language en

Airport Security Interoperability Integrated Ontology

Release 11/Sept/2020

Latest version:
http://www.gecad.isep.ipp.pt/ASIIO_SITE/index-en.html
Revision:
1.7
Authors:
Katia Aleid, (GECAD | Instituto Politécnico do Porto)
Alda Canito, (GECAD | Instituto Politécnico do Porto)
Imported Ontologies:
OWL-Time
Ticket Ontology
Unified Cybersecurity Ontology
NASA ATMONTO
Download serialization:
JSON-LD RDF/XML N-Triples TTL
License:
https://creativecommons.org/licenses/by-sa/4.0/
Visualization:
Visualize with WebVowl
Cite as:
Revision: 1.7.

Ontology Specification Draft
Critical infrastructures, like airports and hospitals, provide essential services and are considered huge investments in any country. Ensuring the security of these critical infrastructures is a necessity in every possible aspect. These infrastructures, however, currently make use of different technological solutions with distinct security levels, features and knowledge representation formats which often do not communicate directly with each other, leaving the task of processing the global view of the institution's security to the end-users. In order to have a complete view of the current cyber and physical security status of a given system, interoperability between these tools must be addressed. The Airport Security Interoperability Integrated Ontology (ASIIO) is an integrated ontology that combines cyber and physical security and was developed in the scope of the Security of Air Transport Infrastructure of Europe (SATIE) project.
The Security of Air Transport Infrastructure of Europe (SATIE) project aims to develop a cybersecurity toolkit to face cyber-physical threats in airports in a coordinated and effective way, supported by a shared situational awareness system. Several systems of varying responsibilities contribute to this result by cooperating and exchanging security data. These systems' responsibilities include, but are not limited to:

The cyber and physical threat detection, air traffic monitoring services, passenger data, access control, traffic management, and baggage handling systems all work as data sources, providing real-time information about events occurring in different parts of the airport. To achieve the general goal of securing critical infrastructures, it is required from all involved systems to communicate with each other, such that a holistic view of the environment is possible.

An ontology focused on cyber and physical security can provide a standard data-exchange between these systems, which would not only facilitate the existing communications but also the addition, removal, or compensation of systems from the overall architecture. For an ontology to be useful in this scenario, it would have to cover the knowledge representation needs of all the concerned parties, provide a unique frame of reference over the meaning of the exchanged messages which leaves no room for ambiguity, and guarantee that the same conclusions can be inferred in any part of the system. Such a semantic layer would facilitate a holistic, integrated view of the security status of the airport at any given moment, and the collaboration of multiple concerned parties would lead to an increase in the quality of the resulted work.

The current version of ASIIO reflects the consensus between the different parties involved in the SATIE project, and incorporates existing ontologies as illustrated in Figure 1:

Figure 1 - Representation of the concepts involved in the ASIIO ontology and its relationship with imported ontologies

Assets can be either Physical or Cyber, with different subclasses for differentiation. An Event can affect (or change) one or more Assets and trigger one or more Alerts. The SeverityLevel of these should be related to the Criticality of the Assets involved; how that relationship is defined can be specified by each individual tool issuing the Alerts, or it can be inferred through the affected Assets’ Criticality. Here we may introduce some sub-classes that comply with specific practical conditions, i.e. different types of Alerts: a consensus between all involved partners establishes these types as Info, Advisory, Warning and Alarm.

Please make sure the following ontologies are correctly imported:

Cross reference for Airport Security Interoperability Integrated Ontology classes, properties and dataproperties back to ToC

This section provides details for each class and property defined by Airport Security Interoperability Integrated Ontology.

Classes

Accelerometerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAccelerometer

A tool that measure proper acceleration
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Access Controlc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAccessControl

The selective restriction of access to a place or resource
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
has sub-classes
Badge Reader c, Biometeric Reader c, RFID Reader c
is disjoint with
CCTV c, Check-in Conveyor c, Emergency Exit c, Security Door c, Warning Device c

Administrative Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAdministrativeData

Data related to administrative tasks
Current version:
1
has super-classes
Data c
is disjoint with
Commercial Data c, Customer Data c, Personal Data c, Personnel Data c, Strategic Data c, Commercial Data c, Customer Data c, Personal Data c, Personnel Data c, Technical Data c

Advanced Persistent Threatc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAPT

An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected
Current version:
1
has super-classes
Attack Type c
is disjoint with
Backdoor c, Brute Force c, DDoS c, DoS c, IP Detection c, Phishing c, Port Detection c, Brute Force c, DDoS c, DoS c, IP Detection c, Malware c, Phishing c, Port Detection c

Advisoryc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAdvisory

A type of Alert fulfilling a specific criterion to be determined later
Current version:
1
has super-classes
Alert c
is disjoint with
Alarm c, Info c, Warning c

Airplanec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAirplane

A powered flying vehicle with fixed wings and a weight greater than that of the air it displaces
Current version:
1
has super-classes
Transport System c

Alarmc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAlarm

An alert with a Security Level that is either High or Extreme
Current version:
1
is equivalent to
Alert c and ((hasSeverity op some Extreme c) or (hasSeverity op some High c))
is disjoint with
Advisory c, Info c, Warning c

Alertc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAlert

A notification that a specific attack has been directed at an organization’s information systems.
Current version:
1
has super-classes
ASIIOThing c
has sub-classes
Advisory c, Info c, Warning c
is disjoint with
Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

ASIIOThingc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThing

Local class to represent OWL:Thing within the ontology for organizational purpose
Current version:
1
has sub-classes
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Assetc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAsset

Information or resource which have value to an organization or person.
Current version:
4
has super-classes
ASIIOThing c
has sub-classes
Data c, Engineered System c, ICARUS Entities c, Logical Asset c, Personnel c, Physical Asset c, Product c
is disjoint with
Alert c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Attackc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAttack

