| arkcscOWL | <https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#> |
| dc | <http://purl.org/dc/elements/1.1/> |
| dcterms | <http://purl.org/dc/terms/> |
| ns1 | <https://openark.adaptcentre.ie/Ontologies/ARKCube#> |
| ns2 | <https://w3id.org/widoco/vocab#> |
| owl | <http://www.w3.org/2002/07/owl#> |
| rdf | <http://www.w3.org/1999/02/22-rdf-syntax-ns#> |
| rdfs | <http://www.w3.org/2000/01/rdf-schema#> |
| skos | <http://www.w3.org/2004/02/skos/core#> |
| vann | <http://purl.org/vocab/vann/> |
| xml | <http://www.w3.org/XML/1998/namespace> |
| xsd | <http://www.w3.org/2001/XMLSchema#> |
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#Corrective
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#Detective
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#OrganizationalControls
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PeopleControls
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PhysicalControls
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#Preventive
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#TechnologicalControls
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AcceptableUseOfInformationAndOtherAssociatedAssets
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AccessControl
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AccessRights
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AccessToSourceCode
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AddressingInformationSecurityWithinSupplierAgreements
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ApplicationSecurityRequirements
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AssessmentAndDecisionOnInformationSecurityEvents
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#AuthenticationInformation
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#CablingSecurity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#CapacityManagement
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ChangeManagement
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ClassificationOfInformation
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ClearDeskAndClearScreen
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ClockSynchronization
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#CollectionOfEvidence
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ComplianceWithPoliciesRulesAndStandardsForInformationSecurity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ConfidentialityOrNon-disclosureAgreements
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ConfigurationManagement
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ContactWithAuthorities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ContactWithSpecialInterestGroups
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#DataLeakagePrevention
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#DataMasking
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#DisciplinaryProcess
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#DocumentedOperatingProcedures
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#EquipmentMaintenance
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#EquipmentSitingAndProtection
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ICTReadinessForBusinessContinuity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#IdentityManagement
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#IndependentReviewOfInformationSecurity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationAccessRestriction
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationBackup
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationDeletion
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityAwarenessEducationAndTraining
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityDuringDisruption
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityEventReporting
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityForUseOfCloudServices
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityInProjectManagement
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityInSupplierRelationships
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityIncidentManagementPlanningAndPreparation
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationSecurityRolesAndResponsibilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InformationTransfer
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InstallationOfSoftwareOnOperationalSystems
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#IntellectualPropertyRights
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#InventoryOfInformationAndOtherAssociatedAssets
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#LabellingOfInformation
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#LearningFromInformationSecurityIncidents
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#LegalStatutoryRegulatoryAndContractualRequirements
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#Logging
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ManagementOfTechnicalVulnerabilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ManagementResponsibilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ManagingInformationSecurityInTheICTSupplyChain
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#MonitoringActivities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#MonitoringReviewAndChangeManagementOfSupplierServices
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#NetworksSecurity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#OutsourcedDevelopment
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PhysicalEntry
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PhysicalSecurityMonitoring
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PhysicalSecurityPerimeters
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PoliciesForInformationSecurity
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PrivacyAndProtectionOfPII
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#PrivilegedAccessRights
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ProtectingAgainstPhysicalAndEnvironmentalThreats
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ProtectionAgainstMalware
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ProtectionOfInformationSystemsDuringAuditTesting
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ProtectionOfRecords
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#RedundancyOfInformationProcessingFacilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#RemoteWorking
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ResponseToInformationSecurityIncidents
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ResponsibilitiesAfterTerminationOrChangeOfEmployment
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ReturnOfAssets
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#Screening
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecureAuthentication
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecureCoding
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecureDevelopmentLifeCycle
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecureDisposalOrRe-useOfEquipment
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecureSystemArchitectureAndEngineeringPrinciples
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecuringOfficesRoomsAndFacilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecurityOfAssetsOff-premises
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecurityOfNetworkServices
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SecurityTestingInDevelopmentAndAcceptance
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SegregationOfDuties
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SegregationOfNetworks
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SeparationOfDevelopmentTestAndProductionEnvironments
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#StorageMedia
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#SupportingUtilities
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#TermsAndConditionsOfEmployment
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#TestInformation
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#ThreatIntelligence
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#UseOfCryptography
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#UseOfPrivilegedUtilityPrograms
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#UserEndpointDevices
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#WebFiltering
IRI: https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-OWL#WorkingInSecureAreas
The authors would like to thank Silvio Peroni for developing LODE, a Live OWL Documentation Environment, which is used for representing the Cross Referencing Section of this document and Daniel Garijo for developing Widoco, the program used to create the template used in this documentation.