Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Computer security
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
765969
(xsd:integer)
dbo:
wikiPageRevisionID
977251006
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:CatAutoTOC
dbt
:Cat_main
dbt
:Category_diffuse
rdf:
type
skos
:Concept
rdfs:
label
Computer security
(en)
skos:
broader
dbc
:Subfields_of_computer_science
dbc
:Cybercrime
dbc
:Cyberwarfare
dbc
:Security_engineering
dbc
:Security_technology
dbc
:Crime_prevention
dbc
:Secure_communication
dbc
:Weapons_countermeasures
skos:
prefLabel
Computer security
(en)
skos:
related
dbc
:Computer_security_exploits
prov:
wasDerivedFrom
wikipedia-en
:Category:Computer_security?oldid=977251006&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Public_computer
dbr
:Pwnie_Awards
dbr
:Electric_grid_security
dbr
:Enrollment_over_Secure_Transport
dbr
:Model-driven_security
dbr
:Zardoz_(computer_security)
dbr
:Trust_boundary
dbr
:Principle_of_least_privilege
dbr
:Anomaly_Detection_at_Multiple_Scales
dbr
:Application_portfolio_attack_surface
dbr
:Aptum_Technologies
dbr
:Homeland_Open_Security_Technology
dbr
:BeyondCorp
dbr
:Resilient_control_systems
dbr
:Cure53
dbr
:Cyber_Discovery
dbr
:Cyber_Intelligence_Sharing_and_Protection_Act
dbr
:Cyber_Ireland
dbr
:Cyber_Storm_Exercise
dbr
:Cyber_range
dbr
:Cyberbiosecurity
dbr
:Cybercrime
dbr
:Cybersecurity_Information_Sharing_Act
dbr
:Cybersex_trafficking
dbr
:DREAD_(risk_assessment_model)
dbr
:Usage_of_job_applications_by_hackers
dbr
:Vastaamo_data_breach
dbr
:Deception_technology
dbr
:Defense_strategy_(computing)
dbr
:Defensive_computing
dbr
:ERP_security
dbr
:EasyJet_data_breach
dbr
:Information_Exchange_Gateway
dbr
:Information_Security_Automation_Program
dbr
:Information_security_operations_center
dbr
:Insider_threat
dbr
:Intel_Management_Engine
dbr
:Internet_Security_Awareness_Training
dbr
:Intrusion_tolerance
dbr
:List_of_security_assessment_tools
dbr
:List_of_security_hacking_incidents
dbr
:System_integrity
dbr
:US_Cyber_Challenge
dbr
:Trusted_client
dbr
:Software_Guard_Extensions
dbr
:WS-SecurityPolicy
dbr
:Zero-knowledge_service
dbr
:Computer_security
dbr
:Computer_security_incident_management
dbr
:Content_Threat_Removal
dbr
:Anderson's_rule_(computer_science)
dbr
:SMBGhost
dbr
:Nobody_(username)
dbr
:Opal_Storage_Specification
dbr
:Operations_security
dbr
:Open-source_software_security
dbr
:RFPolicy
dbr
:Secure_state
dbr
:Co-managed_Security
dbr
:Collaboration-oriented_architecture
dbr
:Enterprise_information_security_architecture
dbr
:Confused_deputy_problem
dbr
:Content_Disarm_&_Reconstruction
dbr
:Control-flow_integrity
dbr
:Dancing_pigs
dbr
:MinID
dbr
:Open_Threat_Exchange
dbr
:Open_security
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:Client_honeypot
dbr
:Closed-loop_authentication
dbr
:CloudPassage
dbr
:Cloud_computing_security
dbr
:Commission_on_Enhancing_National_Cybersecurity
dbr
:Computer_Law_&_Security_Review
dbr
:Computer_security_compromised_by_hardware_failure
dbr
:Democratic_Congressional_Campaign_Committee_cyber_attacks
dbr
:Democratic_National_Committee_cyber_attacks
dbr
:Hardware_security
dbr
:Host_Based_Security_System
dbr
:Krebs_on_Security
dbr
:Proof-carrying_code
dbr