An attempt by an unauthorized individual to fool a Verifier or a Relying Party into believing that the unauthorized individual in question is the Subscriber
Current version:
1
has super-classes
Event c

Attack Typec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAttackType

A category or classification of the attack
Current version:
1
has super-classes
ASIIOThing c
has sub-classes
Advanced Persistent Threat c, Backdoor c, Brute Force c, DDoS c, DoS c, IP Detection c, Malware c, Phishing c, Port Detection c
is disjoint with
Alert c, Asset c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Attackerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAttacker

a party, including an insider, who acts with malicious intent to compromise a system
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Backdoorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBackdoor

A covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment
Current version:
1
has super-classes
Attack Type c
has sub-classes
Backdoor Trojan c
is disjoint with
Advanced Persistent Threat c, Brute Force c, DDoS c, DoS c, IP Detection c, Phishing c, Port Detection c

Backdoor Trojanc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBackdoorTrojan

An attack that gives malicious users remote control over the infected computer
Current version:
1
has super-classes
Backdoor c, Trojan Horse c
is disjoint with
Spyware c

Badgec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBadge

A small piece of metal, plastic, or cloth bearing a design or words, typically worn to identify a person or to indicate membership of an organization
Current version:
1
has super-classes
Equipment c

Badge Readerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBadgeReader

A data input device that reads data from a Badge
Current version:
1
Authors:
Katia Aleid
has super-classes
Access Control c
is disjoint with
Biometeric Reader c, RFID Reader c

Beaconc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBeacon

A block that projects a light beam to attract attraction or provide a status
Current version:
1
Authors:
Katia Aleid
has super-classes
Warning Device c
is disjoint with
Fire Alarm c, Sounder c

Biometeric Readerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBiometricReader

A device that reads the identity of a person by comparing some attributes or their physiological being or behavioural traits against a sample database
Current version:
1
Authors:
Katia Aleid
has super-classes
Access Control c
has sub-classes
Finger Print Scanner c, Hand Scanner c, Iris Scanner c, Voice Recognition Device c
is disjoint with
Badge Reader c, RFID Reader c

Brute Forcec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBruteForce

An attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
Current version:
1
has super-classes
Attack Type c
is disjoint with
Advanced Persistent Threat c, Backdoor c, DDoS c, DoS c, IP Detection c, Phishing c, Port Detection c, Advanced Persistent Threat c, DDoS c, DoS c, IP Detection c, Malware c, Phishing c, Port Detection c

Buildingc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBuilding

A structure with a roof and walls
Current version:
1
has super-classes
Location c
is disjoint with
Cabinet c, Data Processing Center c, Office c, Technical Room c

Business Impact Assessmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBusinessImpactAssessment

A way to predict the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies
Current version:
1
has super-classes
Impact c

Business Process Compromised Eventc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBusinessProcessCompromisedEvent

An attack that targets specific business processes and attempts to compromise them for some financial gain
Current version:
1
has super-classes
Event c

Cabinetc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCabinet

A cupboard with shelves or drawers for storing or displaying articles
Current version:
1
has super-classes
Location c
is disjoint with
Building c, Data Processing Center c, Office c, Technical Room c

Cablingc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCabling

An electrical or electronic cable
Current version:
1
has super-classes
Equipment c

CCTVc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCCTV

A video camera used to transmit a signal to a specific place on a limited set of monitors
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
is disjoint with
Access Control c, Check-in Conveyor c, Emergency Exit c, Security Door c, Warning Device c

Check-in Conveyorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCheckInConveyor

A device used to weigh baggage and dispatch it onto the collector conveyor without the need for manual lifting
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
is disjoint with
Access Control c, CCTV c, Emergency Exit c, Security Door c, Warning Device c

Clientc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extClient

A desktop computer or workstation that is capable of obtaining information and applications from a server
Current version:
1
has super-classes
Hardware c
is disjoint with
Mobile Device c, Physical Barrier c, Sensor c, Server c, Storage c, Terminal c, USB Drive Pen c

Cloud Servicec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCloudService

A service delivered on demand to companies and customers over the internet
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Cloud Service Managementc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCloudServiceManagement

A collection of activities that an organization does to plan, design, deliver, operate, and control the IT and cloud services that it offers to customers
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Commercial Appc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCommercialApp

A software or program that is designed and developed for licensing or sale to end users or that serves a commercial purpose
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Commercial Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCommercialData

Data related to commercial activities
Current version:
1
has super-classes
Data c
is disjoint with
Administrative Data c, Customer Data c, Personal Data c, Personnel Data c, Strategic Data c, Administrative Data c, Customer Data c, Personal Data c, Personnel Data c, Technical Data c

Confidential Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConfidentialData

Data that is not available to the general public
Current version:
1
has super-classes
Strategic Data c

Configurationc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConfiguration

The possible conditions, parameters, and specifications with which an information system or system component can be described or arranged
Current version:
1
has super-classes
ASIIOThing c
has sub-classes
Software Version c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Consequencec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConsequence

An effect (change or non-change), usually associated with an event or condition or with the system and usually allowed, facilitated, caused, prevented, changed, or contributed to by the event, condition, or system
Current version:
2
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Correlationc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCorrelation

Finding relationships between two or more log entries
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Countermeasurec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCountermeasure

A protective measure prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Criticalityc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCriticalityValuePartition

Available criticality levels are: Normal Escalation Emergency
A value partition that controls the level of criticality of an event
Current version:
1
is equivalent to
Emergency c or Escalation c or Normal c
has super-classes
Value Partition c
has sub-classes
Emergency c, Escalation c, Normal c
is disjoint with
Severity c, Status c

Cryptographic Devicec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCryptographicDevice

A device capable of accelerating and decrypting Secure Sockets Layer (SSL)
Current version:
1
has super-classes
Equipment c

