Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:information_security_principle
|
| gptkbp:alternativeName |
AIC triad
|
| gptkbp:appliesTo |
cybersecurity
data protection |
| gptkbp:component |
Confidentiality
Integrity Availability |
| gptkbp:describes |
core objectives of information security
|
| gptkbp:originatedIn |
computer security field
|
| gptkbp:purpose |
guide security policies
|
| gptkbp:relatedTo |
risk management
security controls |
| gptkbp:standsFor |
Confidentiality, Integrity, Availability
|
| gptkbp:usedIn |
information security
|
| gptkbp:bfsParent |
gptkb:The_Pillars_of_Security
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CIA triad
|