security

GPTKB entity

Statements (878)
Predicate Object
gptkbp:instanceOf gptkb:intelligence_gathering
gptkb:military_organization
gptkb:organization
gptkb:security
gptkb:software
gptkb:bankruptcy
gptkb:educational_institution
gptkb:library
gptkb:parliamentary_committee
concept
foreign aid program
cryptographic device
gptkbp:abbreviation gptkb:HSM
gptkb:IPS
gptkb:NSS
gptkbp:acquiredBy gptkb:Federal_Reserve
foreign governments
institutions
individuals
gptkbp:activity incident response
policy development
security research
security training
gptkbp:administeredBy gptkb:United_States_Department_of_Defense
gptkb:United_States_Department_of_State
gptkbp:ageRange from a few days to 30 years
gptkbp:alsoKnownAs gptkb:MI5
Al-Amn Al-Markazi
gptkbp:alternativeName Vulnerability
password
vulnerability
privacy_concern
security_rating
security_feature
security_model
security_operation
security_standard
security_vulnerability
API_security_product
API_security_profile
Access_control_system
Automotive_Security_Threat
Campus_security_service
Central_Security_Command
Cloud_Security_Feature
Computer_Security_Component
Computer_Security_Concept
Computer_Security_Organization
Computer_Security_Technique
Computer_Security_Term
Computer_Security_Vulnerability
Computer_security_standard
Computer_security_technique
Computer_security_term
Cryptographic_System
Cryptographic_attack
Cryptographic_technique
Cybersecurity_Concept
Cybersecurity_Framework
Cybersecurity_Technique
Cybersecurity_Technology
Cybersecurity_Term
Cybersecurity_Threat
Cybersecurity_Vulnerability
Cybersecurity_attack_technique
Cybersecurity_concept
Cybersecurity_framework
Cybersecurity_vulnerability
Data_Security_Solution
Data_Security_Technique
Data_security_technique
Database_security_feature
Encryption_Technology
Enterprise_security_architecture_framework
Equity_Security
Equity_security
Field_of_Computer_Security
Government_Security
Government_security
Hardware_Security_Module
Home_security_service
Home_security_system
IT_security_evaluation_assurance_level
IT_security_evaluation_process
IT_security_standard
IT_security_standard_version
Information_Security_Concept
Information_Security_Control
Information_Security_Discipline
Information_Security_Domain
Information_security_concept
Information_security_standard
Internet_security_framework
Internet_security_mechanism
Internet_security_process
Internet_security_service
Internet_security_standard
Intrusion_Prevention_System
IoT_security_service
IoT_security_solution
JavaScript_security_library
Java_security_framework
Linux_security_module
Managed_Security_Service
Managed_Security_Service_Provider
Microsoft_Security_Bulletin
Microsoft_Security_Update
Microsoft_security_bulletin
Microsoft_security_update
Network_Security_Device
Network_Security_Feature
Network_Security_Service
Network_Security_Technique
Network_Security_Technology
Network_security_appliance
Network_security_device
Network_security_feature
Network_security_management_appliance
Network_security_software
Network_security_technology
OWASP_Top_10_Security_Risk
Password_manager
Peace_and_security_body
Secret_management_feature
Security_Assessment_Methodology
Security_Committee
Security_Concept
Security_Context
Security_Device
Security_Discipline
Security_Facility
Security_Feature
Security_Identifier
Security_Incident
Security_Information_and_Event_Management_software
Security_Information_and_Event_Management_solution
Security_Measure
Security_Mechanism
Security_Model
Security_Principle
Security_Process
Security_Service
Security_Solution
Security_System
Security_Technology
Security_Threat
Security_Vulnerability
Security_advisory_publication
Security_agreement
Security_barrier
Security_checkpoint
Security_concept
Security_discipline
Security_feature
Security_information_and_event_management_software
Security_mitigation_technique
Security_orchestration_platform
Security_organization
Security_platform
Security_policy
Security_principle
Security_product
Security_program
Security_software
Security_technique
Security_technology
Security_token
Security_vulnerability
Trusted_Computing_Concept
Trusted_Computing_Technology
U.S._government_security
U.S._security_assistance_program
United_States_Treasury_security
United_States_security_assistance_program
Web_Security_Feature
Web_Security_Vulnerability
Web_security_concept
Web_security_feature
Web_security_policy
Web_security_service