Customer Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCustomerData

Data related to customers
Current version:
1
has super-classes
Data c
is disjoint with
Administrative Data c, Commercial Data c, Personal Data c, Personnel Data c, Strategic Data c, Administrative Data c, Commercial Data c, Personal Data c, Personnel Data c, Technical Data c

Customer Databasec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCustomerDatabase

A database related to customers' information
Current version:
1
has super-classes
Database c
is disjoint with
Internal Database c

Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extData

Data collections that are used or produced from the work process
Current version:
1
has super-classes
Asset c
has sub-classes
Administrative Data c, Commercial Data c, Customer Data c, Personal Data c, Personnel Data c, Strategic Data c, Technical Data c
is disjoint with
Engineered System c, Logical Asset c, Personnel c, Physical Asset c

Data Processing Centerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDataProcessingCenter

A place where various electronic equipment, especially computers and telecommunications equipment
Current version:
1
has super-classes
Location c
is disjoint with
Building c, Cabinet c, Office c, Technical Room c

Databasec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDatabase

An organized collection of data stored and accessed on computers
Current version:
1
has super-classes
Logical Asset c
has sub-classes
Customer Database c, Internal Database c
is disjoint with
Network c

DDoSc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDDOS

A malicious attempt to disrupt normal traffic to a web property
Current version:
1
has super-classes
Attack Type c
is disjoint with
Advanced Persistent Threat c, Backdoor c, Brute Force c, DoS c, IP Detection c, Phishing c, Port Detection c, Advanced Persistent Threat c, Brute Force c, DoS c, IP Detection c, Malware c, Phishing c, Port Detection c

Developed Softwarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDevelopedSoftware

A program that was conceived, specified, designed, programmed, documented, and tested
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Development Toolc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDevelopmentTool

A tool that supports the rapid implementation of software applications upon a programming platform
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Digital Credentialc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDigitalCredential

A proof of qualification or clearance in electronic form
Current version:
1
has super-classes
Strategic Data c, Technical Data c

Disabledc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDisabledStaus

A state of inactivity
Current version:
1
has super-classes
Status c
is disjoint with
Enabled c

DoSc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDOS

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet
Current version:
1
has super-classes
Attack Type c
has sub-classes
Tear Drop c
is disjoint with
Advanced Persistent Threat c, Backdoor c, Brute Force c, DDoS c, IP Detection c, Phishing c, Port Detection c, Advanced Persistent Threat c, Brute Force c, DDoS c, IP Detection c, Malware c, Phishing c, Port Detection c

Dropperc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDropper

A kind of Trojan that has been designed to "install" some sort of malware to a target system
Current version:
1
has super-classes
Malware c
has sub-classes
Injector c
is disjoint with
Exploit c, General Virus c, Trojan Horse c

Email Wormc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEmailWorm

A worm spread via email
Current version:
1
has super-classes
General Worm c
is disjoint with
Network Worm c

Emergencyc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEmergencyCriticality

Criticality value that the related event impacts to safety/breach of critical systems
Current version:
1
has super-classes
Criticality c
is disjoint with
Escalation c, Normal c

Emergency Exitc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEmergencyExit

A special exit for emergencies such as fire for faster evacuation if the regular exit in blocked.
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
is disjoint with
Access Control c, CCTV c, Check-in Conveyor c, Security Door c, Warning Device c

Enabledc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEnabledStatus

A state of activity
Current version:
1
has super-classes
Status c
is disjoint with
Disabled c

Engineered Systemc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEngineeredSystem

A subclass used to link to ATMONTO/equipment
Current version:
1
is equivalent to
engineered system c
has super-classes
Asset c
is disjoint with
Data c, Logical Asset c, Personnel c, Physical Asset c

Environmental Equipmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEnvironmentalEquipment

A system, product, equipment, or technology responsible for the mitigation of environmental damage and minimization of the environmental impact
Current version:
1
has super-classes
Equipment c

Equipmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEquipment

Necessary items for a particular purpose
Current version:
1
has super-classes
Physical Asset c
has sub-classes
Badge c, Cabling c, Cryptographic Device c, Environmental Equipment c, Key c, Media c, Mobile Device c, Network Equipment c, Physical Barrier c, Power System c, Rack c, Structured Cabling c, Technological Equipment c, Telecommunication Equipment c, Wireless Network c
is disjoint with
Location c, Physical Security System c, Software c, Transport System c

Escalationc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEscalationCriticality

Criticality value that the related event requires the application of corrective measures
Current version:
1
has super-classes
Criticality c
is disjoint with
Emergency c, Normal c

Eventc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extEvent

A discrete change of state or status of an Asset or group of Assets. Specific Events may trigger Alerts.
Current version:
3
has super-classes
ASIIOThing c
has sub-classes
Attack c, Business Process Compromised Event c, Threat Propagation Event c, Vulnerability Exposure c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Exploitc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExploit

A code that takes advantage of a software vulnerability or security flaw
Current version:
1
has super-classes
Malware c
has sub-classes
Local Exploit c, Remote Exploit c
is disjoint with
Dropper c, General Virus c, Trojan Horse c

External Web Serverc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExternalWebServer

A third-party web server where companies outsource their website hosting
Current version:
1
has super-classes
Server c
is disjoint with
FTP Server c, Internal Web Server c

Extremec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExtremeSeverity

The highest severity level
Current version:
1
has super-classes
Severity c
is disjoint with
High c, Low c, Medium c

Finger Print Scannerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extFingerPrintScanner

A device that optically scans the fingerprint when the user touches the glowing window
Current version:
1
Authors:
Katia Aleid
has super-classes
Biometeric Reader c
is disjoint with
Hand Scanner c, Iris Scanner c, Voice Recognition Device c

