Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Field
|
gptkbp:aimsTo |
Prevent unauthorized access
Prevent data breaches |
gptkbp:alsoKnownAs |
Cybersecurity
Information Technology Security |
gptkbp:focusesOn |
Protection of computer systems
Protection of data Protection of networks |
https://www.w3.org/2000/01/rdf-schema#label |
IT Security
|
gptkbp:includes |
Cloud security
Cryptography Network security Risk management Disaster recovery Identity management Application security Security operations Endpoint security |
gptkbp:practicedIn |
gptkb:Chief_Information_Security_Officers
Security Analysts IT Security Professionals Security Engineers |
gptkbp:relatedTo |
gptkb:Information_Security
gptkb:ISO/IEC_27001 gptkb:GDPR gptkb:NIST_Cybersecurity_Framework gptkb:Computer_Security cybercrime malware Firewalls Phishing Compliance Security policies Antivirus software Intrusion detection systems Hacking Penetration testing Vulnerability assessment |
gptkbp:requires |
Multi-factor authentication
Access control Encryption Patch management Security awareness training Incident response planning Regular security audits |
gptkbp:threats |
malware
Denial-of-service attacks Viruses Social engineering Spyware Zero-day exploits |
gptkbp:bfsParent |
gptkb:ICDL
gptkb:Axonius |
gptkbp:bfsLayer |
7
|