Countermeasure (video Game)
   HOME

TheInfoList



OR:

A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The first known use of the term according to the Merriam-Webster dictionary was in 1923, though
Google Books Google Books (previously known as Google Book Search, Google Print, and by its code-name Project Ocean) is a service from Google Inc. that searches the full text of books and magazines that Google has scanned, converted to text using optical ...
shows a use as early as 1756. Countermeasures can refer to the following disciplinary spectrum: * Medicine * Materials engineering * Electro-magnetic engineering * Policing * Information technology *
International Law International law (also known as public international law and the law of nations) is the set of rules, norms, and standards generally recognized as binding between states. It establishes normative guidelines and a common conceptual framework for ...
* Diplomatic security * Pollution prevention * Aviation Defense countermeasures are often divided into "active" and "passive".


Active

"Active" countermeasures mean the system user or the defender takes an active position because the incoming incident is known so the system takes active approaches to deal with such possible damage. Such an approach may include setting up a security method for the incident or actively trying to stop or intersect such damage.


Passive

"Passive" countermeasures mean the system is not aware of the incoming incident or potential security issues. To mitigate the result of any security issues, the system sets up a set of passive approach which only activates when the system encounters security problems. Usually, "Passive" countermeasures include: *
Security Technology Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
This includes information on security or defensive technology, usually a way to protect the system. For example, security software or firewall could also be thought of as an approach to defensive technology. These methods detect potential security issues and report back to the system or protect the system when the system is under a certain threat. *
Damage Control In navies and the maritime industry, damage control is the emergency control of situations that may cause the sinking of a watercraft. Examples are: * rupture of a pipe or hull especially below the waterline and * damage from grounding (ru ...
This means the system has damage control about the possible outcome of the security problem. For example, the system might have a backup in a remote area so even if the current system is damaged, the system could switch to the remote backup and works seamlessly. *
Fortification A fortification is a military construction or building designed for the defense of territories in warfare, and is also used to establish rule in a region during peacetime. The term is derived from Latin ''fortis'' ("strong") and ''facere' ...
This means the system sets up a security approach to separate the core of the system. This approach is commonly used in a modern server network, where the server user has to go through a
jump server A jump server, jump host or jump box is a system on a network used to access and manage devices in a separate security zone. A jump server is a hardened and monitored device that spans two dissimilar security zones and provides a controlled mean ...
to access the core server. The jump server works as a fortification to separate the core server and the outside, which the core server sometimes is not connected to the internet and only connects to the local network, so the user needs to access the jump server to access the core server


References

{{reflist Strategy