Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Cyber-security regulation
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Cyber-security_regulation
http://dbpedia.org/ontology/abstract A cybersecurity regulation comprises direcA cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. There are numerous measures available to prevent cyberattacks. Cybersecurity measures include firewalls, anti-virus software, intrusion detection and prevention systems, encryption, and login passwords. There have been attempts to improve cybersecurity through regulation and collaborative efforts between the government and the private sector to encourage voluntary improvements to cybersecurity. Industry regulators, including banking regulators, have taken notice of the risk from cybersecurity and have either begun or planned to begin to include cybersecurity as an aspect of regulatory examinations.y as an aspect of regulatory examinations. , قوانين الأمن الإلكتروني أو كما تسمى غالباًقوانين الأمن الإلكتروني أو كما تسمى غالباً بـ «الأمن السيبراني» هي لوائح تشتمل على توجيهات متخصصة لحماية تقنية المعلومات وأنظمة الحاسب بغرض إجبار الشركات والمؤسسات على حماية أنظمتها ومعلوماتها من الهجمات الإلكترونية مثل الفيروسات والديدان وأحصنة طروادة والتصيد وهجمات رفض الخدمة (DOS) والوصول غير المصرح به كسرقة الملكية الفكرية أو المعلومات السرية وهجمات نظام التحكم وغيرها. هناك العديد من التدابير المتاحة لمنع الهجمات الإلكترونية. تشمل هذه التدابير في الأمن السيبراني بناء سياسات وضوابط وأنظمة مثل إنشاء جدران الحماية وبرامج مكافحة الفيروسات وأنظمة كشف التسلل والوقاية منها والتشفير وكلمات المرور في عمليات تسجيل الدخول. كانت ولازالت هناك محاولات لتحسين الأمن السيبراني من خلال التنظيم والجهود التعاونية بين الحكومة والقطاع الخاص لتشجيع التحسينات الطوعية للأمن السيبراني. لاحظ مسؤولين ومنظمين الصناعة، بما في ذلك المنظمون والشركاء المصرفيون المخاطر الناجمة عن الأمن السيبراني وبدأوا يخططون للبدء في إدراج الأمن السيبراني كجانب من جوانب الاختبارات التنظيمية.براني كجانب من جوانب الاختبارات التنظيمية.
http://dbpedia.org/ontology/wikiPageExternalLink http://www.klgates.com/files/Publication/b107a7ae-1e01-404e-830d-5f4a20eebd1b/Presentation/PublicationAttachment/dbb0ff0d-33fd-4808-b338-60b3345450f6/CybersecurityRegisHere.pdf + , http://mashable.com/2012/08/02/cybersecurity-bill-fails/ + , http://www.computerworld.com/s/article/9230341/No_partisan_fight_over_cybersecurity_bill_GOP_senator_says%3FtaxonomyId=70 + , http://mashable.com/2012/07/20/cybersecurity-obama/ + , https://obamawhitehouse.archives.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal + , https://web.archive.org/web/20130513032101/http:/idealab.talkingpointsmemo.com/2012/08/as-cybersecurity-bill-fails-in-senate-advocates-rejoice.php + , http://www.howstuffworks.com/virus.htm + , http://www.usdoj.gov/criminal/cybercrime/FBI2005.pdf + , http://www.epic.org/privacy/bill_track.html + , http://articles.latimes.com/2002/jan/14/business/fi-micro14 + , https://techcrunch.com/2012/04/26/u-s-house-passes-cispa-248-to-168/%20 + , https://web.archive.org/web/20081121222303/http:/www.forrester.com/Research/Document/0%2C7211%2C35913%2C00.html + , https://web.archive.org/web/20051210162540/http:/www.privacy.ca.gov/code/cc1798.291798.82.htm + , http://thehill.com/blogs/hillicon-valley/technology/242227-with-defeat-of-cybersecurity-bill-obama-weighs-executive-order-option + , http://www.us-cert.gov/reading_room/cyberspace_strategy.pdf + , http://www.sfgate.com/business/article/Forum-focuses-on-cyber-security-2510105.php + , https://www.forbes.com/sites/jodywestby/2012/08/13/congress-needs-to-go-back-to-school-on-cyber-legislation/ + , http://www.heritage.org/research/reports/2012/07/cybersecurity-act-of-2012-revised-cyber-bill-still-has-problems + , https://www.washingtonpost.com/world/national-security/cybersecurity-bill-fails-in-senate/2012/08/02/gJQADNOOSX_story.html + , http://www.upi.com/Top_News/US/2012/07/26/Cybersecurity-bill-wins-key-Senate-vote/UPI-57801343345113/ + , https://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/clarke.html + , https://web.archive.org/web/20130203174242/http:/articles.cnn.com/2012-08-02/politics/politics_cybersecurity-act_1_cybersecurity-bill-homeland-security-cyberattacks + , https://web.archive.org/web/20080302205503/http:/news.zdnet.com/2100-1009_22-984697.html + , https://web.archive.org/web/20100613183200/http:/www.privacyrights.org/ar/ChronDataBreaches.htm +
http://dbpedia.org/ontology/wikiPageID 3421940
http://dbpedia.org/ontology/wikiPageLength 41005
http://dbpedia.org/ontology/wikiPageRevisionID 1120349853
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Default_password + , http://dbpedia.org/resource/CEO + , http://dbpedia.org/resource/Data_Quality_Act + , http://dbpedia.org/resource/General_Data_Protection_Regulation + , http://dbpedia.org/resource/Critical_infrastructure_protection + , http://dbpedia.org/resource/Consumer_Data_Security_and_Notification_Act + , http://dbpedia.org/resource/SPY_ACT + , http://dbpedia.org/resource/Personally_identifiable_information + , http://dbpedia.org/resource/Cybersecurity + , http://dbpedia.org/resource/Barack_Obama + , http://dbpedia.org/resource/ENISA + , http://dbpedia.org/resource/United_States_Democratic_Party + , http://dbpedia.org/resource/National_Institute_of_Standards_and_Technology + , http://dbpedia.org/resource/Medical_device_hijack + , http://dbpedia.org/resource/Kay_Bailey_Hutchison + , http://dbpedia.org/resource/Pavan_Duggal + , http://dbpedia.org/resource/Federal_Information_Security_Management_Act_of_2002 + , http://dbpedia.org/resource/Information_Technology_Association_of_America + , http://dbpedia.org/resource/Federal_Information_Security_Management_Act + , http://dbpedia.org/resource/United_States_Computer_Emergency_Readiness_Team + , http://dbpedia.org/resource/National_Strategy_to_Secure_Cyberspace + , http://dbpedia.org/resource/Office_of_Management_and_Budget + , http://dbpedia.org/resource/Computer_trojan + , http://dbpedia.org/resource/Government + , http://dbpedia.org/resource/California + , http://dbpedia.org/resource/Indian_Space_Agency + , http://dbpedia.org/resource/Category:Cyberwarfare + , http://dbpedia.org/resource/Federal_government_of_the_United_States + , http://dbpedia.org/resource/Payment_card_number + , http://dbpedia.org/resource/Health_Insurance_Portability_and_Accountability_Act + , http://dbpedia.org/resource/Rulemaking + , http://dbpedia.org/resource/Bruce_Schneier + , http://dbpedia.org/resource/Cyber_security_standards + , http://dbpedia.org/resource/Department_of_Homeland_Security + , http://dbpedia.org/resource/American_Civil_Liberties_Union + , http://dbpedia.org/resource/Gramm-Leach-Bliley_Act + , http://dbpedia.org/resource/Information_technology + , http://dbpedia.org/resource/The_Heritage_Foundation + , http://dbpedia.org/resource/Richard_A._Clarke + , http://dbpedia.org/resource/Obama_administration + , http://dbpedia.org/resource/Cybersecurity_Information_Sharing_Act + , http://dbpedia.org/resource/Cyber_Intelligence_Sharing_and_Protection_Act + , http://dbpedia.org/resource/Data_breach + , http://dbpedia.org/resource/Category:Computer_security_procedures + , http://dbpedia.org/resource/Lobbyist + , http://dbpedia.org/resource/Spyware + , http://dbpedia.org/resource/CERT_Coordination_Center + , http://dbpedia.org/resource/ISO + , http://dbpedia.org/resource/Social_security_number + , http://dbpedia.org/resource/United_States_Department_of_Defense + , http://dbpedia.org/resource/Regulation_%28European_Union%29 + , http://dbpedia.org/resource/Homeland_Security_Act + , http://dbpedia.org/resource/Digital_Single_Market + , http://dbpedia.org/resource/Anti-virus_software + , http://dbpedia.org/resource/Presidential_directive + , http://dbpedia.org/resource/Category:Politics_and_technology + , http://dbpedia.org/resource/Brexit + , http://dbpedia.org/resource/Resilient_control_systems + , http://dbpedia.org/resource/Susan_Collins + , http://dbpedia.org/resource/United_States_Department_of_Homeland_Security + , http://dbpedia.org/resource/Cyberattack + , http://dbpedia.org/resource/Computer_virus + , http://dbpedia.org/resource/Intrusion_prevention + , http://dbpedia.org/resource/ITU + , http://dbpedia.org/resource/Supreme_Court_of_India + , http://dbpedia.org/resource/Virginia + , http://dbpedia.org/resource/US_Chamber_of_Commerce + , http://dbpedia.org/resource/US_Congress + , http://dbpedia.org/resource/Encryption + , http://dbpedia.org/resource/Joseph_Lieberman + , http://dbpedia.org/resource/GAO + , http://dbpedia.org/resource/Electronic_Frontier_Foundation + , http://dbpedia.org/resource/Firewall_%28networking%29 + , http://dbpedia.org/resource/California_State_Legislature + , http://dbpedia.org/resource/White_House + , http://dbpedia.org/resource/European_Union_Agency_for_Cybersecurity + , http://dbpedia.org/resource/DoS_attack + , http://dbpedia.org/resource/Intrusion_detection + , http://dbpedia.org/resource/Category:Data_laws + , http://dbpedia.org/resource/Bank_regulation + , http://dbpedia.org/resource/Proactive_cyber_defence + , http://dbpedia.org/resource/John_McCain + , http://dbpedia.org/resource/Category:Computer_law + , http://dbpedia.org/resource/List_of_data_breaches + , http://dbpedia.org/resource/Phishing + , http://dbpedia.org/resource/John_O._Brennan + , http://dbpedia.org/resource/Password + , http://dbpedia.org/resource/European_Union + , http://dbpedia.org/resource/Computer_systems + , http://dbpedia.org/resource/Administrative_Procedure_Act_%28United_States%29 + , http://dbpedia.org/resource/Rick_Boucher + , http://dbpedia.org/resource/Computer_worm + , http://dbpedia.org/resource/US_House_of_Representatives + , http://dbpedia.org/resource/RSA_Conference + , http://dbpedia.org/resource/Category:Government_in_the_United_States + , http://dbpedia.org/resource/National_Cyber_Security_Division + , http://dbpedia.org/resource/US_Senate + , http://dbpedia.org/resource/U.S._Department_of_Defense_Strategy_for_Operating_in_Cyberspace + , http://dbpedia.org/resource/Internet_Service_Provider +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Note + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Ref + , http://dbpedia.org/resource/Template:Globalize + , http://dbpedia.org/resource/Template:Short_description + , http://dbpedia.org/resource/Template:Main +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Government_in_the_United_States + , http://dbpedia.org/resource/Category:Politics_and_technology + , http://dbpedia.org/resource/Category:Cyberwarfare + , http://dbpedia.org/resource/Category:Data_laws + , http://dbpedia.org/resource/Category:Computer_security_procedures + , http://dbpedia.org/resource/Category:Computer_law +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Cyber-security_regulation?oldid=1120349853&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Cyber-security_regulation +
owl:sameAs http://ar.dbpedia.org/resource/%D9%82%D9%88%D8%A7%D9%86%D9%8A%D9%86_%D8%A7%D9%84%D8%A3%D9%85%D9%86_%D8%A7%D9%84%D8%A5%D9%84%D9%83%D8%AA%D8%B1%D9%88%D9%86%D9%8A + , http://rdf.freebase.com/ns/m.09bnfq + , http://dbpedia.org/resource/Cyber-security_regulation + , http://yago-knowledge.org/resource/Cyber-security_regulation + , https://global.dbpedia.org/id/4iiDy + , http://www.wikidata.org/entity/Q5197670 +
