Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Data security
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
4842680
(xsd:integer)
dbo:
wikiPageRevisionID
952387041
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:CatAutoTOC
dbt
:Cat_main
rdf:
type
skos
:Concept
rdfs:
label
Data security
(en)
skos:
broader
dbc
:Electronic_documents
dbc
:Data_laws
dbc
:Computer_data
dbc
:Information_technology_management
dbc
:Computer_security
dbc
:National_security
skos:
prefLabel
Data security
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Data_security?oldid=952387041&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Rublon
dbr
:Electronic_seal
dbr
:National_Industrial_Security_Program
dbr
:User_activity_monitoring
dbr
:Open_Information_Security_Maturity_Model
dbr
:Password_fatigue
dbr
:Wireless_identity_theft
dbr
:Blancco
dbr
:Anomaly_detection
dbr
:Application_firewall
dbr
:Application_security
dbr
:List_of_data_breaches
dbr
:Cyber_Insider_Threat
dbr
:Verinice
dbr
:De-perimeterisation
dbr
:Defense_in_depth_(computing)
dbr
:Inference_attack
dbr
:Information_Systems_Security_Association
dbr
:Information_Trust_Institute
dbr
:Information_diving
dbr
:Information_repository
dbr
:Information_security
dbr
:Information_security_awareness
dbr
:Information_security_indicators
dbr
:Pod_slurping
dbr
:Titan_Rain
dbr
:Common_Criteria_Evaluation_and_Validation_Scheme
dbr
:Generally_Accepted_Privacy_Principles
dbr
:Purple_Penelope
dbr
:United_Kingdom_government_security_breaches
dbr
:Screened_subnet
dbr
:GateKeeper_(access_control_device)
dbr
:Gordon–Loeb_model
dbr
:MyDLP
dbr
:Context-based_access_control
dbr
:Copyright_alternatives
dbr
:Crypto-shredding
dbr
:Cryptographic_key_types
dbr
:Cryptographic_splitting
dbr
:LogLogic
dbr
:Loggly
dbr
:Malware_Information_Sharing_Platform
dbr
:Chinese_wall
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:Cloud_storage_gateway
dbr
:Compartmentalization_(information_security)
dbr
:Computer_recycling
dbr
:Key_management
dbr
:Mayfield's_paradox
dbr
:Medical_data_breach
dbr
:Relocatable_user_backup
dbr
:Active_hard-drive_protection
dbr
:Administrative_share
dbr
:Agbogbloshie
dbr
:Threat_Intelligence_Platform
dbr
:DataSpii
dbr
:Data_architect
dbr
:Data_breach
dbr
:Data_center_security
dbr
:Data_embassy
dbr
:Data_exfiltration
dbr
:Data_loss_prevention_software
dbr
:Data_security
dbr
:Data_theft
dbr
:Data_validation
dbr
:Database_encryption
dbr
:Domain_Based_Security
dbr
:Doxing
dbr
:Jericho_Forum
dbr
:Actiance
dbr
:Adaptive_Redaction
dbr
:2009_Sidekick_data_loss
dbr
:Air_gap_(networking)
dbr
:FinalCode
dbr
:Fluentd
dbr
:Forum_of_Incident_Response_and_Security_Teams
dbr
:Foldering
dbr
:Glossary_of_backup_terms
dbr
:Hard_privacy_technologies
dbr
:Kill_chain
dbr
:Security_controls
dbr
:BPO_security
dbr
:Backup
dbr
:Backup_validation
dbr
:SWIPSY
dbr
:Transient-key_cryptography
dbr
:Biometric_passport
dbr
:Biometric_tokenization
dbr
:Misuse_detection
dbr
:Reception_and_criticism_of_WhatsApp_security_and_privacy_features
dbr
:Screening_router
dbr
:Self-destruct
dbr
:Transshipment_(information_security)
dbr
:Asset_(computer_security)
dbr
:AuthenTec
dbr
:Bulk_personal_datasets
dbr
:Splunk
dbr
:Guard_(information_security)
dbr
:Information_sensitivity
dbr
:Budapest_Declaration_on_Machine_Readable_Travel_Documents
dbr
:Offensive_Security
dbr
:Certified_Information_Systems_Security_Professional
dbr
:Certified_Penetration_Testing_Engineer
dbr
:Chain_of_trust
dbr
:Loss_of_United_Kingdom_child_benefit_data_(2007)
dbr
:McCumber_cube
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Sanitization_(classified_information)
dbr
:Security_convergence
dbr
:Security_information_and_event_management
dbr
:Separation_of_duties
dbr
:Sheep_dip_(computing)
dbr
:Virtual_private_database
dbr
:Wireless_intrusion_prevention_system
dbr
:Security_level_management
dbr
:Extended_Access_Control
dbr
:Extrusion_detection
dbr
:IT_risk
dbr
:IT_risk_management
dbr
:Single-loss_expectancy
dbr
:Offline_private_key_protocol
dbr
:Threat_intelligence
dbr
:Firewall_(computing)
dbr
:First_Department
dbr
:NIST_RBAC_model
dbr
:National_Information_Assurance_Partnership
dbr
:Signed_and_Encrypted_Email_Over_The_Internet
dbr
:Multi-party_authorization
dbr
