Statements (267)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:fictional_character
gptkb:character |
gptkbp:access |
secure networks
|
gptkbp:age |
gptkb:Unknown
approximately 24 years old in the first book |
gptkbp:allies |
gptkb:Mikael_Blomkvist
|
gptkbp:analyzes |
security vulnerabilities
network traffic |
gptkbp:appears_in |
gptkb:The_Girl_with_the_Dragon_Tattoo
gptkb:The_Girl_Who_Played_with_Fire gptkb:The_Girl_Who_Kicked_the_Hornet's_Nest |
gptkbp:associated_with |
gptkb:Mikael_Blomkvist
|
gptkbp:can_be_used_to |
open-source intelligence
|
gptkbp:can_bypass |
firewalls
|
gptkbp:can_conduct |
security assessments
security training phishing attacks |
gptkbp:can_create |
security policies
hacking tools |
gptkbp:can_perform |
system audits
|
gptkbp:community_involvement |
despite trauma
|
gptkbp:conflict |
Abuse
|
gptkbp:controls |
gptkb:computer
|
gptkbp:created_by |
gptkb:Stieg_Larsson
|
gptkbp:development |
gptkb:security
penetration testing strategies |
gptkbp:family |
gptkb:Unknown
|
gptkbp:famous_quote |
I’m not a hero.
|
gptkbp:financial_support |
PTSD
Asperger syndrome |
gptkbp:first_appearance |
gptkb:2005
gptkb:The_Girl_with_the_Dragon_Tattoo |
gptkbp:gender |
gptkb:Female
|
gptkbp:has_ability |
data retrieval
|
gptkbp:has_access_to |
dark web
advanced hacking resources hacking communities |
gptkbp:has_adaptation |
gptkb:television_series
gptkb:television gptkb:film gptkb:film_series Graphic novels |
gptkbp:has_appearance |
Piercings
Tattoos |
gptkbp:has_appearance_in |
gptkb:The_Girl_Who_Played_with_Fire
gptkb:The_Girl_in_the_Spider's_Web gptkb:The_Girl_Who_Kicked_the_Hornet's_Nest |
gptkbp:has_backstory |
Institutionalization
Abuse in childhood |
gptkbp:has_conflict_with |
gptkb:Mikael_Blomkvist
gptkb:corruption Patriarchy Zala Bjurman Abusers |
gptkbp:has_experience_in |
gptkb:Trauma
gptkb:Survival incident response Abuse ethical hacking penetration testing cyber threat intelligence |
gptkbp:has_family |
gptkb:father
gptkb:Mother gptkb:Sister brother Zala Holger Palmgren unknown father unknown mother |
gptkbp:has_fan_base |
global
Global audience |
gptkbp:has_goal |
Expose corruption
Seek justice Protect the innocent |
gptkbp:has_occupation |
gptkb:Espionage
Investigator |
gptkbp:has_psychological_issues |
PTSD
|
gptkbp:has_relationship_with |
gptkb:Miriam_Wu
gptkb:Mikael_Blomkvist gptkb:Cameron gptkb:Dragan_Armansky gptkb:Lisbeth_Salander's_father Zala Holger Palmgren Bjurman Lisbeth's father Lisbeth's mother Lisbeth Salander's mother |
gptkbp:has_skill |
gptkb:crypt
gptkb:martial_arts gptkb:investigation Computer programming Martial arts data analysis computer networks computer programming social engineering computer hacking surveillance forensic analysis hacking Social engineering network security protocols photographic memory |
gptkbp:has_symbol |
gptkb:Dragon
dragon tattoo |
gptkbp:has_theme |
gptkb:Revenge
gptkb:Justice gptkb:feminism |
gptkbp:has_worked_with |
law enforcement agencies
high-profile cases cybersecurity teams cybersecurity projects hacktivist groups |
https://www.w3.org/2000/01/rdf-schema#label |
Lisbeth Salander
|
gptkbp:inspiration |
gptkb:feminism
|
gptkbp:is_a |
gptkb:Espionage
gptkb:Detective Anti-hero Feminist icon Cyberpunk character Social outcast |
gptkbp:is_a_resource_for |
information gathering
in dangerous situations |
gptkbp:is_a_tool_for |
gptkb:crypt
|
gptkbp:is_acclaimed_for |
as a literary character
|
gptkbp:is_adept_at |
self-defense
|
gptkbp:is_associated_with |
gptkb:The_Millennium_Group
