Statements (878)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:intelligence_gathering
gptkb:military_organization gptkb:organization gptkb:security gptkb:software gptkb:bankruptcy gptkb:educational_institution gptkb:library gptkb:parliamentary_committee concept foreign aid program cryptographic device |
gptkbp:abbreviation |
gptkb:HSM
gptkb:IPS gptkb:NSS |
gptkbp:acquiredBy |
gptkb:Federal_Reserve
foreign governments institutions individuals |
gptkbp:activity |
incident response
policy development security research security training |
gptkbp:administeredBy |
gptkb:United_States_Department_of_Defense
gptkb:United_States_Department_of_State |
gptkbp:ageRange |
from a few days to 30 years
|
gptkbp:alsoKnownAs |
gptkb:MI5
Al-Amn Al-Markazi |
gptkbp:alternativeName |
Vulnerability
password vulnerability privacy_concern security_rating security_feature security_model security_operation security_standard security_vulnerability API_security_product API_security_profile Access_control_system Automotive_Security_Threat Campus_security_service Central_Security_Command Cloud_Security_Feature Computer_Security_Component Computer_Security_Concept Computer_Security_Organization Computer_Security_Technique Computer_Security_Term Computer_Security_Vulnerability Computer_security_standard Computer_security_technique Computer_security_term Cryptographic_System Cryptographic_attack Cryptographic_technique Cybersecurity_Concept Cybersecurity_Framework Cybersecurity_Technique Cybersecurity_Technology Cybersecurity_Term Cybersecurity_Threat Cybersecurity_Vulnerability Cybersecurity_attack_technique Cybersecurity_concept Cybersecurity_framework Cybersecurity_vulnerability Data_Security_Solution Data_Security_Technique Data_security_technique Database_security_feature Encryption_Technology Enterprise_security_architecture_framework Equity_Security Equity_security Field_of_Computer_Security Government_Security Government_security Hardware_Security_Module Home_security_service Home_security_system IT_security_evaluation_assurance_level IT_security_evaluation_process IT_security_standard IT_security_standard_version Information_Security_Concept Information_Security_Control Information_Security_Discipline Information_Security_Domain Information_security_concept Information_security_standard Internet_security_framework Internet_security_mechanism Internet_security_process Internet_security_service Internet_security_standard Intrusion_Prevention_System IoT_security_service IoT_security_solution JavaScript_security_library Java_security_framework Linux_security_module Managed_Security_Service Managed_Security_Service_Provider Microsoft_Security_Bulletin Microsoft_Security_Update Microsoft_security_bulletin Microsoft_security_update Network_Security_Device Network_Security_Feature Network_Security_Service Network_Security_Technique Network_Security_Technology Network_security_appliance Network_security_device Network_security_feature Network_security_management_appliance Network_security_software Network_security_technology OWASP_Top_10_Security_Risk Password_manager Peace_and_security_body Secret_management_feature Security_Assessment_Methodology Security_Committee Security_Concept Security_Context Security_Device Security_Discipline Security_Facility Security_Feature Security_Identifier Security_Incident Security_Information_and_Event_Management_software Security_Information_and_Event_Management_solution Security_Measure Security_Mechanism Security_Model Security_Principle Security_Process Security_Service Security_Solution Security_System Security_Technology Security_Threat Security_Vulnerability Security_advisory_publication Security_agreement Security_barrier Security_checkpoint Security_concept Security_discipline Security_feature Security_information_and_event_management_software Security_mitigation_technique Security_orchestration_platform Security_organization Security_platform Security_policy Security_principle Security_product Security_program Security_software Security_technique Security_technology Security_token Security_vulnerability Trusted_Computing_Concept Trusted_Computing_Technology U.S._government_security U.S._security_assistance_program United_States_Treasury_security United_States_security_assistance_program Web_Security_Feature Web_Security_Vulnerability Web_security_concept Web_security_feature Web_security_policy Web_security_service Web_security_technology Web_security_vulnerability Web_service_security_standard