Statements (54)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Field
|
| gptkbp:aimsTo |
Prevent unauthorized access
Prevent data breaches |
| gptkbp:alsoKnownAs |
Cybersecurity
Information Technology Security |
| gptkbp:focusesOn |
Protection of computer systems
Protection of data Protection of networks |
| gptkbp:includes |
Cloud security
Cryptography Network security Risk management Disaster recovery Identity management Application security Security operations Endpoint security |
| gptkbp:practicedIn |
gptkb:Chief_Information_Security_Officers
Security Analysts IT Security Professionals Security Engineers |
| gptkbp:relatedTo |
gptkb:cybercrime
gptkb:Information_Security gptkb:ISO/IEC_27001 gptkb:GDPR gptkb:NIST_Cybersecurity_Framework gptkb:Computer_Security gptkb:malware Firewalls Phishing Compliance Security policies Antivirus software Intrusion detection systems Hacking Penetration testing Vulnerability assessment |
| gptkbp:requires |
Multi-factor authentication
Access control Encryption Patch management Security awareness training Incident response planning Regular security audits |
| gptkbp:threats |
gptkb:malware
Denial-of-service attacks Viruses Social engineering Spyware Zero-day exploits |
| gptkbp:bfsParent |
gptkb:ICDL
gptkb:Axonius |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
IT Security
|