expand for answer

Control

Any protective action, device, procedure, technique, or other measure that reduces exposures. The use of access rules or countermeasures to limit a subject’s access to an object.


Similar items:
Extent to which protective measures, techniques, and procedures must be applied to information systems and networks based on risk, threat, vulnerability, system interconnectivity considerations, and information assurance needs. Levels of protection are: 1. Basic: information system and networks requiring implementation of standard minimum security countermeasures. 2. Medium: information system and networks requiring layering of additional safeguards above the standard minimum security countermeasures. 3. High: information system and networks requiring the most stringent protection and rigorous security countermeasures.
[view]
Actions taken to patch a vulnerability or secure a system against an attack. Countermeasures can include altering access controls, reconfiguring security settings, installing new security devices or mechanisms, adding or removing services, and so on.
[view]
A nonhostile environment that can be protected from external hostile elements by physical, personnel, and procedural security countermeasures. Nonhostile environment that may be protected from external hostile elements by physical, personnel, and procedural security countermeasures.
[view]
Security controls (i. e. , safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system. (NIST Special Pub 80053. )The security controls (i. e. , safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system.
[view]
Protective measures prescribed to meet the security requirements (i. e. , confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in