Statements (82)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_technology
|
gptkbp:collaborates_with |
gptkb:Net_Watch
|
gptkbp:conducts |
Surveillance Operations
|
gptkbp:develops |
Cybernetic Enhancements
|
gptkbp:employs |
Cybersecurity Measures
|
gptkbp:engages_in |
Data Theft
|
gptkbp:has_access_to |
State-of-the-Art Technology
|
gptkbp:has_influence_on |
Political Decisions
|
gptkbp:has_relationship_with |
Other Corporations
|
https://www.w3.org/2000/01/rdf-schema#label |
Arasaka Cyber Warfare
|
gptkbp:involved_in |
Corporate Espionage
|
gptkbp:is_a |
gptkb:public_company
|
gptkbp:is_associated_with |
gptkb:Arasaka_Security
Corporate Sabotage |
gptkbp:is_considered |
A Major Threat
A Key Player A Major Player A Cyber Threat A Cybersecurity Authority A Cybersecurity Expert A Cybersecurity Innovator A Cybersecurity Leader A Cybersecurity Pioneer A Cybersecurity Specialist |
gptkbp:is_engaged_in |
Cyber Intelligence
Cyber Defense Cyber Risk Management |
gptkbp:is_focused_on |
Technological Superiority
|
gptkbp:is_involved_in |
gptkb:cyber_operations
gptkb:Compliance_Management gptkb:forensic_science gptkb:Risk_Management gptkb:security_services gptkb:emergency_services gptkb:security Information Security Threat Assessment Vulnerability Assessment Data Breaches Incident Management Cybersecurity Research Penetration Testing Security Audits Network Intrusions Security Training Information Warfare Cyber Defense Strategies Security Policy Development Cyber Threat Mitigation Digital Warfare Digital Espionage |
gptkbp:is_known_for |
gptkb:security_services
gptkb:security Data Analysis Incident Response Data Manipulation Cyber Attacks Intelligence Gathering Threat Hunting Security Frameworks Advanced Surveillance Digital Surveillance Brutal Tactics High-Tech Warfare |
gptkbp:is_linked_to |
gptkb:Cybercrime_Syndicates
Cybernetic Crime |
gptkbp:is_part_of |
gptkb:Cyberpunk_Universe
gptkb:Arasaka_Group Corporate Warfare Cybersecurity Industry |
gptkbp:operates_in |
gptkb:Night_City
Virtual Environments |
gptkbp:operates_under |
Corporate Law
|
gptkbp:part_of |
gptkb:Arasaka_Corporation
|
gptkbp:participates_in |
Black Market Activities
|
gptkbp:targets |
Rival Corporations
|
gptkbp:uses |
gptkb:Artificial_Intelligence
|
gptkbp:utilizes |
Propaganda Techniques
Advanced Hacking Techniques |
gptkbp:bfsParent |
gptkb:Arasaka_Systems
gptkb:Arasaka_Group |
gptkbp:bfsLayer |
7
|