Statements (75)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:cyber_operations
|
gptkbp:aims_to |
Protect National Security
|
gptkbp:analyzes |
Malware
Network Traffic Cyber Threats Phishing Attacks Cybersecurity Frameworks Cybersecurity Trends Cybersecurity Incidents |
gptkbp:collaborates_with |
gptkb:law_enforcement
Academic Institutions International Partners Other Intelligence Agencies |
gptkbp:conducts |
Cyber Espionage
Penetration Testing Security Audits Threat Assessments Vulnerability Assessments Cybersecurity Training Programs Cybersecurity Assessments Red Team Operations |
gptkbp:conducts_research_on |
Emerging Cyber Threats
|
gptkbp:coordinates_with |
Private Sector
|
gptkbp:develops |
gptkb:Cyber_Incident_Response_Teams
Cybersecurity Tools Cyber Capabilities Incident Response Plans Cybersecurity Frameworks Cybersecurity Policies Cybersecurity Standards Incident Management Procedures Cybersecurity Metrics |
gptkbp:develops_strategies_for |
Cyber Defense
|
gptkbp:employs |
Advanced Technologies
|
gptkbp:engages_in |
gptkb:forensic_science
Cybersecurity Research Information Warfare Offensive Cyber Operations Supply Chain Security Data Breach Response Network Defense Cyber Threat Hunting Cybersecurity Policy Advocacy Incident Response Drills |
gptkbp:evaluates |
Cyber Vulnerabilities
|
gptkbp:focuses_on |
gptkb:Cybersecurity
|
https://www.w3.org/2000/01/rdf-schema#label |
CIA Cyber Operations
|
gptkbp:implements |
Security Protocols
|
gptkbp:involves |
Intelligence Gathering
|
gptkbp:is_involved_in |
Counterterrorism
|
gptkbp:maintains |
Cyber Intelligence Databases
|
gptkbp:monitors |
Emerging Technologies
Cyber Activities Social Media Threats |
gptkbp:operates_in |
Global Cyber Space
|
gptkbp:part_of |
gptkb:CIA
|
gptkbp:participates_in |
Cyber Exercises
Cybersecurity Conferences International Cybersecurity Initiatives |
gptkbp:provides |
gptkb:military_intelligence
Technical Assistance Cyber Training Cybersecurity Awareness Training |
gptkbp:reports_to |
gptkb:U._S._Government
|
gptkbp:responds_to |
Cyber Attacks
|
gptkbp:responsible_for |
Cyber Risk Management
|
gptkbp:supports |
gptkb:military_operations
Critical Infrastructure Protection Cybersecurity Legislation Cyber Policy Development |
gptkbp:trains |
Cyber Personnel
|
gptkbp:utilizes |
gptkb:Data_Analytics
Cyber Tools |
gptkbp:bfsParent |
gptkb:Central_Intelligence
|
gptkbp:bfsLayer |
5
|