Fire Alarmc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extFireAlarm

A device used to detect and warn people through visual and audio appliances when smoke, fire, carbon monoxide or other emergencies are present
Current version:
1
Authors:
Katia Aleid
has super-classes
Warning Device c
is disjoint with
Beacon c, Sounder c

Firewallc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extFirewall

A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules
Current version:
1
has super-classes
Network Equipment c
is disjoint with
Switch c

FTP Serverc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extFTPServer

A software application which enables the transfer of files from one computer to another
Current version:
1
has super-classes
Server c
is disjoint with
External Web Server c, Internal Web Server c

Gas Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extGasSensor

A tool that detects gases like oxygen, carbon dioxide, nitrogen, etc
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

General Virusc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extGeneralVirus

A malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works
Current version:
1
has super-classes
Malware c
has sub-classes
General Worm c, Local Virus c
is disjoint with
Dropper c, Exploit c, Trojan Horse c

General Wormc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extGeneralWorm

A type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
Current version:
1
has super-classes
General Virus c
has sub-classes
Email Worm c, Network Worm c
is disjoint with
Local Virus c

Hand Scannerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHandScanner

A device that veins in the user’s palm which are as distinctive as fingerprints
Current version:
2
Authors:
Katia Aleid
has super-classes
Biometeric Reader c
is disjoint with
Finger Print Scanner c, Iris Scanner c, Voice Recognition Device c

Hardwarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHardware

The physical parts of a computer
Current version:
1
has super-classes
Physical Asset c
has sub-classes
Client c, Mobile Device c, Sensor c, Server c, Storage c, Terminal c, USB Drive Pen c
is disjoint with
Location c, Physical Security System c, Software c, Transport System c

Highc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHighSeverity

A high severity level
Current version:
1
has super-classes
Severity c
has members
high ni
is disjoint with
Extreme c, Low c, Medium c

Humidity Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHumiditySensor

A tool that detects and measure water vapor
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

ICARUS Entitiesc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extICARUSEntities

A subclass used to link to ICARUS
Authors:
Katia Aleid
is equivalent to
i c a r u s extra entities c
has super-classes
Asset c

Impactc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extImpact

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability
Current version:
1
has super-classes
ASIIOThing c
has sub-classes
Business Impact Assessment c, Resilience Assessment c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Incidentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIncident

An Event (or group of Events) that compromises an Asset. An Incident may be retroactively classified as an attack. Additionally, it has some sort of impact within the organization, which is described by its severity and completion level.
Current version:
2
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Infoc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extInfo

A type of Alert fulfilling a specific criterion to be determined later
Current version:
1
has super-classes
Alert c
is disjoint with
Advisory c, Alarm c, Warning c

Injectorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extInjector

A type of trojan that insert malicious code into processes running on a computer in order to perform various actions, such as downloading additional malware, interfering with web browsing activities or monitoring the user's actions
Current version:
1
has super-classes
Dropper c

Intellectual Propertyc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIntelectualProperty

An intangible property that is the result of creativity, such as patents, copyrights.
Current version:
1
has super-classes
Strategic Data c

Internal Databasec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extInternalDatabase

A database related to industry operations
Current version:
1
has super-classes
Database c
is disjoint with
Customer Database c

Internal Personnelc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extInternalPersonnel

A group of personnel related to the business
Current version:
1
has super-classes
Personnel c

Internal Web Serverc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extInternalWebServer

A web server where the organization itself sets up their own to host the website
Current version:
1
has super-classes
Server c
is disjoint with
External Web Server c, FTP Server c

IP Detectionc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIPDetection

An attack that examine a network to see which network devices are on that network
Current version:
1
has super-classes
Attack Type c
is disjoint with
Advanced Persistent Threat c, Backdoor c, Brute Force c, DDoS c, DoS c, Phishing c, Port Detection c, Advanced Persistent Threat c, Brute Force c, DDoS c, DoS c, Malware c, Phishing c, Port Detection c

IR Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIRSensor

A tool that emit and detects infrared radiation
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Iris Scannerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIrisScanner

A device that measures the unique patterns in irises
Current version:
1
Authors:
Katia Aleid
has super-classes
Biometeric Reader c
is disjoint with
Finger Print Scanner c, Hand Scanner c, Voice Recognition Device c

Keyc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extKey

A small piece of metal used to operate a lock
Current version:
1
has super-classes
Equipment c

Local Exositic Virusc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLocalExositicVirus

A type of virus that does not modify the targeted file but there exists a dependency on the pre-existence of it
Current version:
1
has super-classes
Local Virus c
is disjoint with
Local Parasitic Virus c

Local Exploitc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLocalExploit

An exploit that requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator
Current version:
1
has super-classes
Exploit c
is disjoint with
Remote Exploit c

Local Parasitic Virusc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLocalParasiticVirus

A type of virus that spreads by attaching itself to another program
Current version:
1
has super-classes
Local Virus c
is disjoint with
Local Exositic Virus c

Local Virusc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLocalVirus

A virus that requires prior access to the vulnerable system
Current version:
1
has super-classes
General Virus c
has sub-classes
Local Exositic Virus c, Local Parasitic Virus c
is disjoint with
General Worm c

Locationc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLocation

A particular place or position
Current version:
1
has super-classes
Physical Asset c
has sub-classes
Building c, Cabinet c, Data Processing Center c, Office c, Technical Room c
is disjoint with
Equipment c, Physical Security System c, Software c, Transport System c, Hardware c, Physical Security System c, Software c, Transport System c

Logical Assetc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLogicalAsset

An intangible possession related to business domain
Current version:
1
has super-classes
Asset c
has sub-classes
Database c, Network c
is disjoint with
Data c, Engineered System c, Personnel c, Physical Asset c

Lowc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLowSeverity

A low severity level
Current version:
1
has super-classes
Severity c
has members
low ni
is disjoint with
Extreme c, High c, Medium c

Malwarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMalware

A software intentionally designed to cause damage to a computer, server, client, or computer network
Current version:
1
has super-classes
Attack Type c
has sub-classes
Dropper c, Exploit c, General Virus c, Trojan Horse c
is disjoint with
Advanced Persistent Threat c, Brute Force c, DDoS c, DoS c, IP Detection c, Phishing c, Port Detection c

Mediac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMedia

Means of communication like broadcasting, publishing, and the internet
Current version:
1
has super-classes
Equipment c

Mediumc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMediumSeverity

A medium severity level
Current version:
1
has super-classes
Severity c
is disjoint with
Extreme c, High c, Low c

Mitigation Strategyc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMitigationStrategy

A set of steps taken to reduce the risk (the severity of the impact and/or probability of the occurrence)
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Performance c, Threat Propagation Path c, Value Partition c, Vulnerability c

Mobile Devicec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMobileDevice

A portable computing device
Current version:
1
has super-classes
Equipment c, Hardware c
is disjoint with
Client c, Physical Barrier c, Sensor c, Server c, Storage c, Terminal c, USB Drive Pen c

Motion Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMotionSensor

A tool that detects nearby movement
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Networkc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extNetwork

A group of interconnected systems
Current version:
1
has super-classes
Logical Asset c
has sub-classes
Service Provider c, Telephony Provider c
is disjoint with
Database c

Network Equipmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extNetworkEquipment

Electronic devices which are required for communication and interaction between devices on a computer network
Current version:
1
has super-classes
Equipment c
has sub-classes
Firewall c, Switch c

Network Wormc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extNetworkWorm

A worm spread via the network
Current version:
1
has super-classes
General Worm c
is disjoint with
Email Worm c

Normalc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extNormalCriticality

Criticality value that the related event does not impact critical components and does not require intervention
Current version:
1
has super-classes
Criticality c
is disjoint with
Emergency c, Escalation c

Officec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extOffice

A room, set of rooms, or building used as a place for commercial, professional, or bureaucratic work
Current version:
1
has super-classes
Location c
is disjoint with
Building c, Cabinet c, Data Processing Center c, Technical Room c

Office Automationc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extOfficeAutomation

A software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Open Source SWc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extOpenSourceSW

A software that uses an open development process and is licensed to include the source code
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Operating Systemc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extOperatingSystem

A system software that manages computer hardware, software resources, and provides common services for computer programs
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Performancec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPerformance

An action or process of performing a task or function
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Threat Propagation Path c, Value Partition c, Vulnerability c

Personal Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPersonalData

Data related to demographics
Current version:
1
has super-classes
Data c
is disjoint with
Administrative Data c, Commercial Data c, Customer Data c, Personnel Data c, Strategic Data c, Administrative Data c, Commercial Data c, Customer Data c, Personnel Data c, Technical Data c

Personnelc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPersonnel

A group of people employed in an organization or engaged in an organized undertaking
Current version:
1
has super-classes
Asset c
has sub-classes
Internal Personnel c, Third Party Personnel c
is disjoint with
Data c, Engineered System c, Logical Asset c, Physical Asset c

Personnel Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPersonnelData

Data related to staff
Current version:
1
has super-classes
Data c
is disjoint with
Administrative Data c, Commercial Data c, Customer Data c, Personal Data c, Strategic Data c, Administrative Data c, Commercial Data c, Customer Data c, Personal Data c, Technical Data c

Phishingc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPhishing

A fraudulent attempt to obtain sensitive information or data, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in an electronic communication
Current version:
1
has super-classes
Attack Type c
is disjoint with
Advanced Persistent Threat c, Backdoor c, Brute Force c, DDoS c, DoS c, IP Detection c, Port Detection c, Advanced Persistent Threat c, Brute Force c, DDoS c, DoS c, IP Detection c, Malware c, Port Detection c

Physical Assetc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPhysicalAsset

An item of economic, commercial, or exchange value that has a material existence
Current version:
1
has super-classes
Asset c
has sub-classes
Equipment c, Hardware c, Location c, Physical Security System c, Software c, Transport System c
is disjoint with
Data c, Engineered System c, Logical Asset c, Personnel c

Physical Barrierc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPhysicalBarrier

A structural obstacle in natural or manmade environments that prevent or block mobility
Current version:
1
has super-classes
Equipment c
is disjoint with
Client c, Mobile Device c, Sensor c, Server c, Storage c, Terminal c, USB Drive Pen c

Physical Security Systemc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPhysicalSecuritySystem

A collection of equipment that provides security and safety
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Asset c
has sub-classes
Access Control c, CCTV c, Check-in Conveyor c, Emergency Exit c, Security Door c, Warning Device c
is disjoint with
Equipment c, Location c, Software c, Transport System c, Hardware c, Location c, Software c, Transport System c

Port Detectionc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPortDetection

An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service
Current version:
1
has super-classes
Attack Type c
is disjoint with
Advanced Persistent Threat c, Backdoor c, Brute Force c, DDoS c, DoS c, IP Detection c, Phishing c, Advanced Persistent Threat c, Brute Force c, DDoS c, DoS c, IP Detection c, Malware c, Phishing c

Power Systemc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPowerSystem

A network which consists of generation, distribution, and transmission system. It uses the form of energy (like coal and diesel) and converts it into electrical energy
Current version:
1
has super-classes
Equipment c

Pressure Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPressureSensor

A tool that measures pressure of gases or liquids
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Productc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extProduct

A subclass used to link to Ticket Ontology
Current version:
1
has super-classes
Asset c

product or servicec back to ToC or Class ToC

IRI: http://purl.org/goodrelations/v1#ProductOrService

is equivalent to
Product c

Proximity Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extProximitySensor

A tool with the ability to detect the presence of nearby object without any physical contact
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Rackc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extRack

