Countermeasure (computer)
In
The definition is given in
According to the Glossary[3] by InfosecToday, the meaning of countermeasure is:
- The deployment of a set of security services to protect against a security threat.
A synonym is security control.[2][4] In telecommunications, communication countermeasures are defined as security services as part of the OSI Reference model by ITU-T X.800 Recommendation. X.800 and ISO ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture are technically aligned.
The following picture explains the relationships between these concepts and terms:
+ - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ | An Attack: | |Counter- | | A System Resource: | | i.e., A Threat Action | | measure | | Target of the Attack | | +----------+ | | | | +-----------------+ | | | Attacker |<==================||<========= | | | | i.e., | Passive | | | | | Vulnerability | | | | A Threat |<=================>||<========> | | | | Agent | or Active | | | | +-------|||-------+ | | +----------+ Attack | | | | VVV | | | | | | Threat Consequences | + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+
A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the confidentiality, integrity or availability properties of these resources (potentially different than the vulnerable one) of the organization and other involved parties (customers, suppliers).
The so-called CIA triad is the basis of information security.
The attack can be active when it attempts to alter system resources or affect their operation: so it compromises integrity or availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources, compromising confidentiality.
A threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger enabling the exploitation of a vulnerability. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, fire, or tornado).[1]
A set of policies concerned with information security management, the
Countermeasures Against Physical Attacks
If a potential malicious actor has physical access to a computer system, they have a greater chance of inflicting harm upon it.
Electronic Destruction Devices
Devices such as a
This threat can be mitigated by not installing or restricting physical access to easily accessible ports in situations where they are not necessary. A port-closing lock which permanently disables access to a port short of the actual port being disassembled.[7] When it is necessary for a port to be accessible, an optocoupler can allow for a port to send and receive data to a computer or device without a direct electrical connection, preventing the computer or device from receiving any dangerous voltage from an external device.[8]
Hard Drives and Storage
In an unsecured scenario, a malicious actor may steal or destroy storage devices such as hard drives or SSDs, resulting in the destruction or theft of valuable data.
If the data of a storage device is no longer necessary, data theft is best prevented against by physically destroying or shredding the storage device.[9]
If the data of a storage device is in use and must be secured, one can use
Not to be neglected is the process of adding physical barriers to the storage devices themselves. Locked cases or physically hidden drives, with a limited number of personnel with knowledge and access to the keys or locations, may prove to be a good first line against physical theft.
See also
- Countermeasure
- Computer security
- Computer insecurity
- Common Vulnerabilities and Exposures (CVE)
- Common Vulnerability Scoring System (CVSS)
- Exploit (computer security)
- Full disclosure (computer security)
- IT risk
- Metasploit
- Month of Bugs
- Vulnerability management
- w3af
References
- ^ a b RFC 2828 Internet Security Glossary
- ^ a b CNSS Instruction No. 4009 Archived 27 February 2012 at the Wayback Machine dated 26 April 2010
- ^ "InfosecToday Glossary" (PDF). Archived from the original (PDF) on 20 November 2014. Retrieved 30 September 2010.
- ^ ISBN 978-0-12-374354-1.
- ^ "USB Killer, yours for $50, lets you easily fry almost every device". Ars Technica. Retrieved 26 August 2018.
- ^ "This $50 USB Killer Can Destroy Almost Any Smartphone, Computer Or Car Within Seconds". TechFonder. Retrieved 26 August 2018.
- ^ "Bench Talk | Protect USB Ports From Nefarious "USB Killers"". mouser.com. Retrieved 26 August 2018.
- ^ "Optocoupler Tutorial". ElectronicsTutorials.
- ^ "Discarded hard drives can be dangerous". ComputerWeekly.com. Retrieved 26 August 2018.