Statements (54)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Security_Concept
|
| gptkbp:appliesTo |
Networks
Buildings Computer Systems |
| gptkbp:component |
Security Policy
|
| gptkbp:example |
gptkb:Turnstiles
Single Sign-On Access Badges Multi-factor Authentication Access Control Matrix Biometric Authentication Firewall Rules Geographical Access Restrictions Keycard Entry Network Segmentation Password Protection Security Tokens Smart Locks Time-based Access User Permissions VPN Access Control Zero Trust Security Model |
| gptkbp:goal |
Prevent Unauthorized Access
Protect Availability Protect Confidentiality Protect Integrity |
| gptkbp:hasMethod |
gptkb:Access_Control_System
gptkb:Role-Based_Access_Control Attribute-Based Access Control Discretionary Access Control Logical Access Control Mandatory Access Control Physical Access Control |
| gptkbp:purpose |
Restrict Access to Resources
|
| gptkbp:relatedTo |
gptkb:Access_Control_System
gptkb:Information_Security gptkb:Role-Based_Access_Control Authorization Authentication Discretionary Access Control Mandatory Access Control Physical Security |
| gptkbp:standardizedBy |
gptkb:PCI_DSS
gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 |
| gptkbp:usedIn |
Cloud Computing
Databases IoT Devices Operating Systems Enterprise Networks |
| gptkbp:bfsParent |
gptkb:Authentication_Server
gptkb:Token_Ring_frame_format |
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Access Control
|