Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- General Platform - AI (1 member)
- General Safety (18 members)
- Generative AI Detection (2 members)
- Geolocation (1 member)
- Geolocation Settings (1 member)
- Georgia (8 members)
- Germany (2 members)
- Global Attack Analysis (1 member)
- Governance, Risk, and Compliance (GRC) (4 members)
- Governance (ID.GV) (4 members)
- Governance - AI (17 members)
- Governance - AI Expert (1 member)
- Government (154 members)
- Government AI Solutions (1 member)
- Government Branches (0 members)
- Government emergency alert systems (4 members)
- Governments - US-State - Local - Tribal - Territorial (SLTT) (2 members)
- Governments - US State - Local - Tribal - Territorial (SLTT) (33 members)
- Governments and Intergovernmental Organizations (17 members)
- Greece (2 members)
- Guardrails - AI (2 members)
- Harassment & Legal Considerations (7 members)
- Hard Token Passcode Generators (1 member)
- Hardware Wallet Use (1 member)
- Hashes (2 members)
- Having Personal Information Leaked (4 members)
- Hawaii (4 members)
- Healthcare Data Protection (1 member)
- Homomorphic Encryption (1 member)
- Honeypot (3 members)
- Hotlines & Services (13 members)
- How Do Digital Wallets Work? (2 members)
- How to Spot Non-Reputable NFT Projects (3 members)
- Hubs (1 member)
- Humanitarian Organizations (3 members)
- ID.AM-1: Physical devices and systems within the organization are inventoried (1 member)
- ID.AM-2: Software platforms and applications within the organization are inventoried (1 member)
- ID.AM-3: Organizational communication and data flows are mapped (1 member)
- ID.AM-4: External information systems are catalogued (1 member)
- ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value (1 member)
- ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established (1 member)
- ID.BE-1: The organization’s role in the supply chain is identified and communicated (1 member)
- ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated (1 member)
- ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated (1 member)
- ID.BE-4: Dependencies and critical functions for delivery of critical services are established (1 member)
- ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress or attack, during recovery, normal operations) (1 member)
- ID.GV-1: Organizational cybersecurity policy is established and communicated (1 member)
- ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners (1 member)
- ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed (1 member)
- ID.GV-4: Governance and risk management processes address cybersecurity risks (1 member)