See below for expanded domain ontology for Cybersecurity & Sustainability
1.1 Cyber & Social Ecosystems
- A. Actors & Capabilities
- B. Internet Layers
- 1. People
- 2. Information
- 3. Logical
- 4. Physical
- C. International Levels
- 1. Individual & Groups
- 2. State & Non-State
- 3. International System
- 4. Global System
- D. Overarching Global System
- 1. Human & Social
- 2. Environmental
- 3. Cyberspace
- 4. Intersection Among Systems
1.2 Activities & Operations
- A. Cyber-IR Cybersecurity
- 1. Access
- 2. Encryption
- 3. Risk
- 4. Sustainability & Security Provision
- B. Cyber-IR System Sustainability
- 1. Loads
- 2. Capabilities
- 3. Changes
- 4. Other
- C. Operations & Services
- D. Other
1.3 Support Systems
- A. Monitoring Vulnerability Status
- B. Cybersecurity Supports
- C. Management Capability
- D. Information & Communication
1.4 Risk & Management
- A. Authority Base & Type
- B. Risk Assessment
- C. Practices & Policies
- D. Implementation Mechanisms
Dimension 2 -- System Problems:
2.1 Problem Type
- A. Physical Damage
- 1. Intrusions & Damages
- 2. Cyber Attacks
- 3. Societal Damages
- 4. Other
- B. Threats to System Operations
- 1. System Overload
- 2. Capability Constraints
- 3. Mounting Demands
- 4. Threats to Life Supports
- C. Management & Regulations
- D. Threat Incidence—Cyber & Real
- 1. Threat Actor & Agent
- 2. Tool & Target
- 3. Scope & Scale
- 4. Analysis & Assessment
2.2 Problem Tools & Target
- A. Natural Systems
- B. Cyber Systems
- 1. Dynamic Attack
- 2. Malicious Code
- 3. Bots & Botnets
- 4. Cyber Incident
- C. Human Systems
- D. Intersections Among Systems
2.3 Threat Actors
- A. Individual & Groups
- B. States & Non-States
- C. International & Global
- D. Known & Unknown
2.4 Damages & Impacts
- A. Damages to Cyber Systems
- 1. Exploiting Vulnerabilities
- 2. Attacks & Impacts
- 3. Damages
- 4. Other
- B. Burdens on Sustainability
- 1. Levels of Human Activity
- 2. Layers of Internet
- 3. Loads Over Capabilities
- 4. Life Supports
- C. Expansion of Vulnerabilities
- D. Loss of Resilience
Dimension 3 -- Technological & Scientific Responses:
3.1 Technology Strategies
- A. Technology Innovation & Organization
- 1. Privacy Protections
- 2. Joint Private–Public Strategies
- 3. Resilient System Architecture
- 4. Computer Network Defense Analysis
- B. System Safety Architecture
- 1. Innovations for Sustainability
- 2. Monitoring Systems
- C. Information Protection & Management
- D. Computer Network Defense
- 1. Access
- 2. Infrastructure
- 3. Manpower
- 4. Software
3.2 Capacity Building
- A. Skills & Personnel
- B. Technology “Hard” And “Soft”
- 1. Machine Learning & Evolution
- 2. Artificial Intelligence
- 3. Simulation & Forecasting
- 4. Other
- C. Technology Readiness Level
- D. Security & Sustainability Practice
3.3 Risk Assessment
- A. Technical Operations & Standards
- B. Threat Detection & Mitigation
- C. System-Wide Assessments
- D. Technical Resilience
3.4 Behavior Imperatives
- A. Deterrence & Defense
- B. System Improvements
- C. Coordination & Cooperation
- D. Recovery Mechanisms
Dimension 4 -- Socio-Economic & Political Responses:
4.1 Institutional Responses
- A. Information Security Systems
- 1. Assurance Measures
- 2. Policy Measures
- 3. Voluntary Measures
- 4. Other
- B. National Sustainability Measures
- C. Market Mechanisms
- D. Legal & Regulatory Methods
4.2 Capacity Building
- A. Situation Awareness
- 1. Asset Management
- 2. Data & Information Assessment
- 3. Monitoring Performance
- 4. Cyber Incident Responses
- B. Enterprise Risk Management
- C. Sustainability of Capacity
- D. Multi-Stake Holder Collaboration
4.3 System Sustainability
- A. System Assessment & Audits
- B. Integrated Risk Management
- C. Vulnerability Management & Institutional Response
- D. Other
4.4 Policy Imperatives
- A. Response Focus
- B. Insurance & Assessment Measures
- 1. Security Provision & Policy
- 2. Continuity of Operations
- 3. Access Management Plans
- 4. Supply Chain Risk Management
- C. Legal & Regulatory Strategies
- D. Resilience Strategy