:Macro_and_security
dbr
:STRIDE_(security)
dbr
:Typed_assembly_language
dbr
:Michigan_Cyber_Range
dbr
:Centurion_guard
dbr
:Thunderspy
dbr
:Data-centric_security
dbr
:Data_commingling
dbr
:Wargame_(hacking)
dbr
:Dolev–Yao_model
dbr
:Domain_fronting
dbr
:HTTP_tunnel
dbr
:Hacker_Bible
dbr
:Language-based_security
dbr
:Linked_timestamping
dbr
:National_Cyber_Security_Awareness_Month
dbr
:National_Cyber_Security_Policy_2013
dbr
:Security_bug
dbr
:Adrozek
dbr
:American_Innovation_and_Competitiveness_Act
dbr
:Air_India_data_breach
dbr
:CyberPatriot
dbr
:Cyber_Threat_Intelligence_Integration_Center
dbr
:Cyber_and_Information_Domain_Service
dbr
:Cyber_risk_quantification
dbr
:Cyber_self-defense
dbr
:Data_remanence
dbr
:Fabric_of_Security
dbr
:Federal_Desktop_Core_Configuration
dbr
:Follina_(security_vulnerability)
dbr
:British_Airways_data_breach
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Digital_self-defense
dbr
:Digital_supply_chain_security
dbr
:Fail-stop
dbr
:Footprinting
dbr
:Four_Horsemen_of_the_Infocalypse
dbr
:Kill_Pill
dbr
:Trust_on_first_use
dbr
:Security_hacker
dbr
:Principal_(computer_security)
dbr
:Reverse_engineering
dbr
:Runtime_application_self-protection
dbr
:HEAT_LANrev
dbr
:Cowrie_(honeypot)
dbr
:Crackme
dbr
:Access_level
dbr
:Adversarial_machine_learning
dbr
:Biometric_device
dbr
:BlueBorne_(security_vulnerability)
dbr
:BlueHat
dbr
:Blue_team_(computer_security)
dbr
:Collateral_freedom
dbr
:Economics_of_security
dbr
:High_Assurance_Guard
dbr
:Trademark_(computer_security)
dbr
:Tunneling_protocol
dbr
:Refraction_networking
dbr
:Aurora_Generator_Test
dbr
:Automotive_security
dbr
:CPU_modes
dbr
:Spanish_Network_of_Excellence_on_Cybersecurity_Research
dbr
:Ciscogate
dbr
:Grayshift
dbr
:Howard_Schmidt
dbr
:Information_Security_Forum
dbr
:Camfecting
dbr
:Seccomp
dbr
:Secure_coding
dbr
:Secure_transmission
dbr
:Security_breach_notification_laws
dbr
:Security_information_management
dbr
:Security_of_smart_meters
dbr
:National_Collegiate_Cyber_Defense_Competition
dbr
:Risk_factor_(computing)
dbr
:Sherwood_Applied_Business_Security_Architecture
dbr
:Software-defined_perimeter
dbr
:Supervisor_Mode_Access_Prevention
dbr
:System_Service_Descriptor_Table
dbr
:Vanish_(computer_science)
dbr
:Vulnerabilities_Equities_Process
dbr
:Vulnerability_Discovery_Model
dbr
:Network_behavior_anomaly_detection
dbr
:Network_eavesdropping
dbr
:Security_log
dbr
:Shell_Control_Box
dbr
:ITIL_security_management
dbr
:IT_baseline_protection
dbr
:Parkerian_Hexad
dbr
:Gifar
dbr
:Site_Security_Handbook
dbr
:Physical_access
dbr
:Relying_party
dbr
:Trustworthy_computing
dbr
:Physical_information_security
dbr
:Security_testing
dbr
:Zero-day_(computing)
dbr
:Secure_element
dbr
:Secure_environment
dbr
:Security.txt
dbr
:Security_and_Privacy_in_Computer_Systems
dbr
:Security_type_system
dbr
:Ware_report
dbr
:Separation_of_protection_and_security
dbr
:Security_Vision
dbr
:SafetyNet_API
dbr
:Outline_of_computer_security
dbr
:PRODIGAL_(computer_system)
dbr
:Parasitic_computing
dbr
:Security_awareness
dbr
:Shadow_stack
dbr
:SCADA_Strangelove
dbr
:Spanish_Cybersecurity_Research_Conference
dbr
:Vulnerability_assessment_(computing)
dbr
:Stegomalware
dbr
:Thermal_attack
is
dcterms:
subject
of
dbr
