Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Information security
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia-live.demo.openlinksw.com
Protecting information by mitigating information risks
Property
Value
dbo:
description
andmete ja andmetöötlusvahendite turvalisuse tagamine
(et)
ensemble de pratiques visant à protéger des données
(fr)
תחום העוסק בהגנה על מערכות ממוחשבות
(iw)
безопасность от злоупотреблений информацией
(ru)
melindungi informasi dengan mengurangi resiko informasi
(in)
at sikre information for uvedkommende
(da)
at tryggja upplýsingar, soleiðis at óviðkomandi ikki fáa atgongd, vm.
(fo)
một lĩnh vực của công nghệ thông tin
(vi)
protecting information by mitigating information risks
(en)
ochrana před poškozením a ztrátou informací
(cs)
práctica de protección de la información
(es)
technischer Begriff komplementär zum Datenschutz
(de)
ঝুঁকি হ্রাসকরণের মাধ্যমে তথ্যকে সুরক্ষিত করা
(bn)
varovanje informacij z zmanjševanjem informacijskih tveganj
(sl)
ایمن سازی اطلاعات
(fa)
研究信息存储、传输和处理中信息安全保障问题的理论与技术
(zh)
захист інформації шляхом зниження інформаційних ризиків
(uk)
proteger as informações mitigando os riscos das informações
(pt)
dbo:
thumbnail
wiki-commons
:Special:FilePath/CIAJMK1209-en.svg?width=300
dbo:
wikiPageExternalLink
https://web.archive.org/web/20110906012808/http:/iac.dtic.mil/iatac/ia_policychart.html
https://web.archive.org/web/20191108164220/http:/www.iwar.org.uk/comsec/
http://blog.brisbanedatarecovery.com.au/2017/05/awareness-of-how-your-data-is-being.html
http://www.opensecurityarchitecture.org/
https://spi.dod.mil/
http://msdn2.microsoft.com/en-us/library/ms998382.aspx
https://spi.dod.mil/threat.htm
https://web.archive.org/web/20080402234040/http:/www.scmagazineus.com/IT-security-professionals-must-evolve-for-changing-market/article/33990/
https://web.archive.org/web/20160925225224/https:/www.spi.dod.mil/
https://web.archive.org/web/20200510012626/https:/spi.dod.mil/threat.htm
https://archive.org/details/certguidetosyste00alle
https://archive.org/details/principlesofinfo0000dhil
http://www.cl.cam.ac.uk/~rja14/book.html
http://www.iwar.org.uk/comsec/
http://iac.dtic.mil/iatac/ia_policychart.html
dbo:
wikiPageWikiLink
dbr
:Network_architecture
dbr
:Electronic_business
dbr
:TACACS
dbr
:Speaker_recognition
dbr
:Productivity
dbr
:List_of_computer_security_certifications
dbr
:Threat_assessment
dbr
:Privacy_engineering
dbr
:Wi-Fi_Protected_Access
dbr
:Wired_Equivalent_Privacy
dbr
:Encryption
dbr
:Data_integrity
dbr
:Internet_Engineering_Task_Force
dbr
:Information_technology_audit
dbr
:Data_Retention_Directive
dbr
:G.hn
dbr
:Central_processing_unit
dbr
:Computer_hardware
dbr
:Hospital
dbr
:Military
dbr
:Router_(computing)
dbc
:Crime_prevention
dbr
:Document
dbr
:United_States_Department_of_the_Treasury
dbr
:RADIUS
dbr
:Network_security
dbr
:Audit_trail
dbr
:Environmental_security
dbr
:Information_infrastructure
dbr
:Payment_Card_Industry_Data_Security_Standard
dbr
:Digital_forensics
dbr
:Information
dbr
:Information_technology
dbr
:Parliament_of_the_United_Kingdom
dbr
:United_States_Department_of_Defense
dbr
:Risk_management
dbr
:Website
dbr
:Information_system
dbr
:Infrastructure
dbr
:Application_software
dbr
:Palm_print
dbr
:Parkerian_Hexad
dbr
:John_Doe
dbr
:Sabotage
dbr
:Social_engineering_(security)
dbr
:Key_size
dbr
:Data_security
dbr
:Information_privacy
dbr
:Pearson_Education
dbr
:Asset_management
dbr
:Ransomware
dbr
:Policy
dbr
:Risk_assessment
dbr
:The_Open_Group
dbr
:High_availability
dbr
:Capability-based_security
dbr
:Information_security_standards
dbr
:Data_breach
dbr
:Gramm–Leach–Bliley_Act
dbr
:Family_Educational_Rights_and_Privacy_Act
dbr
:Human_resources
dbr
:Countermeasure_(computer)
dbr
:Information_and_communications_technology
dbr
:Official_Secrets_Act_1889
dbr
:X.1035
dbr
:Visa_Inc.
