Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Information security
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Protecting information by mitigating information risks
Property
Value
dbo:
description
andmete ja andmetöötlusvahendite turvalisuse tagamine
(et)
ensemble de pratiques visant à protéger des données
(fr)
תחום העוסק בהגנה על מערכות ממוחשבות
(iw)
безопасность от злоупотреблений информацией
(ru)
melindungi informasi dengan mengurangi resiko informasi
(in)
at sikre information for uvedkommende
(da)
at tryggja upplýsingar, soleiðis at óviðkomandi ikki fáa atgongd, vm.
(fo)
một lĩnh vực của công nghệ thông tin
(vi)
protecting information by mitigating information risks
(en)
ochrana před poškozením a ztrátou informací
(cs)
práctica de protección de la información
(es)
technischer Begriff komplementär zum Datenschutz
(de)
ঝুঁকি হ্রাসকরণের মাধ্যমে তথ্যকে সুরক্ষিত করা
(bn)
varovanje informacij z zmanjševanjem informacijskih tveganj
(sl)
ایمن سازی اطلاعات
(fa)
研究信息存储、传输和处理中信息安全保障问题的理论与技术
(zh)
захист інформації шляхом зниження інформаційних ризиків
(uk)
proteger as informações mitigando os riscos das informações
(pt)
dbo:
thumbnail
wiki-commons
:Special:FilePath/CIAJMK1209-en.svg?width=300
dbo:
wikiPageExternalLink
https://web.archive.org/web/20110906012808/http:/iac.dtic.mil/iatac/ia_policychart.html
https://web.archive.org/web/20191108164220/http:/www.iwar.org.uk/comsec/
http://iac.dtic.mil/iatac/ia_policychart.html
http://blog.brisbanedatarecovery.com.au/2017/05/awareness-of-how-your-data-is-being.html
http://www.opensecurityarchitecture.org/
https://spi.dod.mil/threat.htm
http://www.cl.cam.ac.uk/~rja14/book.html
http://www.iwar.org.uk/comsec/
https://spi.dod.mil/
https://archive.org/details/certguidetosyste00alle
https://archive.org/details/principlesofinfo0000dhil
https://web.archive.org/web/20080402234040/http:/www.scmagazineus.com/IT-security-professionals-must-evolve-for-changing-market/article/33990/
https://web.archive.org/web/20160925225224/https:/www.spi.dod.mil/
https://web.archive.org/web/20200510012626/https:/spi.dod.mil/threat.htm
http://msdn2.microsoft.com/en-us/library/ms998382.aspx
dbo:
wikiPageWikiLink
dbr
:Institute_of_Information_Security_Professionals
dbr
:Due_care
dbr
:Maiden_name
dbr
:ISO/IEC_27002
dbr
:IT_baseline_protection
dbr
:TACACS
dbr
:Driver's_license
dbr
:Firewall_(computing)
dbr
:Authentication
dbr
:Encryption
dbr
:ITU-T
dbr
:Wi-Fi_Protected_Access
dbr
:Electronic_business
dbr
:Identity_theft
dbr
:IT_risk
dbr
:Small_business
dbr
:Data_security
dbr
:Information_security_standards
dbr
:Verification_and_validation
dbr
:Password_policy
dbr
:Data_Retention_Directive
dbr
:Countermeasure_(computer)
dbc
:Security
dbr
:File_system_permissions
dbr
:Computer
dbr
:Computer_virus
dbr
:Internet
dbr
:Julius_Caesar
dbr
:Republic_of_Ireland
dbr
:Telecommunications
dbr
:World_War_II
dbr
:Internet_Architecture_Board
dbr
:Data_quality
dbr
:Palm_print
dbr
:Audit_trail
dbr
:Information_infrastructure
dbr
:ARPANET
dbr
:Alan_Turing
dbr
:Antivirus_software
dbr
:Canada
dbr
:Carnegie_Mellon_University
dbr
:Central_processing_unit
dbr
:Cold_War
dbr
:Computer_hardware
dbr
:Computer_security
dbr
:Computing
dbr
:Cryptography
dbr
:Database
dbr
:Information_technology
dbr
:Knowledge
dbr
:Military
dbr
:Natural_disaster
dbr
:Parliament_of_the_United_Kingdom
dbr
:Privacy
