MIT Logo

Cybersecurity & Sustainability

The last domain captures cyber-driven threats to & support for system stability & resilience over time, modes of response & their various features, as well as propensities for sustainability and strategies for sustainable development.

High-level Ontology for Cybersecurity & Sustainability domain.
Source: Choucri, Fairman, Agarwal (2021).

See dropdown for details of each dimensions.

DIMENSION 1: SYSTEM STATE

1. CYBER & SOCIAL ECOSYSTEMS

  1. Actors & Capabilities
  2. Internet Layers
    • People
    • Information
    • Logical
    • Physical
  3. International Levels
    • Individual & Groups
    • State & Non-State
    • International System
    • Global System
  4. Overarching Global System
    • Human & Social
    • Environmental
    • Cyberspace
    • Intersection Among Systems

2. ACTIVITIES & OPERATIONS

  1. Cyber-IR System Cybersecurity
    • Access
    • Encryption
    • Risk
    • Sustainability & Security Provision
  2. Cyber-IR System Sustainability
    • Loads
    • Capabilities
    • Changes
    • Others
  3. Operation & Services
  4. Others

3. SUPPORT SYSTEMS

  1. Monitoring Vulnerability Status
  2. Cybersecurity Supports
  3. Management Capability
  4. Information & Communication

4. RISK & MANAGEMENT

  1. Authority Base
  2. Risk Assessment
  3. Practice & Policies
  4. Implementation Mechanisms
DIMENSION 2: SYSTEM PROBLEMS

1. PROBLEM TYPE

  1. Physical Damage
    • Intrusion & Damages
    • Cyber Attacks
    • Social Damages
    • Others
  2. Threat to System Operations
    • System Overload
    • Capability Constraints
    • Mounting Demands
    • Threats to Life Support
  3. Management & Regulations
  4. Threat Incidence – Real & Cyber
    • Threat Actor & Agent
    • Tool & Target
    • Scope & Scale
    • Analysis & Assessment

2. PROBLEM TOOLS & TARGET

  1. Natural Systems
  2. Cyber Systems
    • Dynamic Attack
    • Malicious Code
    • Bots & Botnets
    • Cyber Incident
  3. Human Systems
  4. Interaction Among Systems

3. THREAT ACTORS

  1. Individual & Groups
  2. States & Non-States
  3. International & Global
  4. Known & Unknowns

4. DAMAGE & IMPACTS

  1. Damages to Cyber Systems
    • Exploiting Vulnerabilities
    • Attack & Impacts
    • Damages
    • Others
  2. Burdens on Sustainability
    • Levels of Human Activity
    • Layers of the Internet
    • Loads Over Capabilities
    • Life Supports
  3. Expansion of Vulnerabilities
  4. Loss of Resilience
DIMENSION 3: SCIENCE & TECHNOLOGY RESPONSES

1. TECHNOLOGY STRATEGIES

  1. Technology Innovation & Organization
    • Privacy Protections
    • Joint Private-Public St
    • Resilient System Architecture
    • Computer Network Defense Analysis
  2. System Safety Architecture
    • Innovations for Sustainability
    • Monitoring Systems
  3. Information Protection & Management/li>
  4. Computer Network Defense
    • Access
    • Infrastructure
    • Manpower
    • Software

2. CAPACITY BUILDING

  1. Skill & Personnel
  2. Technology “Hard” & “Soft”
    • Machine Learning & Evolution
    • Artificial Intelligence
    • Simulation & Forecasting
    • Other
  3. Technology Readiness Level
  4. Security & Sustainability Practice

3. RISK ASSESSMENT

  1. Technical Operations & Standards
  2. Threat Detection & Mitigation
  3. System-wide Assessments
  4. Technical Resilience

4. BEHAVIOR IMPERATIVES

  1. Deterrence & Defense
  2. System Improvements
  3. Coordination & Cooperation
  4. Recovery Mechanisms
DIMENSION 4: SOCIO-ECONOMIC & POLITICAL RESPONSES

1. INSTITUTIONAL RESPONSES

  1. Information Security Systems
    • Assurance Measures
    • Policy Measures
    • Voluntary Measures
    • Others
  2. National Sustainability Measures
  3. Market Mechanisms
  4. Legal & Regulatory Methods

2. CAPACITY BUILDING

  1. Situation Awareness
    • Asset Management
    • Data & Information Assessment
    • Monitoring Performance
    • Cyber Incident Response
  2. Enterprise Risk Management
  3. Sustainability of Capacity
  4. Multi-stakeholder Collaboration

3. SYSTEM SUSTAINABILITY

  1. System Assessment & Audits
  2. Integrated Risk Management
  3. Vulnerability Management & Institutional Response
  4. Others

4. POLICY IMPERATIVES

  1. Response Focus
  2. Insurance & Assessment Measures
    • Security Provision & Policy
    • Continuity of Operations
    • Access Management Plans
    • Supply Chain Risk Management
  3. Legal & Regulatory Strategies
  4. Resilience Strategy