1 |
CountermeasureAny process that directly reduces a threat or vulnerability.
|
2 |
CountermeasureReactive methods used to prevent an exploit from successfully occurring once a threat has been detected. Intrusion Prevention Systems (IPS) commonly employ countermeasures to prevent intruders form ga [..]
|
3 |
Countermeasure1923, from counter- + measure (n.).
|
4 |
Countermeasure1. [An] action, device, procedure, technique, or other measure that reduces the vulnerability of an information system (IS). [INFOSEC-99] 2. Synonymous with Security Measure [CESG].
|
5 |
Countermeasurenoun. With regard to polygraph examinations, any attempt on the behalf of a person to refrain from being categorized as misleading or corrupt. Usually, people might employ physical methods to escalate [..]
|
6 |
CountermeasureAn action taken or a physical capability provided whose principal purpose is to reduce or eliminate one or more vulnerabilities.
|
7 |
Countermeasure(n) an action taken to offset another action
|
8 |
CountermeasureAn activity or initiative to prevent, neutralize, or correct a specific problem.
|
9 |
CountermeasureA security measure implemented in order to mitigate an identified risk, or perhaps to maintain a baseline level of security (as, for example, in the case of the HMG Baseline Countermeasure Set).
|
10 |
CountermeasureTechniques and routines designed to prevent or reverse unwanted effects of Weightlessness experienced during actual and simulated Space Flight, including physiologic changes related to removal of grav [..]
|
11 |
CountermeasureA countermeasure is an action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS). Countermeasur [..]
|
12 |
Countermeasureany action or device that reduces a computer system's vulnerability cracker
|
13 |
CountermeasureThe deployment of a set of security services to protect against a security threat.
|
14 |
Countermeasure
Any action taken to counteract or correct another
|
<< COSO | Credentialed analysis >> |