dbr
:Risk_analysis
dbr
:Financial_institution
dbr
:European_Telecommunications_Standards_Institute
dbr
:Incident_management
dbr
:Security_information_management
dbr
:Encryption_software
dbr
:Enterprise_information_security_architecture
dbr
:Antivirus_software
dbr
:Canada
dbc
:National_security
dbc
:Security
dbr
:Cold_War
dbr
:Computer
dbr
:Computer_virus
dbr
:Cryptography
dbr
:Internet
dbr
:Julius_Caesar
dbr
:Mobile_security
dbr
:Republic_of_Ireland
dbr
:Statistics
dbr
:Technology
dbr
:Telecommunications
dbr
:World_War_II
dbr
:American_Express
dbr
:Backup
dbr
:International_Electrotechnical_Commission
dbr
:Authentication
dbr
:Authorization
dbr
:Integrity
dbr
:Non-repudiation
dbr
:ISO/IEC_20000
dbr
:Legal_liability
dbr
:Vulnerability_assessment
dbr
:Database_administrator
dbr
:Data_quality
dbr
:Software_Engineering_Institute
dbr
:Information_assurance
dbr
:Secure_Shell
dbr
:Single_sign-on
dbr
:Business_process
dbr
:Continual_improvement_process
dbr
:Key_management
dbr
:Verification_and_validation
dbr
:Business_model
dbr
:Information_Security_Forum
dbr
:Privacy_software
dbr
:Alan_Turing
dbc
:Cryptography
dbr
:Computing
dbr
:Database
dbr
:Denial-of-service_attack
dbr
:International_Organization_for_Standardization
dbr
:Knowledge
dbr
:Natural_disaster
dbr
:Self-efficacy
dbr
:Software
dbr
:Terrorism
dbr
:United_States_Armed_Forces
dbr
:Corporation
dbr
:Federal_Office_for_Information_Security
dbr
:Telnet
dbr
:ARPANET
dbr
:Biometrics
dbr
:Computer_security
dbr
:Fingerprint
dbr
:National_Institute_of_Standards_and_Technology
dbr
:Kerberos_(protocol)
dbr
:Phishing
dbr
:Trojan_horse_(computing)
dbr
:OECD
dbr
:Physical_security
dbc
:Data_security
dbr
:Driver's_license
dbr
:Robert_Metcalfe
dbr
:Advanced_Encryption_Standard
dbr
:Carnegie_Mellon_University
dbr
:Privacy
dbr
:Privacy-enhancing_technologies
dbr
:Lawrence_Roberts_(scientist)
dbr
:Data
dbr
:File_Transfer_Protocol
dbr
:Firewall_(computing)
dbr
:Organization
dbr
:ITIL
dbr
:Password
dbr
:Utility
dbr
:Public_key_infrastructure
dbr
:Ownership
dbr
:Traffic_Light_Protocol
dbr
:Health_Insurance_Portability_and_Accountability_Act
dbr
:Personal_Information_Protection_and_Electronic_Documents_Act
dbr
:Identity_theft
dbr
:Key_(cryptography)
dbr
:Access_control
dbr
:Pretty_Good_Privacy
dbr
:Bank_teller
dbr
:Transaction_processing
dbr
:Security_controls
dbr
:Information_security_management
dbr
:Internet_Architecture_Board
dbr
:Security_level_management
dbr
:Federal_Financial_Institutions_Examination_Council
dbr
:ITU-T
dbr
:Site_Security_Handbook
dbr
:Username
dbr
:Caesar_cipher
dbr
:Computer_worm
dbr
:Weak_key
dbr
:Application_security
dbr
:Referential_integrity
dbr
:ITIL_security_management
dbr
:IT_risk_management
dbr
:Availability
dbr
:Business_continuity_planning
dbc
:Information_governance
dbr
:ISO/IEC_27001
dbr
:Network_Security_Services
dbr
:Security_awareness
dbr
:Security_bug
dbr
:Security_convergence
dbr
:Security_of_Information_Act
dbr
