Ontology documentation automatically generated with Ontospy on 25th August 2020 12:11
Label: Absorb Measure
Description: Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident.
Has Super Class (direct): sc2r:Response
Has Sub Class (direct): sc2r:EngageMeasure | sc2r:Reporting | sc2r:WithstandMeasure
Has Sub Class (all): sc2r:EngageMeasure | sc2r:ConfrontThreat | sc2r:DisconnectMeasure | sc2r:IsolateMeasure | sc2r:RemovalMeasure | sc2r:MaliciousContactRemoval | sc2r:MaliciousContentRemoval | sc2r:MaliciousSoftwareRemoval | sc2r:Reporting | sc2r:IncidentReporting | sc2r:WithstandMeasure | sc2r:AlternativeResource | sc2r:IncreaseResources
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AbsorbMeasure a owl:Class ; rdfs:label "Absorb Measure" ; rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident.""" ; rdfs:subClassOf sc2r:Response .
Label: Abuse Threat
Description: Abuse threats emanate from the harmful treatment of individuals online.
Has Super Class (direct): sc2r:PersonalThreat
Has Super Class (all): sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:CyberPredator | sc2r:CyberStalking | sc2r:Cyberbullying | sc2r:Flaming | sc2r:InformationFlooding | sc2r:SexualAbuse | sc2r:Trolling | sc2r:UnsolicitedCommunication
Has Sub Class (all): sc2r:CyberPredator | sc2r:CyberStalking | sc2r:Cyberbullying | sc2r:Flaming | sc2r:InformationFlooding | sc2r:SexualAbuse | sc2r:BoyfriendingGirlfriending | sc2r:Grooming | sc2r:LoveBombing | sc2r:Luring | sc2r:Persistence | sc2r:Sextortion | sc2r:SexualAssault | sc2r:Trolling | sc2r:Sealioning | sc2r:UnsolicitedCommunication | sc2r:SpamEmail | sc2r:UnsolicitedSocialRequest
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Abuse a owl:Class ; rdfs:label "Abuse Threat"@en ; rdfs:comment "Abuse threats emanate from the harmful treatment of individuals online." ; rdfs:subClassOf sc2r:PersonalThreat .
Label: Abused Harm
Description: Abused Harm refers to misuse of physical or digital assets.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Abused a owl:Class ; rdfs:label "Abused Harm" ; rdfs:comment "Abused Harm refers to misuse of physical or digital assets." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Access Control
Description: Access control is the prevention measure that involves controlling and authorizing access to cyber resources.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:Firewall | sc2r:LeastPrivilege | sc2r:PhysicalRestriction | sc2r:Sandboxing
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AccessControl a owl:Class ; rdfs:label "Access Control" ; rdfs:comment "Access control is the prevention measure that involves controlling and authorizing access to cyber resources." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Account Hijacking
Description: This is the process where an individuals account is hijacked or stolen by someone else.
Has Super Class (direct): sc2r:AuthenticationThreat
Has Super Class (all): sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AccountHijacking a owl:Class ; rdfs:label "Account Hijacking"@en ; rdfs:comment "This is the process where an individuals account is hijacked or stolen by someone else."@en ; rdfs:subClassOf sc2r:AuthenticationThreat .
Label: Account Recovery
Description: Account recovery measures involve restoring access and control of an account after an adverse cyber incident.
Has Super Class (direct): sc2r:RecoverMeasure
Has Super Class (all): sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AccountRecovery a owl:Class ; rdfs:label "Account Recovery" ; rdfs:comment "Account recovery measures involve restoring access and control of an account after an adverse cyber incident." ; rdfs:subClassOf sc2r:RecoverMeasure .
Label: Active Mediation
Description: Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents.
Has Super Class (direct): sc2r:MediationMeasures
Has Super Class (all): sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ActiveMediation a owl:Class ; rdfs:label "Active Mediation" ; rdfs:comment "Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents." ; rdfs:subClassOf sc2r:MediationMeasures .
Label: Activity Data
Description: Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ActivityData a owl:Class ; rdfs:label "Activity Data" ; rdfs:comment "Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer." ; rdfs:subClassOf sc2r:PersonalData .
Label: Adapt Measure
Description: Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better”
Has Super Class (direct): sc2r:Response
Has Sub Class (direct): sc2r:CapacityBuilding | sc2r:Evolve
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AdaptMeasure a owl:Class ; rdfs:label "Adapt Measure" ; rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better”""" ; rdfs:subClassOf sc2r:Response .
Label: Addiction
Description: Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Addiction a owl:Class ; rdfs:label "Addiction" ; rdfs:comment "Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Agency
Description: Agency is the ability to define one’s goals and act upon them.
Has Super Class (direct): sc2r:IndividualResource
Has Super Class (all): sc2r:IndividualResource | sc2r:Resource
Has Sub Class (direct): sc2r:MentalFaculties
Has Sub Class (all): sc2r:MentalFaculties | sc2r:Knowledge | sc2r:Motivation | sc2r:Skills
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Agency a owl:Class ; rdfs:label "Agency" ; rdfs:comment "Agency is the ability to define one’s goals and act upon them." ; rdfs:subClassOf sc2r:IndividualResource .
Label: Alternative Resource Measure
Description: This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources. For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized.
Has Super Class (direct): sc2r:WithstandMeasure
Has Super Class (all): sc2r:WithstandMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AlternativeResource a owl:Class ; rdfs:label "Alternative Resource Measure" ; rdfs:comment """This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources. For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized.""" ; rdfs:subClassOf sc2r:WithstandMeasure .
Label: Angler Phishing
Description: Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information.
Has Super Class (direct): sc2r:Phishing
Has Super Class (all): sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AnglerPhishing a owl:Class ; rdfs:label "Angler Phishing"@en ; rdfs:comment "Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information." ; rdfs:subClassOf sc2r:Phishing .
Label: Anonymity Threat
Description: Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened.
Has Super Class (direct): sc2r:PrivacyThreat
Has Super Class (all): sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AnonymityThreat a owl:Class ; rdfs:label "Anonymity Threat"@en ; rdfs:comment "Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened." ; rdfs:subClassOf sc2r:PrivacyThreat .
Label: Anonymous Routing
Description: Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers.
Has Super Class (direct): sc2r:TrustedNetworking
Has Super Class (all): sc2r:TrustedNetworking | sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AnonymousRouting a owl:Class ; rdfs:label "Anonymous Routing" ; rdfs:comment "Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers." ; rdfs:subClassOf sc2r:TrustedNetworking .
Label: Anticipate Measure
Description: Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents.
Has Super Class (direct): sc2r:PrepareMeasure
Has Super Class (all): sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:AttitudinalMeasure | sc2r:Awareness | sc2r:RecoveryPlan | sc2r:RedundancyMeasure | sc2r:Training
Has Sub Class (all): sc2r:AttitudinalMeasure | sc2r:BeCritical | sc2r:BeSuspicious | sc2r:BeVigilant | sc2r:YouAreNotImmune | sc2r:Awareness | sc2r:AssetInventory | sc2r:DigitalFootprint | sc2r:RecoveryPlan | sc2r:RedundancyMeasure | sc2r:DataRedundancy | sc2r:NetworkRedundancy | sc2r:SoftwareRedundancy | sc2r:SourceRedundancy | sc2r:Training
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AnticipateMeasure a owl:Class ; rdfs:label "Anticipate Measure" ; rdfs:comment "Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents." ; rdfs:subClassOf sc2r:PrepareMeasure .
Label: Right to Assembly
Description: The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately.
Has Super Class (direct): sc2r:Right
Has Super Class (all): sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Assembly a owl:Class ; rdfs:label "Right to Assembly" ; rdfs:comment "The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately." ; rdfs:subClassOf sc2r:Right .
Label: Asset Inventory Management
Description: Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to.
Has Super Class (direct): sc2r:Awareness
Has Super Class (all): sc2r:Awareness | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AssetInventory a owl:Class ; rdfs:label "Asset Inventory Management" ; rdfs:comment "Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to." ; rdfs:subClassOf sc2r:Awareness ; owl:equivalentClass sc2r:DigitalFootprint .
Label: Attitudinal Measure
Description: Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents.
Has Super Class (direct): sc2r:AnticipateMeasure
Has Super Class (all): sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:BeCritical | sc2r:BeSuspicious | sc2r:BeVigilant | sc2r:YouAreNotImmune
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AttitudinalMeasure a owl:Class ; rdfs:label "Attitudinal Measure" ; rdfs:comment "Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents." ; rdfs:subClassOf sc2r:AnticipateMeasure .
Label: Authentication Threat
Description: Authentication threats compromise the Authentication cyber security goal.
Has Super Class (direct): sc2r:TechnologicalThreat
Has Super Class (all): sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:AccountHijacking | sc2r:Fabrication | sc2r:Masquerading | sc2r:Spoofing | sc2r:UnauthorizedAccess
Has Sub Class (all): sc2r:AccountHijacking | sc2r:Fabrication | sc2r:Masquerading | sc2r:Spoofing | sc2r:UnauthorizedAccess | sc2r:NetworkIntrusion | sc2r:Piggybacking
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AuthenticationThreat a owl:Class ; rdfs:label "Authentication Threat"@en ; rdfs:comment "Authentication threats compromise the Authentication cyber security goal."@en ; rdfs:subClassOf sc2r:TechnologicalThreat .
Label: Availability Threat
Description: Availability Threats compromise the Availability cyber security goal.
Has Super Class (direct): sc2r:TechnologicalThreat
Has Super Class (all): sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:DenialOfService | sc2r:Disruption | sc2r:LostCredentials | sc2r:LostDevices | sc2r:Ransomware
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:AvailabilityThreat a owl:Class ; rdfs:label "Availability Threat"@en ; rdfs:comment "Availability Threats compromise the Availability cyber security goal."@en ; rdfs:subClassOf sc2r:TechnologicalThreat .
Label: Awareness
Description: Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape.
Has Super Class (direct): sc2r:AnticipateMeasure
Has Super Class (all): sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:AssetInventory | sc2r:DigitalFootprint
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Awareness a owl:Class ; rdfs:label "Awareness" ; rdfs:comment "Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape." ; rdfs:subClassOf sc2r:AnticipateMeasure .
Label: Baiting
Description: Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods.
Has Super Class (direct): sc2r:SocialEngineering
Has Super Class (all): sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Baiting a owl:Class ; rdfs:label "Baiting"@en ; rdfs:comment "Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods." ; rdfs:subClassOf sc2r:SocialEngineering .
Label: Bandwagon Effect
Description: Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does.
Has Super Class (direct): sc2r:PsychographicHacking
Has Super Class (all): sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BandwagonEffect a owl:Class ; rdfs:label "Bandwagon Effect" ; rdfs:comment "Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does." ; rdfs:subClassOf sc2r:PsychographicHacking .
Label: Be Critical
Description: This attitude emphasizes the need to be critical in online engagements. For example being critical with regard to news and content consumed online.
Has Super Class (direct): sc2r:AttitudinalMeasure
Has Super Class (all): sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BeCritical a owl:Class ; rdfs:label "Be Critical" ; rdfs:comment """This attitude emphasizes the need to be critical in online engagements. For example being critical with regard to news and content consumed online.""" ; rdfs:subClassOf sc2r:AttitudinalMeasure .
Label: Be Suspicious
Description: This attitude emphasizes the importance of being suspicious online. For example, being suspicious of unsolicited communication.
Has Super Class (direct): sc2r:AttitudinalMeasure
Has Super Class (all): sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BeSuspicious a owl:Class ; rdfs:label "Be Suspicious" ; rdfs:comment """This attitude emphasizes the importance of being suspicious online. For example, being suspicious of unsolicited communication.""" ; rdfs:subClassOf sc2r:AttitudinalMeasure .
Label: Be Vigilant
Description: This attitude emphasizes the need to be vigilant online.
Has Super Class (direct): sc2r:AttitudinalMeasure
Has Super Class (all): sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BeVigilant a owl:Class ; rdfs:label "Be Vigilant" ; rdfs:comment "This attitude emphasizes the need to be vigilant online." ; rdfs:subClassOf sc2r:AttitudinalMeasure .
Label: Behavioral Data
Description: Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BehaviouralData a owl:Class ; rdfs:label "Behavioral Data" ; rdfs:comment "Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played." ; rdfs:subClassOf sc2r:PersonalData .
Label: Biometric Token
Description: Biometric Token is a biometric-based security token that is used for authentication or verification purpose.
Has Super Class (direct): sc2r:Credential
Has Super Class (all): sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BiometricToken a owl:Class ; rdfs:label "Biometric Token" ; rdfs:comment "Biometric Token is a biometric-based security token that is used for authentication or verification purpose." ; rdfs:subClassOf sc2r:Credential .
Label: Black Propaganda
Description: Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BlackPropaganda a owl:Class ; rdfs:label "Black Propaganda"@en ; rdfs:comment "Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins."@en ; rdfs:subClassOf sc2r:SocialHacking .
Label: Blacklisted
Description: Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided.
Has Super Class (direct): sc2r:ReputationalHarm
Has Super Class (all): sc2r:ReputationalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Blacklisted a owl:Class ; rdfs:label "Blacklisted" ; rdfs:comment "Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided." ; rdfs:subClassOf sc2r:ReputationalHarm .
Label: Bodily Injury
Description: Bodily Injury refers to the wound caused to individual's body.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
Has Sub Class (direct): sc2r:Pain | sc2r:SelfHarm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BodilyInjury a owl:Class ; rdfs:label "Bodily Injury" ; rdfs:comment "Bodily Injury refers to the wound caused to individual's body." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Boyfriending and Girlfriending
Description: Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:BoyfriendingGirlfriending a owl:Class ; rdfs:label "Boyfriending and Girlfriending" ; rdfs:comment "Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Capacity-building
Description: The capacity-building measures involve increasing the level of nominal cyber functioning of individuals.
Has Super Class (direct): sc2r:AdaptMeasure
Has Super Class (all): sc2r:AdaptMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CapacityBuilding a owl:Class ; rdfs:label "Capacity-building" ; rdfs:comment "The capacity-building measures involve increasing the level of nominal cyber functioning of individuals." ; rdfs:subClassOf sc2r:AdaptMeasure .
Label: Catphishing
Description: Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target.
Has Super Class (direct): sc2r:Phishing
Has Super Class (all): sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Catphishing a owl:Class ; rdfs:label "Catphishing"@en ; rdfs:comment "Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target." ; rdfs:subClassOf sc2r:Phishing .
Label: Censorship
Description: Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media.
Has Super Class (direct): sc2r:InstitutionalThreat
Has Super Class (all): sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Censorship a owl:Class ; rdfs:label "Censorship"@en ; rdfs:comment "Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media."@en ; rdfs:subClassOf sc2r:InstitutionalThreat .
Label: Cheerleading
Description: Using information influence techniques to crowd out dissent.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Cheerleading a owl:Class ; rdfs:label "Cheerleading"@en ; rdfs:comment "Using information influence techniques to crowd out dissent."@en ; rdfs:subClassOf sc2r:SocialHacking .
Label: Coercion
Description: Coercion occurs when individuals are persuaded by threats or force to do something.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Coercion a owl:Class ; rdfs:label "Coercion"@en ; rdfs:comment "Coercion occurs when individuals are persuaded by threats or force to do something." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Cognitive Impairement
Description: Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CognitiveImpairement a owl:Class ; rdfs:label "Cognitive Impairement" ; rdfs:comment "Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Cognitive Threat
Description: Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.
