Statements (68)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:war
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Capt._John_Connor
|
gptkbp:addressed |
Cybersecurity measures
|
gptkbp:affects |
Civilian populations
|
gptkbp:can_be |
Geopolitical tensions
Diplomatic conflicts |
gptkbp:can_lead_to |
Loss of life
Loss of trust in institutions Economic damage |
gptkbp:challenges |
gptkb:Police_Department
Governments Private sector |
gptkbp:conducted |
Social media
Dark web Non-state actors State actors |
gptkbp:facilitates |
Internet connectivity
|
gptkbp:focuses_on |
International cooperation
Intelligence agencies |
gptkbp:form |
Asymmetric warfare
|
gptkbp:game_components |
Hybrid warfare
|
https://www.w3.org/2000/01/rdf-schema#label |
Cybernetic Warfare
|
gptkbp:influence |
gptkb:Public_opinion
|
gptkbp:investment |
Election security
|
gptkbp:involves |
gptkb:healthcare_organization
Cyber attacks Information warfare |
gptkbp:is_a_tool_for |
Political leverage
|
gptkbp:is_affected_by |
Military operations
|
gptkbp:is_characterized_by |
Anonymity of attackers
|
gptkbp:is_countered_by |
Cyber intelligence
|
gptkbp:is_effective_against |
Critical services
|
gptkbp:is_evaluated_by |
Public awareness
|
gptkbp:is_influenced_by |
Technological advancements
Cultural factors |
gptkbp:is_involved_in |
gptkb:Detective
gptkb:Sabotage Data breaches Identity theft Supply chain attacks Ransomware attacks |
gptkbp:is_often_associated_with |
Cyber terrorism
State-sponsored hacking |
gptkbp:is_part_of |
Cyber operations
Modern warfare tactics |
gptkbp:is_protected_by |
Cyber defense strategies
|
gptkbp:is_studied_in |
Cybersecurity research
|
gptkbp:is_used_for |
Propaganda purposes
|
gptkbp:is_vulnerable_to |
Human error
Vulnerabilities in software |
gptkbp:issues |
gptkb:Embassy
gptkb:National_security Human rights advocates Corporate security |
gptkbp:occupation |
gptkb:battle
|
gptkbp:origin |
Emerging technologies
|
gptkbp:regulates |
gptkb:legal_case
|
gptkbp:subject |
Academic research
Policy discussions Legal debates Public policy initiatives |
gptkbp:targets |
Critical infrastructure
|
gptkbp:threats |
Global stability
|
gptkbp:utilizes |
Malware
Phishing attacks Denial-of-service attacks |
gptkbp:was_a_factor_in |
Military strategy development
|