:Advanced_Research_Projects_Agency
dbr
:U.S._Department_of_Commerce
dbr
:Databases
dbr
:ACID
dbr
:Operational_definition
dbr
:System_administrator
dbr
:Classified_information
dbr
:Standardization
dbr
:ISACA
dbr
:Information_security_audit
dbr
:Quality_control
dbr
:Sarbanes–Oxley_Act
dbr
:ISO/IEC_27002
dbr
:IT_baseline_protection
dbr
:Small_business
dbr
:IT_risk
dbr
:Security_policy
dbr
:Password_policy
dbr
:Canada_Evidence_Act
dbr
:Discover_Card
dbr
:Data_processing
dbr
:Security_testing
dbr
:Data-centric_security
dbr
:Information_security_awareness
dbr
:Standard_of_Good_Practice
dbr
:Certified_Information_Systems_Auditor
dbr
:Cybersecurity
dbr
:Group_Policy_Object
dbr
:Confidentiality
dbr
:Asset_(computer_security)
dbr
:Chuck_Easttom
dbr
:Vulnerability_(computing)
dbr
:U.S._Department_of_Education
dbr
:Threat_(computer)
dbr
:Federal_Sentencing_Guidelines
dbr
:Institute_of_Information_Security_Professionals
dbr
:File_system_permissions
dbr
:Security_service_(telecommunication)
dbr
:Intrusion_detection
dbr
:Communications
dbr
:Federal_Information_Processing_Standard
dbr
:First_World_War
dbr
:Disaster_recovery_plan
dbr
:ISO/IEC_17799
dbr
:Intellectual_property_infringement
dbr
:Kill_chain
dbr
:Identity-based_security
dbr
:Information_security_indicators
dbr
:Information_technology_security_audit
dbr
:Maiden_name
dbr
:MasterCard
dbr
:Security_breach_notification_laws
dbr
:Gordon-Loeb_Model
dbr
:John_Wiley_&_Sons
dbr
:GnuPG
dbr
:Risk_management_information_systems
dbr
:NIST
dbr
:Governments
dbr
:Businesses
dbr
:Data_Protection_Act_1984
dbr
:Due_care
dbr
:Swipe_card
dbr
:Firewall_(networking)
dbr
:Cengage
dbr
:File:CIAJMK1209-en.svg
dbr
:File:Defense_In_Depth_-_Onion_Model.svg
dbr
:File:Posters_for_information_security_...Defense_of_the_Russian_Federation.jpg
dbr
:File:Privacy_International_2007_privacy_ranking_map.png
dbr
:Access_control_list
dbr
:Open_Information_Security_Maturity_Model
dbr
:Time-based_One-time_Password_Algorithm
dbr
:Mainframe_computers
dbr
:Cultures
dbr
:Dialup_connection
dbr
:DoD
dbr
:Donn_Parker
dbr
:Enigma_Machine
dbr
:Role-Based_Access_Control
dbr
:Black_hat_hacker
dbr
:Computer_Misuse_Act
dbr
:Magnetic_tapes
dbr
:Retina_scan
dbr
:Tamper-evident
dbr
:U-570
dbr
:The_Internet_Society
dbp:
date
2011-09-06
(xsd:date)
2019-11-08
(xsd:date)
dbp:
url
https://web.archive.org/web/20110906012808/http:/iac.dtic.mil/iatac/ia_policychart.html
https://web.archive.org/web/20191108164220/http:/www.iwar.org.uk/comsec/
dbp:
wikiPageUsesTemplate
dbt
:SecurityType
dbt
:Usc
dbt
:Commons_category
dbt
:Authority_control
dbt
:Information_security
dbt
:Cite_book
dbt
:Main
dbt
:Reflist
dbt
:Sfn
dbt
:Refend
dbt
:Computer_science
dbt
:Refbegin
dbt
:Citation_needed
dbt
:Use_mdy_dates
dbt
:Colbegin
dbt
:Colend
dbt
:Webarchive
dbt
:Short_description
dct:
subject
dbc
:Crime_prevention
dbc
:National_security
dbc
:Security
dbc
:Cryptography
dbc
:Data_security
dbc
:Information_governance
gold:
