Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Security Concept
|
gptkbp:appliesTo |
Networks
Buildings Computer Systems |
gptkbp:component |
Security Policy
|
gptkbp:example |
gptkb:Turnstiles
Single Sign-On Access Badges Multi-factor Authentication Access Control Matrix Biometric Authentication Firewall Rules Geographical Access Restrictions Keycard Entry Network Segmentation Password Protection Security Tokens Smart Locks Time-based Access User Permissions VPN Access Control Zero Trust Security Model |
gptkbp:goal |
Prevent Unauthorized Access
Protect Availability Protect Confidentiality Protect Integrity |
gptkbp:hasMethod |
gptkb:Role-Based_Access_Control
Access Control System Attribute-Based Access Control Discretionary Access Control Logical Access Control Mandatory Access Control Physical Access Control |
https://www.w3.org/2000/01/rdf-schema#label |
Access Control
|
gptkbp:purpose |
Restrict Access to Resources
|
gptkbp:relatedTo |
gptkb:Information_Security
gptkb:Role-Based_Access_Control Authorization Access Control System Authentication Discretionary Access Control Mandatory Access Control Physical Security |
gptkbp:standardizedBy |
gptkb:PCI_DSS
gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 |
gptkbp:usedIn |
Cloud Computing
Databases IoT Devices Operating Systems Enterprise Networks |
gptkbp:bfsParent |
gptkb:server
gptkb:lock |
gptkbp:bfsLayer |
4
|