Unilexicon
Trees
Login
Sign up
Help
Prices
Switch view
side scroll
on
Editor (Hypertree)
Cards, drag to order priorities
List, nested list preview
Tabs and dropdowns navigation
Export:
JSON
/
SKOS
/
CSV
Cyber Security
Cyber Security Taxonomy
Event
Awareness Event
Conference
Forum
Summit
Symposium
Expo
Training Event
Workshop
Individual
Expert
Consultant
Trainer
Engineer
Academic
Professor
Researcher
Student
Cybercriminal
Hacker
Black-Hat Hacker
White-Hat Hacker
Gray-Hat Hacker
End User
Journalist
Activist
Party
Government
Critical Infrastructure
Research Centre
Educational Institute
Business
Enterprise
IT Company
Cyber Security Company
NGO
Group
Attack
Physical
Software Attack
Virus
Malware
Ransomware
Worm
Trojan
Spyware
Rootkit
Website Attack
SQL Injection
Web Application Attack
Exploit
Brute-force
Network Attack
APT
Man in the middle
DOS
DDOS
DNS
Poisoning
Spoofing
Manipulation
Botnet
Command & Control
Remote Access Tool (RAT)
Remote Command Execution
Port Scanning
Social Engineering
Phishing
Spear Phishing
Data Breach
Unauthorized Access
Unauthorized Privilege Escalation
Vulnerability
Dataset
CVE
CWE
Software
OS
Application
Web Server
Threat
Criminal Threat
Technical Threat
Business Threat
Legal Threat
Other Threat
Control
Firewall
Access Control
Authentication
Authorization
Usage Control
Control Standards
Policy
Data Policies
Data Handle Policy
Data Protection Policy
Data Retention Policy
Data Sharing Agreement
Access Control Policies
Access Control Policy
Usage Control Policy
Code Integrity Policy
Computer Security Policy
Content Security Policy
Cyber Insurance Policy
Cyber Security Policy
Device Guard Policy
Vulnerability Disclosure Policy
Regulations
Training
Detection
Intrusion Detection System
Anti-virus
Anti-malware
Sandbox
Technical
Cyrptography
Encryption
Symmetric
DES
Triple DES
AES
Blowfish
Asymmetric
Diffie-Hellman
RSA
Key
Public Key
Private Key
Hashing
Algorithm
BSD
CRC-32
MD5
SHA-1
SHA-256
Salted Hash
Rainbow Table
Protocol
HTTPS
SFTP
SSL
SSH
Standard
STIX
TAXII
IODEF
Risk
Type
Application
Insider
Internet
IoT
Privacy
Technical
Third-party
Score
Operation
Aggregation
Assessment
Identification
Management
Mitigation
Modeling
Sub-domain
Automotive Security
Cloud Security
Cyber Insurance
Cyber Threat Intelligence
Information Security Management
Standard
ISO 27000
IoT Security
Mobile Security
Smart Grid Security
Trust
Cyber Security
177 concepts
By @emahayni