Statements (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
military unit
|
gptkbp:advocatesFor |
cyber policy
|
gptkbp:analyzes |
cyber intelligence
|
gptkbp:collaboratesWith |
gptkb:National_Security_Agency
federal agencies |
gptkbp:conducts |
penetration testing
cyber exercises vulnerability assessments cybersecurity assessments |
gptkbp:conductsResearchOn |
cybersecurity trends
|
gptkbp:coordinates |
incident response
|
gptkbp:coordinatesWith |
other military branches
|
gptkbp:develops |
cyber capabilities
cyber strategies cyber incident response plans cyber threat models cyber resilience strategies |
gptkbp:developsStrategiesFor |
cyber defense
|
gptkbp:employs |
cyber tools
|
gptkbp:engagesIn |
cyber warfare
international partners cybersecurity research and development cyber threat hunting cyber policy development cyber risk management cyber research |
gptkbp:enhances |
military readiness
information security |
gptkbp:evaluates |
cyber vulnerabilities
|
gptkbp:focusesOn |
information assurance
|
gptkbp:formed |
2010
|
gptkbp:headquarters |
gptkb:Fort_Belvoir
|
https://www.w3.org/2000/01/rdf-schema#label |
Army Cyber Group
|
gptkbp:implements |
cyber policies
|
gptkbp:mission |
cyber operations
|
gptkbp:monitors |
cyber activities
|
gptkbp:operates |
cybersecurity
cyber defense operations cyber operations centers |
gptkbp:operatesIn |
cyber domain
|
gptkbp:participatesIn |
joint operations
training exercises cybersecurity initiatives cyber competitions |
gptkbp:partOf |
gptkb:United_States_Army
|
gptkbp:protectedArea |
military networks
|
gptkbp:provides |
cybersecurity solutions
cyber defense cyber threat assessments cybersecurity awareness training incident response support cyber training programs |
gptkbp:providesSupportFor |
military operations
|
gptkbp:providesTrainingFor |
soldiers
|
gptkbp:railwayLine |
cyber personnel
|
gptkbp:respondsTo |
cyber threats
|
gptkbp:supports |
gptkb:Department_of_Defense
intelligence operations national security objectives critical infrastructure protection military cyber strategy military operations globally |
gptkbp:utilizes |
advanced technology
|
gptkbp:worksWith |
private sector
law enforcement agencies |