Cybersecurity Terminology
This taxonomy defines the cybersecurity terms, taken from the ISO27000 document, that are used on the ARK Platform.
This version:
https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-SKOS
Version information:
0.1
Sources:
ISO 27000
ISO 27002
Contributors:
Rob Brennan
Junli Liang
Preferred namespace prefix:
arkcscSKOS
Preferred namespace URI:
https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-SKOS#
License:
https://creativecommons.org/licenses/by-nc/4.0/
Namespaces used in the document:
rr:
http://www.w3.org/ns/r2rml#
owl:
http://www.w3.org/2002/07/owl#
xsd:
http://www.w3.org/2001/XMLSchema#
skos:
http://www.w3.org/2004/02/skos/core#
dcterms:
http://purl.org/dc/terms/
rdfs:
http://www.w3.org/2000/01/rdf-schema#
vocab:
http://purl.org/vocab/vann/
dc:
http://purl.org/dc/elements/1.1/
arkcscSKOS:
https://openark.adaptcentre.ie/Ontologies/CybersecurityControl-SKOS#
Cybersecurity Terminology : A-Z
Access control
Application security
Asset management
Attack
Audit
Audit scope
Authentication
Authenticity
Availability
Base measure
Competence
Confidentiality
Conformity
Consequence
Continual improvement
Continuity
Control
Control objective
Correction
Corrective action
Defence
Deroved measure
Detect
Documented information
Effectiveness
Event
External context
Governance
Governance and ecosystem
Governance of information security
Governing body
Human resource security
Identify
Identity and access management
Indicator
Information need
Information processing facilities
Information protection
Information security
Information security assurance
Information security continuity
Information security event
Information security event management
Information security incident
Information security incident management
Information security management system professional
Information sharing community
Information system
Integreity
Integrity
Interested party
Internal context
Legal and compliance
Level of risk
Likelihood
Management system
Measure
Measurement
Measurement function
Measurement method
Monitoring
Nonconformity
Non-repudiation
Objective
Organisation
Outsource
Performance
Physical security
Policy
Process
Protect
Protection
Recover
Reliability
Requirement
Residual risk
Resilience
Respond
Review
Review object
Review objective
Risk
Risk acceptance
Risk analysis
Risk assessment
Risk communication and consultation
Risk criteria
Risk evaluation
Risk identification
Risk management
Risk management process
Risk owner
Risk treatment
Secure configuration
Security implementation standard
Supplier relationship security
System and network security
Threat
Threat and vulnerability management
Top management
Trusted information communication entity
Vulnerability