Statements (28)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Process
|
| gptkbp:frequency |
Periodic
On Demand |
| gptkbp:method |
gptkb:Policy_Review
Social Engineering Configuration Analysis Technical Testing |
| gptkbp:performedBy |
Consultants
Security Professionals |
| gptkbp:purpose |
Ensure Compliance
Mitigate Risks Identify Security Weaknesses |
| gptkbp:relatedTo |
gptkb:Information_Security
Vulnerability Assessment Risk Assessment Penetration Testing |
| gptkbp:result |
Remediation Plan
Security Report |
| gptkbp:standardizedBy |
gptkb:PCI_DSS
gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 gptkb:Common_Criteria |
| gptkbp:usedBy |
gptkb:IT_Departments
Organizations Security Auditors |
| gptkbp:bfsParent |
gptkb:Security_Assurance_Requirements
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
IT Security Evaluation
|