gptkbp:instance_of
|
gptkb:Company
|
gptkbp:bfsLayer
|
3
|
gptkbp:bfsParent
|
gptkb:NIST
|
gptkbp:addresses
|
Cyber Risk
|
gptkbp:aims_to
|
improve cybersecurity practices
|
gptkbp:based_on
|
gptkb:NIST_Special_Publication_800-53
|
gptkbp:collaborated_with
|
Academic Institutions
International Organizations
Private Sector Organizations
|
gptkbp:consists_of
|
gptkb:microprocessor
Implementation Tiers
|
gptkbp:developed_by
|
gptkb:Research_Institute
|
https://www.w3.org/2000/01/rdf-schema#label
|
National Institute of Standards and Technology Cybersecurity Framework
|
gptkbp:includes
|
Detect Function
Identify Function
Protect Function
Recover Function
Respond Function
|
gptkbp:is_adopted_by
|
Private Sector
State Governments
Federal Agencies
|
gptkbp:is_evaluated_by
|
Government Agencies
Cybersecurity Experts
Industry Groups
|
gptkbp:is_influenced_by
|
gptkb:COBIT
gptkb:NIST_Risk_Management_Framework
gptkb:ISO/_IEC_27001
|
gptkbp:is_part_of
|
gptkb:Company
NIST Cybersecurity Framework Implementation Guide
|
gptkbp:is_promoted_by
|
gptkb:NIST_Cybersecurity_Center_of_Excellence
gptkb:Workshops
gptkb:publishing_company
Conferences
Webinars
|
gptkbp:is_reviewed_by
|
Stakeholders
|
gptkbp:is_supported_by
|
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:is_used_by
|
gptkb:organization
|
gptkbp:is_used_for
|
gptkb:government_agency
Incident Response
Continuous Monitoring
Cybersecurity Assessment
Cybersecurity Improvement
|
gptkbp:provides
|
gptkb:historical_event
|
gptkbp:provides_information_on
|
gptkb:Executive_Order_13800
gptkb:software
|
gptkbp:published_by
|
gptkb:2014
|
gptkbp:supports
|
gptkb:software
|
gptkbp:updates
|
gptkb:2018
gptkb:2020
|