Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Computer network security
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
4651913
(xsd:integer)
dbo:
wikiPageRevisionID
951392880
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:CatAutoTOC
dbt
:Cat_main
dbt
:Category_diffuse
rdf:
type
skos
:Concept
rdfs:
label
Computer network security
(en)
skos:
broader
dbc
:Cyberwarfare
dbc
:Computer_networking
dbc
:Computer_security
skos:
prefLabel
Computer network security
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Computer_network_security?oldid=951392880&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Prelude_SIEM_(Intrusion_Detection_System)
dbr
:Proxy_list
dbr
:Network_Access_Control
dbr
:Network_Admission_Control
dbr
:Network_Based_Application_Recognition
dbr
:Network_security_policy
dbr
:MAC_filtering
dbr
:Messaging_security
dbr
:Monoculture_(computer_science)
dbr
:Anomaly-based_intrusion_detection_system
dbr
:Anti-pharming
dbr
:Anti-worm
dbr
:Application-level_gateway
dbr
:Honeyd
dbr
:Honeynet_Project
dbr
:Joint_Worldwide_Intelligence_Communications_System
dbr
:CyberCIEGE
dbr
:Cyber_range
dbr
:DDoS_mitigation
dbr
:DMZ_(computing)
dbr
:UT-VPN
dbr
:VIPRE
dbr
:Daxin_(spyware)
dbr
:Deep_packet_inspection
dbr
:Defense_in_depth_(computing)
dbr
:Device_fingerprint
dbr
:Ingress_filtering
dbr
:Inter-protocol_exploitation
dbr
:Interest_Flooding_Attack
dbr
:Intrusion_detection_system
dbr
:Penetration_test
dbr
:Robust_random_early_detection
dbr
:Spyware
dbr
:Unidirectional_network
dbr
:Zero_trust_security_model
dbr
:Generalized_TTL_security_mechanism
dbr
:Same-origin_policy
dbr
:MySecureCyberspace
dbr
:Woo–Lam
dbr
:Network_cloaking
dbr
:Warflying
dbr
:Phoning_home
dbr
:Trusted_path
dbr
:Screened_subnet
dbr
:Cisco_Security_Agent
dbr
:Cisco_Systems_VPN_Client
dbr
:End_node_problem
dbr
:Miredo
dbr
:ContraVirus
dbr
:Timestamping_(computing)
dbr
:Bastion_host
dbr
:Managed_security_service
dbr
:Client_Puzzle_Protocol
dbr
:Common_Vulnerability_Scoring_System
dbr
:Common_Weakness_Enumeration
dbr
:Z-Wave
dbr
:Host_Identity_Protocol
dbr
:Identity_interrogation
dbr
:Key_distribution_center
dbr
:Spoofing_attack
dbr
:Ticket_Granting_Ticket
dbr
:Trusted_Network_Connect
dbr
:McAfee_Change_Control
dbr
:Microsoft_SmartScreen
dbr
:Middlebox
dbr
:Protected_computer
dbr
:Packet_capture_appliance
dbr
:Wireless_security
dbr
:Broker_injection
dbr
:Administrative_domain
dbr
:Data_center_security
dbr
:Distributed_firewall
dbr
:Dual-homed
dbr
:Minimum-Pairs_Protocol
dbr
:Network_interface_layer_security
dbr
:Rogue_access_point
dbr
:TCP_Cookie_Transactions
dbr
:ACARM-ng
dbr
:3-subset_meet-in-the-middle_attack
dbr
:Downgrade_attack
dbr
:Fail2ban
dbr
:Banner_grabbing
dbr
:Outbound_content_compliance
dbr
:PacketFence
dbr
:Packet_Storm
dbr
:Captive_portal
dbr
:Capture_the_flag
dbr
:Digital_Postmarks
dbr
:Global_Telecoms_Exploitation
dbr
:Google_Safe_Browsing
dbr
:Knowledge-based_authentication
dbr
:Security_controls
dbr
:MAC_flooding
dbr
:Port_forwarding
dbr
:Attack_tree
dbr
:IntruShield
dbr
:Invincea
dbr
:Countermeasure_(computer)
dbr
:Port_triggering
dbr
:UDP_hole_punching
dbr
:AEGIS_SecureConnect
dbr
:Check_Point_GO
dbr
:Check_Point_VPN-1
dbr
:Jump_server
dbr
:Kerberos_(protocol)
dbr
:LARIAT
dbr
:BitSight
dbr
:Black_hole_(networking)
dbr
:Blacker_(security)
dbr
:Egress_filtering
dbr
:Hole_punching_(networking)
