Statements (62)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_personnel
|
gptkbp:analyzes |
gptkb:virus
cyber threats cybersecurity frameworks network traffic |
gptkbp:collaborates_with |
gptkb:international_partners
academic institutions intelligence agencies |
gptkbp:conducts |
security audits
risk assessments forensic analysis offensive cyber operations |
gptkbp:coordinates_with |
law enforcement agencies
|
gptkbp:created |
cyber threat intelligence
|
gptkbp:defending_champion |
cyber attacks
|
gptkbp:develops |
cyber hygiene practices
cyber defense strategies incident response plans cybersecurity awareness programs cyber resilience strategies malware analysis techniques |
gptkbp:employs |
gptkb:advanced_technology
|
gptkbp:engages_in |
gptkb:Espionage
penetration testing digital forensics information warfare threat hunting vulnerability disclosure programs network defense cyber threat modeling social engineering defense |
gptkbp:evaluates |
vulnerabilities
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Soldiers
|
gptkbp:monitors |
cyber infrastructure
social media for threats |
gptkbp:operates_in |
cloud environments
virtual environments cyber domain |
gptkbp:operates_under |
gptkb:military_leadership
rules of engagement |
gptkbp:participates_in |
joint military exercises
cybersecurity research cyber exercises cybersecurity competitions cyber policy development |
gptkbp:provides |
cybersecurity training
|
gptkbp:provides_training_for |
cybersecurity
|
gptkbp:responds_to |
cyber incidents
|
gptkbp:supports |
gptkb:national_security
cybersecurity legislation |
gptkbp:uses |
cyber warfare techniques
|
gptkbp:utilizes |
data analytics
encryption technologies firewalls incident management systems security information and event management (SIEM) systems penetration testing tools |
gptkbp:works_with |
private sector companies
|
gptkbp:bfsParent |
gptkb:United_States_Army_Cyber_Command
gptkb:U._S._Army_Cyber_Operations gptkb:33rd_Signal_Battalion |
gptkbp:bfsLayer |
6
|