Has Super Class (direct): sc2r:PersonalThreat
Has Super Class (all): sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:DigitalHoarding | sc2r:Disinformation | sc2r:InfluenceThreat | sc2r:Malinformation | sc2r:Misinformation
Has Sub Class (all): sc2r:DigitalHoarding | sc2r:Disinformation | sc2r:Deceit | sc2r:Forging | sc2r:PotemkinVillageEvidence | sc2r:Shilling | sc2r:EngineeredContent | sc2r:FakeNews | sc2r:InfluenceOperation | sc2r:HumorAndMeme | sc2r:Parody | sc2r:Satire | sc2r:MalignRhetoric | sc2r:Firehosing | sc2r:GishGalloping | sc2r:Strawman | sc2r:Transfer | sc2r:WhatAboutism | sc2r:OpposingInformation | sc2r:Propaganda | sc2r:InfluenceThreat | sc2r:Coercion | sc2r:Extortion | sc2r:InformationOverload | sc2r:PsychographicHacking | sc2r:BandwagonEffect | sc2r:DarkAdvertising | sc2r:Microtargeting | sc2r:Scareware | sc2r:SocialEngineering | sc2r:Baiting | sc2r:Phishing | sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating | sc2r:Malinformation | sc2r:InappropriateContent | sc2r:OffensiveLanguage | sc2r:Pornography | sc2r:Profanity | sc2r:Violence | sc2r:Misinformation | sc2r:MisleadingInformation | sc2r:MisleadingAdvertising
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CognitiveThreat a owl:Class ; rdfs:label "Cognitive Threat"@en ; rdfs:comment "Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others."@en ; rdfs:subClassOf sc2r:PersonalThreat .
Label: Compensation Payment
Description: Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CompensationPayment a owl:Class ; rdfs:label "Compensation Payment" ; rdfs:comment "Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Compromised
Description: Comprised is the state in which the resources are physically or digitally affected.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Compromised a owl:Class ; rdfs:label "Compromised" ; rdfs:comment "Comprised is the state in which the resources are physically or digitally affected." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Computer
Description: Computer is an electronic device that can store, retrieve, and process data.
Has Super Class (direct): sc2r:ComputingAsset
Has Super Class (all): sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Computer a owl:Class ; rdfs:label "Computer" ; rdfs:comment "Computer is an electronic device that can store, retrieve, and process data." ; rdfs:subClassOf sc2r:ComputingAsset .
Label: Computing Asset
Description: Computing Asset is any asset that utilises computing processes.
Has Super Class (direct): sc2r:PhysicalResource
Has Super Class (all): sc2r:PhysicalResource | sc2r:Resource
Has Sub Class (direct): sc2r:Computer | sc2r:Laptop | sc2r:MobileDevice | sc2r:Server
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ComputingAsset a owl:Class ; rdfs:label "Computing Asset" ; rdfs:comment "Computing Asset is any asset that utilises computing processes." ; rdfs:subClassOf sc2r:PhysicalResource .
Label: Confidentiality Threat
Description: Confidentiality Threats compromise the Confidentiality cybersecurity goal.
Has Super Class (direct): sc2r:TechnologicalThreat
Has Super Class (all): sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:DataBreach | sc2r:DataLeak | sc2r:Doxing | sc2r:InadvertentDisclosure | sc2r:Interception | sc2r:Reconnaissance | sc2r:Skimming
Has Sub Class (all): sc2r:DataBreach | sc2r:DataLeak | sc2r:Doxing | sc2r:InadvertentDisclosure | sc2r:Interception | sc2r:Eavesdropping | sc2r:Reconnaissance | sc2r:Skimming
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ConfidentialityThreat a owl:Class ; rdfs:label "Confidentiality Threat"@en ; rdfs:comment "Confidentiality Threats compromise the Confidentiality cybersecurity goal."@en ; rdfs:subClassOf sc2r:TechnologicalThreat .
Label: Conflict
Description: Conflict refers to an active disagreement between the individual with those with opposing opinions or principles.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Conflict a owl:Class ; rdfs:label "Conflict" ; rdfs:comment "Conflict refers to an active disagreement between the individual with those with opposing opinions or principles." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Confront the Threat
Description: Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors.
Has Super Class (direct): sc2r:EngageMeasure
Has Super Class (all): sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ConfrontThreat a owl:Class ; rdfs:label "Confront the Threat" ; rdfs:comment "Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors." ; rdfs:subClassOf sc2r:EngageMeasure .
Label: Confusion
Description: Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
Has Sub Class (direct): sc2r:Misled
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Confusion a owl:Class ; rdfs:label "Confusion" ; rdfs:comment "Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Conscientiousness
Description: Conscientiousness refers to individual's ability to control, regulate, and direct their impulses.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Conscientiousness a owl:Class ; rdfs:label "Conscientiousness" ; rdfs:comment "Conscientiousness refers to individual's ability to control, regulate, and direct their impulses." ; rdfs:subClassOf sc2r:Individual .
Label: Breach of Contract
Description: A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources.
Has Super Class (direct): sc2r:Violation
Has Super Class (all): sc2r:Violation | sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ContractBreach a owl:Class ; rdfs:label "Breach of Contract"@en ; rdfs:comment "A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources."@en ; rdfs:subClassOf sc2r:Violation .
Label: Corrupted
Description: Corrupted is the state where the resources are being physically or digitally debased or their integrity affected.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Corrupted a owl:Class ; rdfs:label "Corrupted" ; rdfs:comment "Corrupted is the state where the resources are being physically or digitally debased or their integrity affected." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Credential
Description: A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID.
Has Super Class (direct): sc2r:IdentifyingData
Has Super Class (all): sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Credential a owl:Class ; rdfs:label "Credential" ; rdfs:comment "A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID." ; rdfs:subClassOf sc2r:IdentifyingData .
Label: Curiosity
Description: Curiosity is the desire to learn or know about anything.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Curiosity a owl:Class ; rdfs:label "Curiosity" ; rdfs:comment "Curiosity is the desire to learn or know about anything." ; rdfs:subClassOf sc2r:Individual .
Label: Cyber Predator
Description: Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CyberPredator a owl:Class ; rdfs:label "Cyber Predator"@en ; rdfs:comment "Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes." ; rdfs:subClassOf sc2r:Abuse .
Label: Cyber Stalking
Description: Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CyberStalking a owl:Class ; rdfs:label "Cyber Stalking"@en ; rdfs:comment "Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes." ; rdfs:subClassOf sc2r:Abuse .
Label: Cyberbullying
Description: Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Cyberbullying a owl:Class ; rdfs:label "Cyberbullying"@en ; rdfs:comment "Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods." ; rdfs:subClassOf sc2r:Abuse .
Label: Crypto Currency
Description: A Cryptocurrency is a digital or virtual currency that is secured by cryptography.
Has Super Class (direct): sc2r:File
Has Super Class (all): sc2r:File | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:CyptoCurrency a owl:Class ; rdfs:label "Crypto Currency" ; rdfs:comment "A Cryptocurrency is a digital or virtual currency that is secured by cryptography." ; rdfs:subClassOf sc2r:File .
Label: Damage
Description: These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Damage a owl:Class ; rdfs:label "Damage"@en ; rdfs:comment "These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Damaged Relationship
Description: Damaged Relationship refers to an adverse change in relationship between the individuals with other people.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DamagedRelationship a owl:Class ; rdfs:label "Damaged Relationship" ; rdfs:comment "Damaged Relationship refers to an adverse change in relationship between the individuals with other people." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Damaged Social Perception
Description: Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network.
Has Super Class (direct): sc2r:ReputationalHarm
Has Super Class (all): sc2r:ReputationalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DamagedSocialPerception a owl:Class ; rdfs:label "Damaged Social Perception" ; rdfs:comment "Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network." ; rdfs:subClassOf sc2r:ReputationalHarm .
Label: Dark Advertising
Description: Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence.
Has Super Class (direct): sc2r:PsychographicHacking
Has Super Class (all): sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DarkAdvertising a owl:Class ; rdfs:label "Dark Advertising" ; rdfs:comment "Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence." ; rdfs:subClassOf sc2r:PsychographicHacking .
Label: Data
Description: Data is information that has been translated into a form that is efficient for movement or processing.
Has Super Class (direct): sc2r:DigitalResource
Has Super Class (all): sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:File | sc2r:PersonalData
Has Sub Class (all): sc2r:File | sc2r:CyptoCurrency | sc2r:PersonalData | sc2r:ActivityData | sc2r:BehaviouralData | sc2r:DemographicInformation | sc2r:IdentifyingData | sc2r:Credential | sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken | sc2r:FinancialData | sc2r:LocationData | sc2r:SocialContact | sc2r:UserGeneratedContent
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Data a owl:Class ; rdfs:label "Data" ; rdfs:comment "Data is information that has been translated into a form that is efficient for movement or processing." ; rdfs:subClassOf sc2r:DigitalResource .
Label: Data Breach
Description: A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataBreach a owl:Class ; rdfs:label "Data Breach"@en ; rdfs:comment "A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external."@en ; rdfs:seeAlso sc2r:DataLeak ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Data Corruption
Description: Data Corruption occurs when there are errors to data which compromise the integrity of the data.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataCorruption a owl:Class ; rdfs:label "Data Corruption"@en ; rdfs:comment "Data Corruption occurs when there are errors to data which compromise the integrity of the data."@en ; rdfs:seeAlso sc2r:DataError ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Data Error
Description: These are data errors that compromise the integrity of data.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataError a owl:Class ; rdfs:label "Data Error"@en ; rdfs:comment "These are data errors that compromise the integrity of data."@en ; rdfs:seeAlso sc2r:DataCorruption ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Data Leak
Description: A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataLeak a owl:Class ; rdfs:label "Data Leak"@en ; rdfs:comment "A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor."@en ; rdfs:seeAlso sc2r:DataBreach ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Data Recovery
Description: Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss.
Has Super Class (direct): sc2r:RecoverMeasure
Has Super Class (all): sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataRecovery a owl:Class ; rdfs:label "Data Recovery" ; rdfs:comment "Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss." ; rdfs:subClassOf sc2r:RecoverMeasure .
Label: Data Redundancy
Description: Data redundancy measure involves having data backups and redundant data storage.
Has Super Class (direct): sc2r:RedundancyMeasure
Has Super Class (all): sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataRedundancy a owl:Class ; rdfs:label "Data Redundancy" ; rdfs:comment "Data redundancy measure involves having data backups and redundant data storage." ; rdfs:subClassOf sc2r:RedundancyMeasure .
Label: Data Token
Description: Data Token is tokenized data access that is used to secure access to data.
Has Super Class (direct): sc2r:Credential
Has Super Class (all): sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataToken a owl:Class ; rdfs:label "Data Token" ; rdfs:comment "Data Token is tokenized data access that is used to secure access to data." ; rdfs:subClassOf sc2r:Credential .
Label: Data Vulnerability
Description: Data Vulnerabilities are the weaknesses associated with data.
Has Super Class (direct): sc2r:Digital
Has Super Class (all): sc2r:Digital | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DataVulnerability a owl:Class ; rdfs:label "Data Vulnerability" ; rdfs:comment "Data Vulnerabilities are the weaknesses associated with data." ; rdfs:subClassOf sc2r:Digital .
Label: Deceit
Description: Threat of deceptive content and information
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Forging | sc2r:PotemkinVillageEvidence | sc2r:Shilling
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Deceit a owl:Class ; rdfs:label "Deceit"@en ; rdfs:comment "Threat of deceptive content and information"@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Demographic Information
Description: Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DemographicInformation a owl:Class ; rdfs:label "Demographic Information" ; rdfs:comment "Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status." ; rdfs:subClassOf sc2r:PersonalData .
Label: Denial of Service
Description: A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users.
Has Super Class (direct): sc2r:AvailabilityThreat
Has Super Class (all): sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DenialOfService a owl:Class ; rdfs:label "Denial of Service"@en ; rdfs:comment "A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users."@en ; rdfs:subClassOf sc2r:AvailabilityThreat .
Label: Depressed
Description: Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Depressed a owl:Class ; rdfs:label "Depressed" ; rdfs:comment "Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Destroyed
Description: Destroyed refers to the state in which the resources being physically or digitally ruined.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Destroyed a owl:Class ; rdfs:label "Destroyed" ; rdfs:comment "Destroyed refers to the state in which the resources being physically or digitally ruined." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Device Identification
Description: Device authentication is the process is verifying the identity of the devices that are used to connect to network resources.
Has Super Class (direct): sc2r:Identification
Has Super Class (all): sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DeviceIdentification a owl:Class ; rdfs:label "Device Identification" ; rdfs:comment "Device authentication is the process is verifying the identity of the devices that are used to connect to network resources." ; rdfs:subClassOf sc2r:Identification .
Label: Diffusion of Responsibility
Description: Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DiffusionOfResponsibility a owl:Class ; rdfs:label "Diffusion of Responsibility" ; rdfs:comment "Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people." ; rdfs:subClassOf sc2r:Individual .
Label: Digital Vulnerability
Description: Digital Vulnerabilities are weaknesses associated with digital resources.
Has Super Class (direct): sc2r:Vulnerability
Has Sub Class (direct): sc2r:DataVulnerability | sc2r:NetworkVulnerability | sc2r:SoftwareVulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Digital a owl:Class ; rdfs:label "Digital Vulnerability" ; rdfs:comment "Digital Vulnerabilities are weaknesses associated with digital resources." ; rdfs:subClassOf sc2r:Vulnerability .
Label: Digital Footprint Management
Description: Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings.
Has Super Class (direct): sc2r:Awareness
Has Super Class (all): sc2r:Awareness | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DigitalFootprint a owl:Class ; rdfs:label "Digital Footprint Management" ; rdfs:comment "Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings." ; rdfs:subClassOf sc2r:Awareness .
Label: Digital Hoarding
Description: Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user.
Has Super Class (direct): sc2r:CognitiveThreat
Has Super Class (all): sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DigitalHoarding a owl:Class ; rdfs:label "Digital Hoarding"@en ; rdfs:comment "Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Digital_hoarding"@en ; rdfs:subClassOf sc2r:CognitiveThreat .
Label: Digital Resource
Description: Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised).
Has Super Class (direct): sc2r:Resource
Has Sub Class (direct): sc2r:Data | sc2r:Software
Has Sub Class (all): sc2r:Data | sc2r:File | sc2r:CyptoCurrency | sc2r:PersonalData | sc2r:ActivityData | sc2r:BehaviouralData | sc2r:DemographicInformation | sc2r:IdentifyingData | sc2r:Credential | sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken | sc2r:FinancialData | sc2r:LocationData | sc2r:SocialContact | sc2r:UserGeneratedContent | sc2r:Software | sc2r:OnlineServices
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DigitalResource a owl:Class ; rdfs:label "Digital Resource" ; rdfs:comment "Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised)." ; rdfs:subClassOf sc2r:Resource .
Label: Discomfort
Description: Discomfort is the state in which the individual experiences uneasiness or anxiety.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Discomfort a owl:Class ; rdfs:label "Discomfort" ; rdfs:comment "Discomfort is the state in which the individual experiences uneasiness or anxiety." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Disconnect Measure
Description: The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation. For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform.
Has Super Class (direct): sc2r:EngageMeasure
Has Super Class (all): sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DisconnectMeasure a owl:Class ; rdfs:label "Disconnect Measure" ; rdfs:comment """The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation. For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform.""" ; rdfs:subClassOf sc2r:EngageMeasure .
Label: Disempowerment
Description: Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Disempowerment a owl:Class ; rdfs:label "Disempowerment" ; rdfs:comment "Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Disinformation
Description: Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional.
