Statements (17)
Predicate | Object |
---|---|
gptkbp:instanceOf |
information security principle
|
gptkbp:alternativeName |
AIC triad
|
gptkbp:appliesTo |
cybersecurity
data protection |
gptkbp:component |
Confidentiality
Integrity Availability |
gptkbp:describes |
core objectives of information security
|
https://www.w3.org/2000/01/rdf-schema#label |
CIA triad
|
gptkbp:originatedIn |
computer security field
|
gptkbp:purpose |
guide security policies
|
gptkbp:relatedTo |
risk management
security controls |
gptkbp:standsFor |
Confidentiality, Integrity, Availability
|
gptkbp:usedIn |
information security
|
gptkbp:bfsParent |
gptkb:The_Pillars_of_Security
|
gptkbp:bfsLayer |
7
|