Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
RC: RECOVER |
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p50 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p176 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p118 |
|
|
A statement or formal explanation of the meaning of a concept. |
<div><p>Focuses on restoring affected services and operations after an incident. It also includes learning from the event to improve future resilience. The CyberFundamentals Framework uses a proportional assurance model with three assurance levels: Basic , Important and Essential , preceded by an entry level: Small . The entry level allows an organisation to make an initial assessment. It is intended for micro-organisations or organisations with limited technical knowledge. The assurance level includes information and cyber security requirements applicable for all organisations. It provides a reliable level of protection by using technologies and processes that are generally already available. Where appropriate, these requirements can be adapted and improved to better match the organisation’s specific needs. Based on common types of cyber-attacks, some requirements are marked as . These shall be addressed at this assurance level.</p></div> |
|
A statement or formal explanation of the meaning of a concept. |
Focuses on restoring affected services and operations after an incident. It also includes learning from the event to improve future resilience. The CyberFundamentals Framework uses a proportional assurance model with three assurance levels: Basic , Important and Essential , preceded by an entry level: Small . The entry level allows an organisation to make an initial assessment. It is intended for micro-organisations or organisations with limited technical knowledge. The assurance level includes information and cyber security requirements applicable for all organisations. It provides a reliable level of protection by using technologies and processes that are generally already available. Where appropriate, these requirements can be adapted and improved to better match the organisation’s specific needs. Based on common types of cyber-attacks, some requirements are marked as . These shall be addressed at this assurance level. |
|
A statement or formal explanation of the meaning of a concept. |
Focuses on restoring affected services and operations after an incident. It also includes learning from the event to improve future resilience. The CyberFundamentals Framework uses a proportional assurance model with three assurance levels: Basic , Important and Essential , preceded by an entry level: Small . The entry level allows an organisation to make an initial assessment. It is intended for micro-organisations or organisations with limited technical knowledge. The assurance level includes information and cyber security requirements applicable for all organisations. It provides a reliable level of protection by using technologies and processes that are generally already available. Where appropriate, these requirements can be adapted and improved to better match the organisation’s specific needs. Based on common types of cyber-attacks, some requirements are marked as . These shall be addressed at this assurance level. |
|
A statement or formal explanation of the meaning of a concept. |
Focuses on restoring affected services and operations after an incident. It also includes learning from the event to improve future resilience. The CyberFundamentals Framework uses a proportional assurance model with three assurance levels: Basic , Important and Essential , preceded by an entry level: Small . The entry level allows an organisation to make an initial assessment. It is intended for micro-organisations or organisations with limited technical knowledge. The assurance level includes information and cyber security requirements applicable for all organisations. It provides a reliable level of protection by using technologies and processes that are generally already available. Where appropriate, these requirements can be adapted and improved to better match the organisation’s specific needs. Based on common types of cyber-attacks, some requirements are marked as . These shall be addressed at this assurance level. |
|
skos:exactMatch is used to link two concepts, indicating a high degree of confidence that the concepts can be used interchangeably across a wide range of information retrieval applications. skos:exactMatch is a transitive property, and is a sub-property of skos:closeMatch. |
|
|
Relates a concept to a concept that is more specific in meaning. |
|
|
Relates a concept to a concept that is more specific in meaning. |
|
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
RC |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
RECOVER |
|
Relates a concept to the concept scheme that it is a top level concept of. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
20 |
|
Specifies the dataset the subject is part of. |
|
|
RC |
Resultaten 1 - 22 of 22
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more general in meaning. |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
Relates, by convention, a concept scheme to a concept which is topmost in the broader/narrower concept hierarchies for that scheme, providing an entry point to these hierarchies. |
Resultaten 1 - 3 of 3