Has Super Class (direct): sc2r:CognitiveThreat
Has Super Class (all): sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Deceit | sc2r:EngineeredContent | sc2r:FakeNews | sc2r:InfluenceOperation | sc2r:MalignRhetoric | sc2r:OpposingInformation | sc2r:Propaganda
Has Sub Class (all): sc2r:Deceit | sc2r:Forging | sc2r:PotemkinVillageEvidence | sc2r:Shilling | sc2r:EngineeredContent | sc2r:FakeNews | sc2r:InfluenceOperation | sc2r:HumorAndMeme | sc2r:Parody | sc2r:Satire | sc2r:MalignRhetoric | sc2r:Firehosing | sc2r:GishGalloping | sc2r:Strawman | sc2r:Transfer | sc2r:WhatAboutism | sc2r:OpposingInformation | sc2r:Propaganda
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Disinformation a owl:Class ; rdfs:label "Disinformation"@en ; rdfs:comment "Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Disinformation"@en ; rdfs:subClassOf sc2r:CognitiveThreat .
Label: Disrupted Income
Description: Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DisruptedIncome a owl:Class ; rdfs:label "Disrupted Income" ; rdfs:comment "Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Disrupted Work
Description: Disrupted Work refers to the suspension of work as a result of the cyber threats.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:DisruptedWork a owl:Class ; rdfs:label "Disrupted Work" ; rdfs:comment "Disrupted Work refers to the suspension of work as a result of the cyber threats." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Disruption
Description: Disruption occurs when individuals' access to information and resources is disrupted.
Has Super Class (direct): sc2r:AvailabilityThreat
Has Super Class (all): sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Disruption a owl:Class ; rdfs:label "Disruption"@en ; rdfs:comment "Disruption occurs when individuals' access to information and resources is disrupted."@en ; rdfs:subClassOf sc2r:AvailabilityThreat .
Label: Distraction
Description: Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Distraction a owl:Class ; rdfs:label "Distraction" ; rdfs:comment "Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Doxing
Description: Doxing is when private and confidential information about individuals is researched and published online with malicious intent.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Doxing a owl:Class ; rdfs:label "Doxing"@en ; rdfs:comment "Doxing is when private and confidential information about individuals is researched and published online with malicious intent."@en ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Eavesdropping
Description: Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties.
Has Super Class (direct): sc2r:Interception
Has Super Class (all): sc2r:Interception | sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Eavesdropping a owl:Class ; rdfs:label "Eavesdropping"@en ; rdfs:comment "Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties."@en ; rdfs:subClassOf sc2r:Interception .
Label: Economic Harm
Description: Economic Harm is the harm that relates to negative financial or economic consequences.
Has Super Class (direct): sc2r:Harm
Has Sub Class (direct): sc2r:CompensationPayment | sc2r:DisruptedIncome | sc2r:DisruptedWork | sc2r:ExtorsionPayment | sc2r:Fine | sc2r:LossOfWork | sc2r:MitigationCost | sc2r:ScamCost | sc2r:TheftOfFinances | sc2r:TimeWasted
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:EconomicHarm a owl:Class ; rdfs:label "Economic Harm" ; rdfs:comment "Economic Harm is the harm that relates to negative financial or economic consequences." ; rdfs:subClassOf sc2r:Harm .
Label: Electricity
Description: Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings.
Has Super Class (direct): sc2r:InfrastructureResource
Has Super Class (all): sc2r:InfrastructureResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Electricity a owl:Class ; rdfs:label "Electricity" ; rdfs:comment "Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings." ; rdfs:subClassOf sc2r:InfrastructureResource .
Label: Email Hygiene
Description: Email hygiene are measures and practices that contribute to safe and secure use of email.
Has Super Class (direct): sc2r:WebHygiene
Has Super Class (all): sc2r:WebHygiene | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:EmailHygiene a owl:Class ; rdfs:label "Email Hygiene" ; rdfs:comment "Email hygiene are measures and practices that contribute to safe and secure use of email." ; rdfs:subClassOf sc2r:WebHygiene .
Label: Embarrassed
Description: Embarrassed is the state in which the individual feels humiliated or shameful.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Embarrassed a owl:Class ; rdfs:label "Embarrassed" ; rdfs:comment "Embarrassed is the state in which the individual feels humiliated or shameful." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Engage Measure
Description: Engage measures involve direct handling of and engagement with the adverse cyber incident.
Has Super Class (direct): sc2r:AbsorbMeasure
Has Super Class (all): sc2r:AbsorbMeasure | sc2r:Response
Has Sub Class (direct): sc2r:ConfrontThreat | sc2r:DisconnectMeasure | sc2r:IsolateMeasure | sc2r:RemovalMeasure
Has Sub Class (all): sc2r:ConfrontThreat | sc2r:DisconnectMeasure | sc2r:IsolateMeasure | sc2r:RemovalMeasure | sc2r:MaliciousContactRemoval | sc2r:MaliciousContentRemoval | sc2r:MaliciousSoftwareRemoval
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:EngageMeasure a owl:Class ; rdfs:label "Engage Measure" ; rdfs:comment "Engage measures involve direct handling of and engagement with the adverse cyber incident." ; rdfs:subClassOf sc2r:AbsorbMeasure .
Label: Engineered Content
Description: Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:EngineeredContent a owl:Class ; rdfs:label "Engineered Content"@en ; rdfs:comment "Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives."@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Environmental Threat
Description: Environmental Threats emanate from individuals' wider environmental and institutional context.
Has Super Class (direct): sc2r:Threat
Has Sub Class (direct): sc2r:InstitutionalThreat | sc2r:NaturalDisaster
Has Sub Class (all): sc2r:InstitutionalThreat | sc2r:Censorship | sc2r:Surveillance | sc2r:Violation | sc2r:ContractBreach | sc2r:NaturalDisaster
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:EnvironmentalThreat a owl:Class ; rdfs:label "Environmental Threat"@en ; rdfs:comment "Environmental Threats emanate from individuals' wider environmental and institutional context."@en ; rdfs:subClassOf sc2r:Threat .
Label: Evolve Measure
Description: The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning.
Has Super Class (direct): sc2r:AdaptMeasure
Has Super Class (all): sc2r:AdaptMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Evolve a owl:Class ; rdfs:label "Evolve Measure" ; rdfs:comment "The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning." ; rdfs:subClassOf sc2r:AdaptMeasure .
Label: Exposed
Description: Exposed is the state in which the resources are physically or digitally disclosed.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Exposed a owl:Class ; rdfs:label "Exposed" ; rdfs:comment "Exposed is the state in which the resources are physically or digitally disclosed." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Right to Expression
Description: The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues.
Has Super Class (direct): sc2r:Right
Has Super Class (all): sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Expression a owl:Class ; rdfs:label "Right to Expression" ; rdfs:comment "The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues." ; rdfs:subClassOf sc2r:Right .
Label: External Hard Drive
Description: External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection.
Has Super Class (direct): sc2r:StorageAsset
Has Super Class (all): sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ExternalHardDrive a owl:Class ; rdfs:label "External Hard Drive" ; rdfs:comment "External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection." ; rdfs:subClassOf sc2r:StorageAsset .
Label: External Support
Description: External support involves receiving external input and support towards recovering and restoring cyber functioning.
Has Super Class (direct): sc2r:RecoverMeasure
Has Super Class (all): sc2r:RecoverMeasure | sc2r:Response
Has Sub Class (direct): sc2r:ProfessionalSupport | sc2r:SocialSupport
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ExternalSupport a owl:Class ; rdfs:label "External Support" ; rdfs:comment "External support involves receiving external input and support towards recovering and restoring cyber functioning." ; rdfs:subClassOf sc2r:RecoverMeasure .
Label: Extorsion Payment
Description: Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents).
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ExtorsionPayment a owl:Class ; rdfs:label "Extorsion Payment" ; rdfs:comment "Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents)." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Extortion
Description: Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Extortion a owl:Class ; rdfs:label "Extortion"@en ; rdfs:comment "Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Fabrication
Description: Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity.
Has Super Class (direct): sc2r:AuthenticationThreat
Has Super Class (all): sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Fabrication a owl:Class ; rdfs:label "Fabrication"@en ; rdfs:comment "Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity."@en ; rdfs:subClassOf sc2r:AuthenticationThreat .
Label: Fact-checking
Description: Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident. In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident.
Has Super Class (direct): sc2r:RecoverMeasure
Has Super Class (all): sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Fact-checking a owl:Class ; rdfs:label "Fact-checking" ; rdfs:comment """Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident. In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident.""" ; rdfs:subClassOf sc2r:RecoverMeasure .
Label: Failure Detection
Description: Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources.
Has Super Class (direct): sc2r:ThreatMonitoringMeasure
Has Super Class (all): sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:FailureDetection a owl:Class ; rdfs:label "Failure Detection" ; rdfs:comment "Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources." ; rdfs:subClassOf sc2r:ThreatMonitoringMeasure .
Label: Fake Giveaways
Description: Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee.
Has Super Class (direct): sc2r:Scam
Has Super Class (all): sc2r:Scam | sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:FakeGiveways a owl:Class ; rdfs:label "Fake Giveaways"@en ; rdfs:comment "Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee." ; rdfs:subClassOf sc2r:Scam .
Label: Fake News
Description: Fake News is news that include deliberate disinformation content.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:FakeNews a owl:Class ; rdfs:label "Fake News"@en ; rdfs:comment "Fake News is news that include deliberate disinformation content."@en ; rdfs:seeAlso sc2r:Disinformation, sc2r:Malinformation ; rdfs:subClassOf sc2r:Disinformation .
Label: Fear
Description: Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Fear a owl:Class ; rdfs:label "Fear" ; rdfs:comment "Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone." ; rdfs:subClassOf sc2r:Individual .
Label: Feeling Upset
Description: Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:FeelingUpset a owl:Class ; rdfs:label "Feeling Upset" ; rdfs:comment "Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: File Resource
Description: A File is an object on a computer that stores data, information, settings, or commands used with a computer program.
Has Super Class (direct): sc2r:Data
Has Super Class (all): sc2r:Data | sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:CyptoCurrency
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:File a owl:Class ; rdfs:label "File Resource" ; rdfs:comment "A File is an object on a computer that stores data, information, settings, or commands used with a computer program." ; rdfs:subClassOf sc2r:Data .
Label: Financial Data
Description: Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow.
Has Super Class (direct): sc2r:IdentifyingData
Has Super Class (all): sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:FinancialData a owl:Class ; rdfs:label "Financial Data" ; rdfs:comment "Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow." ; rdfs:subClassOf sc2r:IdentifyingData .
Label: Fine Payment
Description: Fine Payment refers to the fine that the individual is liable to pay.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Fine a owl:Class ; rdfs:label "Fine Payment" ; rdfs:comment "Fine Payment refers to the fine that the individual is liable to pay." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Firehosing
Description: Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues.
Has Super Class (direct): sc2r:MalignRhetoric
Has Super Class (all): sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Firehosing a owl:Class ; rdfs:label "Firehosing" ; rdfs:comment "Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues." ; rdfs:subClassOf sc2r:MalignRhetoric .
Label: Firewall
Description: Firewall is a mechanism for allowing and denying access to specific network resources.
Has Super Class (direct): sc2r:AccessControl
Has Super Class (all): sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Firewall a owl:Class ; rdfs:label "Firewall" ; rdfs:comment "Firewall is a mechanism for allowing and denying access to specific network resources." ; rdfs:subClassOf sc2r:AccessControl .
Label: Flaming
Description: Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Flaming a owl:Class ; rdfs:label "Flaming"@en ; rdfs:comment "Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Flaming_(Internet)"@en ; rdfs:subClassOf sc2r:Abuse .
Label: Flooding
Description: Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Flooding a owl:Class ; rdfs:label "Flooding"@en ; rdfs:comment "Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources." ; rdfs:subClassOf sc2r:SocialHacking .
Label: Forging
Description: Forging is the illegitimate dissemination of falsified evidence.
Has Super Class (direct): sc2r:Deceit
Has Super Class (all): sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Forging a owl:Class ; rdfs:label "Forging"@en ; rdfs:comment "Forging is the illegitimate dissemination of falsified evidence." ; rdfs:subClassOf sc2r:Deceit .
Label: Fraud
Description: Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud.
Has Super Class (direct): sc2r:TheftThreat
Has Super Class (all): sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Fraud a owl:Class ; rdfs:label "Fraud"@en ; rdfs:comment "Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud." ; rdfs:subClassOf sc2r:TheftThreat .
Label: Frustration
Description: Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Frustration a owl:Class ; rdfs:label "Frustration" ; rdfs:comment "Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Gish Galloping
Description: Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting.
Has Super Class (direct): sc2r:MalignRhetoric
Has Super Class (all): sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:GishGalloping a owl:Class ; rdfs:label "Gish Galloping"@en ; rdfs:comment "Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting."@en ; rdfs:subClassOf sc2r:MalignRhetoric .
Label: Gluttony
Description: Gluttony refers to over-indulgence in being online.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Gluttony a owl:Class ; rdfs:label "Gluttony" ; rdfs:comment "Gluttony refers to over-indulgence in being online." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Greed
Description: Greed is an overwhelming urge to have more of something, usually more than needed.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Greed a owl:Class ; rdfs:label "Greed" ; rdfs:comment "Greed is an overwhelming urge to have more of something, usually more than needed." ; rdfs:subClassOf sc2r:Individual .
Label: Grooming
Description: Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Grooming a owl:Class ; rdfs:label "Grooming" ; rdfs:comment "Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Guilt
Description: Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Guilt a owl:Class ; rdfs:label "Guilt" ; rdfs:comment "Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad." ; rdfs:subClassOf sc2r:Individual .
Label: Guilty
Description: Guilty refers to the state in which the individual feels regretful or remorse.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Guilty a owl:Class ; rdfs:label "Guilty" ; rdfs:comment "Guilty refers to the state in which the individual feels regretful or remorse." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: HardwareVulnerability
Description: Hardware Vulnerabilities are exploitable weaknesses in a computer system that enables attack through remote or physical access to system hardware. - Hardware Vulnerability
Has Super Class (direct): sc2r:Physical
Has Super Class (all): sc2r:Physical | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:HardwareVulnerability a owl:Class ; rdfs:comment "Hardware Vulnerabilities are exploitable weaknesses in a computer system that enables attack through remote or physical access to system hardware.", "Hardware Vulnerability" ; rdfs:subClassOf sc2r:Physical .