hypernym
dbr
:Practice
rdfs:
label
Information security
(en)
أمن المعلومات
(ar)
Seguretat de la informació
(ca)
Informační bezpečnost
(cs)
Ασφάλεια πληροφοριακών συστημάτων
(el)
Seguridad de la información
(es)
Informazioaren segurtasun
(eu)
Informationssicherheit
(de)
Keamanan informasi
(in)
Sécurité de l'information
(fr)
情報セキュリティ
(ja)
정보 보안
(ko)
Informatiebeveiliging
(nl)
Segurança da informação
(pt)
Informationssäkerhet
(sv)
Информационная безопасность
(ru)
Інформаційна безпека
(uk)
信息安全
(zh)
owl:
sameAs
freebase
:Information security
yago-res
:Information security
wikidata
:Information security
dbpedia-nl
:Information security
dbpedia-de
:Information security
dbpedia-fr
:Information security
dbpedia-tr
:Information security
dbpedia-zh
:Information security
dbpedia-ja
:Information security
dbpedia-pt
:Information security
dbpedia-he
:Information security
dbpedia-ro
:Information security
dbpedia-da
:Information security
dbpedia-es
:Information security
dbpedia-hu
:Information security
dbpedia-fa
:Information security
dbpedia-ru
:Information security
dbpedia-sv
:Information security
dbpedia-vi
:Information security
dbpedia-ko
:Information security
dbpedia-id
:Information security
dbpedia-el
:Information security
dbpedia-et
:Information security
dbpedia-ca
:Information security
dbpedia-ar
:Information security
dbpedia-ast
:Information security
dbpedia-az
:Information security
dbpedia-bg
:Information security
dbpedia-bn
:Information security
dbpedia-cs
:Information security
dbpedia-eu
:Information security
dbpedia-fi
:Information security
dbpedia-hi
:Information security
dbpedia-hy
:Information security
dbpedia-kk
:Information security
dbpedia-lv
:Information security
dbpedia-mk
:Information security
dbpedia-mn
:Information security
dbpedia-ms
:Information security
dbpedia-no
:Information security
dbpedia-or
:Information security
dbpedia-pa
:Information security
dbpedia-simple
:Information security
dbpedia-sl
:Information security
dbpedia-sq
:Information security
dbpedia-sr
:Information security
dbpedia-ta
:Information security
dbpedia-th
:Information security
dbpedia-uk
:Information security
dbpedia-uz
:Information security
dbpedia-global
:Information security
dbr
:Information security
prov:
wasDerivedFrom
wikipedia-en
:Information_security?oldid=1295106330&ns=0
foaf:
depiction
wiki-commons
:Special:FilePath/CIAJMK1209-en.svg
wiki-commons
:Special:FilePath/Defense_In_Depth_-_Onion_Model.svg
wiki-commons
:Special:FilePath/Posters_for_informati...Defense_of_the_Russian_Federation.jpg
wiki-commons
:Special:FilePath/Privacy_International_2007_privacy_ranking_map.png
foaf:
isPrimaryTopicOf
wikipedia-en
:Information_security
is
dbo:
academicDiscipline
of
dbr
:Bülent_Yener
dbr
:Eddy_Willems
dbr
:Rasim_Alguliyev
dbr
:David_Harley
dbr
:He_Dequan
dbr
:Moti_Yung
dbr
:Robert_Slade
dbr
:Feng_Dengguo
dbr
:Phillip_Porras
dbr
:Klaus_Peter_Jantke
is
dbo:
field
of
dbr
:Martin_P._Loeb
is
dbo:
genre
of
