Statements (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:academic
|
gptkbp:aimsTo |
prevent data breaches
prevent unauthorized access ensure availability ensure confidentiality ensure integrity |
gptkbp:alsoKnownAs |
cybersecurity
|
gptkbp:concerns |
protection of computer systems
protection of data protection of networks |
gptkbp:hasSubfield |
cryptography
network security risk management compliance identity and access management cloud security application security security operations digital forensics incident response security awareness training IoT security endpoint security mobile security vulnerability management |
https://www.w3.org/2000/01/rdf-schema#label |
Computer Security
|
gptkbp:includes |
cryptography
firewalls intrusion detection systems network security risk management information security access control application security incident response endpoint security penetration testing security policies vulnerability assessment malware protection |
gptkbp:practicedIn |
gptkb:CISOs
IT professionals security analysts security engineers penetration testers |
gptkbp:relatedStandard |
gptkb:PCI_DSS
gptkb:ISO/IEC_27001 gptkb:GDPR gptkb:NIST_Cybersecurity_Framework |
gptkbp:relatedTo |
computer science
information technology privacy compliance digital forensics ethical hacking |
gptkbp:threats |
malware
phishing denial-of-service attacks man-in-the-middle attacks SQL injection insider threats zero-day exploits |
gptkbp:bfsParent |
gptkb:Privilege_Escalation
gptkb:Information_Security |
gptkbp:bfsLayer |
6
|