Label: Harm
Description: A Harm, also called Impact, is the negative consequences of unmitigated Threats
Has Sub Class (direct): sc2r:EconomicHarm | sc2r:PhysicalHarm | sc2r:PsychologicalHarm | sc2r:ReputationalHarm | sc2r:SocialHarm
Has Sub Class (all): sc2r:EconomicHarm | sc2r:CompensationPayment | sc2r:DisruptedIncome | sc2r:DisruptedWork | sc2r:ExtorsionPayment | sc2r:Fine | sc2r:LossOfWork | sc2r:MitigationCost | sc2r:ScamCost | sc2r:TheftOfFinances | sc2r:TimeWasted | sc2r:PhysicalHarm | sc2r:Abused | sc2r:BodilyInjury | sc2r:Pain | sc2r:SelfHarm | sc2r:Compromised | sc2r:Corrupted | sc2r:Destroyed | sc2r:Exposed | sc2r:Infected | sc2r:LossOfLife | sc2r:ReducedPerformance | sc2r:Theft | sc2r:Unavailable | sc2r:PsychologicalHarm | sc2r:Addiction | sc2r:CognitiveImpairement | sc2r:Confusion | sc2r:Misled | sc2r:Depressed | sc2r:Discomfort | sc2r:Disempowerment | sc2r:Distraction | sc2r:Embarrassed | sc2r:FeelingUpset | sc2r:Frustration | sc2r:Gluttony | sc2r:Guilty | sc2r:IdentityTheftLoss | sc2r:LossOfConfidence | sc2r:LowMorale | sc2r:LowSatisfaction | sc2r:Mistreatment | sc2r:NegativePerception | sc2r:Overwhelmed | sc2r:Prosecution | sc2r:SelfCensorship | sc2r:Shameful | sc2r:Worried | sc2r:ReputationalHarm | sc2r:Blacklisted | sc2r:DamagedSocialPerception | sc2r:ReducedOpportunities | sc2r:UnderScrutiny | sc2r:SocialHarm | sc2r:Conflict | sc2r:DamagedRelationship | sc2r:ImpairedPrivateSocialBoundary | sc2r:Isolation | sc2r:Radicalisation | sc2r:SocialWithdrawal
In Domain Of: sc2r:canBeResultOf | sc2r:isResultOf
In Range Of: sc2r:canResultIn | sc2r:resultsIn
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Harm a owl:Class ; rdfs:label "Harm"@en ; rdfs:comment "A Harm, also called Impact, is the negative consequences of unmitigated Threats"@en .
Label: Helpfulness
Description: Helpfulness is the quality of being ready to give help.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Helpfulness a owl:Class ; rdfs:label "Helpfulness" ; rdfs:comment "Helpfulness is the quality of being ready to give help." ; rdfs:subClassOf sc2r:Individual .
Label: Humor and Meme
Description: Humor and Memes that are employed to influence individuals and shape narratives.
Has Super Class (direct): sc2r:InfluenceOperation
Has Super Class (all): sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:HumorAndMeme a owl:Class ; rdfs:label "Humor and Meme"@en ; rdfs:comment "Humor and Memes that are employed to influence individuals and shape narratives."@en ; rdfs:subClassOf sc2r:InfluenceOperation .
Label: Identification
Description: Identification is a prevention measure that involves confirming claimed identity online.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:DeviceIdentification | sc2r:MultiFactorAuthentication | sc2r:MutualAuthentication | sc2r:PasswordManagement | sc2r:UserIdentification
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Identification a owl:Class ; rdfs:label "Identification" ; rdfs:comment "Identification is a prevention measure that involves confirming claimed identity online." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Identifying Data
Description: Identifying Data includes all kinds of data that can be used to identify an individual and their personal information.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:Credential | sc2r:FinancialData
Has Sub Class (all): sc2r:Credential | sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken | sc2r:FinancialData
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IdentifyingData a owl:Class ; rdfs:label "Identifying Data" ; rdfs:comment "Identifying Data includes all kinds of data that can be used to identify an individual and their personal information." ; rdfs:subClassOf sc2r:PersonalData .
Label: Identity
Description: Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status.
Has Super Class (direct): sc2r:IndividualResource
Has Super Class (all): sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Identity a owl:Class ; rdfs:label "Identity" ; rdfs:comment "Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status." ; rdfs:subClassOf sc2r:IndividualResource .
Label: Identity Theft
Description: Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
Has Super Class (direct): sc2r:TheftThreat
Has Super Class (all): sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IdentityTheft a owl:Class ; rdfs:label "Identity Theft"@en ; rdfs:comment "Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Identity_theft"@en ; rdfs:subClassOf sc2r:TheftThreat .
Label: Identity Theft Harm
Description: Identity Theft Loss refers to the state in which the individual's personal information is stolen.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IdentityTheftLoss a owl:Class ; rdfs:label "Identity Theft Harm" ; rdfs:comment "Identity Theft Loss refers to the state in which the individual's personal information is stolen." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Impaired Private Social Boundary
Description: Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ImpairedPrivateSocialBoundary a owl:Class ; rdfs:label "Impaired Private Social Boundary" ; rdfs:comment "Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Impulsiveness
Description: Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Impulsiveness a owl:Class ; rdfs:label "Impulsiveness" ; rdfs:comment "Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences." ; rdfs:subClassOf sc2r:Individual .
Label: Inadvertent Information Disclosure
Description: Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InadvertentDisclosure a owl:Class ; rdfs:label "Inadvertent Information Disclosure"@en ; rdfs:comment "Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently."@en ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Inappropriate Content
Description: Inappropriate information is content that causes harm to individuals who consume it.
Has Super Class (direct): sc2r:Malinformation
Has Super Class (all): sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:OffensiveLanguage | sc2r:Pornography | sc2r:Profanity | sc2r:Violence
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InappropriateContent a owl:Class ; rdfs:label "Inappropriate Content"@en ; rdfs:comment "Inappropriate information is content that causes harm to individuals who consume it."@en ; rdfs:subClassOf sc2r:Malinformation .
Label: Incident Reporting
Description: Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals.
Has Super Class (direct): sc2r:Reporting
Has Super Class (all): sc2r:Reporting | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IncidentReporting a owl:Class ; rdfs:label "Incident Reporting" ; rdfs:comment "Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals." ; rdfs:subClassOf sc2r:Reporting .
Label: Increase Resource Measure
Description: This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources. For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning.
Has Super Class (direct): sc2r:WithstandMeasure
Has Super Class (all): sc2r:WithstandMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IncreaseResources a owl:Class ; rdfs:label "Increase Resource Measure" ; rdfs:comment """This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources. For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning.""" ; rdfs:subClassOf sc2r:WithstandMeasure .
Label: Individual and Personal Vulnerability
Description: Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats.
Has Super Class (direct): sc2r:Vulnerability
Has Sub Class (direct): sc2r:Conscientiousness | sc2r:Curiosity | sc2r:DiffusionOfResponsibility | sc2r:Fear | sc2r:Greed | sc2r:Guilt | sc2r:Helpfulness | sc2r:Impulsiveness | sc2r:Sympathy | sc2r:Urgency
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Individual a owl:Class ; rdfs:label "Individual and Personal Vulnerability" ; rdfs:comment "Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats." ; rdfs:subClassOf sc2r:Vulnerability .
Label: Individual Personal Resource
Description: Individual resources are a combination of natural endowments and what is acquired through social relationships.
Has Super Class (direct): sc2r:Resource
Has Sub Class (direct): sc2r:Agency | sc2r:Identity | sc2r:Right | sc2r:SocialCapital
Has Sub Class (all): sc2r:Agency | sc2r:MentalFaculties | sc2r:Knowledge | sc2r:Motivation | sc2r:Skills | sc2r:Identity | sc2r:Right | sc2r:Assembly | sc2r:Expression | sc2r:Information | sc2r:Opinion | sc2r:Privacy | sc2r:InformationalPrivacy | sc2r:PhysicalPrivacy | sc2r:PsychologicalPrivacy | sc2r:SocialPrivacy | sc2r:TerritorialPrivacy | sc2r:SocialCapital | sc2r:Reputation | sc2r:SocialNetwork
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IndividualResource a owl:Class ; rdfs:label "Individual Personal Resource" ; rdfs:comment "Individual resources are a combination of natural endowments and what is acquired through social relationships." ; rdfs:subClassOf sc2r:Resource .
Label: Infected
Description: Infected is the state in which the resources are physically or digitally contaminated.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Infected a owl:Class ; rdfs:label "Infected" ; rdfs:comment "Infected is the state in which the resources are physically or digitally contaminated." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Influence Operation
Description: Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:HumorAndMeme | sc2r:Parody | sc2r:Satire
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InfluenceOperation a owl:Class ; rdfs:label "Influence Operation"@en ; rdfs:comment "Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others."@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Influence Threat
Description: Influence Threat is any threat that is intended to influence individual's perceptions and prejudices.
Has Super Class (direct): sc2r:CognitiveThreat
Has Super Class (all): sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Coercion | sc2r:Extortion | sc2r:InformationOverload | sc2r:PsychographicHacking | sc2r:Scareware | sc2r:SocialEngineering
Has Sub Class (all): sc2r:Coercion | sc2r:Extortion | sc2r:InformationOverload | sc2r:PsychographicHacking | sc2r:BandwagonEffect | sc2r:DarkAdvertising | sc2r:Microtargeting | sc2r:Scareware | sc2r:SocialEngineering | sc2r:Baiting | sc2r:Phishing | sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InfluenceThreat a owl:Class ; rdfs:label "Influence Threat" ; rdfs:comment "Influence Threat is any threat that is intended to influence individual's perceptions and prejudices." ; rdfs:subClassOf sc2r:CognitiveThreat .
Label: Right to Information
Description: The Right to Information is individual's right to access personal and non-personal information held by government.
Has Super Class (direct): sc2r:Right
Has Super Class (all): sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Information a owl:Class ; rdfs:label "Right to Information" ; rdfs:comment "The Right to Information is individual's right to access personal and non-personal information held by government." ; rdfs:subClassOf sc2r:Right .
Label: Information Flooding
Description: Information Flooding occurs when individuals are exposed to too much information and data.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InformationFlooding a owl:Class ; rdfs:label "Information Flooding"@en ; rdfs:comment "Information Flooding occurs when individuals are exposed to too much information and data."@en ; rdfs:subClassOf sc2r:Abuse ; owl:equivalentClass sc2r:InformationOverload .
Label: Information Overload
Description: Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InformationOverload a owl:Class ; rdfs:label "Information Overload"@en ; rdfs:comment "Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Right to Information Privacy
Description: Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others.
Has Super Class (direct): sc2r:Privacy
Has Super Class (all): sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InformationalPrivacy a owl:Class ; rdfs:label "Right to Information Privacy" ; rdfs:comment "Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others." ; rdfs:subClassOf sc2r:Privacy .
Label: Infrastructure Resource
Description: Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data.
Has Super Class (direct): sc2r:Resource
Has Sub Class (direct): sc2r:Electricity | sc2r:InternetConnectivity
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InfrastructureResource a owl:Class ; rdfs:label "Infrastructure Resource" ; rdfs:comment "Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data." ; rdfs:subClassOf sc2r:Resource .
Label: Institutional Threat
Description: Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context.
Has Super Class (direct): sc2r:EnvironmentalThreat
Has Super Class (all): sc2r:EnvironmentalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Censorship | sc2r:Surveillance | sc2r:Violation
Has Sub Class (all): sc2r:Censorship | sc2r:Surveillance | sc2r:Violation | sc2r:ContractBreach
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InstitutionalThreat a owl:Class ; rdfs:label "Institutional Threat"@en ; rdfs:comment "Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context."@en ; rdfs:subClassOf sc2r:EnvironmentalThreat .
Label: Integrity Threat
Description: Integrity Threats compromise the Integrity cybersecurity goal.
Has Super Class (direct): sc2r:TechnologicalThreat
Has Super Class (all): sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Damage | sc2r:DataCorruption | sc2r:DataError | sc2r:Malfunction | sc2r:Malware | sc2r:Misconfiguration | sc2r:RemoteExecution | sc2r:Replay | sc2r:Vandalism
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IntegrityThreat a owl:Class ; rdfs:label "Integrity Threat"@en ; rdfs:comment "Integrity Threats compromise the Integrity cybersecurity goal."@en ; rdfs:subClassOf sc2r:TechnologicalThreat .
Label: Interception
Description: Interception occurs when unauthorized access is gained to private or confidential information.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Eavesdropping
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Interception a owl:Class ; rdfs:label "Interception"@en ; rdfs:comment "Interception occurs when unauthorized access is gained to private or confidential information."@en ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Internet Connectivity
Description: Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices.
Has Super Class (direct): sc2r:InfrastructureResource
Has Super Class (all): sc2r:InfrastructureResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:InternetConnectivity a owl:Class ; rdfs:label "Internet Connectivity" ; rdfs:comment "Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices." ; rdfs:subClassOf sc2r:InfrastructureResource .
Label: Intimacy Threat
Description: Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened.
Has Super Class (direct): sc2r:PrivacyThreat
Has Super Class (all): sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IntimacyThreat a owl:Class ; rdfs:label "Intimacy Threat"@en ; rdfs:comment "Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened." ; rdfs:subClassOf sc2r:PrivacyThreat .
Label: Intrusion Detection
Description: Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources.
Has Super Class (direct): sc2r:ThreatMonitoringMeasure
Has Super Class (all): sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IntrusionDetection a owl:Class ; rdfs:label "Intrusion Detection" ; rdfs:comment "Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources." ; rdfs:subClassOf sc2r:ThreatMonitoringMeasure .
Label: Isolate Measure
Description: The isolate measure involves isolating the affected cyber resources from the connection with the threat. While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context.
Has Super Class (direct): sc2r:EngageMeasure
Has Super Class (all): sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:IsolateMeasure a owl:Class ; rdfs:label "Isolate Measure" ; rdfs:comment """The isolate measure involves isolating the affected cyber resources from the connection with the threat. While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context.""" ; rdfs:subClassOf sc2r:EngageMeasure .
Label: Isolation
Description: Isolation refers to the individual's act of completely separating themselves from others.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Isolation a owl:Class ; rdfs:label "Isolation" ; rdfs:comment "Isolation refers to the individual's act of completely separating themselves from others." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Knowledge Resource
Description: Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education.
Has Super Class (direct): sc2r:MentalFaculties
Has Super Class (all): sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Knowledge a owl:Class ; rdfs:label "Knowledge Resource" ; rdfs:comment "Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education." ; rdfs:subClassOf sc2r:MentalFaculties .
Label: Laptop
Description: A Laptop is a portable computer.
Has Super Class (direct): sc2r:ComputingAsset
Has Super Class (all): sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Laptop a owl:Class ; rdfs:label "Laptop" ; rdfs:comment "A Laptop is a portable computer." ; rdfs:subClassOf sc2r:ComputingAsset .
Label: Laundering
Description: Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Laundering a owl:Class ; rdfs:label "Laundering" ; rdfs:comment "Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none." ; rdfs:subClassOf sc2r:SocialHacking .
Label: Least Privilege
Description: Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions.
Has Super Class (direct): sc2r:AccessControl
Has Super Class (all): sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LeastPrivilege a owl:Class ; rdfs:label "Least Privilege" ; rdfs:comment "Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions." ; rdfs:subClassOf sc2r:AccessControl .
Label: Location Data
Description: Location data is geographial information about a specific device's whereabouts associated to a time identifier.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LocationData a owl:Class ; rdfs:label "Location Data" ; rdfs:comment "Location data is geographial information about a specific device's whereabouts associated to a time identifier." ; rdfs:subClassOf sc2r:PersonalData .
Label: Logging and Audit
Description: Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources.
Has Super Class (direct): sc2r:MonitoringMeasure
Has Super Class (all): sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LoggingAndAudit a owl:Class ; rdfs:label "Logging and Audit" ; rdfs:comment "Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources." ; rdfs:subClassOf sc2r:MonitoringMeasure .
Label: Loss of Confidence
Description: Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LossOfConfidence a owl:Class ; rdfs:label "Loss of Confidence" ; rdfs:comment "Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Loss of Life
Description: Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LossOfLife a owl:Class ; rdfs:label "Loss of Life" ; rdfs:comment "Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Loss of Work
Description: Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LossOfWork a owl:Class ; rdfs:label "Loss of Work" ; rdfs:comment "Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Lost Credentials
Description: Lost Credentials is when access to information and services is not possible due to lost account creditials.
Has Super Class (direct): sc2r:AvailabilityThreat
Has Super Class (all): sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LostCredentials a owl:Class ; rdfs:label "Lost Credentials"@en ; rdfs:comment "Lost Credentials is when access to information and services is not possible due to lost account creditials."@en ; rdfs:subClassOf sc2r:AvailabilityThreat .
