Statements (98)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cryptography
|
gptkbp:developedBy |
U.S._Navy_cryptographers
|
gptkbp:employs |
public key infrastructure
|
gptkbp:ensures |
confidentiality
data integrity authentication data confidentiality data protection integrity system availability system integrity information accuracy |
gptkbp:historical_significance |
military strategy
|
https://www.w3.org/2000/01/rdf-schema#label |
U.S. Navy cryptography
|
gptkbp:includes |
signal intelligence
codebooks secure voice communications |
gptkbp:inheritsFrom |
technology advancements
|
gptkbp:involves |
encryption techniques
|
gptkbp:is_a_key_component_of |
defense operations
|
gptkbp:is_designed_to |
data security
network security information security operational capabilities secure collaboration secure information exchange secure communications channels communication security |
gptkbp:is_essential_for |
command and control
data protection intelligence gathering mission success secure communications force protection data management operational effectiveness strategic operations operational security information dominance |
gptkbp:is_governed_by |
National_Security_Agency_(NSA)_standards
|
gptkbp:is_involved_in |
data recovery
risk management data encryption incident response network security policy development security assessments security audits security compliance security measures security training technology integration security architecture security protocols secure data transmission threat assessment information assurance threat mitigation |
gptkbp:is_part_of |
intelligence sharing
strategic planning intelligence operations military strategy defense strategy naval operations defensive operations information warfare military communications operational planning defensive measures |
gptkbp:is_supported_by |
military readiness
mission planning strategic initiatives intelligence operations intelligence analysis advanced computing resources force deployment |
gptkbp:is_used_in |
gptkb:Cold_War
gptkb:World_War_II data breaches cyber espionage espionage satellite communications data loss cyber threats secure messaging classified information malicious attacks unauthorized access joint military operations operational secrecy |
gptkbp:related_to |
cybersecurity
|
gptkbp:requires |
training and certification
|
gptkbp:security |
sensitive information
|
gptkbp:supports |
national security
|
gptkbp:taught |
cryptanalysis
|
gptkbp:usedBy |
gptkb:U.S._Navy
|
gptkbp:utilizes |
encryption algorithms
cipher machines |