Cyber-IR Ontology
Cyber-IR captures the multiple pressures and threat that can result in social damage & fundamental destruction.
Click the buttons below for a more detailed ontology of each of the four (4) dimensions.
DIMENSION 1: SYSTEM STATE
- CYBER-IR SYSTEM
- Internet-Layers
- Physical Layer
- Logical Layer
- Information Layer
- People & User Layer
- International Relations (IR) – Levels
- Levels of Analysis
- Cross Level Actors & Entities
- Cross Level Activities
- Others
- Supply Chain
- Contents & Components
- Sources, Locations & Owners
- Trade & Transactions
- Uncertainties, Problems, Barriers
- Standards
- Formal
- Informal
- Evolving
- Contingent
- Internet-Layers
- INTERSECTION OF LAYERS & LEVELS
- Types of Intersection
- Features & Salience
- Infrastructure & Communication
- Management & Governance
- Jurisdictions & Locations
- Internet Institutions & Decision Entities
- Innovators, Technologists & Protocol Design
- Operators, Routing & Supports
- Internet System Providers
- Certificate Authorities & Other
- International Relations (IR) Institutions & Decision Entities
- State Actors & Institutions
- International & Regional Entities
- Market, Industry, Business & Non-State Actors
- Other
- Interactions across Levels & Layers
- Drivers of Interactions
- Actors & Impacts
- Relevance & Impacts
- Others
- Types of Intersection
- CYBER-IR ACTORS & ACTIVITIES
- Individual & Groups
- Users
- Content Providers
- Supporters
- Opponents
- State Users & Activities
- Governance & Regulation
- Defense & National Security
- Services Provision
- Regulation, Extraction & Other
- International Actors & Activities
- Coordination of Cooperation
- Supports for Institutions & Missions
- Policy Development
- Outreach & Other
- Innovations and Innovators
- Private, Public Mixed
- Physical System Innovations
- Knowledge Innovations
- Institutional Innovations
- Individual & Groups
- GLOBAL ACTORS & ACTIVITIES
- Anonymous
- Private
- Public
- Mixed
- Focus
- Formal & Informal
- Institutional
- Sporadic
- Known
- Unknown
- Illegitimate
- Organized
- Sporadic
- Known
- Unknown
- Properties
- Focus
- Funding
- Scale & Scope
- Other
- Anonymous
DIMENSION 2: PROBLEMS FOR CYBER-IR SYSTEMS
- THREATS TO LAYERS
- Physical Systems & Operations
- Cables, Wires & infrastructure
- Network Systems
- ICT Attacks Vectors
- Supply Chain, Industrial Trade Threats
- Cyber Security Threats & Transgressions
- Malware & Malicious Code
- Bypass-Security Modes
- Overt Conduct to Damage
- Other
- Threats & Damage
- To Information
- To Capabilities
- To Intents
- Other
- Threats to People & Users
- Information & Communication Threats
- Unauthorized Access
- Misinformation
- Other
- Physical Systems & Operations
- THREATS TO LEVELS
- Individual & Groups
- Threats to Cyber Access
- Identity Loss
- Threats to Privacy
- Other
- State Level Targets & Damages
- Critical Infrastructure
- Defense Infrastructure
- Industry & Manufacturing
- Other
- International Disruptions
- Terrestrial
- Undersea
- Space
- Other
- Global Risks & Disruptions
- Social & Political
- Economic & Financial
- Environmental
- Other
- Individual & Groups
- THREATS AT INTERSECTION OF LAYERS AND LEVELS
- Physical
- Level of Analysis
- Layers of Internet
- For Profit
- Not for Profit
- Computational
- Content Targets
- Application Targets
- Innovation Targets
- Other
- Operational
- Institutional
- Law & Regulation
- Managerial
- Procedural
- Policy
- Regulations
- Type & Focus
- Targets
- Compliance
- Physical
- LOSS OF VALUE – LAYERS & LEVELS
- Productivity, Time & Money
- Information Loss
- Loss of National/Business Secrets
- Loss of Value
- Other
- Physical System
- Infrastructure
- Process Interruptions
- Operational damages
- Other
- Transactions & Investments
- Reputation Loss
- Financial Loss
- Regulatory Loss
- Insurance Loss
- Loss of Legitimacy
- Loss of Trust
- Loss of Legal Status
- Loss of Protections
- Other
- Productivity, Time & Money
DIMENSION 3: SCIENCE & TECHNOLOGY RESPONSES
- LAYERS OF INTERNET
- Physical Layer
- Protections Modes
- Improved Maintenance
- Strengthening Operations
- Customizing Responses
- Supply Chain Structure & Management
- Review & Assess
- Improving Legal Protections
- Upgrading Management & Operations
- Review of Insurance
- Network Security
- Enhanced Authorization
- Security at Control Points
- Security of Exchange Points
- System Resilience
- Integrated Risk Management
- Prevention
- Risk Assessment
- Early Warning Systems
- Capability & Response
- Physical Layer
- LEVELS OF INTERNATIONAL RELATIONS
- Security of Critical Infrastructure
- Land Based
- Undersea
- Communication Operations
- Other
- Security of Human Wellbeing
- Protections of Workforce
- Provision of Training
- Benefits Adequacy
- Operational Safety
- Environmental Security
- Viable Working Conditions
- Wellbeing Protections
- Quality of Operations
- Other
- Cybersecurity
- Training Measures
- Information Updates
- Restoring Security Measures
- Other
- Security of Critical Infrastructure
- COMPUTER NETWORK DEFENSE
- Defense Analysis
- Infrastructure
- Data Protection
- Cryptography
- SYSTEM RESILIENCE
- Anticipation
- Adaption
- Innovation
- Organization
DIMENSION 4: SOCIO-ECONOMIC & POLITICAL RESPONSES
- INDIVIDUALS & GROUP LEVEL
- Control Point Analysis
- Modelling & Simulation
- Analytics for Cyber-IR System Resilience
- Others
- STATE LEVEL
- Legal and Regulatory Systems
- Communication & Cyber Law
- Contract & Commercial Law
- Consumer Protection Law
- Civil & Criminal Law
- Capacity Building & Social Capital
- Encryption Capability
- Machine Learning & Artificial Intelligence
- Digital Rights
- Other
- Business & Non-State Initiatives
- Codes of Conduct & Best Practices
- IT Vendors Responsibility
- Information Sharing
- Other
- Partnership & Voluntary Initiative
- Legal and Regulatory Systems
- INTERNATIONAL RESPONSES
- International Institutions
- International Telecommunication Union (ITU)
- International Court of Justice (ICJ)
- World Trade Organization (WTO)
- Interpol & Other
- Joint Cyber-IR Initiatives
- World Summit on the Information Society (WSIS)
- World Congress on Information Technology (WCIT)
- Millennium Development Goals
- Other
- Cyber International Institutions
- Internet Corporation for Assigned Names and Numbers (ICANN)
- Internet Engineering Task Force (IETF)
- Internet Governance Forum (IGF)
- Other
- International Law & Norms
- Public International Law
- Environmental Law
- International Cyber Law
- Other
- International Institutions
- GLOBAL RESONSES
- Situational Awareness
- Norms & Ethics
- Advocacy & Support Systems
- Other