Logo -Internet Security Systems


advICE : Countermeasures
Countermeasures are software/hardware products that prevent intruders gaining access to your system.

The most common countermeasure is the firewall, which acts like a fence around a network, allowing only authorized people to enter. A firewall is a static countermeasure. Increasingly, dynamic countermeasures like Intrusion Detection Systems (IDS) are becoming popular. These systems act like security cameras, catching hackers in the act and automatically cutting of their access to computers.

  • Banners (1)
    Telling hackers to go away
  • Scanners (25)
    Programs that scan a network looking for ways hackers can break in.
  • Anti-spam (15)
    Tools to prevent spam from entering your network, or prevent your network from being used to relay spam to other people.
  • Authentication (25)
    Common password protection systems for the entire network.
  • Intrusion Detection (31)
    Watches what's going on in order to catch hackers in the act.
  • Encryption@

  • Prevents prying eyes from reading your private data by encoding it behind mathematical algorithms.
  • Firewalls (53)
    Puts a fence around your systems allowing people in only at carefully controled checkpoints.
  • Hardening (0)
    Locking down systems to prevent intrusion
  • Policy (4)
    The most important countermeasure, knowing what you are going to do to prevent an attack -- and how to respond to one when it occurs.
  • TEMPEST (3)
    A rare, but important concern in government circles about escaping electromagnetic radiation that might reveal data.
  • VPN (37)
    Virtual Private Networks, allow users from accross the Internet to connect as if their were local.
  • Services (1)
    Hiring "ethical hackers" to help set up, and test, the security of your network.

  • Books
  • FAQs
  • Intro
  • News
  • Lists
  • Notes

    Privacy Policy |  Copyright Info