A framework, typically with rails, bars, hooks, or pegs, for holding or storing things
Current version:
1
has super-classes
Equipment c

Remote Exploitc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extRemoteExploit

An exploit that works over a network and exploits the security vulnerability without any prior access to the vulnerable system
Current version:
1
has super-classes
Exploit c
is disjoint with
Local Exploit c

Resilience Assessmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extResilienceAssessment

A short self-assessment to help identify the scores relating to Resilience
Current version:
1
has super-classes
Impact c

RFID Readerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extRFIDReader

A device that uses radio frequency waves to wirelessly transfer data between itself and a RFID tag
Current version:
1
Authors:
Katia Aleid
has super-classes
Access Control c
is disjoint with
Badge Reader c, Biometeric Reader c

Security Doorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSecurityDoor

A gate with any range of measures to provide a safe and secure access control
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
is disjoint with
Access Control c, CCTV c, Check-in Conveyor c, Emergency Exit c, Warning Device c

Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSensor

A device, module, machine, or subsystem whose purpose is to detect events or changes in its environment and send the information to other electronics
Current version:
1
has super-classes
Hardware c
has sub-classes
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c, Ultrasonic Sensor c
is disjoint with
Client c, Mobile Device c, Physical Barrier c, Server c, Storage c, Terminal c, USB Drive Pen c

Serverc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extServer

A piece of computer hardware or software (computer program) that provides functionality for other programs or devices
Current version:
1
has super-classes
Hardware c
has sub-classes
External Web Server c, FTP Server c, Internal Web Server c
is disjoint with
Client c, Mobile Device c, Physical Barrier c, Sensor c, Storage c, Terminal c, USB Drive Pen c

Service Providerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extServiceProvider

A service provider provides organizations with consulting, legal, real estate, communications, storage, processing
Current version:
1
has super-classes
Network c
is disjoint with
Telephony Provider c

Severityc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSeverityValuePartition

Available severity levels are: Low Medium High Extreme
A value partition that controls the level of severity of an alert
Current version:
1
is equivalent to
Extreme c or High c or Low c or Medium c
has super-classes
Value Partition c
has sub-classes
Extreme c, High c, Low c, Medium c
is disjoint with
Criticality c, Status c

Smoke Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSmokeSensor

A tool that uses both photoelectric and temperature sensor for maximum protection from flaming
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Temperature Sensor c, Ultrasonic Sensor c

Softwarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSoftware

A collection of data or computer instructions that tell the computer how to work
Current version:
1
has super-classes
Physical Asset c
has sub-classes
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c, Virtual Server c
is disjoint with
Equipment c, Location c, Physical Security System c, Transport System c, Hardware c, Location c, Physical Security System c, Transport System c

Software Versionc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSoftwareVersion

A unique set of version numbers assigned to unique state of computer software
Current version:
1
has super-classes
Configuration c

Sounderc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSounder

An audio device used with Beacon to represent warnings
Current version:
1
Authors:
Katia Aleid
has super-classes
Warning Device c
is disjoint with
Beacon c, Fire Alarm c

Spywarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSpyware

An unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
Current version:
1
has super-classes
Trojan Horse c
is disjoint with
Backdoor Trojan c

Statusc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extStatusValuePartition

A value partition that controls the status of an alert.
Current version:
1
is equivalent to
Disabled c or Enabled c
has super-classes
Value Partition c
has sub-classes
Disabled c, Enabled c
is disjoint with
Criticality c, Severity c

Storagec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extStorage

A space available for storing something, in particular allocated space in a warehouse
Current version:
1
has super-classes
Hardware c
is disjoint with
Client c, Mobile Device c, Physical Barrier c, Sensor c, Server c, Terminal c, USB Drive Pen c

Strategic Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extStrategicData

Data related to the business operations on a strategic level
Current version:
1
has super-classes
Data c
has sub-classes
Confidential Data c, Digital Credential c, Intellectual Property c
is disjoint with
Administrative Data c, Commercial Data c, Customer Data c, Personal Data c, Personnel Data c

Structured Cablingc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extStructuredCabling

A building or campus cabling infrastructure that consists of a number of standardized smaller elements
Current version:
1
has super-classes
Equipment c

Switchc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSwitch

A networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
Current version:
1
has super-classes
Network Equipment c
is disjoint with
Firewall c

Tear Dropc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTearDrop

A denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another, crashing the target network device
Current version:
1
has super-classes
DoS c

Technical Datac back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTechnicalData

A recorded information of scientific or technical nature
Current version:
1
has super-classes
Data c
has sub-classes
Digital Credential c, Technological Report c
is disjoint with
Administrative Data c, Commercial Data c, Customer Data c, Personal Data c, Personnel Data c

Technical Roomc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTechnicalRoom

An enclosed space with doors for access/egress inside or outside the tunnel with safety installations
Current version:
1
has super-classes
Location c
is disjoint with
Building c, Cabinet c, Data Processing Center c, Office c

Technological Equipmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTechnologicalEquipment

A collection of technology assets including mainframe computers, servers, general computer equipment, printers, monitors, hard drives, memory, storage devices and call centers/ACD systems but excluding Flight Simulators
Current version:
1
has super-classes
Equipment c

Technological Reportc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTechnologicalReport

A document that describes the process, progress, or results of technical or scientific research or the state of a technical or scientific research problem
Current version:
1
has super-classes
Technical Data c

Telecommunication Equipmentc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTelecommunicationEquipment

A hardware which is used for the purposes of telecommunications
Current version:
1
has super-classes
Equipment c

Telephony Providerc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTelephonyProvider

A software interface to a physical telephony device (such as a modem) that can be accessed programmatically to perform actions such as dialing a phone number or logging a call
Current version:
1
has super-classes
Network c
is disjoint with
Service Provider c