Web_security_technology
Web_security_vulnerability
Web_service_security_standard
Wi-Fi_security_service
Windows_Security_feature
Windows_security_feature
Windows_security_principal
access_control_system
anti-theft_system
attack_transport
authentication_attack
authentication_technology
bilateral_security_dialogue
cargo_security_system
cloud-based_network_security_platform
cloud-based_security_suite
cloud_security_feature
cloud_security_guideline
cloud_security_technology
computer_security_architecture
computer_security_attack
computer_security_classification
computer_security_component
computer_security_concept
computer_security_conference
computer_security_evaluation_criteria
computer_security_exploit_technique
computer_security_feature
computer_security_guideline
computer_security_incident
computer_security_model
computer_security_organization
computer_security_research_project
computer_security_software
computer_security_standard
computer_security_technique
computer_security_technology
computer_security_vulnerability
corporate_security_team
cryptographic_attack
cryptographic_authentication_IC
cryptographic_backdoor
cryptographic_method
cryptographic_mode
cryptographic_property
cryptographic_system
cryptographic_technique
cryptographic_vulnerability
cryptography_principle
cryptologic_system
cybersecurity_advisory
cybersecurity_approach
cybersecurity_artifact
cybersecurity_assessment
cybersecurity_attack
cybersecurity_attack_technique
cybersecurity_competition
cybersecurity_compliance_solution
cybersecurity_concept
cybersecurity_division
cybersecurity_exercise
cybersecurity_exploit
cybersecurity_facility
cybersecurity_feature
cybersecurity_framework
cybersecurity_guide
cybersecurity_guideline
cybersecurity_identifier
cybersecurity_incident
cybersecurity_initiative
cybersecurity_marketplace
cybersecurity_metric
cybersecurity_model
cybersecurity_operation
cybersecurity_platform
cybersecurity_practice
cybersecurity_process
cybersecurity_product
cybersecurity_program
cybersecurity_project
cybersecurity_research_project
cybersecurity_risk
cybersecurity_service
cybersecurity_software
cybersecurity_solution
cybersecurity_standard
cybersecurity_system
cybersecurity_team
cybersecurity_technique
cybersecurity_technology
cybersecurity_term
cybersecurity_threat
cybersecurity_tool
cybersecurity_vulnerability
data_protection_process
data_protection_right
data_protection_solution
data_security_feature
data_security_platform
data_security_software
data_security_technology
database_security_feature
digital_security_guide
digital_security_platform
digital_security_service
digital_security_support_service
email_security_standard
email_security_term
encryption_system
encryption_technology
encryption_utility
endpoint_security_platform
endpoint_security_software
enterprise_security_appliance
federal_security_program
global_security_assessment
government_security
hacker_convention
hardware_security_feature
hardware_security_key
hardware_security_module
home_security_system
informal_security_cooperation_arrangement
information_security_assessment_scheme
information_security_concept
information_security_control_framework
information_security_management_standard
information_security_management_system
information_security_model
information_security_policy
information_security_principle
information_security_process
information_security_program
information_security_solution
information_security_standard
intergovernmental_security_forum
international_security_forum
international_security_framework
international_security_program
internet_security_standard
internet_security_suite
intrusion_prevention_system
mainframe_security_software
mobile_security_feature
mobile_security_service
mortgage-backed_security
national_security_body
national_security_concept
network_security_appliance
network_security_architecture
network_security_component
network_security_concept
network_security_credential
network_security_device
network_security_feature
network_security_framework
network_security_incident
network_security_management_appliance
network_security_management_product
network_security_management_software
network_security_mechanism
network_security_model
network_security_module
network_security_monitor
network_security_product
network_security_product_line
network_security_service
network_security_software
network_security_software_suite
