|
gptkbp:instanceOf
|
gptkb:concept
|
|
gptkbp:cause
|
gptkb:Sabotage
Espionage
Data Breaches
Financial Loss
Infrastructure Disruption
|
|
gptkbp:debatedBy
|
gptkb:International_Relations
Ethics of Cyberwarfare
Information Security Communities
|
|
gptkbp:evolvesFrom
|
Traditional Hacking Tools
|
|
gptkbp:includes
|
gptkb:Worms
gptkb:malware
Viruses
Spyware
Rootkits
Botnets
Denial-of-Service Attacks
Phishing Tools
Zero-day Exploits
|
|
gptkbp:introducedIn
|
Late 20th Century
|
|
gptkbp:notableExample
|
gptkb:Flame
gptkb:BlackEnergy
gptkb:NotPetya
gptkb:Olympic_Destroyer
gptkb:WannaCry
gptkb:Stuxnet
gptkb:Duqu
Equation Group Tools
|
|
gptkbp:opposedBy
|
Firewalls
Intrusion Detection Systems
Encryption
Antivirus Software
Cybersecurity Policies
|
|
gptkbp:regulates
|
gptkb:International_Law
National Legislation
|
|
gptkbp:relatedTo
|
gptkb:Cyberwarfare
gptkb:malware
Cybersecurity
Hacking
|
|
gptkbp:threats
|
gptkb:Critical_Infrastructure
National Security
Personal Privacy
|
|
gptkbp:usedBy
|
gptkb:Hacktivists
Cybercriminals
Nation States
Terrorist Organizations
|
|
gptkbp:usedFor
|
Cyberattacks
|
|
gptkbp:bfsParent
|
gptkb:Codex:_Grey_Knights
|
|
gptkbp:bfsLayer
|
8
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Digital Weapons
|