dbr
:Router_(computing)
dbr
:Software
dbr
:Terrorism
dbr
:United_States_Armed_Forces
dbr
:Phishing
dbr
:Financial_institution
dbr
:Public_key_infrastructure
dbr
:ITIL
dbr
:ACID
dbr
:X.1035
dbr
:Asset_management
dbr
:Backup
dbr
:Infrastructure
dbr
:Technology
dbr
:United_States_Department_of_Defense
dbr
:Hospital
dbr
:Information
dbr
:Information_system
dbr
:International_Organization_for_Standardization
dbr
:National_Institute_of_Standards_and_Technology
dbr
:Statistics
dbr
:Human_resources
dbr
:System_administrator
dbr
:Bank_teller
dbr
:Document
dbr
:The_Open_Group
dbr
:Password
dbr
:Secure_Shell
dbr
:Telnet
dbr
:Digital_forensics
dbr
:Incident_management
dbr
:Key_(cryptography)
dbr
:ITIL_security_management
dbr
:Network_architecture
dbr
:Federal_Office_for_Information_Security
dbr
:Kerberos_(protocol)
dbr
:Security_controls
dbr
:Wired_Equivalent_Privacy
dbr
:Business_model
dbr
:Single_sign-on
dbr
:Utility
dbr
:Database_administrator
dbr
:Data
dbr
:File_Transfer_Protocol
dbr
:OECD
dbr
:Organization
dbr
:United_States_Department_of_the_Treasury
dbr
:Website
dbr
:Information_and_communications_technology
dbr
:Security_testing
dbr
:Self-efficacy
dbr
:Application_security
dbr
:Biometrics
dbr
:Caesar_cipher
dbr
:Computer_worm
dbr
:Fingerprint
dbr
:Mobile_security
dbr
:Access_control
dbr
:Internet_Engineering_Task_Force
dbr
:Pretty_Good_Privacy
dbr
:Ransomware
dbr
:Information_security_audit
dbr
:Data_integrity
dbr
:Information_Security_Forum
dbr
:Confidentiality
dbr
:Privacy_software
dbr
:Information_security_management
dbr
:Certified_Information_Systems_Auditor
dbr
:Intellectual_property_infringement
dbr
:Privacy_engineering
dbr
:Payment_Card_Industry_Data_Security_Standard
dbr
:Application_software
dbr
:Corporation
dbr
:Denial-of-service_attack
dbr
:Information_privacy
dbr
:Robert_Metcalfe
dbr
:Software_Engineering_Institute
dbr
:Transaction_processing
dbr
:Business_continuity_planning
dbr
:European_Telecommunications_Standards_Institute
dbr
:Standardization
dbr
:Risk_analysis
dbr
:Productivity
dbr
:G.hn
dbr
:Enterprise_information_security_architecture
dbr
:IT_risk_management
dbr
:Network_Security_Services
dbr
:Security_awareness
dbr
:Operational_definition
dbr
:Trojan_horse_(computing)
dbr
:RADIUS
dbr
:ISACA
dbr
:Risk_assessment
dbr
:Key_management
dbr
:Environmental_security
dbr
:Data_breach
dbr
:Key_size
dbr
:Security_level_management
dbr
:Family_Educational_Rights_and_Privacy_Act
dbr
:Health_Insurance_Portability_and_Accountability_Act
dbr
:Information_assurance
dbr
:Personal_Information_Protection_and_Electronic_Documents_Act
dbr
:Advanced_Encryption_Standard
dbr
:American_Express
dbr
:International_Electrotechnical_Commission
dbr
:Sabotage
dbr
:Parkerian_Hexad
dbr
:Ownership
dbr
:Risk_management
dbr
:Pearson_Education
dbr
:Privacy-enhancing_technologies
dbr
:Canada_Evidence_Act
dbr
:Security_service_(telecommunication)
dbr
:Capability-based_security
dbr
:ISO/IEC_20000
dbr
:Legal_liability
dbr
:Vulnerability_assessment
dbr
:Business_process
dbr
:Network_security
dbr
:Classified_information
dbr
:ISO/IEC_27001
dbr
:Physical_security
dbr
:Sarbanes–Oxley_Act
dbr
:Social_engineering_(security)
dbr
:Weak_key
dbr
:Security_policy
dbr
:Chuck_Easttom
dbr
:Non-repudiation
dbr
:Asset_(computer_security)
dbr
:Continual_improvement_process
dbr
:John_Doe
dbr
:Quality_control
dbr
:Visa_Inc.
