Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Cybersecurity
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
Cybersecurity
is
dcterms:subject
of
Cooperative Cyber Defense Center of Excellence
Defensive Cyber Effects Operations
Signature scanning and algorithmic detection
ACMA Annual Reports on Online Risk and Safety in the Digital Economy
Traffic light protocol
Cybersecurity of Freight Information Systems: A Scoping Study - Special Report 274
OMB Memorandum M-14-03
Separation of Duties
Office of Campaign Coordination
Guidance Regarding Cyberspace Roles, Responsibilities, Functions, and Governance Within the DoD
Improving Cybersecurity Protections in Federal Acquisitions
GovCERT.it
Report on Securing and Growing the Digital Economy
Institute for Critical Infrastructure Technology
Remote wipe
U.S. Cyber Consequences Unit
Enterprise Information Security Office
Coast Guard Cyber Program
Cyber Incident Management Planning Guide
Cyber War and Competition in the China-U.S. Relationship
Ignalina nuclear power plant
Cyber Security - A new national programme
Federal Information Management Security Act: Annual Report to Congress
Infratechnology
FIDO Alliance
Cybersecurity governance
Cyber Security Operations Centre
Holiday Traveling with Personal Internet-Enabled Devices
Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented
Guidelines for Smart Grid Cyber Security, Rev. 1
Designed-in Cyber Security for Cyber-Physical Systems
Homeland Open Security Technology
Cyber intelligence
State-sponsored espionage
Misappropriation
Private Industry Notification
Cybersecurity Legislative Proposal (Fact Sheet)
Vulnerability Notes Database
Center for Strategic and International Studies
Public key enabling
Licensing of Trusted Third Parties for the Provision of Encryption Services
European External Action Service
Vocabulary for Event Recording and Incident Sharing
TP CERT
Postmarket Management of Cybersecurity in Medical Devices: Guidance for Industry and Food and Drug Administration Staff
Understanding Firewalls
Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity
The Red Book
The National Security Strategy: A Strong Britain in an Age of Uncertainty
Principles for Cybersecurity and Critical Infrastructure Protection
Information Security: Coordination of Federal Cyber Security Research and Development
Computer Virus Attacks
Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks
Cyber Security and the UK's Critical National Infrastructure
2015 Protected Health Information Data Breach Report
United States Coast Guard Cyber Strategy
Moving target defense
Information Security Management Framework
Joint Cybersecurity Coordination Center
Technology Assessment: Cybersecurity for Critical Infrastructure Protection
Cyber Terror Response Center
Coast Guard Criminal investigative Service
Information Security: Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing
Updating U.S. Federal Cybersecurity Policy and Guidance
Information System Security Operation Center
Cyber device
HackerWatch
Improving our Nation's Cybersecurity Through the Public-Private Partnership
CRISALIS
Defense Industrial Base (DIB) Cybersecurity/Information Assurance
Canada’s Cyber Security Strategy
Pseudo-flaw
Compromised by Design? Securing the Defense Electronics Supply Chain
A Roadmap for Cybersecurity Research
DoD-DIB Cyber Incident Reporting & Cyber Threat Information Sharing Portal
Examining the Cyber Threat to Critical Infrastructure and the American Economy
Controlled risk
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure
Cyber Security Technical Infrastructure Gap
Roadmap to Secure Control Systems in the Energy Sector
Clean-Slate Design of Resilient, Adaptive, Secure Hosts
Recover
Integrity lock
Information Security Incident Detection Reporting and Analysis
Cyberspace Defense Officer
Pentagon
Institute for Security and Open Methodologies
Linking Cybersecurity Policy and Performance
Cyber Resilience Review
Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance
Protection
Federal Cybersecurity Research and Development Strategic Plan
Defence and Cyber-Security
Identifying Hoaxes and Urban Legends
Australian Government Information Security Manual
Information Technology Incident Management Plan
G7 Fundamental Elements of Cybersecurity for the Financial Sector
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
Guide to Developing a Cyber Security and Risk Mitigation Plan
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 12
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software