gptkbp:instanceOf
|
gptkb:academic
gptkb:military_operation
|
gptkbp:component
|
information operations
hybrid warfare
modern military strategy
|
gptkbp:emergedIn
|
late 20th century
|
gptkbp:goal
|
gather intelligence
disrupt enemy systems
influence adversaries
protect own systems
|
gptkbp:hasDoctrine
|
gptkb:Tallinn_Manual
gptkb:NATO_Cyber_Defence_Policy
gptkb:US_Department_of_Defense_Cyber_Operations_Doctrine
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cyber Operations
|
gptkbp:includes
|
cyber defense
cybercrime
defensive cyber operations
offensive cyber operations
cyber attack
|
gptkbp:involves
|
gptkb:cyber_command
cyber mission force
cyber defense teams
cyber attack teams
|
gptkbp:practicedIn
|
gptkb:government
gptkb:government_agency
intelligence agencies
military organizations
|
gptkbp:regulates
|
gptkb:international_relations
gptkb:law
|
gptkbp:relatedEvent
|
gptkb:2016_US_election_interference
gptkb:NotPetya
gptkb:Operation_Olympic_Games
gptkb:Stuxnet
|
gptkbp:relatedTo
|
cybercrime
cybersecurity
information warfare
computer network operations
|
gptkbp:studiedIn
|
gptkb:Norwegian_Defence_Cyber_Academy
various universities
United States Air Force Academy
|
gptkbp:threats
|
national security
public safety
critical infrastructure
economic stability
|
gptkbp:uses
|
malware
phishing
denial-of-service attacks
social engineering
exploits
|
gptkbp:bfsParent
|
gptkb:168th_Cyber_Operations_Squadron
gptkb:185th_Cyber_Operations_Squadron
gptkb:236th_Cyber_Operations_Squadron
gptkb:781st_Military_Intelligence_Battalion
|
gptkbp:bfsLayer
|
6
|