dbr
:Availability
dbr
:Data_processing
dbr
:Discover_Card
dbr
:Encryption_software
dbr
:Gramm–Leach–Bliley_Act
dbr
:Referential_integrity
dbr
:Federal_Financial_Institutions_Examination_Council
dbr
:Speaker_recognition
dbr
:Information_technology_audit
dbr
:Data-centric_security
dbr
:Integrity
dbr
:Policy
dbr
:Authorization
dbr
:High_availability
dbr
:Information_technology_security_audit
dbc
:Crime_prevention
dbr
:Disaster_recovery_plan
dbc
:National_security
dbc
:Cryptography
dbc
:Data_security
dbr
:Security_bug
dbr
:Security_of_Information_Act
dbr
:Standard_of_Good_Practice
dbr
:Official_Secrets_Act_1889
dbr
:List_of_computer_security_certifications
dbc
:Information_governance
dbr
:Traffic_Light_Protocol
dbr
:Information_security_awareness
dbr
:Group_Policy_Object
dbr
:Site_Security_Handbook
dbr
:Identity-based_security
dbr
:Information_security_indicators
dbr
:Threat_assessment
dbr
:Security_convergence
dbr
:Username
dbr
:Security_information_management
dbr
:Kill_chain
dbr
:Advanced_Research_Projects_Agency
dbr
:Communications
dbr
:Federal_Information_Processing_Standard
dbr
:First_World_War
dbr
:John_Wiley_&_Sons
dbr
:NIST
dbr
:Data_Protection_Act_1984
dbr
:MasterCard
dbr
:Businesses
dbr
:GnuPG
dbr
:Swipe_card
dbr
:Lawrence_Roberts_(scientist)
dbr
:Cybersecurity
dbr
:Vulnerability_(computing)
dbr
:Threat_(computer)
dbr
:Cengage
dbr
:Intrusion_detection
dbr
:Governments
dbr
:Databases
dbr
:Federal_Sentencing_Guidelines
dbr
:Firewall_(networking)
dbr
:U.S._Department_of_Commerce
dbr
:Risk_management_information_systems
dbr
:U.S._Department_of_Education
dbr
:Access_control_list
dbr
:Security_breach_notification_laws
dbr
:Time-based_One-time_Password_Algorithm
dbr
:Dialup_connection
dbr
:Cultures
dbr
:Mainframe_computers
dbr
:Open_Information_Security_Maturity_Model
dbr
:Gordon-Loeb_Model
dbr
:ISO/IEC_17799
dbr
:Enigma_Machine
dbr
:Black_hat_hacker
dbr
:Magnetic_tapes
dbr
:DoD
dbr
:Donn_Parker
dbr
:Computer_Misuse_Act
dbr
:Retina_scan
dbr
:Role-Based_Access_Control
dbr
:U-570
dbr
:The_Internet_Society
dbr
:Tamper-evident
dbr
:File:CIAJMK1209-en.svg
dbr
:File:Defense_In_Depth_-_Onion_Model.svg
dbr
:File:Posters_for_information_security_...Defense_of_the_Russian_Federation.jpg
dbr
:File:Privacy_International_2007_privacy_ranking_map.png
dbp:
date
2011-09-06
(xsd:date)
2019-11-08
(xsd:date)
dbp:
url
https://web.archive.org/web/20110906012808/http:/iac.dtic.mil/iatac/ia_policychart.html
https://web.archive.org/web/20191108164220/http:/www.iwar.org.uk/comsec/
dbp:
wikiPageUsesTemplate
dbt
:SecurityType
dbt
:Cite_book
dbt
:Usc
dbt
:Authority_control
dbt
:Citation_needed
dbt
:Colbegin
dbt
:Colend
dbt
:Computer_science
dbt
:For
dbt
:Information_security
dbt
:Main
dbt
:Refbegin
dbt
:Refend
dbt
:Reflist
dbt
:Sfn
dbt
:Short_description
dbt
:Use_mdy_dates
dbt
:Webarchive
dbt
:Commons_category
dct:
subject
dbc
:Security
dbc
:Crime_prevention
dbc
:National_security
dbc
:Cryptography
dbc
:Data_security
dbc
