| http://www.w3.org/ns/prov#value | - For example, GLBA requires organizations to implement -- based upon the results of risk analysis -- intrusion-detection and incident-monitoring tools to be used for detecting, preventing and responding to attacks, intrusions or other systems failures.
|