dbr
:BLADE_(software)__BLADE__1
is
dbo:
industry
of
dbr
:BAE_Systems
dbr
:JAL_Infotec
dbr
:SCSK
dbr
:SafeNet
dbr
:Shred-it
dbr
:Optiv
dbr
:Cyveillance
dbr
:ISheriff
dbr
:Information_Security_Forum
dbr
:Globalscape
dbr
:Mimecast
dbr
:Mandiant
dbr
:DMZGlobal
dbr
:Internet_Security_Alliance
dbr
:Positive_Technologies
dbr
:ScanSafe
dbr
:IViz_Security
dbr
:Cryptek
dbr
:Defence_Intelligence_(company)
dbr
:Secure_Network
dbr
:Pindrop_Security
dbr
:CrowdStrike
dbr
:SK_Infosec
dbr
:Fortra
dbr
:Qualys
dbr
:Area_1_Security
dbr
:Offensive_Security
dbr
:MailChannels
dbr
:Canon_IT_Solutions
dbr
:Dell_Technologies_PowerFlex
dbr
:ObjectSecurity
dbr
:DB_Networks
dbr
:Sony_Global_Solutions
is
dbo:
knownFor
of
dbr
:Bernhard_M._Hämmerli
dbr
:Shon_Harris
dbr
:Barbara_Simons__Barbara_B._Simons__1
dbr
:Erik_Bloodaxe_(hacker)
dbr
:Mark_Abene
dbr
:Kento_Sasano
dbr
:Fulufhelo_Nelwamondo
is
dbo:
occupation
of
dbr
:H._D._Moore
dbr
:Mark_Abene
dbr
:Khalil_Sehnaoui
dbr
:Iftach_Ian_Amit
dbr
:Itzik_Kotler
dbr
:Jesse_Tuttle
is
dbo:
product
of
dbr
:Ruselectronics
is
dbo:
regionServed
of
dbr
:Vupen
dbr
:Zerodium
is
dbo:
service
of
dbr
:NS_Solutions
dbr
:EQualitie
dbr
:Itochu_Techno-Solutions
dbr
:Mitsui_Knowledge_Industry
dbr
:Uniadex
is
dbo:
wikiPageDisambiguates
of
dbr
:Security_(disambiguation)
is
dbo:
wikiPageRedirects
of
dbr
:Infosec
dbr
:Infosec
dbr
:CIA_triad
dbr
:Information_Security
dbr
:Information_Security
dbr
:History_of_information_security
dbr
:Message_integrity
dbr
:INFOSEC
dbr
:Document_security
dbr
:CIA-model
dbr
:CIA_Triad
dbr
:CIA_criteria
dbr
:CIA_model
dbr
:Info_sec
dbr
:Information_Systems_Security
dbr
:Information_protection
dbr
:Information_security_analyst
dbr
:Information_security_policies
dbr
:Information_security_policy
dbr
:Information_security_policy_documents
dbr
:Information_systems_security
dbr
:Infosecurity
dbr
:Security_triad
is
dbo:
wikiPageWikiLink
of
dbr
:BAE_Systems
dbr
:Deep_packet_inspection
dbr
:ISO/IEC_JTC_1/SC_27
dbr
:Private_biometrics
dbr
:List_of_companies_traded_on_the_JSE
dbr
:Sameer_Parekh
dbr
:JAL_Infotec
dbr
:SCSK
dbr
:List_of_computer_security_certifications
dbr
:Michael_Backes
dbr
:Stephen_Gold
dbr
:Distributed_file_system_for_cloud
dbr
:Network_intelligence
dbr
:W00w00
dbr
:Privacy_engineering
dbr
:Aylin_Yener
dbr
:Calton_Pu
dbr
:Yuval_Shahar
dbr
:BusKill
dbr
:Storm_botnet
dbr
:Master_of_Science_in_Cyber_Security
dbr
:Trust_management_(information_system)
dbr
:Ran_Canetti
dbr
:X.509
dbr
:SANS_Institute
dbr
:Transparency_(behavior)
dbr
:Encryption
dbr
:Operations_security
dbr
:University_of_Dodoma
dbr
:Unified_threat_management
dbr
:Basic_access_authentication
dbr
:Simple_file_verification
dbr
:Suffix_(name)
dbr
:Computer_emergency_response_team
dbr
:Intrusion_Countermeasures_Electronics
dbr
:Land_Warrior
dbr
:Splunk
dbr
:Third-party_management
dbr
:List_of_Linux_adopters
dbr
:Electronic_waste
dbr
:Military
dbr
:Cyclic_redundancy_check
dbr
:Communications_Security_Establishment