:Information_governance
gold:
hypernym
dbr
:Practice
rdf:
type
owl
:Thing
owl
:Thing
rdfs:
label
Information security
(en)
Informační bezpečnost
(cs)
Seguretat de la informació
(ca)
Ασφάλεια πληροφοριακών συστημάτων
(el)
أمن المعلومات
(ar)
Informazioaren segurtasun
(eu)
Seguridad de la información
(es)
Informationssicherheit
(de)
Keamanan informasi
(in)
Sécurité de l'information
(fr)
情報セキュリティ
(ja)
정보 보안
(ko)
Informatiebeveiliging
(nl)
Segurança da informação
(pt)
Informationssäkerhet
(sv)
Информационная безопасность
(ru)
Інформаційна безпека
(uk)
信息安全
(zh)
owl:
sameAs
freebase
:Information security
yago-res
:Information security
wikidata
:Information security
dbpedia-de
:Information security
dbpedia-es
:Information security
dbpedia-nl
:Information security
dbpedia-tr
:Information security
dbpedia-fr
:Information security
dbpedia-da
:Information security
dbpedia-he
:Information security
dbpedia-hu
:Information security
dbpedia-ja
:Information security
dbpedia-pt
:Information security
dbpedia-ro
:Information security
dbpedia-ru
:Information security
dbpedia-zh
:Information security
dbpedia-sv
:Information security
dbpedia-vi
:Information security
dbpedia-el
:Information security
dbpedia-id
:Information security
dbpedia-ko
:Information security
dbpedia-ca
:Information security
dbpedia-et
:Information security
dbpedia-ar
:Information security
dbpedia-ast
:Information security
dbpedia-az
:Information security
dbpedia-bg
:Information security
dbpedia-bn
:Information security
dbpedia-cs
:Information security
dbpedia-eu
:Information security
dbpedia-fa
:Information security
dbpedia-fi
:Information security
dbpedia-hi
:Information security
dbpedia-hy
:Information security
dbpedia-kk
:Information security
dbpedia-lv
:Information security
dbpedia-mk
:Information security
dbpedia-mn
:Information security
dbpedia-ms
:Information security
dbpedia-no
:Information security
dbpedia-or
:Information security
dbpedia-pa
:Information security
dbpedia-simple
:Information security
dbpedia-sl
:Information security
dbpedia-sq
:Information security
dbpedia-sr
:Information security
dbpedia-ta
:Information security
dbpedia-th
:Information security
dbpedia-uk
:Information security
dbpedia-uz
:Information security
dbpedia-global
:Information security
prov:
wasDerivedFrom
wikipedia-en
:Information_security?oldid=1311939447&ns=0
foaf:
depiction
wiki-commons
:Special:FilePath/CIAJMK1209-en.svg
wiki-commons
:Special:FilePath/Defense_In_Depth_-_Onion_Model.svg
wiki-commons
:Special:FilePath/Posters_for_informati...Defense_of_the_Russian_Federation.jpg
wiki-commons
:Special:FilePath/Privacy_International_2007_privacy_ranking_map.png
foaf:
isPrimaryTopicOf
wikipedia-en
:Information_security
is
dbo:
academicDiscipline
of
dbr
:Robert_Slade
dbr
:He_Dequan
dbr
:Moti_Yung
dbr
:Rassolov_Ilya_Mikhailovich
dbr
:Eddy_Willems
dbr
:David_Harley
dbr
:Klaus_Peter_Jantke
dbr
:Rasim_Alguliyev
dbr
:Phillip_Porras
dbr
:Bülent_Yener
dbr
:Feng_Dengguo
