Statements (21)
Predicate | Object |
---|---|
gptkbp:instanceOf |
concept
|
gptkbp:alsoKnownAs |
gptkb:shadow_IT
|
gptkbp:associatedWith |
data loss
compliance issues lack of IT oversight risks to security |
gptkbp:cause |
security vulnerabilities
increased productivity |
gptkbp:commonIn |
large organizations
|
https://www.w3.org/2000/01/rdf-schema#label |
stealth IT
|
gptkbp:mayInclude |
cloud services
external storage personal devices unauthorized software |
gptkbp:mitigatedBy |
network monitoring
employee training IT governance policies |
gptkbp:monitors |
IT departments
|
gptkbp:refersTo |
use of information technology systems, devices, software, applications, and services without explicit organizational approval
|
gptkbp:bfsParent |
gptkb:shadow_IT
|
gptkbp:bfsLayer |
8
|