MIT Logo

Cybersecurity & Sustainability Ontology

Cybersecurity & Sustainability capture cyber driven threats and modes of response & their various features as well as the support for & threats to system stability and resilience over time.

Click the buttons below for a more detailed ontology of each of the four (4) dimensions.

DIMENSION 1: SYSTEM STATE

System State— characteristics of the system in current form.

  1. CYBER & SOCIAL ECOSYSTEMS
    1. Actors & Capabilities
    2. Internet Layers
      • People
      • Information
      • Logical
      • Physical
    3. International Levels
      • Individual & Groups
      • State & Non-State
      • International System
      • Global System
    4. Overarching Global System
      • Human & Social
      • Environmental
      • Cyberspace
      • Intersection among Systems
  2. ACTIVITIES & OPERATIONS
    1. Cyber-IR System Cybersecurity
      • Access
      • Encryption
      • Risk
      • Sustainability & Security Provision
    2. Cyber-IR System Sustainability
      • Loads
      • Capabilities
      • Changes
      • Others
    3. Operation & Services
    4. Others
  3. SUPPORT SYSTEMS
    1. Monitoring Vulnerability Status
    2. Cybersecurity Supports
    3. Management Capability
    4. Information & Communication
  4. RISK & MANAGEMENT
    1. Authority Base
    2. Risk Assessment
    3. Practice & Policies
    4. Implementation Mechanisms
DIMENSION 2: SYSTEM PROBLEMS

System Problems — known and emergent challenges for the system.

  1. PROBLEM TYPE
    1. Physical Damage
      • Intrusion & Damages
      • Cyber Attacks
      • Social Damages
      • Others
    2. Threat to System Operations
      • System Overload
      • Capability Constraints
      • Mounting Demands
      • Threats to Life Support
    3. Management & Regulations
    4. Threat Incidence – Real & Cyber
      • Threat Actor & Agent
      • Tool & Target
      • Scope & Scale
      • Analysis & Assessment
  2. PROBLEM TOOLS & TARGET
    1. Natural Systems
    2. Cyber Systems
      • Dynamic Attack
      • Malicious Code
      • Bots & Botnets
      • Cyber Incident
    3. Human Systems
    4. Interaction Among Systems
  3. THREAT ACTORS
    1. Individual & Groups
    2. States & Non-States
    3. International & Global
    4. Known & Unknowns
  4. DAMAGE & IMPACTS
    1. Damages to Cyber Systems
      • Exploiting Vulnerabilities
      • Attack & Impacts
      • Damages
      • Others
    2. Burdens on Sustainability
      • Levels of Human Activity
      • Layers of the Internet
      • Loads over Capabilities
      • Life Supports
    3. Expansion of Vulnerabilities
    4. Loss of Resilience
DIMENSION 3: SCIENCE & TECHNOLOGY RESPONSES

Science & Technology Responses — known and emergent scientific and technical responses to system problems.

  1. TECHNOLOGY STRATEGIES
    1. Technology Innovation & Organization
      • Privacy Protections
      • Joint Private-Public St
      • Resilient System Architecture
      • Computer Network Defense Analysis
    2. System Safety Architecture
      • Innovations for Sustainability
      • Monitoring Systems
    3. Information Protection & Management
    4. Computer Network Defense
      • Access
      • Infrastructure
      • Manpower
      • Software
  2. CAPACITY BUILDING
    1. Skill & Personnel
    2. Technology “Hard” & “Soft”
      • Machine Learning & Evolution
      • Artificial Intelligence
      • Simulation & Forecasting
      • Other
    3. Technology Readiness Level
    4. Security & Sustainability Practice
  3. RISK ASSESSMENT
    1. Technical Operations & Standards
    2. Threat Detection & Mitigation
    3. System-wide Assessments
    4. Technical Resilience
  4. BEHAVIOR IMPERATIVES
    1. Deterrence & Defense
    2. System Improvements
    3. Coordination & Cooperation
    4. Recovery Mechanisms
DIMENSION 4: SOCIO-ECONOMIC & POLITICAL RESPONSES

Socio-economic & Political Responses — known and emergent socio-economic and political responses to system problems.

  1. INSTITUTIONAL RESPONSES
    1. Information Security Systems
      • Assurance Measures
      • Policy Measures
      • Voluntary Measures
      • Others
    2. National Sustainability Measures
    3. Market Mechanisms
    4. Legal & Regulatory Methods
  2. CAPACITY BUILDING
    1. Situation Awareness
      • Asset Management
      • Data & Information Assessment
      • Monitoring Performance
      • Cyber Incident Response
    2. Enterprise Risk Management
    3. Sustainability of Capacity
    4. Multi-stakeholder Collaboration
  3. SYSTEM SUSTAINABILITY
    1. System Assessment & Audits
    2. Integrated Risk Management
    3. Vulnerability Management & Institutional Response
    4. Others
  4. POLICY IMPERATIVES
    1. Response Focus
    2. Insurance & Assessment Measures
      • Security Provision & Policy
      • Continuity of Operations
      • Access Management Plans
      • Supply Chain Risk Management
    3. Legal & Regulatory Strategies
    4. Resilience Strategy
MIT Political Science
MIT Political Science
ECIR
GSS