network_security_solution
network_security_standard
network_security_system
network_security_technique
network_security_technology
network_security_threat
network_security_tool
operating_system_security_feature
password_manager
personal_protection_system
privacy_protection_service
private_security_force
private_security_patrol
public_security_authority
public_security_institution
public_security_organization
publicly_traded_security
regional_security_initiative
regional_security_organization
runtime_security_tool
secret_program
secure_children's_home
secure_communication_service
secure_communications_system
secure_computation_system
secure_element
secure_messaging_application
secure_network
secure_police_communications_system
secure_speech_system
secure_telephone
security_advisory
security_advisory_database
security_advisory_series
security_alert
security_alliance
security_analysis_tool
security_analyst
security_appliance
security_architecture
security_assessment
security_assessment_artifact
security_assessment_tool
security_assistance_program
security_automation_platform
security_barrier
security_benchmark
security_breach
security_camera
security_checkpoint
security_classification
security_classification_level
security_classification_manual
security_clearance
security_company
security_component
security_concept
security_control
security_control_family
security_cooperation_initiative
security_council
security_department
security_design_principle
security_design_principles
security_designation
security_detail
security_device
security_discipline
security_division
security_document
security_entity
security_evaluation_standard
security_expert
security_extension
security_facility
security_force
security_framework
security_guide
security_guideline
security_hardware_module
security_hardware_standard
security_identifier
security_incident
security_industry_ranking
security_information_and_event_management_software
security_information_and_event_management_system
security_initiative
security_integration
security_issue
security_key
security_management_console
security_management_software
security_management_system
security_manual
security_measure
security_mechanism
security_microcontroller
security_mitigation
security_module
security_organization
security_pact
security_pass
security_patch
security_plan
security_platform
security_principle
security_process
security_processor
security_product
security_profile
security_program
security_programme
security_project
security_protocol_extension
security_questionnaire
security_report
security_report_series
security_research_team
security_resource
security_response_center
security_response_team
security_role
security_screening_system
security_sensor
security_service
security_software
security_software_add-on
security_software_feature
security_software_project
security_software_suite
security_solution
security_specification
security_standard_level
security_structure
security_studies_institution
security_subsystem
security_suite
security_summit
security_support_provider
security_system
security_system_control_panel
security_system_hub
security_team
security_technique
security_technology
security_testing_guide
security_testing_methodology
security_token
security_tool
security_training_platform
security_update
security_vulnerability_list
security_zone
set_of_computer_security_standards
smart_security_camera
software_security_list
software_security_maturity_model
software_security_project
software_security_standard
software_security_technology
software_vulnerability
supply_chain_security_program
university_security_office
vehicle_security_feature
vehicle_security_system
virtual_security_module
web_application_security_tool
web_browser_security_feature
web_security_appliance
web_security_concept
web_security_feature
web_security_gateway
web_security_mechanism
web_security_platform
web_security_policy
web_security_policy_mechanism
web_security_service
web_security_software
web_security_solution
web_security_specification
web_security_standard
web_security_tool
web_security_vulnerability
website_security_service
wireless_network_security_standard
wireless_security_appliance
security_orchestration,_automation,_and_response_platform
Security_Orchestration,_Automation,_and_Response_platform
gptkbp:auctionRecord gptkb:U.S._Treasury_Department
gptkbp:benefit Convenience
Improved security
Centralized password management
