SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

Cybervorfall
cyberincident
ciberincidente
cyberincident
Ereignis bei der Nutzung von Informatikmitteln, das dazu führt, dass die Vertraulichkeit, Verfügbarkeit oder Integrität von Informationen oder die Nachvollziehbarkeit ihrer Bearbeitung beeinträchtigt ist.
Événement survenant lors de l'utilisation de moyens informatiques et ayant pour conséquence une atteinte à la confidentialité, à la disponibilité ou à l'intégrité d'informations ou à la traçabilité de leur traitement.
Evento che si verifica nell'utilizzo di mezzi informatici e che compromette la confidenzialità, la disponibilità o l'integrità delle informazioni o la tracciabilità del loro trattamento.
Event that involves the use of IT resources and adversely affects the confidentiality, availability or integrity of information or the traceability of its processing.
2024-10-18T07:38:21.4554160Z
478185
https://www.termdat.bk.admin.ch/entry/478185
Informationssicherheitsgesetz, Änderung 2023-09-29, Art. 5 Bst. d (AS 2024 257)
LF Sécurité de l'information, modification 2023-09-29, art. 5 let. d (RO 2024 257)
LF Sicurezza delle informazioni, modifica 2023-09-29, art. 5 lett. d (RU 2024 257)
FC, National Cyberstrategy (NCS), 2023-04, p. 4, no 1.1 ([Internet, 2024-10-15](https://www.ncsc.admin.ch/dam/ncsc/en/dokumente/strategie/cyberstrategie-ncs/Nationale-Cyberstrategie-NCS-2023-04-13-EN.pdf.download.pdf/Nationale-Cyberstrategie-NCS-2023-04-13-EN.pdf))
USG: preferred spelling
USG: bevorzugte Schreibweise
FCh, English Language Service, 2024-10-14
(USG) BK, Sektion Deutsch, 2019-10-10
Informationssicherheitsgesetz, Änderung 2023-09-29, Art. 5 Bst. d (AS 2024 257)
after FC, National Cyberstrategy (NCS), 2023-04, Glossary, "Cyberincident", p. 36 ([Internet, 2024-10-15](https://www.ncsc.admin.ch/dam/ncsc/en/dokumente/strategie/cyberstrategie-ncs/Nationale-Cyberstrategie-NCS-2023-04-13-EN.pdf.download.pdf/Nationale-Cyberstrategie-NCS-2023-04-13-EN.pdf))
d'après LF Sécurité de l'information, modification 2023-09-29, art. 5 let. d (RO 2024 257)
secondo LF Sicurezza delle informazioni, modifica 2023-09-29, art. 5 lett. d (RU 2024 257)
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000

Incoming Relationships

property subject
seeAlso cyber risk
hypernym cyberattack
seeAlso cybersecurity domain
seeAlso cyberthreat
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.