Statements (161)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_leadership
gptkb:military_organization |
gptkbp:advocates_for |
cyber policy
|
gptkbp:aims_to |
protect military networks
|
gptkbp:analyzes |
cyber incidents
cyber vulnerabilities |
gptkbp:collaborated_with |
academic institutions
law enforcement agencies international cybersecurity organizations |
gptkbp:collaborates_with |
gptkb:National_Security_Agency
law enforcement agencies private sector organizations international cybersecurity organizations |
gptkbp:conducts |
gptkb:cyber_operations
penetration testing cyber exercises vulnerability assessments cyber threat assessments cybersecurity assessments cyber exercises and simulations |
gptkbp:conducts_research_on |
cyber threats
|
gptkbp:coordinates |
gptkb:private_sector
federal agencies cyber defense efforts |
gptkbp:coordinates_with |
gptkb:U._S._Cyber_Command
gptkb:intelligence_gathering gptkb:international_partners gptkb:private_sector law enforcement agencies other federal agencies |
gptkbp:develops |
cybersecurity frameworks
cyber defense strategies incident response plans cyber capabilities cyber strategies cyber training programs |
gptkbp:develops_policies_for |
gptkb:cyber_operations
cybersecurity best practices |
gptkbp:employs |
gptkb:Cybersecurity
|
gptkbp:engages_in |
gptkb:public_outreach
research and development cyber warfare information sharing threat intelligence sharing cyber threat analysis information warfare cyber threat intelligence cyber defense cyber threat hunting cyber diplomacy |
gptkbp:enhances |
gptkb:national_security
|
gptkbp:established |
gptkb:2010
|
gptkbp:established_in |
gptkb:2010
|
gptkbp:evaluates |
cyber capabilities
cyber vulnerabilities |
gptkbp:focuses_on |
cybersecurity
|
gptkbp:headquartered_in |
gptkb:Fort_Meade,_Maryland
|
https://www.w3.org/2000/01/rdf-schema#label |
cyber operations
|
gptkbp:implements |
cyber strategies
|
gptkbp:initiatives |
secure critical infrastructure
|
gptkbp:is_a_framework_for |
gptkb:cyber_operations
|
gptkbp:is_a_resource_for |
cyber initiatives
|
gptkbp:is_a_tool_for |
incident response
|
gptkbp:is_engaged_in |
information sharing
vulnerability assessments cybersecurity research and development cybersecurity awareness campaigns cyber diplomacy cybersecurity compliance efforts |
gptkbp:is_focused_on |
network security
threat detection cyber resilience cyber threat mitigation cybersecurity innovation defensive cyber operations |
gptkbp:is_involved_in |
policy development
cybersecurity education threat assessment cybersecurity training programs cybersecurity policy advocacy cyber research cybersecurity threat mitigation cybersecurity incident management |
gptkbp:is_led_by |
gptkb:General_Paul_M._Nakasone
a commander |
gptkbp:is_part_of |
U. S. Cyber Command structure
U. S. military structure |
gptkbp:is_supported_by |
gptkb:Cybersecurity
|
gptkbp:is_tasked_with |
cybersecurity risk management
protecting government networks defending critical infrastructure monitoring cyber activities |
gptkbp:issues |
cyber threat assessments
|
gptkbp:maintains |
cyber defense capabilities
cyber situational awareness |
gptkbp:manages |
cyber incidents
cyber resources |
gptkbp:mission |
defend U. S. interests in cyberspace
|
gptkbp:monitors |
cyber threats
|
gptkbp:operates |
cyber defense operations
cybersecurity operations center |
gptkbp:operates_in |
cyber domain
|
gptkbp:operates_under |
gptkb:U._S._Cyber_Command
|
gptkbp:oversees |
gptkb:U._S._Cyber_Mission_Force
|
gptkbp:part_of |
gptkb:United_States_Department_of_Defense
|
gptkbp:participates_in |
joint exercises
policy discussions cybersecurity initiatives cyber exercises joint cyber operations |
gptkbp:partnership |
academic institutions
international allies |
gptkbp:promotes |
cyber awareness
|
gptkbp:provides |
technical assistance
cybersecurity training cybersecurity guidance cybersecurity resources cyber incident response cyber training cyber defense services cyber support to allies |
gptkbp:provides_guidance_on |
cybersecurity
cybersecurity best practices |
gptkbp:provides_support_for |
federal agencies
cybersecurity research |
gptkbp:provides_training_for |
gptkb:military_personnel
other military branches |
gptkbp:receives_funding_from |
gptkb:U._S._government
|
gptkbp:reports_to |
gptkb:U._S._Department_of_Defense
|
gptkbp:responds_to |
cyber threats
cyber incidents |
gptkbp:responsible_for |
cyber defense operations
cyber operations planning cybersecurity operations planning cyber policy implementation |
gptkbp:supports |
gptkb:military_operations
cybersecurity research critical infrastructure protection cyber research cyber innovation military cyber operations U. S. military operations |
gptkbp:trains |
gptkb:military_personnel
|
gptkbp:utilizes |
gptkb:intelligence
advanced technologies cyber intelligence |
gptkbp:works_to |
enhance cyber capabilities
mitigate cyber risks improve cyber resilience |
gptkbp:works_with |
gptkb:National_Security_Agency
gptkb:Department_of_Homeland_Security gptkb:international_partners international organizations |
gptkbp:bfsParent |
gptkb:National_Security_Agency
gptkb:military_personnel gptkb:military_unit gptkb:CIA gptkb:Soviet_Union gptkb:United_States_Air_Force gptkb:United_States_Armed_Forces |
gptkbp:bfsLayer |
3
|