Statements (54)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:affects |
gptkb:smartphone
gptkb:software Computer Systems |
gptkbp:can_be |
Financial Loss
System Downtime Loss of Privacy |
gptkbp:can_lead_to |
Identity Theft
|
gptkbp:caused_by |
Data Corruption
|
gptkbp:distribution |
Social Engineering
USB Drives |
gptkbp:exported_to |
Email Attachments
Malicious Downloads |
https://www.w3.org/2000/01/rdf-schema#label |
Digital Virus
|
gptkbp:is_analyzed_in |
Dynamic Analysis
Static Analysis Behavioral Analysis |
gptkbp:is_often_made_with |
Cybercriminals
|
gptkbp:is_protected_by |
gptkb:concert_tour
gptkb:software Encryption Firewalls Network Monitoring Regular Software Updates Regular Audits Security Policies Penetration Testing Incident Reporting Threat Hunting User Education Incident Response Plans Network Segmentation Access Controls Data Loss Prevention Tools Incident Response Training Application Whitelisting Data Backups User Access Reviews |
gptkbp:is_vulnerable_to |
Software Vulnerabilities
|
gptkbp:recognizes |
Antivirus Programs
|
gptkbp:replaced_by |
gptkb:virus
|
gptkbp:scientific_classification |
gptkb:Trojan_Horse
Ransomware Adware Spyware Worm Boot Sector Virus File Infector Macro Virus Multipartite Virus Polymorphic Virus |
gptkbp:type_of |
Malware
|
gptkbp:bfsParent |
gptkb:X._A._N._A.
|
gptkbp:bfsLayer |
5
|