Wi-Fi_security_service Windows_Security_feature Windows_security_feature Windows_security_principal access_control_system anti-theft_system attack_transport authentication_attack authentication_technology bilateral_security_dialogue cargo_security_system cloud-based_network_security_platform cloud-based_security_suite cloud_security_feature cloud_security_guideline cloud_security_technology computer_security_architecture computer_security_attack computer_security_classification computer_security_component computer_security_concept computer_security_conference computer_security_evaluation_criteria computer_security_exploit_technique computer_security_feature computer_security_guideline computer_security_incident computer_security_model computer_security_organization computer_security_research_project computer_security_software computer_security_standard computer_security_technique computer_security_technology computer_security_vulnerability corporate_security_team cryptographic_attack cryptographic_authentication_IC cryptographic_backdoor cryptographic_method cryptographic_mode cryptographic_property cryptographic_system cryptographic_technique cryptographic_vulnerability cryptography_principle cryptologic_system cybersecurity_advisory cybersecurity_approach cybersecurity_artifact cybersecurity_assessment cybersecurity_attack cybersecurity_attack_technique cybersecurity_competition cybersecurity_compliance_solution cybersecurity_concept cybersecurity_division cybersecurity_exercise cybersecurity_exploit cybersecurity_facility cybersecurity_feature cybersecurity_framework cybersecurity_guide cybersecurity_guideline cybersecurity_identifier cybersecurity_incident cybersecurity_initiative cybersecurity_marketplace cybersecurity_metric cybersecurity_model cybersecurity_operation cybersecurity_platform cybersecurity_practice cybersecurity_process cybersecurity_product cybersecurity_program cybersecurity_project cybersecurity_research_project cybersecurity_risk cybersecurity_service cybersecurity_software cybersecurity_solution cybersecurity_standard cybersecurity_system cybersecurity_team cybersecurity_technique cybersecurity_technology cybersecurity_term cybersecurity_threat cybersecurity_tool cybersecurity_vulnerability data_protection_process data_protection_right data_protection_solution data_security_feature data_security_platform data_security_software data_security_technology database_security_feature digital_security_guide digital_security_platform digital_security_service digital_security_support_service email_security_standard email_security_term encryption_system encryption_technology encryption_utility endpoint_security_platform endpoint_security_software enterprise_security_appliance federal_security_program global_security_assessment government_security hacker_convention hardware_security_feature hardware_security_key hardware_security_module home_security_system informal_security_cooperation_arrangement information_security_assessment_scheme information_security_concept information_security_control_framework information_security_management_standard information_security_management_system information_security_model information_security_policy information_security_principle information_security_process information_security_program information_security_solution information_security_standard intergovernmental_security_forum international_security_forum international_security_framework international_security_program internet_security_standard internet_security_suite intrusion_prevention_system mainframe_security_software mobile_security_feature mobile_security_service mortgage-backed_security national_security_body national_security_concept network_security_appliance network_security_architecture network_security_component network_security_concept network_security_credential network_security_device network_security_feature network_security_framework network_security_incident network_security_management_appliance network_security_management_product network_security_management_software network_security_mechanism network_security_model network_security_module network_security_monitor network_security_product network_security_product_line network_security_service network_security_software network_security_software_suite network_security_solution network_security_standard network_security_system network_security_technique network_security_technology network_security_threat network_security_tool