Statements (37)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Network Security Technique
|
gptkbp:alsoKnownAs |
SSL Inspection
HTTPS Interception |
gptkbp:auditedBy |
Compliance Officers
Security Auditors |
gptkbp:block |
gptkb:HSTS
gptkb:Certificate_Pinning Client-Side Validation |
gptkbp:brokenBy |
Forward Secrecy
|
gptkbp:canBeBypassedBy |
End-to-End Encryption
|
gptkbp:cause |
Performance Overhead
Operational Complexity |
gptkbp:controversy |
Security Risks
Privacy Concerns Legal Compliance |
gptkbp:exposedBy |
Sensitive Data
User Privacy |
https://www.w3.org/2000/01/rdf-schema#label |
SSL Decryption
|
gptkbp:implementedIn |
Cloud Security Services
Enterprise Security Appliances |
gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
gptkbp:requires |
gptkb:certification
Man-in-the-Middle Technique Trusted Root Certificate |
gptkbp:supportsProtocol |
gptkb:SSL
TLS |
gptkbp:usedBy |
Firewalls
Intrusion Detection Systems Proxies |
gptkbp:usedFor |
Data Loss Prevention
Threat Detection Monitoring Encrypted Traffic |
gptkbp:bfsParent |
gptkb:PA-3220
gptkb:PA-5220 |
gptkbp:bfsLayer |
8
|