Label: Lost Devices
Description: This is a loss of computing devices that results in lack of access to the associated information and services.
Has Super Class (direct): sc2r:AvailabilityThreat
Has Super Class (all): sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LostDevices a owl:Class ; rdfs:label "Lost Devices"@en ; rdfs:comment "This is a loss of computing devices that results in lack of access to the associated information and services."@en ; rdfs:subClassOf sc2r:AvailabilityThreat .
Label: Love Bombing
Description: Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LoveBombing a owl:Class ; rdfs:label "Love Bombing" ; rdfs:comment "Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Low Morale
Description: Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LowMorale a owl:Class ; rdfs:label "Low Morale" ; rdfs:comment "Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Low Satisfaction
Description: Low Satisfaction refers to the state in which the individual experiences a lack of contentment.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:LowSatisfaction a owl:Class ; rdfs:label "Low Satisfaction" ; rdfs:comment "Low Satisfaction refers to the state in which the individual experiences a lack of contentment." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Luring Sexual Threat
Description: Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Luring a owl:Class ; rdfs:label "Luring Sexual Threat" ; rdfs:comment "Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Malfunction
Description: Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Malfunction a owl:Class ; rdfs:label "Malfunction"@en ; rdfs:comment "Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Malicious Contact Removal
Description: This measures involves the removal and elimination of contact with an individual who is a threat actor.
Has Super Class (direct): sc2r:RemovalMeasure
Has Super Class (all): sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MaliciousContactRemoval a owl:Class ; rdfs:label "Malicious Contact Removal" ; rdfs:comment "This measures involves the removal and elimination of contact with an individual who is a threat actor." ; rdfs:subClassOf sc2r:RemovalMeasure .
Label: Malicious Content Removal
Description: This measures involves the removal and elimination of content that is a cause of a cyber threat.
Has Super Class (direct): sc2r:RemovalMeasure
Has Super Class (all): sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MaliciousContentRemoval a owl:Class ; rdfs:label "Malicious Content Removal" ; rdfs:comment "This measures involves the removal and elimination of content that is a cause of a cyber threat." ; rdfs:subClassOf sc2r:RemovalMeasure .
Label: Malicious Software Detection
Description: Malicious software detection involves scanning computing equipment to check for the presence of malicious software.
Has Super Class (direct): sc2r:ThreatMonitoringMeasure
Has Super Class (all): sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MaliciousSoftwareDetection a owl:Class ; rdfs:label "Malicious Software Detection" ; rdfs:comment "Malicious software detection involves scanning computing equipment to check for the presence of malicious software." ; rdfs:subClassOf sc2r:ThreatMonitoringMeasure .
Label: Malicious Software Removal
Description: This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat.
Has Super Class (direct): sc2r:RemovalMeasure
Has Super Class (all): sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MaliciousSoftwareRemoval a owl:Class ; rdfs:label "Malicious Software Removal" ; rdfs:comment "This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat." ; rdfs:subClassOf sc2r:RemovalMeasure .
Label: Malign Rhetoric
Description: Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Firehosing | sc2r:GishGalloping | sc2r:Strawman | sc2r:Transfer | sc2r:WhatAboutism
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MalignRhetoric a owl:Class ; rdfs:label "Malign Rhetoric"@en ; rdfs:comment "Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold."@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Malinformation
Description: Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm.
Has Super Class (direct): sc2r:CognitiveThreat
Has Super Class (all): sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:InappropriateContent
Has Sub Class (all): sc2r:InappropriateContent | sc2r:OffensiveLanguage | sc2r:Pornography | sc2r:Profanity | sc2r:Violence
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Malinformation a owl:Class ; rdfs:label "Malinformation"@en ; rdfs:comment "Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm."@en ; rdfs:subClassOf sc2r:CognitiveThreat .
Label: Malware
Description: Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Malware a owl:Class ; rdfs:label "Malware"@en ; rdfs:comment "Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Masquerading
Description: Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim.
Has Super Class (direct): sc2r:AuthenticationThreat
Has Super Class (all): sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Masquerading a owl:Class ; rdfs:label "Masquerading"@en ; rdfs:comment "Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim."@en ; rdfs:subClassOf sc2r:AuthenticationThreat .
Label: Mediation Measures
Description: Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents. For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming.
Has Super Class (direct): sc2r:PrepareMeasure
Has Super Class (all): sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:ActiveMediation | sc2r:RestrictiveMediation | sc2r:TechnicalMediation
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MediationMeasures a owl:Class ; rdfs:label "Mediation Measures" ; rdfs:comment """Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents. For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming.""" ; rdfs:subClassOf sc2r:PrepareMeasure .
Label: Mental Faculties
Description: Mental Faculties are the various functions of the mind, or things the mind can "do". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process.
Has Super Class (direct): sc2r:Agency
Has Super Class (all): sc2r:Agency | sc2r:IndividualResource | sc2r:Resource
Has Sub Class (direct): sc2r:Knowledge | sc2r:Motivation | sc2r:Skills
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MentalFaculties a owl:Class ; rdfs:label "Mental Faculties" ; rdfs:comment "Mental Faculties are the various functions of the mind, or things the mind can \"do\". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process." ; rdfs:subClassOf sc2r:Agency .
Label: Microtargeting
Description: Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions.
Has Super Class (direct): sc2r:PsychographicHacking
Has Super Class (all): sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Microtargeting a owl:Class ; rdfs:label "Microtargeting"@en ; rdfs:comment "Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions." ; rdfs:subClassOf sc2r:PsychographicHacking .
Label: Misconfiguration
Description: Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Misconfiguration a owl:Class ; rdfs:label "Misconfiguration"@en ; rdfs:comment "Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Misinformation
Description: Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda.
Has Super Class (direct): sc2r:CognitiveThreat
Has Super Class (all): sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:MisleadingInformation
Has Sub Class (all): sc2r:MisleadingInformation | sc2r:MisleadingAdvertising
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Misinformation a owl:Class ; rdfs:label "Misinformation"@en ; rdfs:comment "Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Misinformation"@en ; rdfs:subClassOf sc2r:CognitiveThreat .
Label: Misleading Advertising
Description: This is advertising content that is meant to mislead consumers.
Has Super Class (direct): sc2r:MisleadingInformation
Has Super Class (all): sc2r:MisleadingInformation | sc2r:Misinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MisleadingAdvertising a owl:Class ; rdfs:label "Misleading Advertising"@en ; rdfs:comment "This is advertising content that is meant to mislead consumers." ; rdfs:subClassOf sc2r:MisleadingInformation .
Label: Misleading Information
Description: Misleading Information is content that is meant to mislead or misinform.
Has Super Class (direct): sc2r:Misinformation
Has Super Class (all): sc2r:Misinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:MisleadingAdvertising
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MisleadingInformation a owl:Class ; rdfs:label "Misleading Information"@en ; rdfs:comment "Misleading Information is content that is meant to mislead or misinform." ; rdfs:subClassOf sc2r:Misinformation .
Label: Misled
Description: Misled is the state in which the individual is led to believe something that is not true.
Has Super Class (direct): sc2r:Confusion
Has Super Class (all): sc2r:Confusion | sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Misled a owl:Class ; rdfs:label "Misled" ; rdfs:comment "Misled is the state in which the individual is led to believe something that is not true." ; rdfs:subClassOf sc2r:Confusion .
Label: Mistreatment
Description: Mistreatment refers to the state in which the individual feels mistreated.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Mistreatment a owl:Class ; rdfs:label "Mistreatment" ; rdfs:comment "Mistreatment refers to the state in which the individual feels mistreated." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Mitigation Cost
Description: Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MitigationCost a owl:Class ; rdfs:label "Mitigation Cost" ; rdfs:comment "Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Mobile Device
Description: Mobile Device is any portable computing device, such as a smartphone or tablet computer.
Has Super Class (direct): sc2r:ComputingAsset
Has Super Class (all): sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MobileDevice a owl:Class ; rdfs:label "Mobile Device" ; rdfs:comment "Mobile Device is any portable computing device, such as a smartphone or tablet computer." ; rdfs:subClassOf sc2r:ComputingAsset .
Label: Monitoring Measure
Description: Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources.
Has Super Class (direct): sc2r:PrepareMeasure
Has Super Class (all): sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:LoggingAndAudit | sc2r:ThreatMonitoringMeasure
Has Sub Class (all): sc2r:LoggingAndAudit | sc2r:ThreatMonitoringMeasure | sc2r:FailureDetection | sc2r:IntrusionDetection | sc2r:MaliciousSoftwareDetection | sc2r:SocialMediaMonitoring
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MonitoringMeasure a owl:Class ; rdfs:label "Monitoring Measure" ; rdfs:comment "Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources." ; rdfs:subClassOf sc2r:PrepareMeasure .
Label: Motivation
Description: Motivation is the internal needs, desires, wants or drives of individuals.
Has Super Class (direct): sc2r:MentalFaculties
Has Super Class (all): sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Motivation a owl:Class ; rdfs:label "Motivation" ; rdfs:comment "Motivation is the internal needs, desires, wants or drives of individuals." ; rdfs:subClassOf sc2r:MentalFaculties .
Label: Multifactor Authentication
Description: Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity.
Has Super Class (direct): sc2r:Identification
Has Super Class (all): sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MultiFactorAuthentication a owl:Class ; rdfs:label "Multifactor Authentication" ; rdfs:comment "Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity." ; rdfs:subClassOf sc2r:Identification .
Label: Mutual Authentication
Description: Mutual authentication is a process of two-way authentication between the communicating entities.
Has Super Class (direct): sc2r:Identification
Has Super Class (all): sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:MutualAuthentication a owl:Class ; rdfs:label "Mutual Authentication" ; rdfs:comment "Mutual authentication is a process of two-way authentication between the communicating entities." ; rdfs:subClassOf sc2r:Identification .
Label: Natural Disaster Threat
Description: Natural disasters affect the cyber resources that support individuals' cyber functionings.
Has Super Class (direct): sc2r:EnvironmentalThreat
Has Super Class (all): sc2r:EnvironmentalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NaturalDisaster a owl:Class ; rdfs:label "Natural Disaster Threat"@en ; rdfs:comment "Natural disasters affect the cyber resources that support individuals' cyber functionings."@en ; rdfs:subClassOf sc2r:EnvironmentalThreat .
Label: Negative Perception
Description: Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NegativePerception a owl:Class ; rdfs:label "Negative Perception" ; rdfs:comment "Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Network Equipment
Description: Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network.
Has Super Class (direct): sc2r:PhysicalResource
Has Super Class (all): sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NetworkEquipment a owl:Class ; rdfs:label "Network Equipment" ; rdfs:comment "Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network." ; rdfs:subClassOf sc2r:PhysicalResource .
Label: Network Intrusion
Description: Network intrusion occurs when there is unauthorized access to a digital network.
Has Super Class (direct): sc2r:UnauthorizedAccess
Has Super Class (all): sc2r:UnauthorizedAccess | sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NetworkIntrusion a owl:Class ; rdfs:label "Network Intrusion"@en ; rdfs:comment "Network intrusion occurs when there is unauthorized access to a digital network."@en ; rdfs:subClassOf sc2r:UnauthorizedAccess .
Label: Network Redundancy
Description: Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents.
Has Super Class (direct): sc2r:RedundancyMeasure
Has Super Class (all): sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NetworkRedundancy a owl:Class ; rdfs:label "Network Redundancy" ; rdfs:comment "Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents." ; rdfs:subClassOf sc2r:RedundancyMeasure .
Label: Network Vulnerability
Description: Network Vulnerabilities are weaknesses in the network resources.
Has Super Class (direct): sc2r:Digital
Has Super Class (all): sc2r:Digital | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NetworkVulnerability a owl:Class ; rdfs:label "Network Vulnerability" ; rdfs:comment "Network Vulnerabilities are weaknesses in the network resources." ; rdfs:subClassOf sc2r:Digital .
Label: Non-repudiation Threat
Description: Non-repudiation Threats compromise the non-repudiation cybersecurity goal.
Has Super Class (direct): sc2r:TechnologicalThreat
Has Super Class (all): sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:NonRepudiationThreat a owl:Class ; rdfs:label "Non-repudiation Threat"@en ; rdfs:comment "Non-repudiation Threats compromise the non-repudiation cybersecurity goal."@en ; rdfs:subClassOf sc2r:TechnologicalThreat .
Label: Offensive Language
Description: This is information and content that uses language that is offensive to individuals under specific contexts.
Has Super Class (direct): sc2r:InappropriateContent
Has Super Class (all): sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:OffensiveLanguage a owl:Class ; rdfs:label "Offensive Language"@en ; rdfs:comment "This is information and content that uses language that is offensive to individuals under specific contexts."@en ; rdfs:subClassOf sc2r:InappropriateContent ; owl:equivalentClass sc2r:Profanity .
Label: Online Service
Description: An Online Service refers to any information and services provided over the Internet.
Has Super Class (direct): sc2r:Software
Has Super Class (all): sc2r:Software | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:OnlineServices a owl:Class ; rdfs:label "Online Service" ; rdfs:comment "An Online Service refers to any information and services provided over the Internet." ; rdfs:subClassOf sc2r:Software .
Label: Right to Opinion
Description: The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction.
Has Super Class (direct): sc2r:Right
Has Super Class (all): sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Opinion a owl:Class ; rdfs:label "Right to Opinion" ; rdfs:comment "The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction." ; rdfs:subClassOf sc2r:Right .
Label: Opposing Information
Description: This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:OpposingInformation a owl:Class ; rdfs:label "Opposing Information"@en ; rdfs:comment "This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives."@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Overwhelmed
Description: Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Overwhelmed a owl:Class ; rdfs:label "Overwhelmed" ; rdfs:comment "Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Bodily Pain
Description: Pain refers to the experience of agony of the individual.
Has Super Class (direct): sc2r:BodilyInjury
Has Super Class (all): sc2r:BodilyInjury | sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Pain a owl:Class ; rdfs:label "Bodily Pain" ; rdfs:comment "Pain refers to the experience of agony of the individual." ; rdfs:subClassOf sc2r:BodilyInjury .
Label: Parasocial Hacking
Description: Parasocial Hacking exploits the biases arising from individual's parasocial relationships.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ParasocialHacking a owl:Class ; rdfs:label "Parasocial Hacking" ; rdfs:comment "Parasocial Hacking exploits the biases arising from individual's parasocial relationships." ; rdfs:subClassOf sc2r:SocialHacking .
Label: Parody
Description: Parody used in the context of an influence campaign to shape narratives and influence individuals.
Has Super Class (direct): sc2r:InfluenceOperation
Has Super Class (all): sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Parody a owl:Class ; rdfs:label "Parody"@en ; rdfs:comment "Parody used in the context of an influence campaign to shape narratives and influence individuals."@en ; rdfs:subClassOf sc2r:InfluenceOperation .
Label: Password Management
Description: Password management is the use of password of authentication in a safe and secure manner.
Has Super Class (direct): sc2r:Identification
Has Super Class (all): sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PasswordManagement a owl:Class ; rdfs:label "Password Management" ; rdfs:comment "Password management is the use of password of authentication in a safe and secure manner." ; rdfs:subClassOf sc2r:Identification .
Label: Persistence Sexual Threat
Description: Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.”
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Persistence a owl:Class ; rdfs:label "Persistence Sexual Threat" ; rdfs:comment "Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.”" ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Personal Data
Description: Personal data is any data relating to an identified or identifiable natural person (‘data subject’).