operating_system_security_feature password_manager personal_protection_system privacy_protection_service private_security_force private_security_patrol public_security_authority public_security_institution public_security_organization publicly_traded_security regional_security_initiative regional_security_organization runtime_security_tool secret_program secure_children's_home secure_communication_service secure_communications_system secure_computation_system secure_element secure_messaging_application secure_network secure_police_communications_system secure_speech_system secure_telephone security_advisory security_advisory_database security_advisory_series security_alert security_alliance security_analysis_tool security_analyst security_appliance security_architecture security_assessment security_assessment_artifact security_assessment_tool security_assistance_program security_automation_platform security_barrier security_benchmark security_breach security_camera security_checkpoint security_classification security_classification_level security_classification_manual security_clearance security_company security_component security_concept security_control security_control_family security_cooperation_initiative security_council security_department security_design_principle security_design_principles security_designation security_detail security_device security_discipline security_division security_document security_entity security_evaluation_standard security_expert security_extension security_facility security_force security_framework security_guide security_guideline security_hardware_module security_hardware_standard security_identifier security_incident security_industry_ranking security_information_and_event_management_software security_information_and_event_management_system security_initiative security_integration security_issue security_key security_management_console security_management_software security_management_system security_manual security_measure security_mechanism security_microcontroller security_mitigation security_module security_organization security_pact security_pass security_patch security_plan security_platform security_principle security_process security_processor security_product security_profile security_program security_programme security_project security_protocol_extension security_questionnaire security_report security_report_series security_research_team security_resource security_response_center security_response_team security_role security_screening_system security_sensor security_service security_software security_software_add-on security_software_feature security_software_project security_software_suite security_solution security_specification security_standard_level security_structure security_studies_institution security_subsystem security_suite security_summit security_support_provider security_system security_system_control_panel security_system_hub security_team security_technique security_technology security_testing_guide security_testing_methodology security_token security_tool security_training_platform security_update security_vulnerability_list security_zone set_of_computer_security_standards smart_security_camera software_security_list software_security_maturity_model software_security_project software_security_standard software_security_technology software_vulnerability supply_chain_security_program university_security_office vehicle_security_feature vehicle_security_system virtual_security_module web_application_security_tool web_browser_security_feature web_security_appliance web_security_concept web_security_feature web_security_gateway web_security_mechanism web_security_platform web_security_policy web_security_policy_mechanism web_security_service web_security_software web_security_solution web_security_specification web_security_standard web_security_tool web_security_vulnerability website_security_service wireless_network_security_standard wireless_security_appliance security_orchestration,_automation,_and_response_platform Security_Orchestration,_Automation,_and_Response_platform |
gptkbp:auctionRecord |
gptkb:U.S._Treasury_Department
|
gptkbp:benefit |
Convenience
Improved security Centralized password management Reduced password reuse Stronger passwords |
gptkbp:budget |
classified
|
gptkbp:canBe |
gptkb:software
gptkb:computer_hardware cloud-based Publicly Traded Privately Held purchased at auction Issued in IPO Issued in Private Placement Issued in Secondary Offering held to maturity purchased on secondary market sold before maturity |
