SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

Terminologie der Cybersicherheit
Terminology of Cybersecurity
Terminologie de la cybersécurité
Terminologia della cibersicurezza
CYBER25
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
Outgoing Relationships: No results found.
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000

Incoming Relationships

property subject
inDefinedTermSet cybersecurity
inDefinedTermSet personnel security screening
inDefinedTermSet social engineering
inDefinedTermSet phishing
inDefinedTermSet cyber risk
inDefinedTermSet cyberincident
inDefinedTermSet National Cyberstrategy
inDefinedTermSet organisational unit IT security officer
inDefinedTermSet cyberespionage
inDefinedTermSet cybersabotage
inDefinedTermSet cyberspace
inDefinedTermSet CEO fraud
inDefinedTermSet spear-phishing
inDefinedTermSet departmental IT security officer
inDefinedTermSet Federal Chancellery IT security officer
inDefinedTermSet cybercrime
inDefinedTermSet Computer Emergency Response Team
inDefinedTermSet honeynet system
inDefinedTermSet cyberattack
inDefinedTermSet pharming
inDefinedTermSet federal IT security officer
inDefinedTermSet cybersecurity domain
inDefinedTermSet resilience
inDefinedTermSet cyberdefence domain
inDefinedTermSet cyberprosecution domain
inDefinedTermSet IT security directives
inDefinedTermSet cyberthreat
inDefinedTermSet National Contact Point for Cyber Risks
inDefinedTermSet vulnerability
inDefinedTermSet SMS phishing
inDefinedTermSet vishing
inDefinedTermSet spoofing
inDefinedTermSet information security officer
inDefinedTermSet information security management system
inDefinedTermSet cybersquatting
inDefinedTermSet cybercrime
inDefinedTermSet digitalised crime
inDefinedTermSet romance scam
inDefinedTermSet classified ad scam
inDefinedTermSet online investment fraud
inDefinedTermSet reputational damage
inDefinedTermSet cyberoffence
inDefinedTermSet cyber resilience
inDefinedTermSet departmental information security officer
inDefinedTermSet information security officer of the administrative unit
inDefinedTermSet Federal Council information security officer
inDefinedTermSet Informationssicherheitsverantwortlicher der Verwaltungseinheit
inDefinedTermSet basic security screening
inDefinedTermSet assessment of trustworthiness
inDefinedTermSet enhanced security screening
inDefinedTermSet sensitive activity
inDefinedTermSet cyberterrorism
inDefinedTermSet ransomware
inDefinedTermSet ransomware attack
inDefinedTermSet malware
inDefinedTermSet cybercriminal
inDefinedTermSet encrypting ransomware
inDefinedTermSet National Cybersecurity Conference
inDefinedTermSet cyberthreat situation
inDefinedTermSet Cyber Security Hub
inDefinedTermSet Meldeformular des BACS
inDefinedTermSet Cyber-Schutzmassnahmen
inDefinedTermSet bug bounty programme
inDefinedTermSet reporting obligation for cyberattacks
inDefinedTermSet ICT minimum standard
inDefinedTermSet bug bounty
inDefinedTermSet ethical hacker
inDefinedTermSet grille de primes
inDefinedTermSet vulnerabilities in IT systems
inDefinedTermSet Coordinated Vulnerability Disclosure
inDefinedTermSet Common Vulnerabilities and Exposure
inDefinedTermSet vulnerability management
inDefinedTermSet contact point for cyber incidents
inDefinedTermSet Informationssicherheitsverantwortlicher des Departements
inDefinedTermSet man-in-the-middle attack
inDefinedTermSet fortgeschrittene persistente Bedrohung
inDefinedTermSet Zwei-Faktor-Authentifizierung
inDefinedTermSet Backdoor
inDefinedTermSet rollenbasierte Zugriffskontrolle
inDefinedTermSet Cross-Site-Scripting
inDefinedTermSet Pufferüberlauf
inDefinedTermSet Dynamic-Link-Library-Injektion
inDefinedTermSet hardening
inDefinedTermSet endpoint detection and response    
inDefinedTermSet privilege escalation
inDefinedTermSet digital forensics
inDefinedTermSet defacement
inDefinedTermSet honeypot
inDefinedTermSet SQL injection
inDefinedTermSet OSI reference model
inDefinedTermSet network detection and response
inDefinedTermSet Payment Card Industry Data Security Standard
inDefinedTermSet rootkit
inDefinedTermSet sandboxing
inDefinedTermSet vulnerability scanner
inDefinedTermSet network segmentation
inDefinedTermSet attack surface
inDefinedTermSet digital attack surface
inDefinedTermSet physical attack surface
inDefinedTermSet virtual private network
inDefinedTermSet threat hunting
inDefinedTermSet threat intelligence
inDefinedTermSet zero-day exploit
inDefinedTermSet zero-day
inDefinedTermSet zero-day vulnerability
inDefinedTermSet zero-day attack
inDefinedTermSet zero trust
inDefinedTermSet Zero Trust architecture
inDefinedTermSet shadow IT
inDefinedTermSet Red Team / Blue Team Exercise
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.