:Public_computer
dbr
:Pwnie_Awards
dbr
:Electric_grid_security
dbr
:Enrollment_over_Secure_Transport
dbr
:Model-driven_security
dbr
:Zardoz_(computer_security)
dbr
:Trust_boundary
dbr
:Principle_of_least_privilege
dbr
:Anomaly_Detection_at_Multiple_Scales
dbr
:Application_portfolio_attack_surface
dbr
:Aptum_Technologies
dbr
:Homeland_Open_Security_Technology
dbr
:BeyondCorp
dbr
:Resilient_control_systems
dbr
:Cure53
dbr
:Cyber_Discovery
dbr
:Cyber_Intelligence_Sharing_and_Protection_Act
dbr
:Cyber_Ireland
dbr
:Cyber_Storm_Exercise
dbr
:Cyber_range
dbr
:Cyberbiosecurity
dbr
:Cybercrime
dbr
:Cybersecurity_Information_Sharing_Act
dbr
:Cybersex_trafficking
dbr
:DREAD_(risk_assessment_model)
dbr
:Usage_of_job_applications_by_hackers
dbr
:Vastaamo_data_breach
dbr
:Deception_technology
dbr
:Defense_strategy_(computing)
dbr
:Defensive_computing
dbr
:ERP_security
dbr
:EasyJet_data_breach
dbr
:Information_Exchange_Gateway
dbr
:Information_Security_Automation_Program
dbr
:Information_security_operations_center
dbr
:Insider_threat
dbr
:Intel_Management_Engine
dbr
:Internet_Security_Awareness_Training
dbr
:Intrusion_tolerance
dbr
:List_of_security_assessment_tools
dbr
:List_of_security_hacking_incidents
dbr
:System_integrity
dbr
:US_Cyber_Challenge
dbr
:Trusted_client
dbr
:Software_Guard_Extensions
dbr
:WS-SecurityPolicy
dbr
:Zero-knowledge_service
dbr
:Computer_security
dbr
:Computer_security_incident_management
dbr
:Content_Threat_Removal
dbr
:Anderson's_rule_(computer_science)
dbr
:SMBGhost
dbr
:Nobody_(username)
dbr
:Opal_Storage_Specification
dbr
:Operations_security
dbr
:Open-source_software_security
dbr
:RFPolicy
dbr
:Secure_state
dbr
:Co-managed_Security
dbr
:Collaboration-oriented_architecture
dbr
:Enterprise_information_security_architecture
dbr
:Confused_deputy_problem
dbr
:Content_Disarm_&_Reconstruction
dbr
:Control-flow_integrity
dbr
:Dancing_pigs
dbr
:MinID
dbr
:Open_Threat_Exchange
dbr
:Open_security
dbr
:Client_honeypot
dbr
:CloudPassage
dbr
:Cloud_computing_security
dbr
:Commission_on_Enhancing_National_Cybersecurity
dbr
:Computer_Law_&_Security_Review
dbr
:Computer_security_compromised_by_hardware_failure
dbr
:Democratic_Congressional_Campaign_Committee_cyber_attacks
dbr
:Democratic_National_Committee_cyber_attacks
dbr
:Hardware_security
dbr
:Host_Based_Security_System
dbr
:Krebs_on_Security
dbr
:Proof-carrying_code
dbr
:Macro_and_security
dbr
:STRIDE_(security)
dbr
:Typed_assembly_language
dbr
:Michigan_Cyber_Range
dbr
:Centurion_guard
dbr
:Thunderspy
dbr
:Data-centric_security
dbr
:Data_commingling
dbr
:Wargame_(hacking)
dbr
:Dolev–Yao_model
dbr
:Domain_fronting
dbr
:HTTP_tunnel
dbr
:Hacker_Bible
dbr
:Language-based_security
dbr
:Linked_timestamping
dbr
:National_Cyber_Security_Awareness_Month
dbr
:National_Cyber_Security_Policy_2013
dbr
:Security_bug
dbr
:Adrozek
dbr
:American_Innovation_and_Competitiveness_Act
dbr
:Air_India_data_breach
dbr
:CyberPatriot
dbr
:Cyber_Threat_Intelligence_Integration_Center
dbr
:Cyber_and_Information_Domain_Service
dbr
:Cyber_risk_quantification
dbr
:Cyber_self-defense
dbr
:Data_remanence
dbr
:Fabric_of_Security
dbr
:Federal_Desktop_Core_Configuration
dbr
:Follina_(security_vulnerability)
dbr
:British_Airways_data_breach