Temperature Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTemperatureSensor

A tool that measures the amount of heat or coldness that is generated by an object or system
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Ultrasonic Sensor c

Terminalc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTerminal

A device to help accomplish and automate tasks on a computer without the use of graphical user interface
Current version:
1
has super-classes
Hardware c
is disjoint with
Client c, Mobile Device c, Physical Barrier c, Sensor c, Server c, Storage c, USB Drive Pen c

Third Party Personnelc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThirdPartyPersonnel

A group of personnel related to external companies
Current version:
1
has super-classes
Personnel c

Third Party Softwarec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThirdPartySoftware

A reusable software component developed to be either freely distributed or sold by an entity other than the original vendor of the development platform
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Virtual Client c, Virtual Infrastructure c, Virtual Server c

Threat Propagation Eventc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThreatPropagationEvent

A detection of malicious web destinations
Current version:
2
has super-classes
Event c

Threat Propagation Pathc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThreatPropagationPath

A sequence of steps towards the detecting malicious web destinations
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Value Partition c, Vulnerability c

Transport Systemc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTransportSystem

A system for the movement of humans, animals, and goods from one location to another
Current version:
1
has super-classes
Physical Asset c
has sub-classes
Airplane c
is disjoint with
Equipment c, Location c, Physical Security System c, Software c, Hardware c, Location c, Physical Security System c, Software c

Trojan Horsec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTrojanHorse

A type of malicious code or software that looks legitimate but can take control of your computer
Current version:
1
has super-classes
Malware c
has sub-classes
Backdoor Trojan c, Spyware c
is disjoint with
Dropper c, Exploit c, General Virus c

uco incidentc back to ToC or Class ToC

IRI: http://purl.org/cyber/ucoIncident

is equivalent to
Incident c

Ultrasonic Sensorc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extUltrasonicSensor

A tool that measures the distance of a target object by emitting ultrasonic sound waves and converts the reflected sound into an electrical signal
Current version:
1
Authors:
Katia Aleid
has super-classes
Sensor c
is disjoint with
Accelerometer c, Gas Sensor c, Humidity Sensor c, IR Sensor c, Motion Sensor c, Pressure Sensor c, Proximity Sensor c, Smoke Sensor c, Temperature Sensor c

USB Drive Penc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extUSBPenDrive

A data storage device that includes flash memory with an integrated USB interface
Current version:
1
has super-classes
Hardware c
is disjoint with
Client c, Mobile Device c, Physical Barrier c, Sensor c, Server c, Storage c, Terminal c

Value Partitionc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extValuePartition

A logical class to contain all enumeration values used for other concepts
Current version:
1
has super-classes
ASIIOThing c
has sub-classes
Criticality c, Severity c, Status c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Vulnerability c

Virtual Clientc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVirtualClient

A computing model that provides desktop virtualization solution to improve limitations associated with the traditional distributed desktop environment
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Infrastructure c, Virtual Server c

Virtual Infrastructurec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVirtualInfrastructure

A way to share physical resources of multiple machines across your entire infrastructure
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Server c

Virtual Serverc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVirtualServer

A server that shares hardware and software resources with other operating systems
Current version:
1
has super-classes
Software c
is disjoint with
Cloud Service c, Cloud Service Management c, Commercial App c, Developed Software c, Development Tool c, Office Automation c, Open Source SW c, Operating System c, Third Party Software c, Virtual Client c, Virtual Infrastructure c

Voice Recognition Devicec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVoiceRecognitionDevice

A device with the ability to decode the human voice
Current version:
1
Authors:
Katia Aleid
has super-classes
Biometeric Reader c
is disjoint with
Finger Print Scanner c, Hand Scanner c, Iris Scanner c

Vulnerabilityc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVulnerability

A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
Current version:
1
has super-classes
ASIIOThing c
is disjoint with
Alert c, Asset c, Attack Type c, Attacker c, Configuration c, Consequence c, Correlation c, Countermeasure c, Event c, Impact c, Incident c, Mitigation Strategy c, Performance c, Threat Propagation Path c, Value Partition c

Vulnerability Exposurec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVulnerabilityExposure

A system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network
Current version:
1
has super-classes
Event c

Warningc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extWarning

A type of Alert fulfilling a specific criterion to be determined later
Current version:
1
has super-classes
Alert c
is disjoint with
Advisory c, Alarm c, Info c

Warning Devicec back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extWarningDevice

A device that signals the occurrence of some undesirable event
Current version:
1
Authors:
Katia Aleid
has super-classes
Physical Security System c
has sub-classes
Beacon c, Fire Alarm c, Sounder c
is disjoint with
Access Control c, CCTV c, Check-in Conveyor c, Emergency Exit c, Security Door c

Wireless Networkc back to ToC or Class ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extWirelessNetwork

A computer network that uses wireless data connections between network nodes
Current version:
1
has super-classes
Equipment c

Object Properties

affectedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAffextedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
affects op

affectsop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAffests

Current version:
2
has super-properties
objectProperty op
is inverse of
affectedBy op

affectsConfigurationop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAffectesConfiguration

Current version:
1
has super-properties
objectProperty op
is inverse of
configurationAffectedBy op

assetAffectedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAssetAffectedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
hasAffectedAsset op

belongsToop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBelongsTo

Current version:
1
has super-properties
objectProperty op
is inverse of
has op

causedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCausedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
causes op

causesop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCauses

Current version:
1
has super-properties
objectProperty op
is inverse of
causedBy op

configurationAffectedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConfigurationAffectedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
affectsConfiguration op

configurationOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConfigurationOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasConfiguration op

consistsOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extConsistsOf

Current version:
1

has characteristics: asymmetric

has super-properties
objectProperty op
is inverse of
isPartOf op

criticalityOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCriticalityOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasCriticality op

destinationAssetOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDestinationAssetOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasDestinationAsset op

exploitedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExploitedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
exploits op

exploitsop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExploits

Current version:
2
has super-properties
objectProperty op
is inverse of
exploitedBy op

exposedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExposedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
exposes op

exposesop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extExposes

Current version:
1
has super-properties
objectProperty op
is inverse of
exposedBy op

hasop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHas

Current version:
2
has super-properties
objectProperty op
is inverse of
belongsTo op

hasAffectedAssetop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasAffectedAsset

