SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

Verwundbarkeiten in IT-Systemen
vulnerabilities in IT systems
vulnérabilités des systèmes informatiques
vulnerabilità nei sistemi informatici
2025-05-08T07:33:07.6207200Z
520652
https://www.termdat.bk.admin.ch/entry/520652
NCSC, Bug bounty programme to increase cyber-resilience in the Federal Administration ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
BACS, Bug-Bounty-Programm zur Erhöhung der Cyberresilienz in der Bundesverwaltung ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/de/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
OFCS, Accroître la cyberrésilience de l'administration fédérale grâce à des programmes de primes aux bogues ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/fr/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
UFCS, Programmi «bug bounty» per potenziare la ciber-resilienza nell’Amministrazione federale ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/it/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
A complemento di altre misure volte a garantire la sicurezza, i programmi «bug bounty» servono a identificare, documentare ed eliminare eventuali vulnerabilità nei sistemi e nelle applicazioni informatiche grazie alla collaborazione con hacker etici [...]
Bug-Bounty-Programme dienen ergänzend zu anderen Sicherheitsmassnahmen dazu, in Zusammenarbeit mit ethischen Hackern allfällige Verwundbarkeiten in IT-Systemen und -Anwendungen zu identifizieren, zu dokumentieren und zu beheben.
The idea behind bug bounty programmes is to work with ethical hackers to identify, document and fix vulnerabilities in IT systems and applications in a way that complements other existing cyber security measures.
Les programmes [de chasse aux vulnérabilités] (bug bounty programs), qui s’ajoutent à d’autres mesures de sécurité, visent à identifier, à consigner et à corriger, avec l’aide de pirates éthiques, les éventuelles vulnérabilités des systèmes et applications informatiques.
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
Incoming Relationships: No results found.
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.