|
gptkbp:instanceOf
|
gptkb:war
gptkb:Cybersecurity_concept
|
|
gptkbp:emergedIn
|
Late 20th century
|
|
gptkbp:field
|
gptkb:military
Information security
|
|
gptkbp:goal
|
gptkb:Sabotage
gptkb:Propaganda
gptkb:Coercion
Espionage
Destruction
Disruption
Destabilization
Theft of information
|
|
gptkbp:involves
|
gptkb:Denial-of-service_attack
gptkb:Internet
gptkb:malware
gptkb:Telecommunications_infrastructure
Computer networks
Phishing
Social engineering
Hacking
Botnet
Critical infrastructure attack
Data breach
Zero-day exploit
|
|
gptkbp:notableExample
|
gptkb:2015_Ukraine_power_grid_cyberattack
gptkb:Operation_Aurora
gptkb:WannaCry_ransomware_attack
gptkb:NotPetya_cyberattack
gptkb:Stuxnet
gptkb:Sony_Pictures_hack
gptkb:Estonia_2007_cyberattacks
|
|
gptkbp:opposedBy
|
International cooperation
Cyber defense
Incident response
Cyber intelligence
Cybersecurity policy
|
|
gptkbp:practicedIn
|
Military organizations
Terrorist organizations
Hacktivist groups
Nation-states
|
|
gptkbp:regulates
|
gptkb:international_relations
gptkb:Tallinn_Manual
|
|
gptkbp:relatedTo
|
gptkb:Cyberattack
Information warfare
Electronic warfare
Cyberespionage
Cyberterrorism
|
|
gptkbp:studiedBy
|
Cybersecurity researchers
Policy makers
Military analysts
|
|
gptkbp:threats
|
Public safety
National security
Economic stability
Critical infrastructure
|
|
gptkbp:bfsParent
|
gptkb:Second_Cold_War
|
|
gptkbp:bfsLayer
|
6
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cyberwarfare
|