gptkb:Millennium_magazine gptkb:social_justice gptkb:feminism Journalism Crime investigation anti-establishment |
gptkbp:is_capable_of |
data encryption
data mining conducting threat assessments conducting forensic investigations creating malware remote hacking |
gptkbp:is_connected_to |
social issues
|
gptkbp:is_considered_as |
gptkb:anti-hero
|
gptkbp:is_expert_in |
cybersecurity
|
gptkbp:is_explored_in |
gptkb:literary_analysis
|
gptkbp:is_featured_in |
graphic novels
|
gptkbp:is_implemented_in |
security measures
|
gptkbp:is_influenced_by |
gptkb:feminism
Goth subculture Feminist literature Cyberpunk culture |
gptkbp:is_influential_in |
gptkb:popular_culture
|
gptkbp:is_inspired_by |
real-life hackers
|
gptkbp:is_involved_in |
cyber investigations
|
gptkbp:is_known_for |
gptkb:intelligence
gptkb:Indian_independence_movement gptkb:Resilience computer programming Resourcefulness solving complex problems her intelligence Her intelligence Vigilante justice her resilience vigilante justice Her resilience solving complex cases Her resourcefulness complex backstory her unconventional methods Her independence unconventional methods her strategic thinking her investigative skills her technical skills her problem-solving abilities her analytical thinking her troubled past her unconventional appearance Her photographic memory Her unconventional appearance |
gptkbp:is_motivated_by |
gptkb:justice
|
gptkbp:is_part_of |
gptkb:Millennium_series
Crime fiction genre Thriller genre crime fiction genre |
gptkbp:is_popular_in |
gptkb:C_programming_language
cloud security data protection regulations cyber laws malware detection techniques |
gptkbp:is_portrayed_as |
gptkb:Claire_Foy
gptkb:Rooney_Mara gptkb:Noomi_Rapace |
gptkbp:is_recognized_as |
iconic character
a cybersecurity expert a leading hacker. a top hacker |
gptkbp:is_recognized_by |
security flaws
|
gptkbp:is_set_in |
gptkb:Sweden
|
gptkbp:is_symbolic_of |
gptkb:Resistance
Empowerment female empowerment Survivorship |
gptkbp:known_for |
Investigating crimes
investigative skills |
gptkbp:lives_in |
gptkb:Stockholm
|
gptkbp:nationality |
gptkb:Swedish
|
gptkbp:notable_for |
Investigative skills
|
gptkbp:notable_traits |
Tattooed
|
gptkbp:occupation |
gptkb:Espionage
|
gptkbp:personality_trait |
determined
intelligent resourceful Introverted rebellious introverted |
gptkbp:portrayed_by |
gptkb:Claire_Foy
gptkb:Rooney_Mara gptkb:Noomi_Rapace |
gptkbp:protagonist |
gptkb:Millennium_series
|
gptkbp:relationship_with |
gptkb:Mikael_Blomkvist
|
gptkbp:residence |
gptkb:Stockholm
|
gptkbp:series |
gptkb:Millennium_series
|
gptkbp:series_role |
gptkb:protagonist
|
gptkbp:skills |
gptkb:crypt
gptkb:whistleblowing gptkb:investigation gptkb:deception gptkb:networking gptkb:security gptkb:mask problem-solving critical thinking cybersecurity data analysis application security cloud security computer programming data protection incident management incident response network security risk assessment self-defense social engineering strategic planning malware analysis ethical hacking penetration testing vulnerability assessment information retrieval surveillance network analysis digital forensics digital rights advocacy data protection strategies forensics Computer hacking SQL injection |
gptkbp:support |
gptkb:Plague
|
gptkbp:team |
Asperger syndrome
|
gptkbp:utilized |
VPNs for anonymity
social media for hacking |
gptkbp:bfsParent |
gptkb:The_Girl_with_the_Dragon_Tattoo
gptkb:mystery |
gptkbp:bfsLayer |
4
|