Thesaurus · related
Term is associatively related to subject
101 triples under related(skos:related)
- access control→access control mechanismnoun
- active attack→passive attacknoun
- Adversary→Threat agentnoun
- Adversary→attackernoun
- antispyware software→Spywarenoun
- attack→active attacknoun
- attack→passive attacknoun
- attack pattern→attack signaturenoun
- attack signature→attack patternnoun
- attacker→Threat agentnoun
- attacker→Adversarynoun
- Authenticity→non-repudiationnoun
- Authenticity→Integritynoun
- Availability→Integritynoun
- Availability→Confidentialitynoun
- blacklist→whitelistnoun
- Blue Team→White Teamnoun
- Blue Team→Red Teamnoun
- capability→intentnoun
- Ciphertext→plaintextnoun
- Continuity of Operations Plan→Contingency Plannoun
- Continuity of Operations Plan→Business Continuity Plannoun
- Continuity of Operations Plan→Disaster recovery plannoun
- Critical infrastructure→key resourcenoun
- cryptographic algorithm→Decryptionnoun
- cryptographic algorithm→keynoun
- cryptographic algorithm→Encryptionnoun
- cryptographic algorithm→symmetric keynoun
- cryptographic algorithm→Asymmetric keynoun
- cryptology→cryptanalysisnoun
- cryptology→Cryptographynoun
- data breach→data theftnoun
- data breach→data lossnoun
- data breach→exfiltrationnoun
- data integrity→system integritynoun
- data integrity→Integritynoun
- data loss→Data leakagenoun
- data loss→data theftnoun
- data loss prevention→data theftnoun
- data loss prevention→data lossnoun
- data loss prevention→
data leakxsd:string - data mining→data aggregationnoun
- data theft→data aggregationnoun
- data theft→data lossnoun
- data theft→Data leakagenoun
- Digital signature→electronic signaturenoun
- distributed denial of service→Botnetnoun
- distributed denial of service→denial of servicenoun
- electronic signature→Digital signaturenoun
- exfiltration→data breachnoun
- hazard→threatnoun
- ICT supply chain threat→threatnoun
- ICT supply chain threat→supply chainnoun
- incident response→responsenoun
- indicator→precursornoun
- Industrial Control Syst→Operations Technologynoun
- Industrial Control Syst→Supervisory control and data acquisitionnoun
- information and communication(s) technology→information technologynoun
- information assurance→Information Securitynoun
- information security policy→security policynoun
- information system resilience→resiliencenoun
- information technology→information and communication(s) technologynoun
- integrated risk management→enterprise risk managementnoun
- integrated risk management→Risk managementnoun
- intent→capabilitynoun
- key→public keynoun
- key→symmetric keynoun
- key→secret keynoun
- key→private keynoun
- Key Logger→Spywarenoun
- key resource→Critical infrastructurenoun
- macro virus→Virusnoun
- malicious applet→malicious codenoun
- malicious logic→malicious codenoun
- object→access controlnoun
- object→accessnoun
- object→subjectnoun
- Operations Technology→Industrial Control Systemnoun
- outside( r) threat→inside( r) threatnoun
- passive attack→active attacknoun
- plaintext→Ciphertextnoun
- precursor→indicatornoun
- Red Team→White Teamnoun
- Red Team→Blue Teamnoun
- Red Team exercise→cyber exercisenoun
- risk analysis→risk assessmentnoun
- risk analysis→risknoun
- Spyware→Noun #3097
- Supervisory control and data acquisition→Industrial Control Systemnoun
- supply chain→Supply Chain Risk Managementnoun
- Supply Chain Risk Management→supply chainnoun
- system integrity→data integritynoun
- system integrity→Integritynoun
- Threat agent→Adversarynoun
- Threat agent→attackernoun
- threat assessment→Threat analysisnoun
- Virus→macro virusnoun
- weakness→vulnerabilitynoun
- White Team→Blue Teamnoun
- White Team→Red Teamnoun
- whitelist→blacklistnoun