Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
DE.CM-01.3: The organisation shall monitor and identify unauthorised use of its business critical systems through the detection of unauthorised local connections, network connec- tions and remote connections. |
|
DE.CM-01.3 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p147 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p99 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>The goal of this control is to ensure that the organisation can detect and respond to unauthorised access or misuse of its business-critical systems. This includes identifying suspicious local, network, or remote connec- tions that could indicate a security breach or misuse of sensitive systems. To achieve this goal, consider the following:</p><ul><li>Monitoring ofnetwork communications should happen at the external boundaryofthe organisation's business critical systems and at key internal boundaries within those systems.</li><li>Facilities should be monitored for unauthorised or rogue wireless networks that could allow attackers to bypass normal controls.</li><li>CriticalnetworkservicessuchasDomainNameSystem(DNS–whichtranslateswebsitenamestoIPaddresses), Border Gateway Protocol (BGP – which helps route internet traffic), and other network services should be monitored for signs of tampering or misuse.</li><li>When hosting applications that are accessible from the internet, a Web Application Firewall (WAF) should be considered to protect against attacks. If the application is not web-based, it should be protected using other appropriate methods, such as an Identity Provider (IdP) to control access.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation can detect and respond to unauthorised access or misuse of its business-critical systems. This includes identifying suspicious local, network, or remote connec- tions that could indicate a security breach or misuse of sensitive systems. To achieve this goal, consider the following: • Monitoring ofnetwork communications should happen at the external boundaryofthe organisation's business critical systems and at key internal boundaries within those systems. • Facilities should be monitored for unauthorised or rogue wireless networks that could allow attackers to bypass normal controls. • CriticalnetworkservicessuchasDomainNameSystem(DNS–whichtranslateswebsitenamestoIPaddresses), Border Gateway Protocol (BGP – which helps route internet traffic), and other network services should be monitored for signs of tampering or misuse. • When hosting applications that are accessible from the internet, a Web Application Firewall (WAF) should be considered to protect against attacks. If the application is not web-based, it should be protected using other appropriate methods, such as an Identity Provider (IdP) to control access. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation can detect and respond to unauthorised access or misuse of its business-critical systems. This includes identifying suspicious local, network, or remote connec- tions that could indicate a security breach or misuse of sensitive systems. To achieve this goal, consider the following: - Monitoring ofnetwork communications should happen at the external boundaryofthe organisation's business critical systems and at key internal boundaries within those systems. - Facilities should be monitored for unauthorised or rogue wireless networks that could allow attackers to bypass normal controls. - CriticalnetworkservicessuchasDomainNameSystem(DNS–whichtranslateswebsitenamestoIPaddresses), Border Gateway Protocol (BGP – which helps route internet traffic), and other network services should be monitored for signs of tampering or misuse. - When hosting applications that are accessible from the internet, a Web Application Firewall (WAF) should be considered to protect against attacks. If the application is not web-based, it should be protected using other appropriate methods, such as an Identity Provider (IdP) to control access. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation can detect and respond to unauthorised access or misuse of its business-critical systems. This includes identifying suspicious local, network, or remote connec- tions that could indicate a security breach or misuse of sensitive systems. To achieve this goal, consider the following: - Monitoring ofnetwork communications should happen at the external boundaryofthe organisation's business critical systems and at key internal boundaries within those systems. - Facilities should be monitored for unauthorised or rogue wireless networks that could allow attackers to bypass normal controls. - CriticalnetworkservicessuchasDomainNameSystem(DNS–whichtranslateswebsitenamestoIPaddresses), Border Gateway Protocol (BGP – which helps route internet traffic), and other network services should be monitored for signs of tampering or misuse. - When hosting applications that are accessible from the internet, a Web Application Firewall (WAF) should be considered to protect against attacks. If the application is not web-based, it should be protected using other appropriate methods, such as an Identity Provider (IdP) to control access. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
DE.CM-01.3 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Unauthorised system usage detection |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The organisation shall monitor and identify unauthorised use of its business critical systems through the detection of unauthorised local connections, network connec- tions and remote connections. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
1 |
|
|
The number of triples associated with the subject. |
21 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 23 of 23
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1