Statements (102)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Operation_Glowing_Symphony
gptkb:Equation_Group gptkb:Nitro_Zeus |
gptkbp:collaborations |
NSA and Unit 8200
|
gptkbp:created_by |
delay Iran's nuclear program
|
gptkbp:defeated |
centrifuges
|
gptkbp:designed_by |
gptkb:Politician
gptkb:United_States |
gptkbp:developed_by |
gptkb:Politician
gptkb:United_States gptkb:Unit_8200 sabotage 2005 to 2010 delay Iran's nuclear program |
gptkbp:discovered_by |
gptkb:virus
gptkb:2010 |
gptkbp:distribution |
USB drives
|
gptkbp:examines |
gptkb:documentaries
government agencies |
gptkbp:example |
advanced persistent threat (APT)
|
gptkbp:exported_to |
USB drives
|
gptkbp:first_appearance |
2010 by the media
|
gptkbp:first_described_by |
gptkb:Virus_Blok_Ada
|
gptkbp:focus |
industrial control system security
|
gptkbp:has_impact_on |
gptkb:Embassy
uranium enrichment nuclear enrichment process |
gptkbp:has_influence_on |
cybersecurity policies
subsequent cyber attacks |
gptkbp:has_variants |
gptkb:Duqu
gptkb:Fire_Department |
https://www.w3.org/2000/01/rdf-schema#label |
Stuxnet
|
gptkbp:is_a |
gptkb:virus
advanced persistent threat (APT) targeted malware |
gptkbp:is_aimed_at |
gptkb:Natanz_facility
Iranian nuclear facilities |
gptkbp:is_analyzed_in |
gptkb:virus
cybersecurity research cybersecurity conferences cybersecurity experts various cybersecurity firms |
gptkbp:is_associated_with |
state-sponsored hacking
|
gptkbp:is_cited_in |
the first digital weapon
|
gptkbp:is_considered |
state-sponsored attack
set a precedent for future cyber attacks |
gptkbp:is_considered_as |
gptkb:military_operation
a form of cyber warfare a case study in cybersecurity first cyber weapon a landmark in cyber operations a prototype for future cyber weapons a significant event in cyber history a turning point in cyber conflict a warning for nations |
gptkbp:is_designed_to |
disrupt industrial control systems
|
gptkbp:is_discussed_in |
academic literature
security experts cybersecurity conferences |
gptkbp:is_known_for |
infected over 1000 computers
its sophisticated design highly sophisticated design |
gptkbp:is_linked_to |
the U. S. and Israeli governments
the concept of cyber deterrence |
gptkbp:is_part_of |
gptkb:Operation_Olympic_Games
gptkb:military_operation cyber warfare a larger geopolitical conflict the Stuxnet attack the digital arms race the evolution of cyber warfare |
gptkbp:is_referenced_in |
academic papers
|
gptkbp:is_related_to |
gptkb:Detective
|
gptkbp:is_vulnerable_to |
SCADA systems
programmable logic controllers (PL Cs) |
gptkbp:led_to |
increased awareness of cyber threats
new cybersecurity measures |
gptkbp:notable_for |
its complexity
its stealth capabilities its targeted approach |
gptkbp:outcome |
cybersecurity policy
|
gptkbp:religion |
caused physical damage
|
gptkbp:reports_to |
gptkb:Symantec
gptkb:The_New_York_Times |
gptkbp:security_features |
gptkb:Siemens_software
|
gptkbp:series |
cyber attacks
|
gptkbp:significant_event |
cyber warfare history
|
gptkbp:social_responsibility |
Windows operating systems
|
gptkbp:subject |
gptkb:documentaries
|
gptkbp:targets |
gptkb:Siemens_Step_7_software
Siemens PL Cs |
gptkbp:technique |
spear phishing
|
gptkbp:type_of |
cyber weapon
|
gptkbp:uses |
peer-to-peer communication
zero-day vulnerabilities social engineering tactics command and control servers rootkit techniques |
gptkbp:was_a_response_to |
Iran's nuclear program
|
gptkbp:written_in |
C and C++
|