securityImplication
P91654
predicate
Indicates that one entity has a consequence, effect, or relevance for the safety, protection, or vulnerability status of another entity or system.
Observed surface forms (9)
- securityRisk ×9
- securityRelevance ×6
- securityThreat ×6
- securityRisks ×3
- effectOnSecurity ×1
- hasSecurityImplication ×1
- impactOnSecurityDoctrine ×1
- securityImpactOnIndia ×1
- securityReason ×1
Sample triples (39)
| Subject | Object |
|---|---|
| 1967 Six-Day War armistice lines | created new front lines between Israel and neighboring Arab states ⓘ |
| Bishkek Protocol | established a de facto security regime along the Line of Contact ⓘ |
| Compact of Free Association between the United States and the Federated States of Micronesia | United States has the right to deny third-country military access to FSM territory ⓘ |
| Direct Client-to-Client | can be abused to send malware via file transfers via predicate surface "securityRisk" ⓘ |
| Direct Client-to-Client | can be used in denial-of-service attacks via predicate surface "securityRisk" ⓘ |
| Direct Client-to-Client | exposes user IP address to peer via predicate surface "securityRisk" ⓘ |
| EIP-1559 | maintains miner incentives via tips and block rewards via predicate surface "effectOnSecurity" ⓘ |
| Federation–Cardassian Treaty | limitations on Cardassian military operations in the demilitarized zone ⓘ |
| Federation–Cardassian Treaty | limitations on Starfleet operations in the demilitarized zone ⓘ |
| India–Soviet strategic partnership | enhanced deterrence against regional adversaries via predicate surface "securityImpactOnIndia" ⓘ |
| Kandahar–Herat Highway | banditry and checkpoints by armed groups via predicate surface "securityRisks" ⓘ |
| Kandahar–Herat Highway | insurgent attacks via predicate surface "securityRisks" ⓘ |
| Kandahar–Herat Highway | roadside bombs via predicate surface "securityRisks" ⓘ |
| Liptako-Gourma region | Islamic State–affiliated groups via predicate surface "securityThreat" NERFINISHED ⓘ |
| Liptako-Gourma region | al-Qaeda–affiliated groups via predicate surface "securityThreat" NERFINISHED ⓘ |
| Liptako-Gourma region | banditry via predicate surface "securityThreat" ⓘ |
| Loya Paktia | Taliban insurgency via predicate surface "securityRelevance" NERFINISHED ⓘ |
| Loya Paktia | cross-border militancy via predicate surface "securityRelevance" ⓘ |
| Malawi–Tanzania border | regional stability in southeastern Africa via predicate surface "hasSecurityImplication" ⓘ |
| March Against Fear | Ku Klux Klan via predicate surface "securityThreat" ⓘ |
| March Against Fear | violent white mobs via predicate surface "securityThreat" ⓘ |
| Money Bin | frequent robbery attempts via predicate surface "securityThreat" ⓘ |
| Murideke | site linked to militant training activities via predicate surface "securityRelevance" ⓘ |
| Musandam Governorate | monitored for international maritime security via predicate surface "securityRelevance" ⓘ |
| Oracle Java plugin | yes via predicate surface "securityRisk" ⓘ |
| Princeton architecture | requires memory protection for isolation ⓘ |
| SQL Server Authentication | password exposure over network if not encrypted via predicate surface "securityRisk" ⓘ |
| SQL Server Authentication | password reuse across applications via predicate surface "securityRisk" ⓘ |
| Shamir’s attack on RSA with low decryption exponent | RSA key generation must avoid low decryption exponents ⓘ |
| Shamir’s attack on RSA with low decryption exponent | RSA with very small private exponent is insecure ⓘ |
| Sibutu | Philippines–Malaysia maritime security via predicate surface "securityRelevance" ⓘ |
| Sibutu | monitoring of cross-border movements via predicate surface "securityRelevance" ⓘ |
| Smiling Buddha | laid groundwork for India’s later declared nuclear weapons status via predicate surface "impactOnSecurityDoctrine" ⓘ |
|
Sperrgebiet (restricted diamond area)
surface form:
Sperrgebiet
|
diamond security via predicate surface "securityReason" ⓘ |
| United States–Russia prisoner exchange | debate over future hostage diplomacy ⓘ |
| WPS | allows attackers to recover WPA or WPA2 passphrase via predicate surface "securityRisk" ⓘ |
| WPS | can enable unauthorized access to Wi‑Fi networks via predicate surface "securityRisk" ⓘ |
| WPS | reduces overall security of WPA/WPA2 when enabled via predicate surface "securityRisk" ⓘ |
| Wiener’s attack on RSA | RSA implementations must avoid small d ⓘ |