:PhotoDNA
dbr
:Secure_Network
dbr
:Stateful_firewall
dbr
:Vera_Security
dbr
:Personal_data
dbr
:Security_of_automated_teller_machines
dbr
:Paper_key
dbr
:V-Key
is
dcterms:
subject
of
dbr
:Rublon
dbr
:Electronic_seal
dbr
:National_Industrial_Security_Program
dbr
:User_activity_monitoring
dbr
:Open_Information_Security_Maturity_Model
dbr
:Password_fatigue
dbr
:Wireless_identity_theft
dbr
:Blancco
dbr
:Anomaly_detection
dbr
:Application_firewall
dbr
:Application_security
dbr
:List_of_data_breaches
dbr
:Cyber_Insider_Threat
dbr
:Verinice
dbr
:De-perimeterisation
dbr
:Defense_in_depth_(computing)
dbr
:Inference_attack
dbr
:Information_Systems_Security_Association
dbr
:Information_Trust_Institute
dbr
:Information_diving
dbr
:Information_repository
dbr
:Information_security
dbr
:Information_security_awareness
dbr
:Information_security_indicators
dbr
:Pod_slurping
dbr
:Titan_Rain
dbr
:Common_Criteria_Evaluation_and_Validation_Scheme
dbr
:Generally_Accepted_Privacy_Principles
dbr
:Purple_Penelope
dbr
:United_Kingdom_government_security_breaches
dbr
:Screened_subnet
dbr
:GateKeeper_(access_control_device)
dbr
:Gordon–Loeb_model
dbr
:MyDLP
dbr
:Context-based_access_control
dbr
:Copyright_alternatives
dbr
:Crypto-shredding
dbr
:Cryptographic_key_types
dbr
:Cryptographic_splitting
dbr
:LogLogic
dbr
:Loggly
dbr
:Malware_Information_Sharing_Platform
dbr
:Chinese_wall
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:Cloud_storage_gateway
dbr
:Compartmentalization_(information_security)
dbr
:Computer_recycling
dbr
:Key_management
dbr
:Mayfield's_paradox
dbr
:Medical_data_breach
dbr
:Relocatable_user_backup
dbr
:Active_hard-drive_protection
dbr
:Administrative_share
dbr
:Agbogbloshie
dbr
:Threat_Intelligence_Platform
dbr
:DataSpii
dbr
:Data_architect
dbr
:Data_breach
dbr
:Data_center_security
dbr
:Data_embassy
dbr
:Data_exfiltration
dbr
:Data_loss_prevention_software
dbr
:Data_security
dbr
:Data_theft
dbr
:Data_validation
dbr
:Database_encryption
dbr
:Domain_Based_Security
dbr
:Doxing
dbr
:Jericho_Forum
dbr
:Actiance
dbr
:Adaptive_Redaction
dbr
:2009_Sidekick_data_loss
dbr
:Air_gap_(networking)
dbr
:FinalCode
dbr
:Fluentd
dbr
:Forum_of_Incident_Response_and_Security_Teams
dbr
:Foldering
dbr
:Glossary_of_backup_terms
dbr
:Hard_privacy_technologies
dbr
:Kill_chain
dbr
:Security_controls
dbr
:BPO_security
dbr
:Backup
dbr
:Backup_validation
dbr
:SWIPSY
dbr
:Transient-key_cryptography
dbr
:Biometric_passport
dbr
:Biometric_tokenization
dbr
:Misuse_detection
dbr
:Reception_and_criticism_of_WhatsApp_security_and_privacy_features
dbr
:Screening_router
dbr
:Self-destruct
dbr
:Transshipment_(information_security)
dbr
:Asset_(computer_security)
dbr
:AuthenTec
dbr
:Bulk_personal_datasets
dbr
:Splunk
dbr
:Guard_(information_security)
dbr
:Information_sensitivity
dbr
:Budapest_Declaration_on_Machine_Readable_Travel_Documents
dbr
:Offensive_Security
dbr
:Certified_Information_Systems_Security_Professional
dbr
:Certified_Penetration_Testing_Engineer
dbr
:Chain_of_trust
dbr
:Loss_of_United_Kingdom_child_benefit_data_(2007)
dbr
:McCumber_cube
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Sanitization_(classified_information)
dbr
:Security_convergence
dbr
:Security_information_and_event_management
dbr
:Separation_of_duties
dbr
:Sheep_dip_(computing)
dbr
:Virtual_private_database
dbr
:Wireless_intrusion_prevention_system
dbr
:Security_level_management
dbr
:Extended_Access_Control
dbr
:Extrusion_detection
dbr
:IT_risk
dbr
:IT_risk_management
dbr
:Single-loss_expectancy
dbr
:Offline_private_key_protocol
dbr
:Threat_intelligence
dbr
:Firewall_(computing)
dbr
:First_Department
dbr
:NIST_RBAC_model
dbr
:National_Information_Assurance_Partnership
dbr
:Signed_and_Encrypted_Email_Over_The_Internet
dbr
:Multi-party_authorization
dbr
:PhotoDNA
dbr
:Secure_Network
dbr
:Stateful_firewall
dbr
:Vera_Security
dbr
:Personal_data
dbr
:Security_of_automated_teller_machines
dbr
:Paper_key
dbr
:V-Key
is
skos:
broader
of
dbc
:Fault_tolerance
dbc
:Information_governance
dbc
:Database_security
dbc
:Backup
dbc
:Carding_(fraud)
dbc
:Electronic_waste
dbc
:Data_protection
is
skos:
related
of
dbc
:Computer_data_storage
dbc
:Data_quality
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License