Statements (67)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_unit
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:The_Cybermen
|
gptkbp:challenges |
rapidly evolving cyber threats
|
gptkbp:collaborated_with |
foreign allies
|
gptkbp:collaborates_with |
gptkb:National_Security_Agency
|
gptkbp:conducts |
cyber exercises
|
gptkbp:coordinates |
other military branches
|
gptkbp:develops |
cyber capabilities
|
gptkbp:engages_in |
research and development
defensive cyber operations offensive cyber operations |
gptkbp:established |
gptkb:2010
|
gptkbp:focuses_on |
cybersecurity
emerging technologies |
gptkbp:has_goal |
enhance national security
|
gptkbp:has_impact_on |
national defense strategy
|
gptkbp:has_mission |
protect U. S. interests in cyberspace
|
gptkbp:has_role |
cyber warfare
|
gptkbp:headquartered_in |
gptkb:Fort_Meade,_Maryland
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber-Command Unit
|
gptkbp:involved_units |
cyber protection teams
|
gptkbp:is_engaged_in |
cyber education initiatives
|
gptkbp:is_evaluated_by |
gptkb:Police_Department
|
gptkbp:is_involved_in |
cybersecurity research
cybersecurity risk management cyber threat analysis information warfare cyber threat mitigation cybersecurity awareness training cybersecurity policy advocacy cybersecurity threat intelligence sharing cybersecurity awareness campaigns cyber defense operations cyber incident response cybersecurity incident response planning cyber policy development cyber training programs cybersecurity strategy development cybersecurity threat assessment cybersecurity technology development cybersecurity incident management cybersecurity compliance efforts cyber resilience efforts cybersecurity training and exercises cybersecurity vulnerability assessments |
gptkbp:is_part_of |
U. S. Cyber Command structure
U. S. military structure |
gptkbp:is_subject_to |
gptkb:military_unit
|
gptkbp:is_supported_by |
gptkb:government_agency
cybersecurity workforce |
gptkbp:is_tasked_with |
defending critical infrastructure
developing cyber policy |
gptkbp:led_to |
four-star general
|
gptkbp:operates_in |
global cyberspace
|
gptkbp:operates_under |
gptkb:Police_Department
|
gptkbp:part_of |
gptkb:United_States_Cyber_Command
|
gptkbp:participates_in |
international cyber operations
|
gptkbp:partnerships |
academic institutions
|
gptkbp:provides |
cyber intelligence
|
gptkbp:railway_line |
cyber personnel
|
gptkbp:receives_funding_from |
gptkb:legislation
|
gptkbp:responds_to |
cyber threats
|
gptkbp:responsible_for |
cyber defense strategy
|
gptkbp:supports |
gptkb:military_operation
|
gptkbp:utilizes |
gptkb:advanced_technology
|
gptkbp:works_with |
private sector partners
|