Statements (71)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_intelligence
|
gptkbp:can_be_used_with |
SIEM systems
|
gptkbp:collaborated_with |
cybersecurity initiatives
other standards bodies open standards initiatives |
gptkbp:developed_by |
gptkb:MITRE_Corporation
open governance model |
gptkbp:enables |
threat detection
|
gptkbp:facilitates |
incident response
|
gptkbp:first_released |
gptkb:2014
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyb OX
|
gptkbp:includes |
observable types
|
gptkbp:is_adopted_by |
data analysis
government agencies various organizations private sector organizations |
gptkbp:is_associated_with |
incident management
|
gptkbp:is_compatible_with |
gptkb:STIX_2.0
|
gptkbp:is_designed_for |
interoperability
|
gptkbp:is_documented_in |
technical papers
official specifications |
gptkbp:is_evaluated_by |
security assessments
|
gptkbp:is_implemented_in |
various programming languages
|
gptkbp:is_incorporated_in |
security operations
|
gptkbp:is_influenced_by |
previous standards
|
gptkbp:is_integrated_with |
security frameworks
threat intelligence feeds other cybersecurity tools |
gptkbp:is_part_of |
gptkb:Cybersecurity
cybersecurity frameworks cybersecurity policies cybersecurity best practices threat intelligence sharing cyber defense strategies cyber threat frameworks |
gptkbp:is_prominent_in |
cybersecurity conferences
|
gptkbp:is_promoted_by |
industry leaders
cybersecurity communities |
gptkbp:is_promoted_through |
workshops
|
gptkbp:is_recognized_as |
a key standard
|
gptkbp:is_recognized_by |
industry experts
|
gptkbp:is_recognized_for |
its flexibility
|
gptkbp:is_referenced_in |
gptkb:academic_research
|
gptkbp:is_related_to |
malware analysis
threat intelligence platforms |
gptkbp:is_supported_by |
training programs
community contributions open-source tools commercial solutions |
gptkbp:is_used_by |
security analysts
|
gptkbp:is_used_in |
security audits
threat modeling security incident analysis |
gptkbp:is_used_to |
enhance situational awareness
track cyber threats |
gptkbp:is_utilized_by |
incident response teams
|
gptkbp:is_utilized_for |
risk assessment
data correlation forensics vulnerability assessments network defense |
gptkbp:is_utilized_in |
security research
threat hunting |
gptkbp:latest_version |
2.1
|
gptkbp:part_of |
gptkb:Saint
|
gptkbp:provides |
a structured way to represent observables
|
gptkbp:supports |
data sharing
|
gptkbp:used_for |
describing cyber observables
|
gptkbp:written_in |
gptkb:JSON
|
gptkbp:bfsParent |
gptkb:OASIS_specifications
|
gptkbp:bfsLayer |
5
|