Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
concept
|
gptkbp:cause |
gptkb:Sabotage
Espionage Data Breaches Financial Loss Infrastructure Disruption |
gptkbp:debatedBy |
gptkb:International_Relations
Ethics of Cyberwarfare Information Security Communities |
gptkbp:evolvesFrom |
Traditional Hacking Tools
|
https://www.w3.org/2000/01/rdf-schema#label |
Digital Weapons
|
gptkbp:includes |
gptkb:Worms
malware Viruses Spyware Rootkits Botnets Denial-of-Service Attacks Phishing Tools Zero-day Exploits |
gptkbp:introducedIn |
Late 20th Century
|
gptkbp:notableExample |
gptkb:Flame
gptkb:BlackEnergy gptkb:NotPetya gptkb:Olympic_Destroyer gptkb:WannaCry gptkb:Stuxnet gptkb:Duqu Equation Group Tools |
gptkbp:opposedBy |
Firewalls
Intrusion Detection Systems Encryption Antivirus Software Cybersecurity Policies |
gptkbp:regulates |
gptkb:International_Law
National Legislation |
gptkbp:relatedTo |
gptkb:Cyberwarfare
malware Cybersecurity Hacking |
gptkbp:threats |
gptkb:Critical_Infrastructure
National Security Personal Privacy |
gptkbp:usedBy |
gptkb:Hacktivists
Cybercriminals Nation States Terrorist Organizations |
gptkbp:usedFor |
Cyberattacks
|
gptkbp:bfsParent |
gptkb:Codex:_Grey_Knights
|
gptkbp:bfsLayer |
6
|