Statements (59)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:applies_to |
I Pv6
I Pv4 |
gptkbp:can_be_used_with |
gptkb:IKE
gptkb:SSL/_TLS |
gptkbp:developed_by |
gptkb:Internet_Engineering_Task_Force
|
gptkbp:enables |
secure communication
|
https://www.w3.org/2000/01/rdf-schema#label |
IP Security
|
gptkbp:includes |
gptkb:AH_(Authentication_Header)
gptkb:ESP_(Encapsulating_Security_Payload) |
gptkbp:is_adopted_by |
cloud service providers
data centers telecommunications companies |
gptkbp:is_critical_for |
network security
secure data transmission |
gptkbp:is_enhanced_by |
security policies
intrusion detection systems firewall rules |
gptkbp:is_evaluated_by |
security audits
risk assessments penetration testing threat modeling |
gptkbp:is_implemented_in |
routers
firewalls VP Ns |
gptkbp:is_part_of |
gptkb:XMPP_Extension_Protocol
cybersecurity measures secure network architecture information security strategies I Psec framework |
gptkbp:is_standardized_by |
gptkb:RFC_4301
|
gptkbp:is_subject_to |
security vulnerabilities
data protection regulations attacks international laws |
gptkbp:is_supported_by |
network protocols
various operating systems network devices security frameworks |
gptkbp:is_used_by |
corporate networks
government networks private networks |
gptkbp:is_used_for |
secure email
secure web browsing secure Vo IP |
gptkbp:is_used_in |
remote access VP Ns
site-to-site VP Ns |
gptkbp:provides |
data integrity
data confidentiality data authentication |
gptkbp:regulates |
industry regulations
compliance standards |
gptkbp:setting |
transport mode
tunnel mode |
gptkbp:uses |
encryption
authentication headers encapsulating security payloads |
gptkbp:bfsParent |
gptkb:IIS_(Internet_Information_Services)
|
gptkbp:bfsLayer |
4
|