Taxonomy

Classifying Cyber Events: A Proposed Taxonomy

Abstract: 

Immature classification methods for cyber events prevent technical staff, organisational leaders, and policy makers from engaging in meaningful and nuanced conversations about the threats they face. This paper provides a new taxonomy of cyber effects that is used to analyse over 2,431 publicised cyber events from 2014 to 2016.

Building an Improved Taxonomy for IA Education Resources in PRISM

ABSTRACT

To address a perceived lack of availability of educational resources for students and educators in the field of information assurance, Regis University and the United States Air Force Academy (USAFA) have begun development of a web portal to store and make available to the public information security-related educational materials.  The portal is named the Public Repository for Information Security Materials (PRISM).  In this paper, we begin with a review of the initial vision for PRISM.  We then discuss the development and maintenance of a deterministic discipline-specific vocabulary, along with the results of mapping curricular content to our initial set of terms.  Out of the eight material descriptions used in our evaluation, five could be clearly mapped to the initial vocabulary, one could partially be mapped, and three did not contain any clearly mappable terms.   

Fusion of Malware and Weapons Taxonomies for Analysis

ABSTRACT

This theoretical research uses forensic practices to support a likely resultant taxonomy for weaponized malware. Current malware taxonomies focus on behaviours, generations, and targets as part of their definitions. Naming and generational coding are often inherent in the taxonomical definition of a malware variant. In considering malware that may be weaponized, two core questions need to be answered. What makes a particular piece of malware a weapon, and is there such a thing? This research answers both questions and attempts to structure taxonomy. In this research, taxonomies of malware and weapons are considered for fusion in such a way as a taxonomical derivation will allow for discussion and evaluation of possible malware targets.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com