Statements (58)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:war
Cybersecurity concept |
gptkbp:emergedIn |
Late 20th century
|
gptkbp:field |
gptkb:military
Information security |
gptkbp:goal |
gptkb:Sabotage
gptkb:Propaganda gptkb:Coercion Espionage Destruction Disruption Destabilization Theft of information |
https://www.w3.org/2000/01/rdf-schema#label |
Cyberwarfare
|
gptkbp:involves |
gptkb:Internet
Computer networks malware Phishing Social engineering Hacking Telecommunications infrastructure Botnet Critical infrastructure attack Data breach Denial-of-service attack Zero-day exploit |
gptkbp:notableExample |
gptkb:2015_Ukraine_power_grid_cyberattack
gptkb:Operation_Aurora gptkb:WannaCry_ransomware_attack gptkb:NotPetya_cyberattack gptkb:Stuxnet gptkb:Sony_Pictures_hack gptkb:Estonia_2007_cyberattacks |
gptkbp:opposedBy |
International cooperation
Cyber defense Incident response Cyber intelligence Cybersecurity policy |
gptkbp:practicedIn |
Military organizations
Terrorist organizations Hacktivist groups Nation-states |
gptkbp:regulates |
gptkb:international_relations
gptkb:Tallinn_Manual |
gptkbp:relatedTo |
Information warfare
Electronic warfare Cyberattack Cyberespionage Cyberterrorism |
gptkbp:studiedBy |
Cybersecurity researchers
Policy makers Military analysts |
gptkbp:threats |
Public safety
National security Economic stability Critical infrastructure |
gptkbp:bfsParent |
gptkb:Cyberwarfare_Tools
|
gptkbp:bfsLayer |
5
|