Has Super Class (direct): sc2r:Data
Has Super Class (all): sc2r:Data | sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:ActivityData | sc2r:BehaviouralData | sc2r:DemographicInformation | sc2r:IdentifyingData | sc2r:LocationData | sc2r:SocialContact | sc2r:UserGeneratedContent
Has Sub Class (all): sc2r:ActivityData | sc2r:BehaviouralData | sc2r:DemographicInformation | sc2r:IdentifyingData | sc2r:Credential | sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken | sc2r:FinancialData | sc2r:LocationData | sc2r:SocialContact | sc2r:UserGeneratedContent
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PersonalData a owl:Class ; rdfs:label "Personal Data" ; rdfs:comment "Personal data is any data relating to an identified or identifiable natural person (‘data subject’)." ; rdfs:subClassOf sc2r:Data .
Label: Individual and Personal Threat
Description: Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats.
Has Super Class (direct): sc2r:Threat
Has Sub Class (direct): sc2r:Abuse | sc2r:CognitiveThreat | sc2r:PrivacyThreat | sc2r:TheftThreat
Has Sub Class (all): sc2r:Abuse | sc2r:CyberPredator | sc2r:CyberStalking | sc2r:Cyberbullying | sc2r:Flaming | sc2r:InformationFlooding | sc2r:SexualAbuse | sc2r:BoyfriendingGirlfriending | sc2r:Grooming | sc2r:LoveBombing | sc2r:Luring | sc2r:Persistence | sc2r:Sextortion | sc2r:SexualAssault | sc2r:Trolling | sc2r:Sealioning | sc2r:UnsolicitedCommunication | sc2r:SpamEmail | sc2r:UnsolicitedSocialRequest | sc2r:CognitiveThreat | sc2r:DigitalHoarding | sc2r:Disinformation | sc2r:Deceit | sc2r:Forging | sc2r:PotemkinVillageEvidence | sc2r:Shilling | sc2r:EngineeredContent | sc2r:FakeNews | sc2r:InfluenceOperation | sc2r:HumorAndMeme | sc2r:Parody | sc2r:Satire | sc2r:MalignRhetoric | sc2r:Firehosing | sc2r:GishGalloping | sc2r:Strawman | sc2r:Transfer | sc2r:WhatAboutism | sc2r:OpposingInformation | sc2r:Propaganda | sc2r:InfluenceThreat | sc2r:Coercion | sc2r:Extortion | sc2r:InformationOverload | sc2r:PsychographicHacking | sc2r:BandwagonEffect | sc2r:DarkAdvertising | sc2r:Microtargeting | sc2r:Scareware | sc2r:SocialEngineering | sc2r:Baiting | sc2r:Phishing | sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating | sc2r:Malinformation | sc2r:InappropriateContent | sc2r:OffensiveLanguage | sc2r:Pornography | sc2r:Profanity | sc2r:Violence | sc2r:Misinformation | sc2r:MisleadingInformation | sc2r:MisleadingAdvertising | sc2r:PrivacyThreat | sc2r:AnonymityThreat | sc2r:IntimacyThreat | sc2r:ReserveThreat | sc2r:SolitudeThreat | sc2r:TheftThreat | sc2r:Fraud | sc2r:IdentityTheft | sc2r:Scam | sc2r:FakeGiveways | sc2r:SweepstakesScam
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PersonalThreat a owl:Class ; rdfs:label "Individual and Personal Threat"@en ; rdfs:comment "Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats."@en ; rdfs:subClassOf sc2r:Threat .
Label: Phishing
Description: Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source.
Has Super Class (direct): sc2r:SocialEngineering
Has Super Class (all): sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Vishing
Has Sub Class (all): sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Phishing a owl:Class ; rdfs:label "Phishing"@en ; rdfs:comment "Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source." ; rdfs:subClassOf sc2r:SocialEngineering .
Label: Physical Vulnerability
Description: Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own.
Has Super Class (direct): sc2r:Vulnerability
Has Sub Class (direct): sc2r:HardwareVulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Physical a owl:Class ; rdfs:label "Physical Vulnerability" ; rdfs:comment "Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own." ; rdfs:subClassOf sc2r:Vulnerability .
Label: Physical Harm
Description: Physical harm is the negative effect on physical or digital resources.
Has Super Class (direct): sc2r:Harm
Has Sub Class (direct): sc2r:Abused | sc2r:BodilyInjury | sc2r:Compromised | sc2r:Corrupted | sc2r:Destroyed | sc2r:Exposed | sc2r:Infected | sc2r:LossOfLife | sc2r:ReducedPerformance | sc2r:Theft | sc2r:Unavailable
Has Sub Class (all): sc2r:Abused | sc2r:BodilyInjury | sc2r:Pain | sc2r:SelfHarm | sc2r:Compromised | sc2r:Corrupted | sc2r:Destroyed | sc2r:Exposed | sc2r:Infected | sc2r:LossOfLife | sc2r:ReducedPerformance | sc2r:Theft | sc2r:Unavailable
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PhysicalHarm a owl:Class ; rdfs:label "Physical Harm" ; rdfs:comment "Physical harm is the negative effect on physical or digital resources." ; rdfs:subClassOf sc2r:Harm .
Label: Right to Physical Privacy
Description: Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude.
Has Super Class (direct): sc2r:Privacy
Has Super Class (all): sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PhysicalPrivacy a owl:Class ; rdfs:label "Right to Physical Privacy" ; rdfs:comment "Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude." ; rdfs:subClassOf sc2r:Privacy .
Label: Physical Resource
Description: Physical resources are technological resources in material form.
Has Super Class (direct): sc2r:Resource
Has Sub Class (direct): sc2r:ComputingAsset | sc2r:NetworkEquipment | sc2r:StorageAsset
Has Sub Class (all): sc2r:ComputingAsset | sc2r:Computer | sc2r:Laptop | sc2r:MobileDevice | sc2r:Server | sc2r:NetworkEquipment | sc2r:StorageAsset | sc2r:ExternalHardDrive | sc2r:SDCard | sc2r:USBDrive
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PhysicalResource a owl:Class ; rdfs:label "Physical Resource" ; rdfs:comment "Physical resources are technological resources in material form." ; rdfs:subClassOf sc2r:Resource .
Label: Physical Restriction
Description: This is the measure for restricting and limiting access to physical resources.
Has Super Class (direct): sc2r:AccessControl
Has Super Class (all): sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PhysicalRestriction a owl:Class ; rdfs:label "Physical Restriction" ; rdfs:comment "This is the measure for restricting and limiting access to physical resources." ; rdfs:subClassOf sc2r:AccessControl .
Label: Physical Token
Description: Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service.
Has Super Class (direct): sc2r:Credential
Has Super Class (all): sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PhysicalToken a owl:Class ; rdfs:label "Physical Token" ; rdfs:comment "Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service." ; rdfs:subClassOf sc2r:Credential .
Label: Piggybacking
Description: Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network.
Has Super Class (direct): sc2r:UnauthorizedAccess
Has Super Class (all): sc2r:UnauthorizedAccess | sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Piggybacking a owl:Class ; rdfs:label "Piggybacking"@en ; rdfs:comment "Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network."@en ; rdfs:subClassOf sc2r:UnauthorizedAccess .
Label: Point and Shriek
Description: Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PointAndShriek a owl:Class ; rdfs:label "Point and Shriek"@en ; rdfs:comment "Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion."@en ; rdfs:subClassOf sc2r:SocialHacking .
Label: Polarization
Description: Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Polarization a owl:Class ; rdfs:label "Polarization"@en ; rdfs:comment "Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions."@en ; rdfs:subClassOf sc2r:SocialHacking .
Label: Pornography
Description: Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals.
Has Super Class (direct): sc2r:InappropriateContent
Has Super Class (all): sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Pornography a owl:Class ; rdfs:label "Pornography"@en ; rdfs:comment "Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals."@en ; rdfs:subClassOf sc2r:InappropriateContent .
Label: Potemkin Village Evidence
Description: Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration.
Has Super Class (direct): sc2r:Deceit
Has Super Class (all): sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PotemkinVillageEvidence a owl:Class ; rdfs:label "Potemkin Village Evidence"@en ; rdfs:comment "Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration." ; rdfs:subClassOf sc2r:Deceit .
Label: Prepare Measure
Description: Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases.
Has Super Class (direct): sc2r:Response
Has Sub Class (direct): sc2r:AnticipateMeasure | sc2r:MediationMeasures | sc2r:MonitoringMeasure | sc2r:PreventionMeasure
Has Sub Class (all): sc2r:AnticipateMeasure | sc2r:AttitudinalMeasure | sc2r:BeCritical | sc2r:BeSuspicious | sc2r:BeVigilant | sc2r:YouAreNotImmune | sc2r:Awareness | sc2r:AssetInventory | sc2r:DigitalFootprint | sc2r:RecoveryPlan | sc2r:RedundancyMeasure | sc2r:DataRedundancy | sc2r:NetworkRedundancy | sc2r:SoftwareRedundancy | sc2r:SourceRedundancy | sc2r:Training | sc2r:MediationMeasures | sc2r:ActiveMediation | sc2r:RestrictiveMediation | sc2r:TechnicalMediation | sc2r:MonitoringMeasure | sc2r:LoggingAndAudit | sc2r:ThreatMonitoringMeasure | sc2r:FailureDetection | sc2r:IntrusionDetection | sc2r:MaliciousSoftwareDetection | sc2r:SocialMediaMonitoring | sc2r:PreventionMeasure | sc2r:AccessControl | sc2r:Firewall | sc2r:LeastPrivilege | sc2r:PhysicalRestriction | sc2r:Sandboxing | sc2r:Identification | sc2r:DeviceIdentification | sc2r:MultiFactorAuthentication | sc2r:MutualAuthentication | sc2r:PasswordManagement | sc2r:UserIdentification | sc2r:TrustedData | sc2r:TrustedInformation | sc2r:TrustedInfrastructure | sc2r:TrustedNetworking | sc2r:AnonymousRouting | sc2r:VirtualPrivateNetwork | sc2r:TrustedSoftware | sc2r:WebHygiene | sc2r:EmailHygiene | sc2r:SocialMediaHygiene
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PrepareMeasure a owl:Class ; rdfs:label "Prepare Measure" ; rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases.""" ; rdfs:subClassOf sc2r:Response .
Label: Pretexting
Description: Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust.
Has Super Class (direct): sc2r:SocialEngineering
Has Super Class (all): sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Pretexting a owl:Class ; rdfs:label "Pretexting"@en ; rdfs:comment "Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust." ; rdfs:subClassOf sc2r:SocialEngineering .
Label: Prevention Measure
Description: Prevention measures are put in place to limit and stop the occurance of specific cyber threats.
Has Super Class (direct): sc2r:PrepareMeasure
Has Super Class (all): sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:AccessControl | sc2r:Identification | sc2r:TrustedData | sc2r:TrustedInformation | sc2r:TrustedInfrastructure | sc2r:TrustedSoftware | sc2r:WebHygiene
Has Sub Class (all): sc2r:AccessControl | sc2r:Firewall | sc2r:LeastPrivilege | sc2r:PhysicalRestriction | sc2r:Sandboxing | sc2r:Identification | sc2r:DeviceIdentification | sc2r:MultiFactorAuthentication | sc2r:MutualAuthentication | sc2r:PasswordManagement | sc2r:UserIdentification | sc2r:TrustedData | sc2r:TrustedInformation | sc2r:TrustedInfrastructure | sc2r:TrustedNetworking | sc2r:AnonymousRouting | sc2r:VirtualPrivateNetwork | sc2r:TrustedSoftware | sc2r:WebHygiene | sc2r:EmailHygiene | sc2r:SocialMediaHygiene
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PreventionMeasure a owl:Class ; rdfs:label "Prevention Measure" ; rdfs:comment "Prevention measures are put in place to limit and stop the occurance of specific cyber threats." ; rdfs:subClassOf sc2r:PrepareMeasure .
Label: Right to Privacy
Description: The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature.
Has Super Class (direct): sc2r:Right
Has Super Class (all): sc2r:Right | sc2r:IndividualResource | sc2r:Resource
Has Sub Class (direct): sc2r:InformationalPrivacy | sc2r:PhysicalPrivacy | sc2r:PsychologicalPrivacy | sc2r:SocialPrivacy | sc2r:TerritorialPrivacy
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Privacy a owl:Class ; rdfs:label "Right to Privacy" ; rdfs:comment "The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature." ; rdfs:subClassOf sc2r:Right .
Label: Privacy Threat
Description: Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy.
Has Super Class (direct): sc2r:PersonalThreat
Has Super Class (all): sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:AnonymityThreat | sc2r:IntimacyThreat | sc2r:ReserveThreat | sc2r:SolitudeThreat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PrivacyThreat a owl:Class ; rdfs:label "Privacy Threat"@en ; rdfs:comment "Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy." ; rdfs:subClassOf sc2r:PersonalThreat .
Label: Profanity
Description: This is information and content that uses language that is offensive to individuals under specific contexts.
Has Super Class (direct): sc2r:InappropriateContent
Has Super Class (all): sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Profanity a owl:Class ; rdfs:label "Profanity"@en ; rdfs:comment "This is information and content that uses language that is offensive to individuals under specific contexts."@en ; rdfs:subClassOf sc2r:InappropriateContent .
Label: Professional Support
Description: This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning.
Has Super Class (direct): sc2r:ExternalSupport
Has Super Class (all): sc2r:ExternalSupport | sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ProfessionalSupport a owl:Class ; rdfs:label "Professional Support" ; rdfs:comment "This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning." ; rdfs:subClassOf sc2r:ExternalSupport .
Label: Propaganda
Description: Propaganda is information that is used to promote and advance a specific political perspective or point of view.
Has Super Class (direct): sc2r:Disinformation
Has Super Class (all): sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Propaganda a owl:Class ; rdfs:label "Propaganda"@en ; rdfs:comment "Propaganda is information that is used to promote and advance a specific political perspective or point of view."@en ; rdfs:subClassOf sc2r:Disinformation .
Label: Prosecution
Description: Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Prosecution a owl:Class ; rdfs:label "Prosecution" ; rdfs:comment "Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Psychographic Hacking
Description: Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:BandwagonEffect | sc2r:DarkAdvertising | sc2r:Microtargeting
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PsychographicHacking a owl:Class ; rdfs:label "Psychographic Hacking"@en ; rdfs:comment "Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Psychological Harm
Description: Psychological harm is the harm which focuses on an individual and their mental well-being and psyche.
Has Super Class (direct): sc2r:Harm
Has Sub Class (direct): sc2r:Addiction | sc2r:CognitiveImpairement | sc2r:Confusion | sc2r:Depressed | sc2r:Discomfort | sc2r:Disempowerment | sc2r:Distraction | sc2r:Embarrassed | sc2r:FeelingUpset | sc2r:Frustration | sc2r:Gluttony | sc2r:Guilty | sc2r:IdentityTheftLoss | sc2r:LossOfConfidence | sc2r:LowMorale | sc2r:LowSatisfaction | sc2r:Mistreatment | sc2r:NegativePerception | sc2r:Overwhelmed | sc2r:Prosecution | sc2r:SelfCensorship | sc2r:Shameful | sc2r:Worried
Has Sub Class (all): sc2r:Addiction | sc2r:CognitiveImpairement | sc2r:Confusion | sc2r:Misled | sc2r:Depressed | sc2r:Discomfort | sc2r:Disempowerment | sc2r:Distraction | sc2r:Embarrassed | sc2r:FeelingUpset | sc2r:Frustration | sc2r:Gluttony | sc2r:Guilty | sc2r:IdentityTheftLoss | sc2r:LossOfConfidence | sc2r:LowMorale | sc2r:LowSatisfaction | sc2r:Mistreatment | sc2r:NegativePerception | sc2r:Overwhelmed | sc2r:Prosecution | sc2r:SelfCensorship | sc2r:Shameful | sc2r:Worried
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PsychologicalHarm a owl:Class ; rdfs:label "Psychological Harm" ; rdfs:comment "Psychological harm is the harm which focuses on an individual and their mental well-being and psyche." ; rdfs:subClassOf sc2r:Harm .
