The top 19 cyber security taxonomy

2 A Taxonomy of Operational Cyber Security … – SEI Digital Library

  • Author: resources.sei.cmu.edu
  • Published: 06/26/2022
  • Review: 4.79 (565 vote)
  • Summary: This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into 

3 General Cyber Security Taxonomy

4 (PDF) AVOIDIT: A Cyber Attack Taxonomy – ResearchGate

  • Author: researchgate.net
  • Published: 08/03/2021
  • Review: 4.37 (345 vote)
  • Summary: · To aid in identifying and defending against cyber attacks we propose a cyber attack taxonomy called AVOIDIT (Attack Vector, 

5 The Threat Taxonomy: Types of Cybercrime and a Framework | Agari

6 IDC’s Worldwide Security Services Taxonomy, 2021

  • Author: idc.com
  • Published: 12/17/2021
  • Review: 3.79 (537 vote)
  • Summary: The taxonomy is used by IDC’s global team of analysts to generate IDC market sizing, forecasts, and company models. IDC’s security services taxonomy presents a 

7 A taxonomy of cyber-harms: Defining the impacts of cyber-attacks

  • Author: semanticscholar.org
  • Published: 02/24/2022
  • Review: 3.6 (350 vote)
  • Summary: This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and 

8 A Taxonomy Framework for Maritime Cybersecurity

  • Author: commons.erau.edu
  • Published: 02/23/2022
  • Review: 3.59 (384 vote)
  • Summary: The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial 

9 Taxonomy – Glossary | CSRC

  • Author: csrc.nist.gov
  • Published: 01/17/2022
  • Review: 3.33 (487 vote)
  • Summary: Taxonomy. Share to Facebook Share to Twitter. Definition(s):. A scheme of classification. Source(s): NIST Cybersecurity Framework Version 1.1 

10 Evaluation of Comprehensive Taxonomies for Information … – CSIAC

11 A Taxonomy for Large-Scale Cyber Security Attacks – EUDL

  • Author: eudl.eu
  • Published: 10/13/2021
  • Review: 2.93 (113 vote)
  • Summary: · In an effort to examine the spread of large-scale cyber attacks, researchers have created various taxonomies

12 Cyber security risks for minors: A taxonomy and a software architecture

  • Author: ieeexplore.ieee.org
  • Published: 04/09/2022
  • Review: 2.75 (108 vote)
  • Summary: The explosion of the Internet provides a variety possibilities for communication, finding information and many other activities, turning into an essential 

13 Evaluation of Comprehensive Taxonomies for Information

  • Author: sans.org
  • Published: 04/04/2022
  • Review: 2.76 (90 vote)
  • Summary: · People have become the primary attack vector for cyber attackers around the world, as shown by the SANS 2022 Security Awareness Report

14 Cyber attack taxonomy for digital environment in nuclear power plants

  • Author: sciencedirect.com
  • Published: 08/04/2021
  • Review: 2.5 (103 vote)
  • Summary: ‘Damage’ is related to the attack severity. Simmons’ taxonomy [12] proposed a cyber-attack classification system model called AVOIDIT in consideration of the 

15 Shared Assessments Issues First Ever Unified Third Party

16 How to Guide Security Programs with Cybersecurity Risk Taxonomy

  • Author: bitsight.com
  • Published: 09/27/2021
  • Review: 2.32 (86 vote)
  • Summary: · A cybersecurity risk taxonomy is a powerful tool that identifies the risk vectors that your organization will likely face

17 MISP taxonomies and classification as machine tags

  • Author: misp-project.org
  • Published: 12/31/2021
  • Review: 2.23 (128 vote)
  • Summary: The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators, 

18 Cybersecurity Taxonomy

  • Author: cybersecurity-atlas.ec.europa.eu
  • Published: 10/29/2021
  • Review: 2.12 (121 vote)
  • Summary: The taxonomy is based on a comprehensive set of standards, regulations and best practices , and has been validated by different EU cybersecurity stakeholders, such as the European Cyber Security Organization (ECSO)

19 Taxonomy of cyber-harms: Defining the impacts of cyber-attacks and

  • Author: academic.oup.com
  • Published: 06/28/2022
  • Review: 2.09 (158 vote)
  • Summary: · This taxonomy comprises five broad themes: physical or digital harm; economic harm; psychological harm; reputational harm; and social and