Statements (71)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_unit
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:military_unit
|
gptkbp:analyzes |
Network Traffic
|
gptkbp:collaborates_with |
International Partners
Intelligence Agencies Cybersecurity Firms |
gptkbp:composed_of |
gptkb:Cyber_Operators
|
gptkbp:conducts |
Threat Assessments
Vulnerability Assessments Cybersecurity Assessments Cybersecurity Drills Cyber Risk Assessments Cybersecurity Training Exercises Red Team Exercises |
gptkbp:coordinates |
Other Military Units
|
gptkbp:develops |
Incident Response Plans
Cyber Defense Strategies Cybersecurity Frameworks Cybersecurity Policies Cyber Resilience Plans |
gptkbp:engages_in |
gptkb:Company
gptkb:archive Penetration Testing Cyber Threat Hunting |
gptkbp:focuses_on |
gptkb:Company
Cybersecurity Awareness Cyber Defense Training National Cybersecurity |
https://www.w3.org/2000/01/rdf-schema#label |
Special Forces Cyber Teams
|
gptkbp:is_engaged_in |
Cyber Operations Planning
Cybersecurity Operations Coordination |
gptkbp:is_equipped_with |
Advanced Cyber Tools
|
gptkbp:is_involved_in |
gptkb:concert_tour
Cyber Espionage Cybersecurity Research and Development Cybersecurity Innovation Cyber Policy Development Cybersecurity Compliance Cyber Incident Management Cybersecurity Strategy Development |
gptkbp:is_part_of |
gptkb:Company
|
gptkbp:is_tasked_with |
Protecting Critical Infrastructure
Mitigating Cyber Threats Cybersecurity Threat Mitigation |
gptkbp:monitors |
Cyber Infrastructure
|
gptkbp:operates_in |
gptkb:military_unit
gptkb:Monarch Global Cyber Environment |
gptkbp:operates_under |
gptkb:National_Security_Agency
gptkb:Police_Department |
gptkbp:part_of |
gptkb:United_States_Armed_Forces
|
gptkbp:participates_in |
Cybersecurity Research
Joint Exercises Cybersecurity Training Programs Cybersecurity Awareness Campaigns |
gptkbp:provides |
gptkb:Company
Cybersecurity Support Cybersecurity Expertise |
gptkbp:railway_line |
Information Warfare
|
gptkbp:reports_to |
gptkb:Company
|
gptkbp:responds_to |
Cyber Threats
|
gptkbp:responsible_for |
Cyber Defense Operations
|
gptkbp:supports |
gptkb:military_operation
|
gptkbp:training |
Network Defense
Cyber Intelligence Gathering |
gptkbp:uses |
Encryption Techniques
|
gptkbp:utilizes |
gptkb:software
Advanced Technology Malware Analysis Tools |
gptkbp:works_with |
Private Sector Companies
|