is
dbo:
field
of
dbr
:Martin_P._Loeb
is
dbo:
genre
of
dbr
:BLADE_(software)__BLADE__1
is
dbo:
industry
of
dbr
:SafeNet
dbr
:Cryptek
dbr
:MailChannels
dbr
:ISheriff
dbr
:SCSK
dbr
:Optiv
dbr
:IViz_Security
dbr
:Cyveillance
dbr
:DMZGlobal
dbr
:BAE_Systems
dbr
:Shred-it
dbr
:Information_Security_Forum
dbr
:Area_1_Security
dbr
:Positive_Technologies
dbr
:Mandiant
dbr
:Mimecast
dbr
:Pindrop_Security
dbr
:Sony_Global_Solutions
dbr
:CrowdStrike
dbr
:ScanSafe
dbr
:Secure_Network
dbr
:Dell_Technologies_PowerFlex
dbr
:ObjectSecurity
dbr
:SK_Infosec
dbr
:Qualys
dbr
:Fortra
dbr
:Canon_IT_Solutions
dbr
:Defence_Intelligence_(company)
dbr
:Offensive_Security
dbr
:Globalscape
dbr
:JAL_Infotec
dbr
:Jatheon_Technologies
dbr
:DB_Networks
dbr
:Internet_Security_Alliance
is
dbo:
knownFor
of
dbr
:Barbara_Simons__Barbara_B._Simons__1
dbr
:Shon_Harris
dbr
:Bernhard_M._Hämmerli
dbr
:Fulufhelo_Nelwamondo
dbr
:Kento_Sasano
dbr
:Mark_Abene
dbr
:Erik_Bloodaxe_(hacker)
is
dbo:
occupation
of
dbr
:Jesse_Tuttle
dbr
:Iftach_Ian_Amit
dbr
:Mark_Abene
dbr
:Itzik_Kotler
dbr
:H._D._Moore
dbr
:Khalil_Sehnaoui
is
dbo:
product
of
dbr
:Ruselectronics
is
dbo:
regionServed
of
dbr
:Vupen
dbr
:Zerodium
is
dbo:
service
of
dbr
:EQualitie
dbr
:Itochu_Techno-Solutions
dbr
:Mitsui_Knowledge_Industry
dbr
:Uniadex
dbr
:NS_Solutions
is
dbo:
type
of
dbr
:Information_Security_Department
is
dbo:
wikiPageDisambiguates
of
dbr
:Security_(disambiguation)
is
dbo:
wikiPageRedirects
of
dbr
:CIA_triad
dbr
:Infosec
dbr
:Infosec
dbr
:Information_Security
dbr
:Information_Security
dbr
:Message_integrity
dbr
:History_of_information_security
dbr
:INFOSEC
dbr
:Document_security
dbr
:CIA-model
dbr
:CIA_Triad
dbr
:CIA_criteria
dbr
:CIA_model
dbr
:Info_sec
dbr
:Information_Systems_Security
dbr
:Information_protection
dbr
:Information_security_analyst
dbr
:Information_security_policies
dbr
:Information_security_policy
dbr
:Information_security_policy_documents
dbr
:Information_systems_security
dbr
:Infosecurity
dbr
:Security_triad
is
dbo:
wikiPageWikiLink
of
dbr
:CARTA
dbr
:CIA_triad
dbr
:Kiwicon
dbr
:Moamel_Ahmed_Shakeer
dbr
:ISO/IEC_27002
dbr
:List_of_computing_and_IT_abbreviations
dbr
:ISO/IEC_27004
dbr
:List_of_University_of_Michigan_alumni
dbr
:List_of_companies_traded_on_the_JSE
dbr
:Privacy_International
dbr
:Economy_of_Hungary
dbr
:Encryption
dbr
:SafeNet
dbr
:Software_monetization
dbr
:Australian_Signals_Directorate
dbr
:Ran_Canetti
dbr
:Akamai_Technologies
dbr
:DQS
dbr
:IT_risk
dbr
:Data_loss_prevention_software
dbr
:Data_security
dbr
:Beijing_Electronic_Science_and_Technology_Institute
dbr
:Clark_G._Fiester
dbr
:Croatian_security_and_intelligence_system
dbr
:CronLab
dbr
:Cryptek
dbr
:Fortezza
dbr
:Pwnie_Awards
dbr
:Ivan_Savchenko
dbr
:List_of_United_States_Marine_Corps_MOS
dbr
:List_of_mergers_and_acquisitions_by_IBM
dbr
:Voice_computing
dbr
:Nikolay_Nikolaevich_Andreev
dbr
:Common_Vulnerabilities_and_Exposures
dbr
:Information_security_standards
dbr