Reduced password reuse
Stronger passwords
gptkbp:budget classified
gptkbp:canBe gptkb:software
gptkb:computer_hardware
cloud-based
Publicly Traded
Privately Held
purchased at auction
Issued in IPO
Issued in Private Placement
Issued in Secondary Offering
held to maturity
purchased on secondary market
sold before maturity
gptkbp:canBeUsedFor gptkb:virus
unauthorized access
denial-of-service attacks
exploits
policy violations
gptkbp:canInclude applications
networks
hosts
gptkbp:canIntegrateWith gptkb:virus
SIEM systems
firewalls
gptkbp:category information security
network security
Identity management
Authentication
hardware security
Personal information management
Cybersecurity
cryptography
gptkbp:collaboratesWith gptkb:GCHQ
gptkb:Secret_Intelligence_Service
police forces
gptkbp:component enterprise security architecture
cryptographic infrastructure
network security infrastructure
gptkbp:contains CVE identifiers
gptkbp:contains_settlement T+1
gptkbp:contrastsWith Debt Security
gptkbp:country gptkb:Saudi_Arabia
gptkb:United_Kingdom
gptkbp:countryOfOrigin gptkb:United_States
gptkbp:covers gptkb:Microsoft_Exchange_Server
gptkb:Microsoft_Windows
gptkb:Microsoft_Office
gptkb:Microsoft_Internet_Explorer
gptkbp:creditRating gptkb:AAA
gptkbp:crosses true
gptkbp:CUSIPAssigned yes
gptkbp:denominatedIn gptkb:United_States_dollar
gptkbp:deployment Mobile app
Desktop app
On-premises
Cloud-based
Browser extension
inline with network traffic
gptkbp:developedBy gptkb:Mozilla_Foundation
gptkbp:differsFrom Intrusion Detection System: IPS can block traffic, IDS cannot
gptkbp:difficulty evasion techniques
performance impact
false positives
gptkbp:director gptkb:Ken_McCallum
gptkbp:employs intelligence officers
gptkbp:entitlesTo gptkb:Dividends
Voting Rights
gptkbp:established 1909
gptkbp:example gptkb:ISACA
gptkb:Bitwarden
gptkb:Dashlane
gptkb:NIST
gptkb:Enpass
gptkb:ENISA
gptkb:Zoho_Vault
gptkb:SANS_Institute
gptkb:CERT_Coordination_Center
gptkb:KeePass
gptkb:LastPass
gptkb:NordPass
gptkb:RoboForm
gptkb:(ISC)²
gptkb:1Password
Keeper
gptkbp:feature Offline access
Encryption
Password sharing
remote management
audit logging
PCI DSS compliance
Cross-platform support
Two-factor authentication support
FIPS 140-2 compliance
secure key storage
Multi-device sync
Secure notes
Form filling
Cloud backup
hardware-based random number generation
Biometric login
Password strength analysis
Zero-knowledge architecture
Password breach monitoring
Password autofill
tamper resistance
Master password
Password import/export
tamper evidence
gptkbp:field cybersecurity
computer security
gptkbp:firstAired 1790
gptkbp:firstIntroduced early 2000s
gptkbp:firstReleaseYear 1997
gptkbp:format gptkb:website
email notification
gptkbp:foundIn organizations
gptkbp:frequency monthly
gptkbp:function log security events
monitor network traffic
alert administrators
block suspicious traffic
gptkbp:fundedBy gptkb:government
gptkbp:governedBy gptkb:Intelligence_and_Security_Committee_of_Parliament
gptkbp:governingBody gptkb:Security_Service_Act_1989
gptkbp:hasType gptkb:stock_exchange
Common Stock
gptkbp:headquartersLocation gptkb:London
gptkb:Riyadh
gptkbp:highestPoint $100
https://www.w3.org/2000/01/rdf-schema#label security
gptkbp:inAppPurchases varies by security type
gptkbp:includes gptkb:Excess_Defense_Articles
gptkb:Foreign_Military_Financing
gptkb:International_Military_Education_and_Training
Peacekeeping Operations
Section 333 Authority to Build Capacity
gptkbp:investor fixed rate
variable rate (for FRNs)
gptkbp:ISINAssigned yes
gptkbp:isPartOf state income tax
gptkbp:issuedBy gptkb:United_States_Department_of_the_Treasury
gptkb:company
gptkbp:jurisdiction gptkb:United_Kingdom
gptkbp:language English
gptkbp:legalStatus gptkb:Foreign_Assistance_Act_of_1961
gptkb:Arms_Export_Control_Act
gptkbp:license gptkb:GPL
gptkb:LGPL
gptkb:MPL
gptkbp:liquiditySources high
gptkbp:mainFunction domestic counter-intelligence
gptkbp:maintainedBy gptkb:Mozilla_Foundation
gptkbp:manufacturer gptkb:Amazon_Web_Services
gptkb:IBM
gptkb:Google_Cloud
gptkb:Thales
gptkb:Microsoft_Azure
gptkb:Entrust
gptkb:Utimaco
gptkbp:market gptkb:Fortinet
gptkb:Palo_Alto_Networks
gptkb:Cisco
gptkb:Trend_Micro
gptkb:Check_Point
gptkbp:marketedBy gptkb:TreasuryDirect
gptkb:primary_dealers
gptkbp:mayBe gptkb:Freely_Tradable_Security
gptkb:Listed_Security
gptkb:Non-Voting_Security
gptkb:Restricted_Security