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Digital_self-defense
dbr
:Digital_supply_chain_security
dbr
:Fail-stop
dbr
:Footprinting
dbr
:Four_Horsemen_of_the_Infocalypse
dbr
:Kill_Pill
dbr
:Trust_on_first_use
dbr
:Security_hacker
dbr
:Principal_(computer_security)
dbr
:Reverse_engineering
dbr
:Runtime_application_self-protection
dbr
:HEAT_LANrev
dbr
:Cowrie_(honeypot)
dbr
:Crackme
dbr
:Access_level
dbr
:Adversarial_machine_learning
dbr
:Biometric_device
dbr
:BlueBorne_(security_vulnerability)
dbr
:BlueHat
dbr
:Blue_team_(computer_security)
dbr
:Collateral_freedom
dbr
:Economics_of_security
dbr
:High_Assurance_Guard
dbr
:Trademark_(computer_security)
dbr
:Tunneling_protocol
dbr
:Refraction_networking
dbr
:Aurora_Generator_Test
dbr
:Automotive_security
dbr
:CPU_modes
dbr
:Spanish_Network_of_Excellence_on_Cybersecurity_Research
dbr
:Ciscogate
dbr
:Grayshift
dbr
:Camfecting
dbr
:Seccomp
dbr
:Secure_coding
dbr
:Secure_transmission
dbr
:Security_breach_notification_laws
dbr
:Security_information_management
dbr
:Security_of_smart_meters
dbr
:National_Collegiate_Cyber_Defense_Competition
dbr
:Risk_factor_(computing)
dbr
:Sherwood_Applied_Business_Security_Architecture
dbr
:Software-defined_perimeter
dbr
:Supervisor_Mode_Access_Prevention
dbr
:System_Service_Descriptor_Table
dbr
:Vanish_(computer_science)
dbr
:Vulnerabilities_Equities_Process
dbr
:Vulnerability_Discovery_Model
dbr
:Network_behavior_anomaly_detection
dbr
:Network_eavesdropping
dbr
:Security_log
dbr
:Shell_Control_Box
dbr
:ITIL_security_management
dbr
:IT_baseline_protection
dbr
:Parkerian_Hexad
dbr
:Gifar
dbr
:Site_Security_Handbook
dbr
:Physical_access
dbr
:Relying_party
dbr
:Trustworthy_computing
dbr
:Physical_information_security
dbr
:Security_testing
dbr
:Zero-day_(computing)
dbr
:Secure_element
dbr
:Secure_environment
dbr
:Security.txt
dbr
:Security_and_Privacy_in_Computer_Systems
dbr
:Security_type_system
dbr
:Ware_report
dbr
:Separation_of_protection_and_security
dbr
:Security_Vision
dbr
:SafetyNet_API
dbr
:Outline_of_computer_security
dbr
:PRODIGAL_(computer_system)
dbr
:Parasitic_computing
dbr
:Security_awareness
dbr
:Shadow_stack
dbr
:SCADA_Strangelove
dbr
:Spanish_Cybersecurity_Research_Conference
dbr
:Vulnerability_assessment_(computing)
dbr
:Stegomalware
dbr
:Thermal_attack
is
skos:
broader
of
dbc
:Mobile_security
dbc
:Computer_security_organizations
dbc
:Cryptography
dbc
:Computer_security_exploits
dbc
:Security_vulnerability_databases
dbc
:Cloud_infrastructure_attacks_and_failures
dbc
:Computational_trust
dbc
:Information_privacy
dbc
:Data_security
dbc
:Computer_network_security
dbc
:Computer_security_software
dbc
:Computer_security_standards
dbc
:Internet_leaks
dbc
:Computer_forensics
dbc
:Computer_security_procedures
dbc
:People_associated_with_computer_security
dbc
:Computer_access_control
dbc
:Computer_security_models
dbc
:InfoSec_Twitter
dbc
:Computer_security_conferences
dbc
:Software_obfuscation
dbc
:Financial_cryptography
dbc
:Trusted_computing
dbc
:IT_risk_management
dbc
:Computer_security_books
dbc
:Computer_surveillance
dbc
:Computer_security_qualifications
is
skos:
related
of
dbc
:Computer_security_exploits
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License