gptkbp:instanceOf
|
gptkb:sword
|
gptkbp:canBe
|
gptkb:Dragon
gptkb:virus
gptkb:Trojan_Horse
malware
Keylogger
Spyware
Exploit
Rootkit
Botnet
Denial-of-Service Tool
Phishing Tool
Zero-Day Exploit
|
gptkbp:cause
|
Espionage
Service Disruption
Financial Loss
Data Theft
System Damage
|
gptkbp:debatedBy
|
gptkb:Ethics
gptkb:International_Relations
Cybersecurity Policy
|
gptkbp:example
|
gptkb:Flame
gptkb:BlackEnergy
gptkb:NotPetya
gptkb:WannaCry
gptkb:Stuxnet
gptkb:Duqu
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cyber Weapons
|
gptkbp:regulates
|
gptkb:International_Law
National Law
|
gptkbp:relatedTo
|
gptkb:Information_Warfare
Critical Infrastructure Protection
Electronic Warfare
Digital Espionage
Hybrid Warfare
|
gptkbp:target
|
gptkb:Critical_Infrastructure
gptkb:Industrial_Control_Systems
Networks
Computer Systems
Personal Devices
|
gptkbp:usedBy
|
gptkb:Hackers
Criminal Organizations
Nation States
Terrorist Groups
|
gptkbp:usedFor
|
gptkb:Sabotage
gptkb:Cyberwarfare
Espionage
Disruption
|
gptkbp:bfsParent
|
gptkb:The_Cybermen
|
gptkbp:bfsLayer
|
6
|