gptkb:Unlisted_Security
Voting Security
gptkbp:mayInclude gptkb:government_agency
non-profit organizations
private companies
international bodies
Warrants
Convertible Securities
Rights
gptkbp:motto gptkb:Regnum_Defende
gptkbp:notableAchievement gptkb:Operation_Kratos
gptkb:Operation_Overt
gptkbp:officialWebsite https://www.mi5.gov.uk/
gptkbp:openSource true
gptkbp:parentOrganization gptkb:Home_Office
gptkbp:partOf gptkb:Ministry_of_Interior_(Saudi_Arabia)
gptkbp:predecessor gptkb:Secret_Service_Bureau
gptkbp:programmingLanguage C
gptkbp:provides authentication
digital signatures
encryption
key management
certificate management
cryptographic services
gptkbp:publishedBy gptkb:Microsoft
gptkbp:purpose hardware-based security
prevent cyber attacks
cryptographic operations
promote U.S. national security interests
support allied and partner nations
secure cryptographic key management
Generate passwords
Manage passwords
Store passwords
detect and prevent malicious activities
finance government spending
protect computer systems
promote information security
oversee security matters
disclose security vulnerabilities
gptkbp:recipient foreign governments
international organizations
gptkbp:recorded gptkb:Shareholder_Register
gptkbp:regionServed gptkb:United_Kingdom
gptkbp:regulatedBy gptkb:Securities_and_Exchange_Commission
gptkbp:relatedStandard gptkb:RFC_4765
gptkb:RFC_4767
gptkbp:relatedTo gptkb:international_relations
gptkb:military_defense
gptkb:video_game
gptkb:virus
gptkb:Patch_Tuesday
gptkb:firewall
authentication
encryption
network security
data loss prevention
Security sector reform
access control
computer security
Security cooperation
malware protection
endpoint security
security information and event management
intrusion detection system
security audit
contactless smart card
Intrusion Detection System
key management service
United States military aid
cryptoprocessor
gptkbp:replacedBy Microsoft Security Update Guide
gptkbp:reportsTo gptkb:government_official
gptkbp:repository https://hg.mozilla.org/projects/nss/
gptkbp:represents Ownership Interest
gptkbp:requires regular updates
tuning to reduce false positives
gptkbp:researchInterest semiannually
gptkbp:responsibility incident response
policy development
risk assessment
compliance monitoring
gptkbp:responsibleFor counter-terrorism
internal security
cyber security
counter-proliferation
counter-espionage
protection of key facilities
gptkbp:restored full faith and credit of the United States government
gptkbp:retirementDate January 2020
gptkbp:risk Single point of failure
Vulnerabilities in software
Master password compromise
gptkbp:securityLevel low
gptkbp:standardizedBy gptkb:NIST
gptkb:PCI_Security_Standards_Council
gptkb:OpenPGP
gptkb:PBKDF2
gptkb:ISO/IEC_27001
gptkb:Argon2
AES-256 encryption
gptkbp:status retired
gptkbp:subjectOf federal income tax
Market Risk
Price Volatility
Corporate Actions
auction process
Dilution
gptkbp:supportsProtocol gptkb:SSL
gptkb:PKCS_#11
gptkb:S/MIME
TLS
gptkbp:symbol Royal Arms of the United Kingdom
gptkbp:targetAudience IT professionals
system administrators
gptkbp:taxStatus exempt from state and local taxes
gptkbp:tradedOn gptkb:stock_exchange
secondary market
gptkbp:type gptkb:government_agency
gptkb:Host-based_IPS
gptkb:Network-based_IPS
gptkb:Network_Behavior_Analysis_IPS
gptkb:Savings_bond
gptkb:Treasury_Inflation-Protected_Security
gptkb:Treasury_bill
gptkb:Treasury_bond
gptkb:Treasury_note
gptkb:Wireless_IPS
Floating Rate Note
gptkbp:typeOf gptkb:aircraft
services
funding
training
gptkbp:usedAs benchmark for interest rates
collateral in financial markets
gptkbp:usedFor authentication
digital signatures
encryption
key generation
monetary policy operations
decryption
key storage
reserve assets by central banks
implementing security protocols
gptkbp:usedIn gptkb:infrastructure
gptkb:Google_Chrome
gptkb:Red_Hat_Directory_Server
gptkb:Mozilla_Firefox
payment systems
banking
data centers
cloud services
gptkbp:uses anomaly detection
signatures
policy-based detection
gptkbp:valuedFor Market Capitalization
gptkbp:website https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
gptkbp:bfsParent gptkb:Cabinet
gptkb:architecture
gptkb:infrastructure
gptkb:military_unit
gptkb:Max_Planck_Institute_for_Software_Systems
gptkb:Max_Planck_Institute_for_the_Study_of_Crime,_Security_and_Law
gptkb:government_office
gptkbp:bfsLayer 3