:Compartmentalization_(information_security)
dbr
:Message_authentication
dbr
:Strong_cryptography
dbr
:Jeff_Moss_(hacker)
dbr
:Robert_Slade
dbr
:Indraprastha_Institute_of_Information_Technology,_Delhi
dbr
:Internet_Security_Awareness_Training
dbr
:Magna_Carta_for_Philippine_Internet_Freedom
dbr
:MailChannels
dbr
:UK_Data_Service
dbr
:CapitalG
dbr
:EQualitie
dbr
:Simple_file_verification
dbr
:BLADE_(software)
dbr
:Countermeasure_(computer)
dbr
:Draft_Communications_Data_Bill
dbr
:List_of_resolutions_at_the_sixty-seven...f_the_United_Nations_General_Assembly
dbr
:Center_for_Information_Security_Technologies
dbr
:Academy_of_State_Customs_Committee_(Azerbaijan)
dbr
:SecurityScorecard
dbr
:Hungary
dbr
:Cryptographic_hash_function
dbr
:SANS_Institute
dbr
:Storm_botnet
dbr
:IABG
dbr
:Homeland_Security_Act_of_2002
dbr
:CyberTrust
dbr
:Parmjit_Singh_Gill
dbr
:Hala_Ayala
dbr
:Resilient_control_systems
dbr
:Richard_Menta
dbr
:Risk_Management_Framework
dbr
:Trusted_Information_Systems
dbr
:Bell–LaPadula_model
dbr
:He_Dequan
dbr
:Mossack_Fonseca
dbr
:Audit_trail
dbr
:Alfonso_Farina
dbr
:NIST_Special_Publication_800-92
dbr
:The_Hub_(forum)
dbr
:Security_(disambiguation)
dbr
:Alan_Rockefeller
dbr
:Bow-tie_diagram
dbr
:Open_security
dbr
:Physical_information_security
dbr
:Annie_Antón
dbr
:Computer_security
dbr
:Computer_security_software
dbr
:Cryptanalysis
dbr
:Cryptography
dbr
:DNA_Oyj
dbr
:Lockheed_Martin
dbr
:Military
dbr
:New_Mexico_Institute_of_Mining_and_Technology
dbr
:Oracle_Corporation
dbr
:Python_(programming_language)
dbr
:Theoretical_computer_science
dbr
:Computer_security_conference
dbr
:End_user
dbr
:Ministry_of_Information_and_Communications_Technology_(Qatar)
dbr
:Read-only_memory
dbr
:SCSK
dbr
:Secrecy
dbr
:Saint_Petersburg_State_University_of_Aerospace_Instrumentation
dbr
:Vulnerability_scanner
dbr
:Andries_Brouwer
dbr
:List_of_Israelis
dbr
:Optiv
dbr
:Shlomo_Touboul
dbr
:Moti_Yung
dbr
:Office_of_the_National_Security_Council
dbr
:University_of_Fairfax
dbr
:Victor_Berlin
dbr
:Vinod_Sekhar
dbr
:Wisconsin_Department_of_Revenue
dbr
:Lawrence_A._Gordon
dbr
:Lockpath
dbr
:Xait
dbr
:Fake_news
dbr
:Yuval_Shahar
dbr
:IT_security_standards
dbr
:EIDAS
dbr
:CloudMinds
dbr
:Luciad
dbr
:Unified_threat_management
dbr
:URI_fragment
dbr
:De-perimeterisation
dbr
:Chongqing_Communication_Institute
dbr
:Meta-Certificate_Working_Group
dbr
:Remote_access_policy
dbr
:SlickLogin
dbr
:Counterintelligence
dbr
:Deloitte
dbr
:INCA_Internet
dbr
:Transparency_(behavior)
dbr
:Barbara_Simons
dbr
:Buffer_overflow
dbr
:Calton_Pu
dbr
:Computer_data_storage
dbr
:Dorothy_E._Denning
dbr
:Human–computer_interaction
dbr
:Information
dbr
:Len_Sassaman
dbr
:RSA_Award_for_Excellence_in_Mathematics
dbr
:Reihaneh_Safavi-Naini
dbr
:Royal_Holloway,_University_of_London
dbr
:SCADA
dbr
:Security
dbr
:Beijing_Institute_of_Technology
dbr
:Cybercrime
dbr
:Dell_Technologies
dbr
:National_Sun_Yat-sen_University
dbr
:Freedom_of_Mobile_Multimedia_Access
dbr
