This HTML5 document contains 141 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n16http://dbpedia.org/resource/Wikipedia:
n14https://www.youtube.com/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n10https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
n13https://ssd.eff.org/
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n11http://www.slate.com/articles/technology/future_tense/
n17https://archive.org/details/
wikipedia-enhttp://en.wikipedia.org/wiki/
provhttp://www.w3.org/ns/prov#
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Cyber_self-defense
rdfs:label
Cyber self-defense
rdfs:comment
In cybersecurity, cyber self-defense refers to self-defense against cyberattack. While it generally emphasizes active cybersecurity measures by computer users themselves, cyber self-defense is sometimes used to refer to the self-defense of organizations as a whole, such as corporate entities or entire nations. Surveillance self-defense is a variant of cyber self-defense and largely overlaps with it. Active and passive cybersecurity measures provide defenders with higher levels of cybersecurity, intrusion detection, incident handling and remediation capabilities. Various sectors and organizations are legally obligated to adhere to cyber security standards.
dcterms:subject
dbc:Computer_security dbc:Self-defense
dbo:wikiPageID
53770851
dbo:wikiPageRevisionID
1116512151
dbo:wikiPageWikiLink
dbr:Multi-factor_authentication dbr:Blue_team_(computer_security) dbr:IPsec dbr:Shoulder_surfing_(computer_security) dbr:Cybersecurity dbr:Anonymous_web_browsing dbr:Tom_Graves dbr:Internet_security dbr:Email_attachments dbr:Privilege_escalation dbr:Malwarebytes dbr:Piggybacking_(security) dbr:Transport_layer dbr:Keystroke_logging dbr:CryptoParty dbr:Physical_security dbr:Computer_security dbr:Superuser dbr:Computer_security_incident_management dbr:Firewall_(computing) dbr:Electronic_Frontier_Foundation dbr:Cyber_threat_hunting dbr:Cyber_threat_intelligence dbr:Martial_art dbr:External_storage dbr:Driver_(software) dbr:Internet_Protocol dbr:Firmware dbr:Vulnerability_(computing) dbr:Unix dbr:Backup dbr:Upgrade dbr:Cyberattack dbr:Authentication dbr:Phishing dbr:Digital_media dbr:Personal_data dbr:Computer_code dbr:Password_strength dbr:Jeffrey_Carr dbr:Social_engineering_(security) dbr:Hash-based_cryptography dbr:Hardening_(computing) dbr:Exploit_(computer_security) dbr:Cyberwarfare dbr:Fail2ban dbr:White-box_testing dbr:Threat_actor dbr:Privacy_settings dbr:Gray_box_testing dbr:Information_security dbr:User_(computing) dbr:Privacy_software dbr:List_of_HTTP_header_fields dbr:Squid_(software) dbr:Remote_access_service dbr:Adobe_Flash dbr:Network_security dbr:Brute-force_attack dbr:Password_manager dbr:Operating_system dbr:Internet_protocol_suite dbr:Web_browser dbr:Proxy_server dbr:Patch_(computing) dbr:Self-defense dbr:Parabolic_microphone dbr:Intrusion_detection_system dbr:System_administrator dbr:Information_system dbr:Programmer dbr:Security_breach_notification_laws dbr:Unintended_consequences dbr:Relay_network dbr:Risk_appetite dbr:TED_talk dbr:Security_question dbr:Digital_signature dbr:Transport_Layer_Security dbr:Penetration_test dbr:Data_breach dbr:Cyber_security_standards dbr:Cyber_self-defense dbr:Information_technology_security_audit dbr:Antivirus_software dbc:Computer_security dbr:Pretty_Good_Privacy n16:User_access_level dbr:Proactive_cyber_defence dbr:Mass_surveillance dbr:Smart_device dbr:USB_flash_drive dbr:Password dbr:Nation dbr:Rooting_(Android_OS) dbr:Hotspot_(Wi-Fi) dbr:Social_networking dbr:Attack_surface dbr:Indicator_of_compromise dbr:Red_team dbc:Self-defense dbr:Black-box_testing dbr:Hypertext_Transfer_Protocol dbr:Device_driver dbr:Digital_footprint dbr:OSI_model dbr:Encryption dbr:Default_Credential_vulnerability dbr:Voice_phishing dbr:Linux dbr:DMZ_(computing) dbr:Computer_Fraud_and_Abuse_Act dbr:Microsoft_Windows dbr:Virtual_private_network dbr:Wardriving dbr:Computer_network dbr:Tor_(anonymity_network)
dbo:wikiPageExternalLink
n11:futurography_cyber.html n13: n14:watch%3Fv=knLDY7hRm5I n17:cyberselfdefense0000moor%7Curl-access=registration
owl:sameAs
n10:2p12D wikidata:Q30324759
dbp:wikiPageUsesTemplate
dbt:Manual dbt:Multiple_issues dbt:Cite_book dbt:More_citations_needed dbt:Use_mdy_dates dbt:Use_American_English dbt:Reflist dbt:Short_description
dbo:abstract
In cybersecurity, cyber self-defense refers to self-defense against cyberattack. While it generally emphasizes active cybersecurity measures by computer users themselves, cyber self-defense is sometimes used to refer to the self-defense of organizations as a whole, such as corporate entities or entire nations. Surveillance self-defense is a variant of cyber self-defense and largely overlaps with it. Active and passive cybersecurity measures provide defenders with higher levels of cybersecurity, intrusion detection, incident handling and remediation capabilities. Various sectors and organizations are legally obligated to adhere to cyber security standards.
prov:wasDerivedFrom
wikipedia-en:Cyber_self-defense?oldid=1116512151&ns=0
dbo:wikiPageLength
18708
foaf:isPrimaryTopicOf
wikipedia-en:Cyber_self-defense