gptkbp:instanceOf
|
gptkb:crime
|
gptkbp:alsoKnownAs
|
Computer Crime
|
gptkbp:cause
|
Data Loss
Financial Loss
Privacy Violation
Reputational Damage
|
gptkbp:foughtIn
|
Law Enforcement Agencies
|
gptkbp:hasLegalFramework
|
gptkb:General_Data_Protection_Regulation_(GDPR)
gptkb:Budapest_Convention_on_Cybercrime
gptkb:Computer_Fraud_and_Abuse_Act_(USA)
gptkb:Information_Technology_Act_(India)
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cyber Crime
|
gptkbp:includes
|
gptkb:Data_Breach
Phishing
Identity Theft
Cyberbullying
Hacking
Child Exploitation
Cyberstalking
Denial of Service Attack
Intellectual Property Theft
Malware Distribution
Online Fraud
Ransomware Attack
|
gptkbp:influencedBy
|
Global
|
gptkbp:investigatedBy
|
Cyber Crime Units
|
gptkbp:involves
|
gptkb:Internet
gptkb:network_protocol
gptkb:personal_computer
Digital Device
|
gptkbp:penalty
|
Imprisonment
Fines
|
gptkbp:prevention
|
Firewalls
Antivirus Software
Cybersecurity Measures
Regular Software Updates
Strong Passwords
User Awareness
|
gptkbp:regulates
|
Cyber Laws
|
gptkbp:relatedTo
|
gptkb:Information_Security
Digital Forensics
Internet Law
|
gptkbp:studiedBy
|
Law Enforcement
Criminologists
Cybersecurity Experts
|
gptkbp:target
|
gptkb:Critical_Infrastructure
Organizations
Governments
Individuals
|
gptkbp:trend
|
Increasing Incidents
|
gptkbp:bfsParent
|
gptkb:FBI_Washington_Field_Office
|
gptkbp:bfsLayer
|
7
|