rdf:type http://dbpedia.org/class/yago/Abstraction100002137 + , http://dbpedia.org/class/yago/YagoPermanentlyLocatedEntity + , http://dbpedia.org/class/yago/PsychologicalFeature100023100 + , http://dbpedia.org/class/yago/WikicatComputerSecurityProcedures + , http://dbpedia.org/class/yago/Activity100407535 + , http://dbpedia.org/class/yago/Act100030358 + , http://dbpedia.org/class/yago/Procedure101023820 + , http://dbpedia.org/class/yago/Event100029378 +
rdfs:comment A cybersecurity regulation comprises direcA cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. There are numerous measures available to prevent cyberattacks.easures available to prevent cyberattacks. , قوانين الأمن الإلكتروني أو كما تسمى غالباًقوانين الأمن الإلكتروني أو كما تسمى غالباً بـ «الأمن السيبراني» هي لوائح تشتمل على توجيهات متخصصة لحماية تقنية المعلومات وأنظمة الحاسب بغرض إجبار الشركات والمؤسسات على حماية أنظمتها ومعلوماتها من الهجمات الإلكترونية مثل الفيروسات والديدان وأحصنة طروادة والتصيد وهجمات رفض الخدمة (DOS) والوصول غير المصرح به كسرقة الملكية الفكرية أو المعلومات السرية وهجمات نظام التحكم وغيرها. هناك العديد من التدابير المتاحة لمنع الهجمات الإلكترونية.التدابير المتاحة لمنع الهجمات الإلكترونية.
rdfs:label Cyber-security regulation , قوانين الأمن الإلكتروني
hide properties that link here 
http://dbpedia.org/resource/Cybersecurity_law + , http://dbpedia.org/resource/NIS_Directive + , http://dbpedia.org/resource/Computer_security_law + , http://dbpedia.org/resource/Cybersecurity_legislation + , http://dbpedia.org/resource/NIS_directive + , http://dbpedia.org/resource/Cyber_security_policy + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Global_Commission_on_the_Stability_of_Cyberspace + , http://dbpedia.org/resource/ICT4peace + , http://dbpedia.org/resource/Personal_Data_Privacy_and_Security_Act_of_2009 + , http://dbpedia.org/resource/Cyber-collection + , http://dbpedia.org/resource/Cybersecurity_law + , http://dbpedia.org/resource/Cyber_spying + , http://dbpedia.org/resource/National_Cyber_Coordination_Centre + , http://dbpedia.org/resource/Medical_device_hijack + , http://dbpedia.org/resource/Default_password + , http://dbpedia.org/resource/Bush_School_of_Government_and_Public_Service + , http://dbpedia.org/resource/IT_risk + , http://dbpedia.org/resource/Regulatory_agency + , http://dbpedia.org/resource/Gh0st_RAT + , http://dbpedia.org/resource/Control_system_security + , http://dbpedia.org/resource/Proactive_cyber_defence + , http://dbpedia.org/resource/Joe_Barton + , http://dbpedia.org/resource/Air_Force_Cyber_Command_%28Provisional%29 + , http://dbpedia.org/resource/National_Strategy_to_Secure_Cyberspace + , http://dbpedia.org/resource/Computer_security + , http://dbpedia.org/resource/NIS_Directive + , http://dbpedia.org/resource/Data_security + , http://dbpedia.org/resource/Cybersecurity_information_technology_list + , http://dbpedia.org/resource/Ambassadors_of_the_United_States + , http://dbpedia.org/resource/OES + , http://dbpedia.org/resource/Computer_security_law + , http://dbpedia.org/resource/SPY + , http://dbpedia.org/resource/Cybersecurity_legislation + , http://dbpedia.org/resource/NIS_directive + , http://dbpedia.org/resource/Cyber_security_policy + , http://dbpedia.org/resource/Cybersecurity_Policy + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Cyber-security_regulation + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Cyber-security_regulation + owl:sameAs
http://dbpedia.org/resource/United_States_Department_of_Homeland_Security + rdfs:seeAlso
 

 

Enter the name of the page to start semantic browsing from.