Alternative names (10)
can be mitigated by • canBeMitigatedBy • hasMitigation • isMitigatedBy • mitigated by • mitigates • mitigation • riskMitigated • riskMitigatedBy • threatMitigatedRandom triples
| Subject | Object |
|---|---|
| gptkb:CWE-119_(Buffer_Overflow) | compiler protections |
| gptkb:COVID-19_outbreaks | social distancing |
| gptkb:Software_and_Data_Integrity_Failures | secure CI/CD pipelines |
| gptkb:Storm_Surge | gptkb:evacuation |
| gptkb:KRACK_attack_family | firmware updates |
| gptkb:Business_Cycles | Fiscal Policy |
| gptkb:CVE-2014-3566 | Use TLS instead of SSL 3.0 |
| gptkb:Cross-site_scripting_(XSS) | escaping special characters |
| gptkb:Reflected_XSS | Output encoding |
| gptkb:Drift_Attack | robust model retraining |
| gptkb:Padding_Oracle_Attack | Constant-time error messages |
| gptkb:POODLE | use TLS 1.2 or higher |
| gptkb:Severe_Drought | Rainwater Harvesting |
| gptkb:Drone_Threat | gptkb:legislation |
| gptkb:Security_Bypass | Input Validation |
| gptkb:File_Inclusion_Attacks | Input Sanitization |
| gptkb:Man-in-the-Middle_Attacks | Regular Software Updates |
| gptkb:FragAttacks | firmware updates |
| gptkb:Server_Side_Request_Forgery | Disabling unnecessary URL schemes |
| gptkb:Security_Misconfiguration | Patch management |