dbr
:Intruder_detection
dbr
:URI_fragment
dbr
:ContactPoint
dbr
:Audit_trail
dbr
:Certified_Information_Systems_Security_Professional
dbr
:New_Mexico_Institute_of_Mining_and_Technology
dbr
:Chief_information_security_officer
dbr
:Tivoli_Software
dbr
:Payment_Card_Industry_Data_Security_Standard
dbr
:Message_authentication
dbr
:Scientific_Research_Institute_of_System_Development
dbr
:Akinori_Yonezawa
dbr
:Annie_Antón
dbr
:Dorothy_E._Denning
dbr
:Information
dbr
:Security
dbr
:National_Sun_Yat-sen_University
dbr
:Risk_management
dbr
:Economy_of_Hungary
dbr
:Mitre_Corporation
dbr
:SafeNet
dbr
:Cochin_University_of_Science_and_Technology
dbr
:Sam_Hocevar
dbr
:Information_Systems_Security_Association
dbr
:Internet_in_Kazakhstan
dbr
:Strong_cryptography
dbr
:Parmjit_Singh_Gill
dbr
:Vulnerability_Discovery_Model
dbr
:SCADA_Strangelove
dbr
:Fake_news_website
dbr
:Alan_Rockefeller
dbr
:Attack_surface
dbr
:Chelsea_Manning
dbr
:Risk
dbr
:Indoctrination
dbr
:Social_engineering_(security)
dbr
:Data_loss_prevention_software
dbr
:DQS
dbr
:Application_firewall
dbr
:Data_security
dbr
:Information_privacy
dbr
:Phil_Zimmermann
dbr
:Open_Source_Vulnerability_Database
dbr
:Public_Security_Section_9
dbr
:Deloitte
dbr
:INCA_Internet
dbr
:Computer_security_software
dbr
:Data_governance
dbr
:Managed_security_service
dbr
:Hyper_Hyper
dbr
:Dell_EMC
dbr
:Saint_Petersburg_State_University_of_Aerospace_Instrumentation
dbr
:Information_security_standards
dbr
:Data_breach
dbr
:Password_manager
dbr
:Outline_of_the_Internet
dbr
:Federal_Information_Security_Management_Act_of_2002
dbr
:For_Official_Use_Only
dbr
:Fortezza
dbr
:G3_(company)
dbr
:Banking_in_the_United_States
dbr
:Clark_G._Fiester
dbr
:Clearswift
dbr
:Countermeasure_(computer)
dbr
:Hack.lu
dbr
:Donn_B._Parker
dbr
:NSA_encryption_systems
dbr
:Paul_A._Schneider
dbr
:Mayfield's_paradox
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:Office_of_the_National_Security_Council
dbr
:Public_opinion_brigades
dbr
:Australian_Signals_Directorate
dbr
:FBI_search_of_Mar-a-Lago
dbr
:Privacy_International
dbr
:Rings_of_Power
dbr
:Database_security
dbr
:Ad_blocking
dbr
:Security_information_management
dbr
:Andries_Brouwer
dbr
:Packet_Storm
dbr
:Enterprise_information_security_architecture
dbr
:Benjamin_N._Cardozo_High_School
dbr
:Bernhard_M._Hämmerli
dbr
:Cryptography
dbr
:Hungary
dbr
:Mobile_security
dbr
:Oracle_Corporation
dbr
:Authorization
dbr
:IPsec
dbr
:Special_Communications_Service_of_Russia
dbr
:Swedish_Security_Service
dbr
:Non-repudiation
dbr
:Personal_information_management
dbr
:Principle_of_least_privilege
dbr
:Royal_Holloway,_University_of_London
dbr
:Swedish_Defence_Research_Agency
dbr
:Elektrooniline_Riigi_Teataja
dbr
:SMS_banking
dbr
:FTC_fair_information_practice
dbr
:University_of_Fairfax
dbr
:Optiv
dbr
:Computer_crime_countermeasures
dbr
:CyberArk
dbr
:CyberTrust
dbr
:Cypherpunks_(book)
dbr
:Cyveillance
dbr
:Chartered_Institute_of_Information_Security