Label: Right to Psychological Privacy
Description: Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed.
Has Super Class (direct): sc2r:Privacy
Has Super Class (all): sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:PsychologicalPrivacy a owl:Class ; rdfs:label "Right to Psychological Privacy" ; rdfs:comment "Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed." ; rdfs:subClassOf sc2r:Privacy .
Label: Quid Pro Quo
Description: Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services.
Has Super Class (direct): sc2r:SocialEngineering
Has Super Class (all): sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:QuidProQuo a owl:Class ; rdfs:label "Quid Pro Quo"@en ; rdfs:comment "Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services." ; rdfs:subClassOf sc2r:SocialEngineering .
Label: Radicalisation
Description: Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Radicalisation a owl:Class ; rdfs:label "Radicalisation" ; rdfs:comment "Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Raiding
Description: Rapid and coordinated influence attacks.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Raiding a owl:Class ; rdfs:label "Raiding"@en ; rdfs:comment "Rapid and coordinated influence attacks."@en ; rdfs:subClassOf sc2r:SocialHacking .
Label: Ransomware
Description: Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid.
Has Super Class (direct): sc2r:AvailabilityThreat
Has Super Class (all): sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Ransomware a owl:Class ; rdfs:label "Ransomware"@en ; rdfs:comment "Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid."@en ; rdfs:subClassOf sc2r:AvailabilityThreat .
Label: Reconnaissance
Description: Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Reconnaissance a owl:Class ; rdfs:label "Reconnaissance"@en ; rdfs:comment "Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources."@en ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Recover Measure
Description: Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning.
Has Super Class (direct): sc2r:Response
Has Sub Class (direct): sc2r:AccountRecovery | sc2r:DataRecovery | sc2r:ExternalSupport | sc2r:Fact-checking | sc2r:SystemRecovery
Has Sub Class (all): sc2r:AccountRecovery | sc2r:DataRecovery | sc2r:ExternalSupport | sc2r:ProfessionalSupport | sc2r:SocialSupport | sc2r:Fact-checking | sc2r:SystemRecovery
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RecoverMeasure a owl:Class ; rdfs:label "Recover Measure" ; rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning.""" ; rdfs:subClassOf sc2r:Response .
Label: Recovery Plan
Description: Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur.
Has Super Class (direct): sc2r:AnticipateMeasure
Has Super Class (all): sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RecoveryPlan a owl:Class ; rdfs:label "Recovery Plan" ; rdfs:comment "Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur." ; rdfs:subClassOf sc2r:AnticipateMeasure .
Label: Reduced Opportunities
Description: Reduced Opportunities refers to an adverse change in the established reputation of the individual's.
Has Super Class (direct): sc2r:ReputationalHarm
Has Super Class (all): sc2r:ReputationalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ReducedOpportunities a owl:Class ; rdfs:label "Reduced Opportunities" ; rdfs:comment "Reduced Opportunities refers to an adverse change in the established reputation of the individual's." ; rdfs:subClassOf sc2r:ReputationalHarm .
Label: Reduced Performance
Description: Reduced Performance refers to the state in which the ability of resources to function is lowered.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ReducedPerformance a owl:Class ; rdfs:label "Reduced Performance" ; rdfs:comment "Reduced Performance refers to the state in which the ability of resources to function is lowered." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Redundancy Measure
Description: Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents.
Has Super Class (direct): sc2r:AnticipateMeasure
Has Super Class (all): sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:DataRedundancy | sc2r:NetworkRedundancy | sc2r:SoftwareRedundancy | sc2r:SourceRedundancy
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RedundancyMeasure a owl:Class ; rdfs:label "Redundancy Measure" ; rdfs:comment "Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents." ; rdfs:subClassOf sc2r:AnticipateMeasure .
Label: Remote Code Execution
Description: Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RemoteExecution a owl:Class ; rdfs:label "Remote Code Execution"@en ; rdfs:comment "Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Removal Measure
Description: Removal measure involve the direct removal and elimination of the cyber threat.
Has Super Class (direct): sc2r:EngageMeasure
Has Super Class (all): sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response
Has Sub Class (direct): sc2r:MaliciousContactRemoval | sc2r:MaliciousContentRemoval | sc2r:MaliciousSoftwareRemoval
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RemovalMeasure a owl:Class ; rdfs:label "Removal Measure" ; rdfs:comment "Removal measure involve the direct removal and elimination of the cyber threat." ; rdfs:subClassOf sc2r:EngageMeasure .
Label: Replay
Description: Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Replay a owl:Class ; rdfs:label "Replay"@en ; rdfs:comment "Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Reporting Measure
Description: Reporting measure is the reporting of an adverse cyber incident to external responders.
Has Super Class (direct): sc2r:AbsorbMeasure
Has Super Class (all): sc2r:AbsorbMeasure | sc2r:Response
Has Sub Class (direct): sc2r:IncidentReporting
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Reporting a owl:Class ; rdfs:label "Reporting Measure" ; rdfs:comment "Reporting measure is the reporting of an adverse cyber incident to external responders." ; rdfs:subClassOf sc2r:AbsorbMeasure .
Label: Reputation Resource
Description: Reputation is the overall quality or character as recognised by other people.
Has Super Class (direct): sc2r:SocialCapital
Has Super Class (all): sc2r:SocialCapital | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Reputation a owl:Class ; rdfs:label "Reputation Resource" ; rdfs:comment "Reputation is the overall quality or character as recognised by other people." ; rdfs:subClassOf sc2r:SocialCapital .
Label: Reputational Harm
Description: Reputational harm is the harm pertaining to the general opinion held about an entity.
Has Super Class (direct): sc2r:Harm
Has Sub Class (direct): sc2r:Blacklisted | sc2r:DamagedSocialPerception | sc2r:ReducedOpportunities | sc2r:UnderScrutiny
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ReputationalHarm a owl:Class ; rdfs:label "Reputational Harm" ; rdfs:comment "Reputational harm is the harm pertaining to the general opinion held about an entity." ; rdfs:subClassOf sc2r:Harm .
Label: Reserve Threat
Description: Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened.
Has Super Class (direct): sc2r:PrivacyThreat
Has Super Class (all): sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ReserveThreat a owl:Class ; rdfs:label "Reserve Threat"@en ; rdfs:comment "Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened." ; rdfs:subClassOf sc2r:PrivacyThreat .
Label: Resource
Description: A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources.
Has Sub Class (direct): sc2r:DigitalResource | sc2r:IndividualResource | sc2r:InfrastructureResource | sc2r:PhysicalResource
Has Sub Class (all): sc2r:DigitalResource | sc2r:Data | sc2r:File | sc2r:CyptoCurrency | sc2r:PersonalData | sc2r:ActivityData | sc2r:BehaviouralData | sc2r:DemographicInformation | sc2r:IdentifyingData | sc2r:Credential | sc2r:BiometricToken | sc2r:DataToken | sc2r:PhysicalToken | sc2r:FinancialData | sc2r:LocationData | sc2r:SocialContact | sc2r:UserGeneratedContent | sc2r:Software | sc2r:OnlineServices | sc2r:IndividualResource | sc2r:Agency | sc2r:MentalFaculties | sc2r:Knowledge | sc2r:Motivation | sc2r:Skills | sc2r:Identity | sc2r:Right | sc2r:Assembly | sc2r:Expression | sc2r:Information | sc2r:Opinion | sc2r:Privacy | sc2r:InformationalPrivacy | sc2r:PhysicalPrivacy | sc2r:PsychologicalPrivacy | sc2r:SocialPrivacy | sc2r:TerritorialPrivacy | sc2r:SocialCapital | sc2r:Reputation | sc2r:SocialNetwork | sc2r:InfrastructureResource | sc2r:Electricity | sc2r:InternetConnectivity | sc2r:PhysicalResource | sc2r:ComputingAsset | sc2r:Computer | sc2r:Laptop | sc2r:MobileDevice | sc2r:Server | sc2r:NetworkEquipment | sc2r:StorageAsset | sc2r:ExternalHardDrive | sc2r:SDCard | sc2r:USBDrive
In Domain Of: sc2r:hasVulnerability | sc2r:isDamagedBy
In Range Of: sc2r:damages | sc2r:isAVulnerabilityOf
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Resource a owl:Class ; rdfs:label "Resource"@en ; rdfs:comment "A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Asset_(computer_security)"@en .
Label: Response
Description: A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt.
Has Sub Class (direct): sc2r:AbsorbMeasure | sc2r:AdaptMeasure | sc2r:PrepareMeasure | sc2r:RecoverMeasure
Has Sub Class (all): sc2r:AbsorbMeasure | sc2r:EngageMeasure | sc2r:ConfrontThreat | sc2r:DisconnectMeasure | sc2r:IsolateMeasure | sc2r:RemovalMeasure | sc2r:MaliciousContactRemoval | sc2r:MaliciousContentRemoval | sc2r:MaliciousSoftwareRemoval | sc2r:Reporting | sc2r:IncidentReporting | sc2r:WithstandMeasure | sc2r:AlternativeResource | sc2r:IncreaseResources | sc2r:AdaptMeasure | sc2r:CapacityBuilding | sc2r:Evolve | sc2r:PrepareMeasure | sc2r:AnticipateMeasure | sc2r:AttitudinalMeasure | sc2r:BeCritical | sc2r:BeSuspicious | sc2r:BeVigilant | sc2r:YouAreNotImmune | sc2r:Awareness | sc2r:AssetInventory | sc2r:DigitalFootprint | sc2r:RecoveryPlan | sc2r:RedundancyMeasure | sc2r:DataRedundancy | sc2r:NetworkRedundancy | sc2r:SoftwareRedundancy | sc2r:SourceRedundancy | sc2r:Training | sc2r:MediationMeasures | sc2r:ActiveMediation | sc2r:RestrictiveMediation | sc2r:TechnicalMediation | sc2r:MonitoringMeasure | sc2r:LoggingAndAudit | sc2r:ThreatMonitoringMeasure | sc2r:FailureDetection | sc2r:IntrusionDetection | sc2r:MaliciousSoftwareDetection | sc2r:SocialMediaMonitoring | sc2r:PreventionMeasure | sc2r:AccessControl | sc2r:Firewall | sc2r:LeastPrivilege | sc2r:PhysicalRestriction | sc2r:Sandboxing | sc2r:Identification | sc2r:DeviceIdentification | sc2r:MultiFactorAuthentication | sc2r:MutualAuthentication | sc2r:PasswordManagement | sc2r:UserIdentification | sc2r:TrustedData | sc2r:TrustedInformation | sc2r:TrustedInfrastructure | sc2r:TrustedNetworking | sc2r:AnonymousRouting | sc2r:VirtualPrivateNetwork | sc2r:TrustedSoftware | sc2r:WebHygiene | sc2r:EmailHygiene | sc2r:SocialMediaHygiene | sc2r:RecoverMeasure | sc2r:AccountRecovery | sc2r:DataRecovery | sc2r:ExternalSupport | sc2r:ProfessionalSupport | sc2r:SocialSupport | sc2r:Fact-checking | sc2r:SystemRecovery
In Domain Of: sc2r:mitigates | sc2r:reduces
In Range Of: sc2r:isMitigatedBy | sc2r:isReducedBy
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Response a owl:Class ; rdfs:label "Response"@en ; rdfs:comment "A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt."@en ; rdfs:seeAlso ""@en .
Label: Restrictive Mediation
Description: Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources.
Has Super Class (direct): sc2r:MediationMeasures
Has Super Class (all): sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:RestrictiveMediation a owl:Class ; rdfs:label "Restrictive Mediation" ; rdfs:comment "Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources." ; rdfs:subClassOf sc2r:MediationMeasures .
Label: Rights
Description: Rights are non-negotiable entitlements grounded in the idea of justice.
Has Super Class (direct): sc2r:IndividualResource
Has Super Class (all): sc2r:IndividualResource | sc2r:Resource
Has Sub Class (direct): sc2r:Assembly | sc2r:Expression | sc2r:Information | sc2r:Opinion | sc2r:Privacy
Has Sub Class (all): sc2r:Assembly | sc2r:Expression | sc2r:Information | sc2r:Opinion | sc2r:Privacy | sc2r:InformationalPrivacy | sc2r:PhysicalPrivacy | sc2r:PsychologicalPrivacy | sc2r:SocialPrivacy | sc2r:TerritorialPrivacy
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Right a owl:Class ; rdfs:label "Rights" ; rdfs:comment "Rights are non-negotiable entitlements grounded in the idea of justice." ; rdfs:subClassOf sc2r:IndividualResource .
Label: SD Card
Description: SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size.
Has Super Class (direct): sc2r:StorageAsset
Has Super Class (all): sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SDCard a owl:Class ; rdfs:label "SD Card" ; rdfs:comment "SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size." ; rdfs:subClassOf sc2r:StorageAsset .
Label: Sandboxing
Description: Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents.
Has Super Class (direct): sc2r:AccessControl
Has Super Class (all): sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Sandboxing a owl:Class ; rdfs:label "Sandboxing" ; rdfs:comment "Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents." ; rdfs:subClassOf sc2r:AccessControl .
Label: Satire
Description: Satire used as part of an influence campaign.
Has Super Class (direct): sc2r:InfluenceOperation
Has Super Class (all): sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Satire a owl:Class ; rdfs:label "Satire"@en ; rdfs:comment "Satire used as part of an influence campaign."@en ; rdfs:subClassOf sc2r:InfluenceOperation .
Label: Scam
Description: Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam.
Has Super Class (direct): sc2r:TheftThreat
Has Super Class (all): sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:FakeGiveways | sc2r:SweepstakesScam
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Scam a owl:Class ; rdfs:label "Scam"@en ; rdfs:comment "Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam." ; rdfs:subClassOf sc2r:TheftThreat .
Label: Scam Cost
Description: Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ScamCost a owl:Class ; rdfs:label "Scam Cost" ; rdfs:comment "Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Scareware
Description: Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Scareware a owl:Class ; rdfs:label "Scareware"@en ; rdfs:comment "Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Sealioning
Description: Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity.
Has Super Class (direct): sc2r:Trolling
Has Super Class (all): sc2r:Trolling | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Sealioning a owl:Class ; rdfs:label "Sealioning" ; rdfs:comment "Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity." ; rdfs:subClassOf sc2r:Trolling .
Label: Self-Censorship
Description: Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SelfCensorship a owl:Class ; rdfs:label "Self-Censorship" ; rdfs:comment "Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Self Harm
Description: Self Harm refers to intentional damage or injury done to the individual's body.
Has Super Class (direct): sc2r:BodilyInjury
Has Super Class (all): sc2r:BodilyInjury | sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SelfHarm a owl:Class ; rdfs:label "Self Harm" ; rdfs:comment "Self Harm refers to intentional damage or injury done to the individual's body." ; rdfs:subClassOf sc2r:BodilyInjury .
Label: Server
Description: A Server is a computer or system that provides resources, data services, or programs to other computers.
