This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dbpedia-dahttp://da.dbpedia.org/resource/
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
n18http://dbpedia.org/resource/Parasoft_C/
foafhttp://xmlns.com/foaf/0.1/
n12https://global.dbpedia.org/id/
dbpedia-trhttp://tr.dbpedia.org/resource/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
n19https://cyber.trackr.live/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n15http://web.nvd.nist.gov/view/ncp/
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
dbphttp://dbpedia.org/property/
xsdhhttp://www.w3.org/2001/XMLSchema#
goldhttp://purl.org/linguistics/gold/
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/
n22https://public.cyber.mil/stigs/

Statements

Subject Item
dbr:STIG
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
dbo:wikiPageRedirects
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:Information_assurance_vulnerability_alert
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:Security_Technical_Implementation_Guide
rdf:type
dbo:Software
rdfs:label
Security Technical Implementation Guide
rdfs:comment
A Security Technical Implementation Guide or STIG is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. Advanced STIGs might cover the design of a corporate network, covering configurations of routers, databases, firewalls, domain name servers and switches.
dcterms:subject
dbc:Security_compliance dbc:Configuration_management
dbo:wikiPageID
9680070
dbo:wikiPageRevisionID
1117278114
dbo:wikiPageWikiLink
dbr:Vulnerability_(computing) dbc:Configuration_management dbr:Patch_(computing) dbr:CIA_triad dbr:Security_Content_Automation_Protocol dbr:Desktop_computer dbr:Information_Assurance dbc:Security_compliance
dbo:wikiPageExternalLink
n15:repository n19: n22:
owl:sameAs
dbpedia-tr:Güvenlik_teknik_uygulama_rehberi n12:4uxZm dbpedia-da:Security_Technical_Implementation_Guide freebase:m.02pnz9q wikidata:Q7445000
dbp:wikiPageUsesTemplate
dbt:Short_description dbt:Reflist
dbo:abstract
A Security Technical Implementation Guide or STIG is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. Examples where STIGs would be of benefit is in the configuration of a desktop computer or an enterprise server. Most operating systems are not inherently secure, which leaves them open to criminals such as identity thieves and computer hackers. A STIG describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system, either physically at the machine or over a network. STIGs also describe maintenance processes such as software updates and vulnerability patching. Advanced STIGs might cover the design of a corporate network, covering configurations of routers, databases, firewalls, domain name servers and switches.
gold:hypernym
dbr:Methodology
prov:wasDerivedFrom
wikipedia-en:Security_Technical_Implementation_Guide?oldid=1117278114&ns=0
dbo:wikiPageLength
1880
foaf:isPrimaryTopicOf
wikipedia-en:Security_Technical_Implementation_Guide
Subject Item
dbr:Stig
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
dbo:wikiPageDisambiguates
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:Stig_(given_name)
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:Trusted_Platform_Module
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
n18:C++test
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:Tapestry_Technologies
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:CAST_(company)
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
dbr:OWASP
dbo:wikiPageWikiLink
dbr:Security_Technical_Implementation_Guide
Subject Item
wikipedia-en:Security_Technical_Implementation_Guide
foaf:primaryTopic
dbr:Security_Technical_Implementation_Guide