Statements (77)
Predicate | Object |
---|---|
gptkbp:instanceOf |
concept
|
gptkbp:alsoKnownAs |
cyber warfare
|
gptkbp:debatedBy |
policy makers
governments legal scholars cybersecurity experts military strategists |
gptkbp:firstMajorIncident |
gptkb:Estonia_cyberattacks_2007
|
gptkbp:governedBy |
gptkb:international_relations
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyberwar
|
gptkbp:involves |
cyberattacks
networks attacks on information systems use of computers |
gptkbp:method |
botnets
malware phishing worms DNS spoofing denial-of-service attacks man-in-the-middle attacks SQL injection data exfiltration social engineering disinformation campaigns supply chain attacks zero-day exploits credential theft rootkits website defacement data breaches logic bombs network intrusions trojans |
gptkbp:notableEvent |
gptkb:2015_Ukraine_power_grid_cyberattack
gptkb:Operation_Aurora gptkb:WannaCry_ransomware_attack gptkb:Stuxnet gptkb:Sony_Pictures_hack |
gptkbp:purpose |
gptkb:propaganda
espionage sabotage data theft infrastructure disruption disrupt activities of organizations or states |
gptkbp:relatedTo |
gptkb:military
cybercrime cybersecurity information warfare |
gptkbp:studiedBy |
gptkb:government
gptkb:government_agency gptkb:law_enforcement historians international organizations journalists universities intelligence agencies think tanks non-governmental organizations cybersecurity researchers military academies defense contractors ethical hackers blue teams red teams security operations centers white hat hackers military analysts cyber defense teams cyber threat intelligence analysts |
gptkbp:target |
gptkb:government
gptkb:government_agency individuals critical infrastructure military systems |
gptkbp:bfsParent |
gptkb:Vice
|
gptkbp:bfsLayer |
4
|