data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_ID_AM_01_3

http://cyfun.data.gift/data/requirement_ID_AM_01_3
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_ID.AM-01

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

ID.AM-01.3: When unauthorised hardware is detected, it shall be quarantined for possible excep- tion handling, removed, or replaced, and the inventory shall be updated accordingly.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

ID.AM-01.3

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p46

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p32

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.AM-01

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce securityrisks byensuring that Unauthorised hardware is promptlyidentified, isolated, and addressed, while maintaining an accurate and accountable asset inventory. To make this happen: - Define Unauthorised hardware Any hardware not approved or lacking documented exceptions should be designated as Unauthorised. - Respond to Detection Unauthorised hardware should be quarantined for review, removed, or replaced as appropriate. The asset inventory should be updated accordingly. - Include OT Considerations Unauthorised devices in OTenvironments should be treatedwith heightened caution due to potential safety and operational impacts. Examples of unauthorised hardware may include: - Unapproved Endpoints Personal orunregistered laptops, desktops, ormobile devices connected to the networkwithoutAuthorisation. - External Storage Devices USB drives or external hard disks not approved for use, which may introduce malware or data leakage risks. - Unvetted IoT and OT Devices Smart devices, sensors, or industrial components connected without proper vetting, posing risks to both IT and OT environments. - Unauthorised Network Equipment Wireless access points or switches installed without approval, potentially bypassing network security controls.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce securityrisks byensuring that Unauthorised hardware is promptlyidentified, isolated, and addressed, while maintaining an accurate and accountable asset inventory. To make this happen: - Define Unauthorised hardware Any hardware not approved or lacking documented exceptions should be designated as Unauthorised. - Respond to Detection Unauthorised hardware should be quarantined for review, removed, or replaced as appropriate. The asset inventory should be updated accordingly. - Include OT Considerations Unauthorised devices in OTenvironments should be treatedwith heightened caution due to potential safety and operational impacts. Examples of unauthorised hardware may include: - Unapproved Endpoints Personal orunregistered laptops, desktops, ormobile devices connected to the networkwithoutAuthorisation. - External Storage Devices USB drives or external hard disks not approved for use, which may introduce malware or data leakage risks. - Unvetted IoT and OT Devices Smart devices, sensors, or industrial components connected without proper vetting, posing risks to both IT and OT environments. - Unauthorised Network Equipment Wireless access points or switches installed without approval, potentially bypassing network security controls.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce securityrisks byensuring that Unauthorised hardware is promptlyidentified, isolated, and addressed, while maintaining an accurate and accountable asset inventory. To make this happen: • Define Unauthorised hardware Any hardware not approved or lacking documented exceptions should be designated as Unauthorised. • Respond to Detection Unauthorised hardware should be quarantined for review, removed, or replaced as appropriate. The asset inventory should be updated accordingly. • Include OT Considerations Unauthorised devices in OTenvironments should be treatedwith heightened caution due to potential safety and operational impacts. Examples of unauthorised hardware may include: • Unapproved Endpoints Personal orunregistered laptops, desktops, ormobile devices connected to the networkwithoutAuthorisation. • External Storage Devices USB drives or external hard disks not approved for use, which may introduce malware or data leakage risks. • Unvetted IoT and OT Devices Smart devices, sensors, or industrial components connected without proper vetting, posing risks to both IT and OT environments. • Unauthorised Network Equipment Wireless access points or switches installed without approval, potentially bypassing network security controls.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to reduce securityrisks byensuring that Unauthorised hardware is promptlyidentified, isolated, and addressed, while maintaining an accurate and accountable asset inventory. To make this happen:</p><ul><li>Define Unauthorised hardware Any hardware not approved or lacking documented exceptions should be designated as Unauthorised.</li><li>Respond to Detection Unauthorised hardware should be quarantined for review, removed, or replaced as appropriate. The asset inventory should be updated accordingly.</li><li>Include OT Considerations Unauthorised devices in OTenvironments should be treatedwith heightened caution due to potential safety and operational impacts. Examples of unauthorised hardware may include:</li><li>Unapproved Endpoints Personal orunregistered laptops, desktops, ormobile devices connected to the networkwithoutAuthorisation.</li><li>External Storage Devices USB drives or external hard disks not approved for use, which may introduce malware or data leakage risks.</li><li>Unvetted IoT and OT Devices Smart devices, sensors, or industrial components connected without proper vetting, posing risks to both IT and OT environments.</li><li>Unauthorised Network Equipment Wireless access points or switches installed without approval, potentially bypassing network security controls.</li></ul></div>

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

ID.AM-01.3

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Unauthorised hardware handling

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

When unauthorised hardware is detected, it shall be quarantined for possible excep- tion handling, removed, or replaced, and the inventory shall be updated accordingly.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_IMPORTANT

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

19

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 21 of 21

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.AM-01

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.AM-01

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.