Which of the following is/are strategies for the implementation of countermeasures?

A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network. In this context, a threat is a potential or actual adverse event that may be malicious or incidental, and that can compromise the assets of an enterprise or the integrity of a computer or network.

Countermeasures can take the form of software, hardware and modes of behavior. Software countermeasures include:

  • personal firewalls
  • application firewalls
  • anti-virus software
  • pop-up blockers
  • spyware detection/removal programs.
The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other hardware countermeasures include:
  • biometric authentication systems
  • physical restriction of access to computers and peripherals
  • intrusion detectors
  • alarms.
Behavioral countermeasures include:
  • frequent deletion of stored cookies and temporary files from Web browsers
  • regular scanning for viruses and other malware
  • regular installation of updates and patches for operating systems
  • refusing to click on links that appear within e-mail messages
  • refraining from opening e-mail messages and attachments from unknown senders
  • staying away from questionable Web sites
  • regularly backing up data on external media.

In military applications, a countermeasure is a system or strategy intended to prevent an enemy from compromising a target. This can be done by shielding, concealing or moving the target, creating decoys or otherwise confusing the enemy.

This was last updated in June 2006

Continue Reading About countermeasure

  • JMRTechnet.com outlines computer security policies and types.
  • Counterpane publishes a quarterly review of news and ideas on integrated network security.

Dig Deeper on Software testing tools and techniques

  • Which of the following is/are strategies for the implementation of countermeasures?
    security

    Which of the following is/are strategies for the implementation of countermeasures?

    By: Madelyn Bacon

  • Which of the following is/are strategies for the implementation of countermeasures?
    OPSEC (operations security)

    Which of the following is/are strategies for the implementation of countermeasures?

    By: Linda Rosencrance

  • Which of the following is/are strategies for the implementation of countermeasures?
    antimalware (anti-malware)

    Which of the following is/are strategies for the implementation of countermeasures?

    By: Linda Rosencrance

  • Which of the following is/are strategies for the implementation of countermeasures?
    Top 10 types of information security threats for IT teams

    Which of the following is/are strategies for the implementation of countermeasures?

    By: Linda Rosencrance

Site Notification

Site Notification

FHWA’s Proven Safety Countermeasures initiative (PSCi) is a collection of 28 countermeasures and strategies effective in reducing roadway fatalities and serious injuries on our Nation’s highways. Transportation agencies are strongly encouraged to consider widespread implementation of PSCs to accelerate the achievement of local, State, and National safety goals. These strategies are designed for all road users and all kinds of roads—from rural to urban, from high-volume freeways to less traveled two-lane State and county roads, from signalized crossings to horizontal curves, and everything in between. Each countermeasure addresses at least one safety focus area – speed management, intersections, roadway departures, or pedestrians/bicyclists – while others are crosscutting strategies that address multiple safety focus areas. Search Proven Safety Countermeasures.

Speed Management

Pedestrian/Bicyclist

Roadway Departure

Intersections

Crosscutting

What are the strategies for the implementation of countermeasures?

A strategic approach to implementing countermeasures.
Increase public awareness of the problem. ... .
Consider the road safety effects, especially for young drivers, of public policy decisions that are not directly related to road safety. ... .
Implement overall road safety improvements that address young driver risk..

What countermeasures can you implement to help reduce technology associated insider threats?

How to minimize the risk of insider threats.
Perform enterprise-wide risk assessments. ... .
Clearly document and consistently enforce policies and controls. ... .
Establish physical security in the work environment. ... .
Implement security software and appliances. ... .
Implement strict password and account management policies and practices..

Which are good countermeasures to insider attacks?

Stopping Insider Threats with Identity & Access Management Consequently, the best way to mitigate the risks posed by insiders is to restrict access to company data as much as possible using an identity & access management solution.

Which of the following must be reported to the Defense Counterintelligence and security Agency and FBI by contractors under the National Industrial security Program?

Cleared contractors must also report actual, probable, or possible espionage, sabotage, terrorism, or subversion promptly to the Federal Bureau of Investigation (FBI) and DCSA (NISPOM 1-301).