gptkbp:canBeUsedFor |
gptkb:virus
unauthorized access denial-of-service attacks exploits policy violations |
gptkbp:canInclude |
applications
networks hosts |
gptkbp:canIntegrateWith |
gptkb:virus
SIEM systems firewalls |
gptkbp:category |
information security
network security Identity management Authentication hardware security Personal information management Cybersecurity cryptography |
gptkbp:collaboratesWith |
gptkb:GCHQ
gptkb:Secret_Intelligence_Service police forces |
gptkbp:component |
enterprise security architecture
cryptographic infrastructure network security infrastructure |
gptkbp:contains |
CVE identifiers
|
gptkbp:contains_settlement |
T+1
|
gptkbp:contrastsWith |
Debt Security
|
gptkbp:country |
gptkb:Saudi_Arabia
gptkb:United_Kingdom |
gptkbp:countryOfOrigin |
gptkb:United_States
|
gptkbp:covers |
gptkb:Microsoft_Exchange_Server
gptkb:Microsoft_Windows gptkb:Microsoft_Office gptkb:Microsoft_Internet_Explorer |
gptkbp:creditRating |
gptkb:AAA
|
gptkbp:crosses |
true
|
gptkbp:CUSIPAssigned |
yes
|
gptkbp:denominatedIn |
gptkb:United_States_dollar
|
gptkbp:deployment |
Mobile app
Desktop app On-premises Cloud-based Browser extension inline with network traffic |
gptkbp:developedBy |
gptkb:Mozilla_Foundation
|
gptkbp:differsFrom |
Intrusion Detection System: IPS can block traffic, IDS cannot
|
gptkbp:difficulty |
evasion techniques
performance impact false positives |
gptkbp:director |
gptkb:Ken_McCallum
|
gptkbp:employs |
intelligence officers
|
gptkbp:entitlesTo |
gptkb:Dividends
Voting Rights |
gptkbp:established |
1909
|
gptkbp:example |
gptkb:ISACA
gptkb:Bitwarden gptkb:Dashlane gptkb:NIST gptkb:Enpass gptkb:ENISA gptkb:Zoho_Vault gptkb:SANS_Institute gptkb:CERT_Coordination_Center gptkb:KeePass gptkb:LastPass gptkb:NordPass gptkb:RoboForm gptkb:(ISC)² gptkb:1Password Keeper |
gptkbp:feature |
Offline access
Encryption Password sharing remote management audit logging PCI DSS compliance Cross-platform support Two-factor authentication support FIPS 140-2 compliance secure key storage Multi-device sync Secure notes Form filling Cloud backup hardware-based random number generation Biometric login Password strength analysis Zero-knowledge architecture Password breach monitoring Password autofill tamper resistance Master password Password import/export tamper evidence |
gptkbp:field |
cybersecurity
computer security |
gptkbp:firstAired |
1790
|
gptkbp:firstIntroduced |
early 2000s
|
gptkbp:firstReleaseYear |
1997
|
gptkbp:format |
gptkb:website
email notification |
gptkbp:foundIn |
organizations
|
gptkbp:frequency |
monthly
|
gptkbp:function |
log security events
monitor network traffic alert administrators block suspicious traffic |
gptkbp:fundedBy |
gptkb:government
|
gptkbp:governedBy |
gptkb:Intelligence_and_Security_Committee_of_Parliament
|
gptkbp:governingBody |
gptkb:Security_Service_Act_1989
|
gptkbp:hasType |
gptkb:stock_exchange
Common Stock |
gptkbp:headquartersLocation |
gptkb:London
gptkb:Riyadh |
gptkbp:highestPoint |
$100
|
https://www.w3.org/2000/01/rdf-schema#label |
security
|
gptkbp:inAppPurchases |
varies by security type
|
gptkbp:includes |
gptkb:Excess_Defense_Articles
gptkb:Foreign_Military_Financing gptkb:International_Military_Education_and_Training Peacekeeping Operations Section 333 Authority to Build Capacity |
gptkbp:investor |
fixed rate
variable rate (for FRNs) |
gptkbp:ISINAssigned |
yes
|
gptkbp:isPartOf |
state income tax
|
gptkbp:issuedBy |
gptkb:United_States_Department_of_the_Treasury
gptkb:company |
gptkbp:jurisdiction |
gptkb:United_Kingdom
|
gptkbp:language |
English
|
gptkbp:legalStatus |
gptkb:Foreign_Assistance_Act_of_1961
gptkb:Arms_Export_Control_Act |
gptkbp:license |
gptkb:GPL
gptkb:LGPL gptkb:MPL |
gptkbp:liquiditySources |
high
|
gptkbp:mainFunction |
domestic counter-intelligence
|
gptkbp:maintainedBy |
gptkb:Mozilla_Foundation
|
gptkbp:manufacturer |
gptkb:Amazon_Web_Services
gptkb:IBM gptkb:Google_Cloud gptkb:Thales gptkb:Microsoft_Azure gptkb:Entrust gptkb:Utimaco |
gptkbp:market |
gptkb:Fortinet
gptkb:Palo_Alto_Networks gptkb:Cisco gptkb:Trend_Micro gptkb:Check_Point |
gptkbp:marketedBy |
gptkb:TreasuryDirect
gptkb:primary_dealers |
gptkbp:mayBe |
gptkb:Freely_Tradable_Security
gptkb:Listed_Security gptkb:Non-Voting_Security gptkb:Restricted_Security gptkb:Unlisted_Security Voting Security |
gptkbp:mayInclude |
gptkb:government_agency
