PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • A penetration test follows, with the vulnerability data used to go after system weaknesses, including passwords, system defaults and secure folders, all of which can contain sensitive information.
http://www.w3.org/ns/prov#wasQuotedFrom
  • cuna.org