Current version:
1
has super-properties
objectProperty op
is inverse of
assetAffectedBy op

hasConfigurationop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasConfiguration

Current version:
1
has super-properties
objectProperty op
is inverse of
configurationOf op

hasCriticalityop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasCriticality

Current version:
2

has characteristics: functional

has super-properties
objectProperty op
is inverse of
criticalityOf op

hasDestinationAssetop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasDestinationAsset

Current version:
1
has super-properties
objectProperty op
is inverse of
destinationAssetOf op

hasSeverityop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasSeverity

Current version:
2

has characteristics: functional

has super-properties
objectProperty op
is inverse of
severityOf op

hasSourceAssetop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasSourceAsset

Current version:
1
has super-properties
objectProperty op
is inverse of
sourceAssetOf op

hasSourceEventop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasSourceEvent

Current version:
1
has super-properties
objectProperty op
is inverse of
sourceEventOf op

hasStatusop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasStatus

Current version:
2

has characteristics: functional

has super-properties
objectProperty op
is inverse of
statusOf op

hasTargetEventop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasTargetEvent

Current version:
1
has super-properties
objectProperty op
is inverse of
targetEventOf op

hasVersionop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extHasVerison

Current version:
1
has super-properties
objectProperty op
is inverse of
versionOf op

isPartOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIsPartOf

Current version:
1
has super-properties
objectProperty op
is inverse of
consistsOf op

launchedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLaunchedBy

Current version:
1

has characteristics: functional

has super-properties
objectProperty op
is inverse of
launches op

launchesop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extLaunches

Current version:
1
has super-properties
objectProperty op
is inverse of
launchedBy op

objectPropertyop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTopObjectProperty

Current version:
1

preventedByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPreventedBy

Current version:
1
has super-properties
objectProperty op
is inverse of
prevents op

preventsop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPrevents

Current version:
1
has super-properties
objectProperty op
is inverse of
preventedBy op

severityOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSeverityOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasSeverity op

sourceAssetOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSourceAssetOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasSourceAsset op

sourceEventOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extSourceEventOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasSourceEvent op

statusOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extStatusOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasStatus op

targetEventOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTargetEventOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasTargetEvent op

triggeredByop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extIsTriggeredBy

Current version:
2

has characteristics: functional

has super-properties
objectProperty op
is inverse of
triggers op

triggersop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTriggers

Current version:
2
has super-properties
objectProperty op
is inverse of
triggeredBy op

versionOfop back to ToC or Object Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVersionOf

Current version:
1
has super-properties
objectProperty op
is inverse of
hasVersion op

Data Properties

actiondp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAction

Current version:
1
has super-properties
dataProperty dp

actionsToFollowdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extActionsToFollow

Current version:
1
has super-properties
dataProperty dp

additionalDatadp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAdditionalData

Current version:
1
has super-properties
dataProperty dp

assetIDdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extAssetID

Current version:
1
has super-properties
dataProperty dp

businessActivitydp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extBusinessActivity

Current version:
1
has super-properties
dataProperty dp

categorydp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCategory

Current version:
1
has super-properties
dataProperty dp

completiondp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCompletion

Current version:
1
has super-properties
dataProperty dp

CVE IDdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extCVEID

Current version:
1
has super-properties
dataProperty dp

dataPropertydp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extTopDataProperty

Current version:
1
has sub-properties
CVE ID dp, ID dp, URL dp, action dp, actionsToFollow dp, additionalData dp, assetID dp, businessActivity dp, category dp, completion dp, description dp, means dp, performanceValue dp, probability dp, process dp, recoveryTime dp, remediation dp, score dp, service dp, thershold dp, type dp, value dp, vulnerabilityID dp
has range
literal

descriptiondp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extDescription

Current version:
1
has super-properties
dataProperty dp

IDdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extID

Current version:
1
has super-properties
dataProperty dp

meansdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extMeans

Current version:
1
has super-properties
dataProperty dp

performanceValuedp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extPerformanceValue

Current version:
1
has super-properties
dataProperty dp

probabilitydp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extProbability

Current version:
1
has super-properties
dataProperty dp

processdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extProcess

Current version:
1
has super-properties
dataProperty dp

recoveryTimedp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extRecoveryTime

Current version:
1
has super-properties
dataProperty dp

remediationdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extRemediation

Current version:
1
has super-properties
dataProperty dp

scoredp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extScore

Current version:
1
has super-properties
dataProperty dp

servicedp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extService

Current version:
1
has super-properties
dataProperty dp

thersholddp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extThreshold

Current version:
1
has super-properties
dataProperty dp

typedp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extType

Current version:
1
has super-properties
dataProperty dp

URLdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extURL

Current version:
1
has super-properties
dataProperty dp

valuedp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extValue

Current version:
1
has super-properties
dataProperty dp

vulnerabilityIDdp back to ToC or Data Property ToC

IRI: http://www.gecad.isep.ipp.pt/ASIIO#extVulnerabilityID

Current version:
1
has super-properties
dataProperty dp

Legend back to ToC

c: Classes
op: Object Properties
dp: Data Properties
ni: Named Individuals

Acknowledgments back to ToC

The ASIIO ontology was developed in the scope of the Security of Air Transport Infrastructures of Europe SATIE project (Security of Air Transport Infrastructure of Europe, H2020 - GA nr. 832969).