129:
32:
193:"Active" countermeasures mean the system user or the defender takes an active position because the incoming incident is known so the system takes active approaches to deal with such possible damage. Such an approach may include setting up a security method for the incident or actively trying to stop or intersect such damage.
201:"Passive" countermeasures mean the system is not aware of the incoming incident or potential security issues. To mitigate the result of any security issues, the system sets up a set of passive approach which only activates when the system encounters security problems. Usually, "Passive" countermeasures include:
211:
This includes information on security or defensive technology, usually a way to protect the system. For example, security software or firewall could also be thought of as an approach to defensive technology. These methods detect potential security issues and report back to the system or protect the
237:
to access the core server. The jump server works as a fortification to separate the core server and the outside, which the core server sometimes is not connected to the internet and only connects to the local network, so the user needs to access the jump server to access the core server
140:
is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The first known use of the term according to the
222:
This means the system has damage control about the possible outcome of the security problem. For example, the system might have a backup in a remote area so even if the current system is damaged, the system could switch to the remote backup and works seamlessly.
233:
This means the system sets up a security approach to separate the core of the system. This approach is commonly used in a modern server network, where the server user has to go through a
205:
16:
This article is about general concept of countermeasure. For information security or cyberspace security countermeasures, see
96:
68:
75:
115:
49:
82:
53:
64:
17:
42:
89:
255:
167:
8:
285:
142:
216:
279:
227:
234:
172:
185:
Defense countermeasures are often divided into "active" and "passive".
128:
31:
148:
Countermeasures can refer to the following disciplinary spectrum:
56:. Unsourced material may be challenged and removed.
212:system when the system is under a certain threat.
277:
256:"Merriam-Webster definition for countermeasure"
116:Learn how and when to remove this message
127:
132:Fortification, a passive countermeasure
278:
54:adding citations to reliable sources
25:
13:
23:Action taken to offset another one
14:
297:
30:
41:needs additional citations for
248:
1:
241:
158:Electro-magnetic engineering
7:
10:
302:
196:
15:
188:
18:Countermeasure (computer)
145:dictionary was in 1923.
164:Information technology
133:
155:Materials engineering
131:
178:Pollution prevention
50:improve this article
206:Security Technology
134:
168:International Law
126:
125:
118:
100:
293:
270:
269:
267:
266:
252:
121:
114:
110:
107:
101:
99:
65:"Countermeasure"
58:
34:
26:
301:
300:
296:
295:
294:
292:
291:
290:
276:
275:
274:
273:
264:
262:
260:Merriam Webster
254:
253:
249:
244:
199:
191:
143:Merriam-Webster
122:
111:
105:
102:
59:
57:
47:
35:
24:
21:
12:
11:
5:
299:
289:
288:
272:
271:
246:
245:
243:
240:
231:
230:
220:
219:
217:Damage Control
209:
208:
198:
195:
190:
187:
183:
182:
179:
176:
170:
165:
162:
159:
156:
153:
138:countermeasure
124:
123:
38:
36:
29:
22:
9:
6:
4:
3:
2:
298:
287:
284:
283:
281:
261:
257:
251:
247:
239:
236:
229:
228:Fortification
226:
225:
224:
218:
215:
214:
213:
207:
204:
203:
202:
194:
186:
180:
177:
174:
171:
169:
166:
163:
160:
157:
154:
151:
150:
149:
146:
144:
139:
130:
120:
117:
109:
98:
95:
91:
88:
84:
81:
77:
74:
70:
67: –
66:
62:
61:Find sources:
55:
51:
45:
44:
39:This article
37:
33:
28:
27:
19:
263:. Retrieved
259:
250:
232:
221:
210:
200:
192:
184:
147:
137:
135:
112:
106:January 2013
103:
93:
86:
79:
72:
60:
48:Please help
43:verification
40:
235:jump server
265:2023-12-09
242:References
173:Diplomatic
76:newspapers
286:Strategy
280:Category
181:Aviation
175:security
161:Policing
152:Medicine
197:Passive
90:scholar
189:Active
92:
85:
78:
71:
63:
97:JSTOR
83:books
69:news
52:by
282::
258:.
136:A
268:.
119:)
113:(
108:)
104:(
94:·
87:·
80:·
73:·
46:.
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.