Statements (35)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:security
|
gptkbp:can |
opt-in or opt-out mode
|
gptkbp:can_be_bypassed |
by sophisticated attacks
|
gptkbp:can_be_configured_for |
through system settings
Control Panel or Group Policy |
gptkbp:can_be_enabled_or_disabled |
per application basis
|
gptkbp:can_cause |
compatibility issues with some applications
|
gptkbp:configuration |
during Windows installation process
|
gptkbp:developed_by |
gptkb:Microsoft
|
gptkbp:enables |
for specific applications
for system processes by default in Internet Explorer for enhanced security in Windows Vista and later versions |
https://www.w3.org/2000/01/rdf-schema#label |
Data Execution Prevention
|
gptkbp:introduced_in |
gptkb:Windows_XP_Service_Pack_2
|
gptkbp:is_designed_to |
prevent code execution from non-executable memory regions
|
gptkbp:is_documented_in |
Microsoft documentation
|
gptkbp:is_implemented_in |
32-bit and 64-bit versions of Windows
|
gptkbp:is_monitored_by |
using Windows Event Viewer
|
gptkbp:is_part_of |
Windows security architecture
Windows security features Windows Defender features |
gptkbp:is_protected_by |
buffer overflow attacks
|
gptkbp:is_related_to |
gptkb:Address_Space_Layout_Randomization
Address Space Layout Randomization (ASLR) malware prevention strategies |
gptkbp:is_similar_to |
other security measures like sandboxing
|
gptkbp:is_supported_by |
Windows Server editions
|
gptkbp:is_used_in |
enterprise environments for security compliance
virtualized environments for security |
gptkbp:supports |
both user-mode and kernel-mode processes
|
gptkbp:uses |
hardware and software techniques
|
gptkbp:works_with |
Windows operating systems
|
gptkbp:bfsParent |
gptkb:Intel_Memory_Protection_Technology
|
gptkbp:bfsLayer |
6
|