:Risk
dbr
:Bad_sector
dbr
:Password_manager
dbr
:Dell_EMC
dbr
:Department_of_Computer_Science_and_Technology,_University_of_Cambridge
dbr
:Attack_surface
dbr
:Fake_news_website
dbr
:CERIAS
dbr
:CITIC_Telecom_CPC
dbr
:COMSATS_University_Islamabad
dbr
:Clearswift
dbr
:Communications_security
dbr
:Confused_deputy_problem
dbr
:Computer_lab
dbr
:Eddy_Willems
dbr
:Ekoparty
dbr
:Georgia_Institute_of_Technology_School_of_Computer_Science
dbr
:ITIL_security_management
dbr
:Java_Authentication_and_Authorization_Service
dbr
:Pseudonymization
dbr
:Remote_patient_monitoring
dbr
:Body_of_knowledge
dbr
:Open_Source_Vulnerability_Database
dbr
:Si6
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:StankDawg
dbr
:Syracuse_University_School_of_Information_Studies
dbr
:THOTCON
dbr
:Vupen
dbr
:Surespot
dbr
:British_hydrogen_bomb_programme
dbr
:Frontiers_of_Computer_Science
dbr
:Illinois_Freedom_of_Information_Act
dbr
:FBI_search_of_Mar-a-Lago
dbr
:Guard_(information_security)
dbr
:Instant-off
dbr
:Intruder_detection
dbr
:Information_Trust_Institute
dbr
:Information_assurance_vulnerability_alert
dbr
:Information_policy
dbr
:Black_Hat_Briefings
dbr
:Mitre_Corporation
dbr
:Virtual_private_network
dbr
:Security_controls
dbr
:Economy_of_Romania
dbr
:Paul_A._Schneider
dbr
:Biosecurity
dbr
:Brazilian_Society_of_Health_Informatics
dbr
:CyberArk
dbr
:Cypherpunks_(book)
dbr
:Cyveillance
dbr
:DMZGlobal
dbr
:Managed_security_service
dbr
:Public_Security_Section_9
dbr
:Leo_Kuvayev
dbr
:Data_governance
dbr
:Brewer_and_Nash_model
dbr
:Contentverse
dbr
:Shon_Harris
dbr
:Martin_P._Loeb
dbr
:Iftach_Ian_Amit
dbr
:Civil_service_in_Kazakhstan
dbr
:FreeCodeCamp
dbr
:Scientific_Research_Group_In_Egypt
dbr
:Usability_of_web_authentication_systems
dbr
:Edward_Hirst
dbr
:KARMA_attack
dbr
:Smart_card
dbr
:Tsar
dbr
:BAE_Systems
dbr
:Block_cipher_mode_of_operation
dbr
:Application_security
dbr
:Cloud_computing_security
dbr
:Mobile_security
dbr
:ISO/IEC_JTC_1/SC_27
dbr
:Security_engineering
dbr
:Information_security_audit
dbr
:Chief_information_security_officer
dbr
:Operations_security
dbr
:Economics_of_security
dbr
:Rings_of_Power
dbr
:Information_Security_Forum
dbr
:Sam_Hocevar
dbr
:Area_1_Security
dbr
:Cross-site_scripting
dbr
:SMS_banking
dbr
:David_Harley
dbr
:Mandiant
dbr
:1993_Bishopsgate_bombing
dbr
:Scientific_Research_Institute_of_System_Development
dbr
:List_of_master's_degrees_in_North_America
dbr
:Risk_analysis_(engineering)
dbr
:Hack.lu
dbr
:Mimecast
dbr
:NSA_encryption_systems
dbr
:Information_security_management
dbr
:University_of_Virginia_School_of_Engineering_and_Applied_Science
dbr
:Basic_access_authentication
dbr
:Defense_in_depth_(computing)
dbr
:National_data_protection_authority
dbr
:Pindrop_Security
dbr
:Privacy_engineering
dbr
:IET_Information_Security
dbr
:Jill_Slay
dbr
:ZMap_(software)
dbr
:Sony_Global_Solutions
dbr
:Jean-Pierre_Hubaux
dbr
:Arjen_Kamphuis
dbr
:Ministry_of_High-Tech_Industry_(Armenia)
dbr
:Brad_Haines