dbr
:HoneyMonkey
dbr
:Honeypot_(computing)
dbr
:Honeytoken
dbr
:NAT_traversal
dbr
:Ticket_(IT_security)
dbr
:XARA
dbr
:Zombie_(computing)
dbr
:Real-time_adaptive_security
dbr
:Science_DMZ_Network_Architecture
dbr
:Screening_router
dbr
:Authentication_server
dbr
:Byzantine_Foothold
dbr
:CERT_Coding_Standards
dbr
:Software-defined_protection
dbr
:Cisco_ASA
dbr
:Cisco_PIX
dbr
:Greynet
dbr
:Guided_tour_puzzle_protocol
dbr
:National_Initiative_for_Cybersecurity_Education
dbr
:NetStumbler
dbr
:Network_encryption_cracking
dbr
:OSSEC
dbr
:Offensive_Security
dbr
:Security_service_(telecommunication)
dbr
:Sguil
dbr
:Shadowsocks
dbr
:XKMS
dbr
:Operation_Cyber_Condition_Zebra
dbr
:Smart_card_management_system
dbr
:Man-in-the-middle_attack
dbr
:Security_Attribute_Modulation_Protocol
dbr
:Session_border_controller
dbr
:Simultaneous_Authentication_of_Equals
dbr
:Sniffing_attack
dbr
:WebScarab
dbr
:Stealth_wallpaper
dbr
:Unified_threat_management
dbr
:Wi-Fi_Protected_Access
dbr
:Wired_Equivalent_Privacy
dbr
:NetCentrics
dbr
:Network_enclave
dbr
:Network_security
dbr
:VLAN_hopping
dbr
:User_agent_spoofing
dbr
:Extranet
dbr
:FTP_bounce_attack
dbr
:ICMP_hole_punching
dbr
:IEC_62351
dbr
:IEEE_802.1X
dbr
:IF-MAP
dbr
:INOC-DBA
dbr
:List_of_spyware_programs
dbr
:Tarpit_(networking)
dbr
:SYN_cookies
dbr
:Password_length_parameter
dbr
:Shell_shoveling
dbr
:VPNBook
dbr
:Evil_bit
dbr
:Firewalk_(computing)
dbr
:Firewall_pinhole
dbr
:Man-on-the-side_attack
dbr
:NT_LAN_Manager
dbr
:National_Cyber_Range
dbr
:National_Initiative_for_Cybersecurity_Careers_and_Studies
dbr
:National_Strategy_for_Trusted_Identities_in_Cyberspace
dbr
:Multibook
dbr
:Service_scan
dbr
:Stateful_firewall
dbr
:TCP_sequence_prediction_attack
dbr
:TACACS
dbr
:Safe@Office
dbr
:Security_Protocols_Open_Repository
dbr
:TCP_Stealth
dbr
:Sybil_attack
dbr
:Split_tunneling
is
dcterms:
subject
of
dbr
:Prelude_SIEM_(Intrusion_Detection_System)
dbr
:Proxy_list
dbr
:Network_Access_Control
dbr
:Network_Admission_Control
dbr
:Network_Based_Application_Recognition
dbr
:Network_security_policy
dbr
:MAC_filtering
dbr
:Messaging_security
dbr
:Monoculture_(computer_science)
dbr
:Anomaly-based_intrusion_detection_system
dbr
:Anti-pharming
dbr
:Anti-worm
dbr
:Application-level_gateway
dbr
:Honeyd
dbr
:Honeynet_Project
dbr
:Joint_Worldwide_Intelligence_Communications_System
dbr
:CyberCIEGE
dbr
:Cyber_range
dbr
:DDoS_mitigation
dbr
:DMZ_(computing)
dbr
:UT-VPN
dbr
:VIPRE
dbr
:Daxin_(spyware)
dbr
:Deep_packet_inspection
dbr
:Defense_in_depth_(computing)
dbr
:Device_fingerprint
dbr
:Ingress_filtering
dbr
:Inter-protocol_exploitation
dbr
:Interest_Flooding_Attack
dbr
:Intrusion_detection_system
dbr
:Penetration_test
dbr
:Robust_random_early_detection
dbr
:Spyware
dbr
:Unidirectional_network
dbr
:Zero_trust_security_model
dbr
:Generalized_TTL_security_mechanism
dbr
:Same-origin_policy
dbr
:MySecureCyberspace
dbr
:Woo–Lam
dbr
:Network_cloaking
dbr
:Warflying
dbr
:Phoning_home
dbr
:Trusted_path
dbr
:Screened_subnet
dbr
:Cisco_Security_Agent
dbr
:Cisco_Systems_VPN_Client
dbr
:End_node_problem
dbr
:Miredo
dbr
:ContraVirus
dbr
:Timestamping_(computing)
dbr
:Bastion_host
dbr
:Managed_security_service
dbr
:Client_Puzzle_Protocol
dbr
:Common_Vulnerability_Scoring_System
dbr
:Common_Weakness_Enumeration
dbr
:Z-Wave
dbr
:Host_Identity_Protocol
dbr
:Identity_interrogation
dbr
