Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Unit
|
gptkbp:analyzes |
User Behavior
Security Incidents Malware_Samples |
gptkbp:assists |
Regulatory Compliance
|
gptkbp:collaboratesWith |
IT_Department
External_Security_Vendors |
gptkbp:conducts |
Risk Assessments
Penetration Testing Security Audits Forensic Analysis Data Breach Investigations |
gptkbp:coordinatesWith |
Law Enforcement
|
gptkbp:develops |
Disaster Recovery Plans
Incident Response Plans Security Frameworks Security Metrics Security_Awareness_Programs |
gptkbp:engagesIn |
Threat Hunting
|
gptkbp:evaluates |
Security Risks
Security_Technologies |
https://www.w3.org/2000/01/rdf-schema#label |
Security Operations Unit
|
gptkbp:implements |
Security Tools
|
gptkbp:maintains |
Security Policies
Incident Response Tools Incident Logs |
gptkbp:manages |
Access Control
Security Incidents |
gptkbp:monitors |
Network Traffic
Cloud Security |
gptkbp:participatesIn |
Security Compliance Audits
Incident Response Drills Security_Conferences |
gptkbp:partOf |
Security_Department
|
gptkbp:provides |
Technical Support
Security Awareness Training 24/7 Monitoring Threat Reports Security Consultation |
gptkbp:railwayLine |
Security Analysts
|
gptkbp:reportsTo |
Chief Information Security Officer (CISO)
|
gptkbp:respondsTo |
Security Breaches
|
gptkbp:responsibleFor |
Incident Response
Threat Intelligence Vulnerability_Management |
gptkbp:uses |
Firewalls
Intrusion_Detection_Systems_(IDS) |
gptkbp:utilizes |
gptkb:Endpoint_Detection_and_Response_(EDR)
gptkb:Security_Information_and_Event_Management_(SIEM) Log_Management_Solutions |