non-profit organizations private companies international bodies Warrants Convertible Securities Rights |
gptkbp:motto |
gptkb:Regnum_Defende
|
gptkbp:notableAchievement |
gptkb:Operation_Kratos
gptkb:Operation_Overt |
gptkbp:officialWebsite |
https://www.mi5.gov.uk/
|
gptkbp:openSource |
true
|
gptkbp:parentOrganization |
gptkb:Home_Office
|
gptkbp:partOf |
gptkb:Ministry_of_Interior_(Saudi_Arabia)
|
gptkbp:predecessor |
gptkb:Secret_Service_Bureau
|
gptkbp:programmingLanguage |
C
|
gptkbp:provides |
authentication
digital signatures encryption key management certificate management cryptographic services |
gptkbp:publishedBy |
gptkb:Microsoft
|
gptkbp:purpose |
hardware-based security
prevent cyber attacks cryptographic operations promote U.S. national security interests support allied and partner nations secure cryptographic key management Generate passwords Manage passwords Store passwords detect and prevent malicious activities finance government spending protect computer systems promote information security oversee security matters disclose security vulnerabilities |
gptkbp:recipient |
foreign governments
international organizations |
gptkbp:recorded |
gptkb:Shareholder_Register
|
gptkbp:regionServed |
gptkb:United_Kingdom
|
gptkbp:regulatedBy |
gptkb:Securities_and_Exchange_Commission
|
gptkbp:relatedStandard |
gptkb:RFC_4765
gptkb:RFC_4767 |
gptkbp:relatedTo |
gptkb:international_relations
gptkb:military_defense gptkb:video_game gptkb:virus gptkb:Patch_Tuesday gptkb:firewall authentication encryption network security data loss prevention Security sector reform access control computer security Security cooperation malware protection endpoint security security information and event management intrusion detection system security audit contactless smart card Intrusion Detection System key management service United States military aid cryptoprocessor |
gptkbp:replacedBy |
Microsoft Security Update Guide
|
gptkbp:reportsTo |
gptkb:government_official
|
gptkbp:repository |
https://hg.mozilla.org/projects/nss/
|
gptkbp:represents |
Ownership Interest
|
gptkbp:requires |
regular updates
tuning to reduce false positives |
gptkbp:researchInterest |
semiannually
|
gptkbp:responsibility |
incident response
policy development risk assessment compliance monitoring |
gptkbp:responsibleFor |
counter-terrorism
internal security cyber security counter-proliferation counter-espionage protection of key facilities |
gptkbp:restored |
full faith and credit of the United States government
|
gptkbp:retirementDate |
January 2020
|
gptkbp:risk |
Single point of failure
Vulnerabilities in software Master password compromise |
gptkbp:securityLevel |
low
|
gptkbp:standardizedBy |
gptkb:NIST
gptkb:PCI_Security_Standards_Council gptkb:OpenPGP gptkb:PBKDF2 gptkb:ISO/IEC_27001 gptkb:Argon2 AES-256 encryption |
gptkbp:status |
retired
|
gptkbp:subjectOf |
federal income tax
Market Risk Price Volatility Corporate Actions auction process Dilution |
gptkbp:supportsProtocol |
gptkb:SSL
gptkb:PKCS_#11 gptkb:S/MIME TLS |
gptkbp:symbol |
Royal Arms of the United Kingdom
|
gptkbp:targetAudience |
IT professionals
system administrators |
gptkbp:taxStatus |
exempt from state and local taxes
|
gptkbp:tradedOn |
gptkb:stock_exchange
secondary market |
gptkbp:type |
gptkb:government_agency
gptkb:Host-based_IPS gptkb:Network-based_IPS gptkb:Network_Behavior_Analysis_IPS gptkb:Savings_bond gptkb:Treasury_Inflation-Protected_Security gptkb:Treasury_bill gptkb:Treasury_bond gptkb:Treasury_note gptkb:Wireless_IPS Floating Rate Note |
gptkbp:typeOf |
gptkb:aircraft
services funding training |
gptkbp:usedAs |
benchmark for interest rates
collateral in financial markets |
gptkbp:usedFor |
authentication
digital signatures encryption key generation monetary policy operations decryption key storage reserve assets by central banks implementing security protocols |
gptkbp:usedIn |
gptkb:infrastructure
gptkb:Google_Chrome gptkb:Red_Hat_Directory_Server gptkb:Mozilla_Firefox payment systems banking data centers cloud services |
gptkbp:uses |
anomaly detection
signatures policy-based detection |
gptkbp:valuedFor |
Market Capitalization
|
gptkbp:website |
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
|
gptkbp:bfsParent |
gptkb:Cabinet
gptkb:architecture gptkb:infrastructure gptkb:military_unit gptkb:Max_Planck_Institute_for_Software_Systems gptkb:Max_Planck_Institute_for_the_Study_of_Crime,_Security_and_Law gptkb:government_office |
gptkbp:bfsLayer |
3
|