:Key_distribution_center
dbr
:Spoofing_attack
dbr
:Ticket_Granting_Ticket
dbr
:Trusted_Network_Connect
dbr
:McAfee_Change_Control
dbr
:Microsoft_SmartScreen
dbr
:Middlebox
dbr
:Protected_computer
dbr
:Packet_capture_appliance
dbr
:Wireless_security
dbr
:Broker_injection
dbr
:Administrative_domain
dbr
:Data_center_security
dbr
:Distributed_firewall
dbr
:Dual-homed
dbr
:Minimum-Pairs_Protocol
dbr
:Network_interface_layer_security
dbr
:Rogue_access_point
dbr
:TCP_Cookie_Transactions
dbr
:ACARM-ng
dbr
:3-subset_meet-in-the-middle_attack
dbr
:Downgrade_attack
dbr
:Fail2ban
dbr
:Banner_grabbing
dbr
:Outbound_content_compliance
dbr
:PacketFence
dbr
:Packet_Storm
dbr
:Captive_portal
dbr
:Capture_the_flag
dbr
:Digital_Postmarks
dbr
:Global_Telecoms_Exploitation
dbr
:Google_Safe_Browsing
dbr
:Knowledge-based_authentication
dbr
:Security_controls
dbr
:MAC_flooding
dbr
:Port_forwarding
dbr
:Attack_tree
dbr
:IntruShield
dbr
:Invincea
dbr
:Countermeasure_(computer)
dbr
:Port_triggering
dbr
:UDP_hole_punching
dbr
:AEGIS_SecureConnect
dbr
:Check_Point_GO
dbr
:Check_Point_VPN-1
dbr
:Jump_server
dbr
:Kerberos_(protocol)
dbr
:LARIAT
dbr
:BitSight
dbr
:Black_hole_(networking)
dbr
:Blacker_(security)
dbr
:Egress_filtering
dbr
:Hole_punching_(networking)
dbr
:HoneyMonkey
dbr
:Honeypot_(computing)
dbr
:Honeytoken
dbr
:NAT_traversal
dbr
:Ticket_(IT_security)
dbr
:XARA
dbr
:Zombie_(computing)
dbr
:Real-time_adaptive_security
dbr
:Science_DMZ_Network_Architecture
dbr
:Screening_router
dbr
:Authentication_server
dbr
:Byzantine_Foothold
dbr
:CERT_Coding_Standards
dbr
:Software-defined_protection
dbr
:Cisco_ASA
dbr
:Cisco_PIX
dbr
:Greynet
dbr
:Guided_tour_puzzle_protocol
dbr
:National_Initiative_for_Cybersecurity_Education
dbr
:NetStumbler
dbr
:Network_encryption_cracking
dbr
:OSSEC
dbr
:Offensive_Security
dbr
:Security_service_(telecommunication)
dbr
:Sguil
dbr
:Shadowsocks
dbr
:XKMS
dbr
:Operation_Cyber_Condition_Zebra
dbr
:Smart_card_management_system
dbr
:Man-in-the-middle_attack
dbr
:Security_Attribute_Modulation_Protocol
dbr
:Session_border_controller
dbr
:Simultaneous_Authentication_of_Equals
dbr
:Sniffing_attack
dbr
:WebScarab
dbr
:Stealth_wallpaper
dbr
:Unified_threat_management
dbr
:Wi-Fi_Protected_Access
dbr
:Wired_Equivalent_Privacy
dbr
:NetCentrics
dbr
:Network_enclave
dbr
:Network_security
dbr
:VLAN_hopping
dbr
:User_agent_spoofing
dbr
:Extranet
dbr
:FTP_bounce_attack
dbr
:ICMP_hole_punching
dbr
:IEC_62351
dbr
:IEEE_802.1X
dbr
:IF-MAP
dbr
:INOC-DBA
dbr
:List_of_spyware_programs
dbr
:Tarpit_(networking)
dbr
:SYN_cookies
dbr
:Password_length_parameter
dbr
:Shell_shoveling
dbr
:VPNBook
dbr
:Evil_bit
dbr
:Firewalk_(computing)
dbr
:Firewall_pinhole
dbr
:Man-on-the-side_attack
dbr
:NT_LAN_Manager
dbr
:National_Cyber_Range
dbr
:National_Initiative_for_Cybersecurity_Careers_and_Studies
dbr
:National_Strategy_for_Trusted_Identities_in_Cyberspace
dbr
:Multibook
dbr
:Service_scan
dbr
:Stateful_firewall
dbr
:TCP_sequence_prediction_attack
dbr
:TACACS
dbr
:Safe@Office
dbr
:Security_Protocols_Open_Repository
dbr
:TCP_Stealth
dbr
:Sybil_attack
dbr
:Split_tunneling
is
skos:
broader
of
dbc
:Email_authentication
dbc
:Antivirus_software
dbc
:Network_analyzers
dbc
:Firewall_software
dbc
:Virtual_private_networks
dbc
:Internet_security
dbc
:Spam_filtering
dbc
:Network_mappers
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License