securityImplication

P91654 predicate

Indicates that one entity has a consequence, effect, or relevance for the safety, protection, or vulnerability status of another entity or system.

Observed surface forms (9)

Sample triples (39)

Subject Object
1967 Six-Day War armistice lines created new front lines between Israel and neighboring Arab states
Bishkek Protocol established a de facto security regime along the Line of Contact
Compact of Free Association between the United States and the Federated States of Micronesia United States has the right to deny third-country military access to FSM territory
Direct Client-to-Client can be abused to send malware via file transfers via predicate surface "securityRisk"
Direct Client-to-Client can be used in denial-of-service attacks via predicate surface "securityRisk"
Direct Client-to-Client exposes user IP address to peer via predicate surface "securityRisk"
EIP-1559 maintains miner incentives via tips and block rewards via predicate surface "effectOnSecurity"
Federation–Cardassian Treaty limitations on Cardassian military operations in the demilitarized zone
Federation–Cardassian Treaty limitations on Starfleet operations in the demilitarized zone
India–Soviet strategic partnership enhanced deterrence against regional adversaries via predicate surface "securityImpactOnIndia"
Kandahar–Herat Highway banditry and checkpoints by armed groups via predicate surface "securityRisks"
Kandahar–Herat Highway insurgent attacks via predicate surface "securityRisks"
Kandahar–Herat Highway roadside bombs via predicate surface "securityRisks"
Liptako-Gourma region Islamic State–affiliated groups via predicate surface "securityThreat" NERFINISHED
Liptako-Gourma region al-Qaeda–affiliated groups via predicate surface "securityThreat" NERFINISHED
Liptako-Gourma region banditry via predicate surface "securityThreat"
Loya Paktia Taliban insurgency via predicate surface "securityRelevance" NERFINISHED
Loya Paktia cross-border militancy via predicate surface "securityRelevance"
Malawi–Tanzania border regional stability in southeastern Africa via predicate surface "hasSecurityImplication"
March Against Fear Ku Klux Klan via predicate surface "securityThreat"
March Against Fear violent white mobs via predicate surface "securityThreat"
Money Bin frequent robbery attempts via predicate surface "securityThreat"
Murideke site linked to militant training activities via predicate surface "securityRelevance"
Musandam Governorate monitored for international maritime security via predicate surface "securityRelevance"
Oracle Java plugin yes via predicate surface "securityRisk"
Princeton architecture requires memory protection for isolation
SQL Server Authentication password exposure over network if not encrypted via predicate surface "securityRisk"
SQL Server Authentication password reuse across applications via predicate surface "securityRisk"
Shamir’s attack on RSA with low decryption exponent RSA key generation must avoid low decryption exponents
Shamir’s attack on RSA with low decryption exponent RSA with very small private exponent is insecure
Sibutu Philippines–Malaysia maritime security via predicate surface "securityRelevance"
Sibutu monitoring of cross-border movements via predicate surface "securityRelevance"
Smiling Buddha laid groundwork for India’s later declared nuclear weapons status via predicate surface "impactOnSecurityDoctrine"
Sperrgebiet (restricted diamond area)
surface form: Sperrgebiet
diamond security via predicate surface "securityReason"
United States–Russia prisoner exchange debate over future hostage diplomacy
WPS allows attackers to recover WPA or WPA2 passphrase via predicate surface "securityRisk"
WPS can enable unauthorized access to Wi‑Fi networks via predicate surface "securityRisk"
WPS reduces overall security of WPA/WPA2 when enabled via predicate surface "securityRisk"
Wiener’s attack on RSA RSA implementations must avoid small d