dbr
:Inference_attack
dbr
:Information_Security_Group
dbr
:Information_Trust_Institute
dbr
:Information_assurance
dbr
:Information_assurance_vulnerability_alert
dbr
:Information_policy
dbr
:Information_school
dbr
:Instant-off
dbr
:International_Conference_on_Availability,_Reliability_and_Security
dbr
:International_Conference_on_Web_Services
dbr
:Economy_of_China
dbr
:Java_Authentication_and_Authorization_Service
dbr
:Pseudonymization
dbr
:Body_of_knowledge
dbr
:Freedom_of_Mobile_Multimedia_Access
dbr
:Bell–LaPadula_model
dbr
:Ciphertext_indistinguishability
dbr
:Ministry_of_Science_and_Technology_(China)
dbr
:Information_Security_Department
dbr
:Israel_National_Museum_of_Science,_Technology,_and_Space
dbr
:International_business
dbr
:ISO/IEC_27003
dbr
:ISO/IEC_27006
dbr
:Information_Security_Forum
dbr
:Academy_of_State_Customs_Committee_(Azerbaijan)
dbr
:COMSATS_University_Islamabad
dbr
:Caldicott_Report
dbr
:Georgia_Institute_of_Technology_School_of_Computer_Science
dbr
:Georgia_Tech_Research_Institute
dbr
:Globalscape
dbr
:Incentive-centered_design
dbr
:Physical_information_security
dbr
:Risk_Management_Framework
dbr
:Risk_factor_(computing)
dbr
:Israeli_Intelligence_Corps
dbr
:Mimecast
dbr
:DNA_Oyj
dbr
:Lockheed_Martin
dbr
:Computer_security
dbr
:Black_Hat_Briefings
dbr
:Counterintelligence
dbr
:End_user
dbr
:Len_Sassaman
dbr
:Research_and_Analysis_Wing
dbr
:Cryptographic_protocol
dbr
:Theoretical_computer_science
dbr
:Chartered_Quality_Institute
dbr
:Acceptable_use_policy
dbr
:H._D._Moore
dbr
:Eddy_Willems
dbr
:Richard_Menta
dbr
:Meta-Certificate_Working_Group
dbr
:Mandiant
dbr
:CapitalG
dbr
:De-perimeterisation
dbr
:Ekoparty
dbr
:Tiger_Team_(TV_series)
dbr
:Cryptoeconomics
dbr
:Riyadh_Techno_Valley
dbr
:Contentverse
dbr
:Cyber_Essentials
dbr
:Shon_Harris
dbr
:Nikolay_Nikolaevich_Andreev
dbr
:AP_Computer_Science_Principles
dbr
:List_of_intelligence_agencies_of_Germany
dbr
:Computer_engineering_compendium
dbr
:Edward_Hirst
dbr
:Barbara_Simons
dbr
:Reihaneh_Safavi-Naini
dbr
:SCADA
dbr
:Physical_security
dbr
:Smart_card
dbr
:Silvio_Micali
dbr
:Akamai_Technologies
dbr
:Fake_news
dbr
:Automated_information_systems_security
dbr
:Contemporary_history
dbr
:Privacy-enhancing_technologies
dbr
:Risk_analysis_(engineering)
dbr
:Human–computer_interaction
dbr
:Transport_Layer_Security
dbr
:Security_descriptor
dbr
:Cyberattack
dbr
:Rasim_Alguliyev
dbr
:Kiwicon
dbr
:Ehud_Tenenbaum
dbr
:Erik_Bloodaxe_(hacker)
dbr
:Leo_Kuvayev
dbr
:Mark_Abene
dbr
:Mohamed_M._Atalla
dbr
:StankDawg
dbr
:Czar_(political_term)
dbr
:Remote_patient_monitoring
dbr
:Tsar
dbr
:Cryptanalysis
dbr
:Block_cipher_mode_of_operation
dbr
:Read-only_memory
dbr
:Brewer_and_Nash_model
dbr
:Spoofing_attack
dbr
:Student_information_system
dbr
:List_of_computing_and_IT_abbreviations
dbr
:VTech
dbr
:Censorship_in_China
dbr
:ECRYPT
dbr
:Homeland_Security_Act_of_2002
dbr
:MEHARI
dbr
:National_Information_Assurance_Glossary
