |
* [[Command, control, and communications countermeasures]] |
Revision as of 01:54, 26 January 2015
Definitions
Computing
Countermeasures (also called security controls and safeguards) are
“ | actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.[1] | ” |
“ | [d]efensive security programs and activities which seek to protect against both foreign intelligence collection efforts and unauthorized access to, or disclosure of, protected facilities, information, and material.[2] | ” |
Military
Countermeasures (also called security controls and safeguards) are
“ | [a]nything which effectively negates or mitigates an adversary's ability to exploit vulnerabilities.[3] | ” |
“ | [t]hat form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity.[4] | ” |
Overview
"They can be deployed preemptively or reactively. Devices and techniques used for EW countermeasures include electro-optical-infrared countermeasures and radio frequency countermeasures."[5]
"A countermeasure can reduce any component of risk — threat, vulnerability, or consequence."[6]
References
- ↑ CNSSI 4009.
- ↑ AR 381-20, at 49.
- ↑ OPSEC Glossary of Terms.
- ↑ U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
- ↑ FM 3-36, at 1-7.
- ↑ DHS Risk Lexicon, App. A, at 44.