Statements (74)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:terrorist_attack
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:CVE-2021-3449
gptkb:CVE-2021-45046 gptkb:CVE-2021-45105 |
gptkbp:affects |
gptkb:High_School
|
gptkbp:can_be |
social engineering attacks
insufficient resources network misconfigurations lack of security measures system overload inadequate bandwidth poor network configuration poorly configured servers vulnerable applications |
gptkbp:can_lead_to |
financial loss
|
gptkbp:caused_by |
service disruption
|
gptkbp:challenges |
gptkb:Cloud_Computing_Service
|
gptkbp:convicted_of |
exploitation of vulnerabilities
HTTP flood TCPSYN flood UDP flood flooding techniques |
gptkbp:first_introduced |
data breaches
|
gptkbp:focuses_on |
cybersecurity legislation
|
gptkbp:form |
attack vector
service attack |
https://www.w3.org/2000/01/rdf-schema#label |
Denial of Service (Do S)
|
gptkbp:is_analyzed_in |
cybersecurity research papers
forensic tools |
gptkbp:is_associated_with |
extortion attacks
|
gptkbp:is_different_from |
Distributed Denial of Service (D Do S)
|
gptkbp:is_discussed_in |
cybersecurity forums
IT security conferences cybersecurity blogs |
gptkbp:is_effective_against |
gptkb:Educational_Institution
government websites |
gptkbp:is_often_associated_with |
cybersecurity training
hacktivism |
gptkbp:is_often_used_in |
cyber warfare
botnets |
gptkbp:is_part_of |
gptkb:Company
disaster recovery plans incident response plans |
gptkbp:is_protected_by |
load balancing
rate limiting intrusion detection systems firewalls network redundancy content delivery networks (CD Ns) |
gptkbp:is_used_for |
other cyber attacks
|
gptkbp:issues |
social media platforms
telecommunications companies e-commerce websites internet security online gaming platforms |
gptkbp:legal_issue |
gptkb:theorem
|
gptkbp:performed_by |
criminal organizations
individual hackers |
gptkbp:recognizes |
traffic analysis
anomaly detection systems |
gptkbp:reports_to |
gptkb:Police_Department
security incidents |
gptkbp:scientific_classification |
protocol attack
application layer attack volumetric attack |
gptkbp:subject |
research in computer science
|
gptkbp:tactics |
gptkb:political_movement
|
gptkbp:targets |
security audits
web servers |
gptkbp:threats |
online services
|
gptkbp:type_of |
gptkb:terrorist_attack
malicious activity malware attack |