HOME

TheInfoList



OR:

In
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
a countermeasure is an action, device, procedure, or technique that reduces a threat, vulnerability, or attack, eliminating or preventing it by minimizing the
harm Harm is a morality, moral and law, legal concept with multiple definitions. It generally functions as a synonym for evil or anything that is bad under certain moral systems. Something that causes harm is harmful, and something that does not is har ...
it can cause. It can also include discovering and reporting vunerabilities so that corrective action can be taken. The definition is given in
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
RFC 2828RFC 2828 Internet Security Glossary and CNSS Instruction No. 4009 dated 26 April 2010 by the Committee on National Security Systems.CNSS Instruction No. 4009
dated 26 April 2010
According to the Glossary b
InfosecToday
the meaning of countermeasure is: :The deployment of a set of security services to protect against a security threat. A synonym is security control. In telecommunications, communication countermeasures are defined as security services as part of the OSI Reference model by ITU-T X.800 Recommendation. X.800 and ISO ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture are technically aligned. The following picture explains the relationships between these concepts and terms:
      + - - - - - - - - - - - - +  + - - - - +  + - - - - - - - - - - -+
      ,  An Attack:              ,   , Counter- ,   ,  A System Resource:   , 
      ,  i.e., A Threat Action   ,   ,  measure ,   ,  Target of the Attack , 
      ,  +----------+            ,   ,          ,   ,  +-----------------+  , 
      ,  ,  Attacker , <

, , <

= , , , , i.e., , Passive , , , , , Vulnerability , , , , A Threat , <

=>, , <

> , , , , Agent , or Active , , , , +-------, , , -------+ , , +----------+ Attack , , , , VVV , , , , , , Threat Consequences , + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+
A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the confidentiality,
integrity Integrity is the quality of being honest and having a consistent and uncompromising adherence to strong moral and ethical principles and values. In ethics, integrity is regarded as the honesty and Honesty, truthfulness or of one's actions. Integr ...
or availability properties of these resources (potentially different than the vulnerable one) of the organization and other involved parties (customers, suppliers).
The so-called CIA triad is the basis of
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
. The attack can be active when it attempts to alter system resources or affect their operation: so it compromises integrity or availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources, compromising confidentiality. A threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger enabling the exploitation of a vulnerability. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, fire, or tornado). A set of policies concerned with information security management, the information security management systems (ISMS), has been developed to manage, according to
risk management Risk management is the identification, evaluation, and prioritization of risks, followed by the minimization, monitoring, and control of the impact or probability of those risks occurring. Risks can come from various sources (i.e, Threat (sec ...
principles, the countermeasures in order to accomplish to a security strategy set up following rules and regulations applicable in a country.


Countermeasures Against Physical Attacks

If a potential malicious actor has physical access to a computer system, they have a greater chance of inflicting harm upon it.


Electronic Destruction Devices

Devices such as a USB Killer may be used to damage or render completely unusable anything with a connection to the
motherboard A motherboard, also called a mainboard, a system board, a logic board, and informally a mobo (see #Nomenclature, "Nomenclature" section), is the main printed circuit board (PCB) in general-purpose computers and other expandable systems. It ho ...
of a computer, such as a USB port, video port, Ethernet port, or serial port. Without proper protection, these devices may result in the destruction of ports, adapter cards, storage devices, RAM, motherboards, CPUs, or anything physically connected to the device attacked, such as monitors, flash drives, or wired switches. These types of devices can even be used to damage smartphones and cars, as well. This threat can be mitigated by not installing or restricting physical access to easily accessible ports in situations where they are not necessary. A port-closing lock which permanently disables access to a port short of the actual port being disassembled. When it is necessary for a port to be accessible, an optocoupler can allow for a port to send and receive data to a computer or device without a direct electrical connection, preventing the computer or device from receiving any dangerous voltage from an external device.


Hard Drives and Storage

In an unsecured scenario, a malicious actor may steal or destroy storage devices such as hard drives or SSDs, resulting in the destruction or theft of valuable data. If the data of a storage device is no longer necessary, data theft is best prevented against by physically destroying or shredding the storage device. If the data of a storage device is in use and must be secured, one can use
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
to encrypt the contents of a storage device, or even encrypt the whole storage device save for the master boot record. The device can then be unlocked with a password, biometric authentication, a physical dongle, a network interchange, a one-time password, or any combination thereof. If this device is a boot drive, however, it must be unencrypted in a pre-boot environment so the operating system can be accessed. Striping, or breaking data into chunks stored upon multiple drives which must be assembled in order to access the data, is a possible solution to physical drive theft, provided that the drives are stored in multiple, individually secured locations, and are enough in number that no one drive can be used to piece together meaningful information. Not to be neglected is the process of adding physical barriers to the storage devices themselves. Locked cases or physically hidden drives, with a limited number of personnel with knowledge and access to the keys or locations, may prove to be a good first line against physical theft.


See also

* Countermeasure *
Computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
* Computer insecurity * Common Vulnerabilities and Exposures (CVE) * Common Vulnerability Scoring System (CVSS) *
Exploit (computer security) An exploit is a method or piece of code that takes advantage of Vulnerability (computer security), vulnerabilities in software, Application software, applications, Computer network, networks, operating systems, or Computer hardware, hardware, typic ...
* Full disclosure (computer security) * IT risk * Metasploit * Month of Bugs * Vulnerability management * w3af


References


External links

* {{DEFAULTSORT:Countermeasure (Computer) Computer network security