dbr
:DMZGlobal
dbr
:David_Harley
dbr
:International_Journal_of_Software_and_Informatics
dbr
:International_School_of_Software,_Wuhan_University
dbr
:Internet_Security_Alliance
dbr
:Jeff_Moss_(hacker)
dbr
:Policy_appliances
dbr
:Pwnie_Awards
dbr
:Khoury_College_of_Computer_Sciences
dbr
:Norwegian_Research_Center_for_Computers_and_Law
dbr
:Corporate_title
dbr
:He_Dequan
dbr
:Mossack_Fonseca
dbr
:Defense_in_depth_(computing)
dbr
:NS_Solutions
dbr
:Computer_data_storage
dbr
:Coding_theory
dbr
:ColdFusion_Markup_Language
dbr
:Cryptographic_hash_function
dbr
:Medical_privacy
dbr
:Service-oriented_architecture_implementation_framework
dbr
:Digital_Millennium_Copyright_Act
dbr
:Biosecurity
dbr
:Security_controls
dbr
:Information_security_management
dbr
:Biocontainment
dbr
:Secure_messaging
dbr
:Transcription_(service)
dbr
:Cyber_self-defense
dbr
:Software_development_security
dbr
:National_data_protection_authority
dbr
:Federal_Service_for_Technical_and_Export_Control
dbr
:Brazilian_Society_of_Health_Informatics
dbr
:CERIAS
dbr
:Attrition_(website)
dbr
:Australian_Information_Security_Association
dbr
:Dmitri_Alperovitch
dbr
:List_of_master's_degrees_in_North_America
dbr
:List_of_mergers_and_acquisitions_by_IBM
dbr
:Moti_Yung
dbr
:Robert_Slade
dbr
:ScanSafe
is
dbp:
areaServed
of
dbr
:Vupen
dbr
:Zerodium
is
dbp:
data
of
dbr
:Incentive-centered_design
is
dbp:
domain
of
dbr
:Common_Vulnerability_Scoring_System
dbr
:ISO/IEC_27001
dbr
:NIST_Special_Publication_800-53
is
dbp:
field
of
dbr
:Rasim_Alguliyev
dbr
:Phillip_Porras
dbr
:Martin_P._Loeb
is
dbp:
fields
of
dbr
:Eddy_Willems
dbr
:David_Harley
dbr
:He_Dequan
dbr
:Robert_Slade
dbr
:Feng_Dengguo
is
dbp:
focus
of
dbr
:Global_Information_Assurance_Certification
is
dbp:
genre
of
dbr
:BLADE_(software)
is
dbp:
industry
of
dbr
:JAL_Infotec
dbr
:SCSK
dbr
:SafeNet
dbr
:Shred-it
dbr
:Optiv
dbr
:Cyveillance
dbr
:ISheriff
dbr
:Globalscape
dbr
:Mimecast
dbr
:Mandiant
dbr
:DMZGlobal
dbr
:Internet_Security_Alliance
dbr
:Positive_Technologies
dbr
:ScanSafe
dbr
:IViz_Security
dbr
:Cryptek
dbr
:Defence_Intelligence_(company)
dbr
:Secure_Network
dbr
:Pindrop_Security
dbr
:CrowdStrike
dbr
:SK_Infosec
dbr
:Fortra
dbr
:Area_1_Security
dbr
:Offensive_Security
dbr
:MailChannels
dbr
:Canon_IT_Solutions
dbr
:Dell_Technologies_PowerFlex
dbr
:ObjectSecurity
dbr
:DB_Networks
dbr
:Sony_Global_Solutions
is
dbp:
knownFor
of
dbr
:Mark_Abene
dbr
:Fulufhelo_Nelwamondo
dbr
:Jean-Pierre_Hubaux
is
dbp:
occupation
of
dbr
:Iftach_Ian_Amit
dbr
:Itzik_Kotler
is
dbp:
researchField
of
dbr
:Information_Trust_Institute
is
dbp:
services
of
dbr
:NS_Solutions
dbr
:EQualitie
dbr
:Itochu_Techno-Solutions
dbr
:Mitsui_Knowledge_Industry
dbr
:Uniadex
is
dbp:
subject
of
dbr
:The_Protection_of_Information_in_Computer_Systems
is
rdfs:
seeAlso
of
dbr
:Data_breach
is
foaf:
primaryTopic
of
wikipedia-en
:Information_security
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 4.0 International