dbr
:Payment_Card_Industry_Data_Security_Standard
dbr
:Contemporary_history
dbr
:Akinori_Yonezawa
dbr
:Coding_theory
dbr
:Information_privacy
dbr
:Silvio_Micali
dbr
:Economy_of_China
dbr
:IPsec
dbr
:Special_Communications_Service_of_Russia
dbr
:Transport_Layer_Security
dbr
:Ground_segment
dbr
:Research_and_Analysis_Wing
dbr
:Computer_emergency_response_team
dbr
:Land_Warrior
dbr
:Secure_copy_protocol
dbr
:Network_security_policy
dbr
:Cyclic_redundancy_check
dbr
:Ehud_Tenenbaum
dbr
:Information_Security_Department
dbr
:Israel_National_Museum_of_Science,_Technology,_and_Space
dbr
:Biocontainment
dbr
:Legal_matter_management
dbr
:Benjamin_N._Cardozo_High_School
dbr
:Bernhard_M._Hämmerli
dbr
:Enterprise_information_security_architecture
dbr
:Chartered_Quality_Institute
dbr
:Chengdu_Tianfu_Software_Park
dbr
:CrowdStrike
dbr
:Ron_Schnell
dbr
:Fulufhelo_Nelwamondo
dbr
:IT_risk_management
dbr
:Neal_Creighton
dbr
:Network_Security_Services
dbr
:Wendy_M._Grossman
dbr
:ScanSafe
dbr
:Matzov
dbr
:Alexandra_Elbakyan
dbr
:Dell_Technologies_PowerFlex
dbr
:ObjectSecurity
dbr
:Vectra_AI
dbr
:Krasnodar_Higher_Military_School_named_for_Army_General_S.M._Shtemenko
dbr
:SK_Infosec
is
dbp:
areaServed
of
dbr
:Vupen
dbr
:Zerodium
is
dbp:
data
of
dbr
:Incentive-centered_design
is
dbp:
domain
of
dbr
:Common_Vulnerability_Scoring_System
dbr
:NIST_Special_Publication_800-53
dbr
:ISO/IEC_27001
is
dbp:
field
of
dbr
:Rassolov_Ilya_Mikhailovich
dbr
:Martin_P._Loeb
dbr
:Rasim_Alguliyev
dbr
:Phillip_Porras
is
dbp:
fields
of
dbr
:Robert_Slade
dbr
:He_Dequan
dbr
:Eddy_Willems
dbr
:David_Harley
dbr
:Feng_Dengguo
is
dbp:
focus
of
dbr
:Global_Information_Assurance_Certification
is
dbp:
genre
of
dbr
:BLADE_(software)
is
dbp:
industry
of
dbr
:SafeNet
dbr
:Cryptek
dbr
:MailChannels
dbr
:ISheriff
dbr
:SCSK
dbr
:Optiv
dbr
:IViz_Security
dbr
:Cyveillance
dbr
:DMZGlobal
dbr
:Shred-it
dbr
:Area_1_Security
dbr
:Positive_Technologies
dbr
:Mandiant
dbr
:Mimecast
dbr
:Pindrop_Security
dbr
:Sony_Global_Solutions
dbr
:CrowdStrike
dbr
:ScanSafe
dbr
:Secure_Network
dbr
:Dell_Technologies_PowerFlex
dbr
:ObjectSecurity
dbr
:SK_Infosec
dbr
:Fortra
dbr
:Canon_IT_Solutions
dbr
:Defence_Intelligence_(company)
dbr
:Offensive_Security
dbr
:Globalscape
dbr
:JAL_Infotec
dbr
:Jatheon_Technologies
dbr
:DB_Networks
dbr
:Internet_Security_Alliance
is
dbp:
knownFor
of
dbr
:Jean-Pierre_Hubaux
dbr
:Fulufhelo_Nelwamondo
dbr
:Mark_Abene
is
dbp:
occupation
of
dbr
:Iftach_Ian_Amit
dbr
:Itzik_Kotler
is
dbp:
researchField
of
dbr
:Information_Trust_Institute
is
dbp:
services
of
dbr
:EQualitie
dbr
:Itochu_Techno-Solutions
dbr
:Mitsui_Knowledge_Industry
dbr
:Uniadex
dbr
:NS_Solutions
is
dbp:
subject
of
dbr
:The_Protection_of_Information_in_Computer_Systems
is
dbp:
type
of
dbr
:Information_Security_Department
is
rdfs:
seeAlso
of
dbr
:Data_breach
is
foaf:
primaryTopic
of
wikipedia-en
:Information_security
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 4.0 International