Has Super Class (direct): sc2r:ComputingAsset
Has Super Class (all): sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Server a owl:Class ; rdfs:label "Server" ; rdfs:comment "A Server is a computer or system that provides resources, data services, or programs to other computers." ; rdfs:subClassOf sc2r:ComputingAsset .
Label: Sextortion
Description: Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Sextortion a owl:Class ; rdfs:label "Sextortion" ; rdfs:comment "Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Sexual Abuse Threat
Description: Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:BoyfriendingGirlfriending | sc2r:Grooming | sc2r:LoveBombing | sc2r:Luring | sc2r:Persistence | sc2r:Sextortion | sc2r:SexualAssault
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SexualAbuse a owl:Class ; rdfs:label "Sexual Abuse Threat"@en ; rdfs:comment "Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication." ; rdfs:subClassOf sc2r:Abuse .
Label: Sexual Assault
Description: Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online.
Has Super Class (direct): sc2r:SexualAbuse
Has Super Class (all): sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SexualAssault a owl:Class ; rdfs:label "Sexual Assault" ; rdfs:comment "Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online." ; rdfs:subClassOf sc2r:SexualAbuse .
Label: Shameful
Description: Shameful refers to the state in which the individual experiences disgracefulness.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Shameful a owl:Class ; rdfs:label "Shameful" ; rdfs:comment "Shameful refers to the state in which the individual experiences disgracefulness." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: Shilling
Description: Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate.
Has Super Class (direct): sc2r:Deceit
Has Super Class (all): sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Shilling a owl:Class ; rdfs:label "Shilling"@en ; rdfs:comment "Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate." ; rdfs:subClassOf sc2r:Deceit .
Label: Skills
Description: A Skill is the ability and capacity to perform an action with determined results.
Has Super Class (direct): sc2r:MentalFaculties
Has Super Class (all): sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Skills a owl:Class ; rdfs:label "Skills" ; rdfs:comment "A Skill is the ability and capacity to perform an action with determined results." ; rdfs:subClassOf sc2r:MentalFaculties .
Label: Skimming
Description: Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services.
Has Super Class (direct): sc2r:ConfidentialityThreat
Has Super Class (all): sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Skimming a owl:Class ; rdfs:label "Skimming"@en ; rdfs:comment "Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services."@en ; rdfs:subClassOf sc2r:ConfidentialityThreat .
Label: Smishing
Description: Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information.
Has Super Class (direct): sc2r:Phishing
Has Super Class (all): sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Smishing a owl:Class ; rdfs:label "Smishing"@en ; rdfs:comment "Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information." ; rdfs:subClassOf sc2r:Phishing .
Label: Social Capital Resource
Description: Social capital is the accumulation of actual and potential resources linked to the possession of a social network.
Has Super Class (direct): sc2r:IndividualResource
Has Super Class (all): sc2r:IndividualResource | sc2r:Resource
Has Sub Class (direct): sc2r:Reputation | sc2r:SocialNetwork
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialCapital a owl:Class ; rdfs:label "Social Capital Resource" ; rdfs:comment "Social capital is the accumulation of actual and potential resources linked to the possession of a social network." ; rdfs:subClassOf sc2r:IndividualResource .
Label: Social Contact
Description: Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialContact a owl:Class ; rdfs:label "Social Contact" ; rdfs:comment "Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device." ; rdfs:subClassOf sc2r:PersonalData .
Label: Social Engineering
Description: Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Has Super Class (direct): sc2r:InfluenceThreat
Has Super Class (all): sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Baiting | sc2r:Phishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating
Has Sub Class (all): sc2r:Baiting | sc2r:Phishing | sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialEngineering a owl:Class ; rdfs:label "Social Engineering"@en ; rdfs:comment "Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes." ; rdfs:subClassOf sc2r:InfluenceThreat .
Label: Social Hacking
Description: Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions.
Has Super Class (direct): sc2r:SocialThreat
Has Super Class (all): sc2r:SocialThreat | sc2r:Threat
Has Sub Class (direct): sc2r:BlackPropaganda | sc2r:Cheerleading | sc2r:Flooding | sc2r:Laundering | sc2r:ParasocialHacking | sc2r:PointAndShriek | sc2r:Polarization | sc2r:Raiding | sc2r:SociocognitiveHacking | sc2r:SockPuppetry
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialHacking a owl:Class ; rdfs:label "Social Hacking"@en ; rdfs:comment "Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions."@en ; rdfs:subClassOf sc2r:SocialThreat .
Label: Social Harm
Description: Social harm is the harm that may result in a social context or society more broadly.
Has Super Class (direct): sc2r:Harm
Has Sub Class (direct): sc2r:Conflict | sc2r:DamagedRelationship | sc2r:ImpairedPrivateSocialBoundary | sc2r:Isolation | sc2r:Radicalisation | sc2r:SocialWithdrawal
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialHarm a owl:Class ; rdfs:label "Social Harm" ; rdfs:comment "Social harm is the harm that may result in a social context or society more broadly." ; rdfs:subClassOf sc2r:Harm .
Label: Social Media Hygiene
Description: Social media hygiene are measures and practices that contribute to safe and secure use of social media.
Has Super Class (direct): sc2r:WebHygiene
Has Super Class (all): sc2r:WebHygiene | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialMediaHygiene a owl:Class ; rdfs:label "Social Media Hygiene" ; rdfs:comment "Social media hygiene are measures and practices that contribute to safe and secure use of social media." ; rdfs:subClassOf sc2r:WebHygiene .
Label: Social Media Monitoring
Description: Social media monitoring involves observing and checking social media resources for signs of adverse incidents.
Has Super Class (direct): sc2r:ThreatMonitoringMeasure
Has Super Class (all): sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialMediaMonitoring a owl:Class ; rdfs:label "Social Media Monitoring" ; rdfs:comment "Social media monitoring involves observing and checking social media resources for signs of adverse incidents." ; rdfs:subClassOf sc2r:ThreatMonitoringMeasure .
Label: Social Network Resource
Description: Social Network refers to individual's network of social interactions and personal relationships.
Has Super Class (direct): sc2r:SocialCapital
Has Super Class (all): sc2r:SocialCapital | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialNetwork a owl:Class ; rdfs:label "Social Network Resource" ; rdfs:comment "Social Network refers to individual's network of social interactions and personal relationships." ; rdfs:subClassOf sc2r:SocialCapital .
Label: Right to Social Privacy
Description: Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network.
Has Super Class (direct): sc2r:Privacy
Has Super Class (all): sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialPrivacy a owl:Class ; rdfs:label "Right to Social Privacy" ; rdfs:comment "Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network." ; rdfs:subClassOf sc2r:Privacy .
Label: Social Support
Description: This involves leveraging individuals social capital towards recovery to the lost cyber functioning. For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts.
Has Super Class (direct): sc2r:ExternalSupport
Has Super Class (all): sc2r:ExternalSupport | sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialSupport a owl:Class ; rdfs:label "Social Support" ; rdfs:comment """This involves leveraging individuals social capital towards recovery to the lost cyber functioning. For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts.""" ; rdfs:subClassOf sc2r:ExternalSupport .
Label: Societal and Social Threat
Description: Social Threats are associated with individuals' social and societal context.
Has Super Class (direct): sc2r:Threat
Has Sub Class (direct): sc2r:SocialHacking
Has Sub Class (all): sc2r:SocialHacking | sc2r:BlackPropaganda | sc2r:Cheerleading | sc2r:Flooding | sc2r:Laundering | sc2r:ParasocialHacking | sc2r:PointAndShriek | sc2r:Polarization | sc2r:Raiding | sc2r:SociocognitiveHacking | sc2r:SockPuppetry
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialThreat a owl:Class ; rdfs:label "Societal and Social Threat"@en ; rdfs:comment "Social Threats are associated with individuals' social and societal context."@en ; rdfs:subClassOf sc2r:Threat .
Label: Social Withdrawal
Description: Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation.
Has Super Class (direct): sc2r:SocialHarm
Has Super Class (all): sc2r:SocialHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SocialWithdrawal a owl:Class ; rdfs:label "Social Withdrawal" ; rdfs:comment "Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation." ; rdfs:subClassOf sc2r:SocialHarm .
Label: Socio-cognitive Hacking
Description: Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SociocognitiveHacking a owl:Class ; rdfs:label "Socio-cognitive Hacking"@en ; rdfs:comment "Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information." ; rdfs:subClassOf sc2r:SocialHacking .
Label: Sock Puppetry
Description: Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website.
Has Super Class (direct): sc2r:SocialHacking
Has Super Class (all): sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SockPuppetry a owl:Class ; rdfs:label "Sock Puppetry"@en ; rdfs:comment "Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website." ; rdfs:subClassOf sc2r:SocialHacking .
Label: Software
Description: A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks.
Has Super Class (direct): sc2r:DigitalResource
Has Super Class (all): sc2r:DigitalResource | sc2r:Resource
Has Sub Class (direct): sc2r:OnlineServices
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Software a owl:Class ; rdfs:label "Software" ; rdfs:comment "A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks." ; rdfs:subClassOf sc2r:DigitalResource .
Label: Software Redundancy
Description: Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents.
Has Super Class (direct): sc2r:RedundancyMeasure
Has Super Class (all): sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SoftwareRedundancy a owl:Class ; rdfs:label "Software Redundancy" ; rdfs:comment "Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents." ; rdfs:subClassOf sc2r:RedundancyMeasure .
Label: Software Vulnerability
Description: Sofware Vulnerabilities are weaknesses in software resources.
Has Super Class (direct): sc2r:Digital
Has Super Class (all): sc2r:Digital | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SoftwareVulnerability a owl:Class ; rdfs:label "Software Vulnerability" ; rdfs:comment "Sofware Vulnerabilities are weaknesses in software resources." ; rdfs:subClassOf sc2r:Digital .
Label: Solitude Threat
Description: Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened.
Has Super Class (direct): sc2r:PrivacyThreat
Has Super Class (all): sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SolitudeThreat a owl:Class ; rdfs:label "Solitude Threat"@en ; rdfs:comment "Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened." ; rdfs:subClassOf sc2r:PrivacyThreat .
Label: Source Redundancy
Description: Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents.
Has Super Class (direct): sc2r:RedundancyMeasure
Has Super Class (all): sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SourceRedundancy a owl:Class ; rdfs:label "Source Redundancy" ; rdfs:comment "Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents." ; rdfs:subClassOf sc2r:RedundancyMeasure .
Label: Spam Email
Description: Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent.
Has Super Class (direct): sc2r:UnsolicitedCommunication
Has Super Class (all): sc2r:UnsolicitedCommunication | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SpamEmail a owl:Class ; rdfs:label "Spam Email"@en ; rdfs:comment "Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent." ; rdfs:subClassOf sc2r:UnsolicitedCommunication .
Label: Spear Phishing
Description: Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information.
Has Super Class (direct): sc2r:Phishing
Has Super Class (all): sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Whaling
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SpearPhishing a owl:Class ; rdfs:label "Spear Phishing"@en ; rdfs:comment "Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information." ; rdfs:subClassOf sc2r:Phishing .
Label: Spoofing
Description: Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address.
Has Super Class (direct): sc2r:AuthenticationThreat
Has Super Class (all): sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Spoofing a owl:Class ; rdfs:label "Spoofing"@en ; rdfs:comment "Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address."@en ; rdfs:subClassOf sc2r:AuthenticationThreat .
Label: Storage Asset
Description: Storage Asset comprises any recording media used to retain data using computers or other devices.
Has Super Class (direct): sc2r:PhysicalResource
Has Super Class (all): sc2r:PhysicalResource | sc2r:Resource
Has Sub Class (direct): sc2r:ExternalHardDrive | sc2r:SDCard | sc2r:USBDrive
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:StorageAsset a owl:Class ; rdfs:label "Storage Asset" ; rdfs:comment "Storage Asset comprises any recording media used to retain data using computers or other devices." ; rdfs:subClassOf sc2r:PhysicalResource .
Label: Strawman Attack
Description: Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition.
Has Super Class (direct): sc2r:MalignRhetoric
Has Super Class (all): sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Strawman a owl:Class ; rdfs:label "Strawman Attack"@en ; rdfs:comment "Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition."@en ; rdfs:subClassOf sc2r:MalignRhetoric .
Label: Surveillance
Description: Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing.
Has Super Class (direct): sc2r:InstitutionalThreat
Has Super Class (all): sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Surveillance a owl:Class ; rdfs:label "Surveillance"@en ; rdfs:comment "Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing."@en ; rdfs:subClassOf sc2r:InstitutionalThreat .
Label: Sweepstakes Scam
Description: Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize.
Has Super Class (direct): sc2r:Scam
Has Super Class (all): sc2r:Scam | sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SweepstakesScam a owl:Class ; rdfs:label "Sweepstakes Scam" ; rdfs:comment "Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize." ; rdfs:subClassOf sc2r:Scam .
Label: Sympathy
Description: Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Sympathy a owl:Class ; rdfs:label "Sympathy" ; rdfs:comment "Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering." ; rdfs:subClassOf sc2r:Individual .
Label: System Recovery
Description: System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident.
Has Super Class (direct): sc2r:RecoverMeasure
Has Super Class (all): sc2r:RecoverMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:SystemRecovery a owl:Class ; rdfs:label "System Recovery" ; rdfs:comment "System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident." ; rdfs:subClassOf sc2r:RecoverMeasure .
Label: Tailgating
Description: Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area.
Has Super Class (direct): sc2r:SocialEngineering
Has Super Class (all): sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Tailgating a owl:Class ; rdfs:label "Tailgating"@en ; rdfs:comment "Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area." ; rdfs:subClassOf sc2r:SocialEngineering .
Label: Technical Mediation
Description: Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents.
Has Super Class (direct): sc2r:MediationMeasures
Has Super Class (all): sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TechnicalMediation a owl:Class ; rdfs:label "Technical Mediation" ; rdfs:comment "Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents." ; rdfs:subClassOf sc2r:MediationMeasures .
Label: Technological Threat
Description: Technological Threats are associated with and affect individuals' computing resources.
Has Super Class (direct): sc2r:Threat
Has Sub Class (direct): sc2r:AuthenticationThreat | sc2r:AvailabilityThreat | sc2r:ConfidentialityThreat | sc2r:IntegrityThreat | sc2r:NonRepudiationThreat
Has Sub Class (all): sc2r:AuthenticationThreat | sc2r:AccountHijacking | sc2r:Fabrication | sc2r:Masquerading | sc2r:Spoofing | sc2r:UnauthorizedAccess | sc2r:NetworkIntrusion | sc2r:Piggybacking | sc2r:AvailabilityThreat | sc2r:DenialOfService | sc2r:Disruption | sc2r:LostCredentials | sc2r:LostDevices | sc2r:Ransomware | sc2r:ConfidentialityThreat | sc2r:DataBreach | sc2r:DataLeak | sc2r:Doxing | sc2r:InadvertentDisclosure | sc2r:Interception | sc2r:Eavesdropping | sc2r:Reconnaissance | sc2r:Skimming | sc2r:IntegrityThreat | sc2r:Damage | sc2r:DataCorruption | sc2r:DataError | sc2r:Malfunction | sc2r:Malware | sc2r:Misconfiguration | sc2r:RemoteExecution | sc2r:Replay | sc2r:Vandalism | sc2r:NonRepudiationThreat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TechnologicalThreat a owl:Class ; rdfs:label "Technological Threat"@en ; rdfs:comment "Technological Threats are associated with and affect individuals' computing resources."@en ; rdfs:subClassOf sc2r:Threat .
Label: Right to Territorial Privacy
Description: The right to protect personal space, property, and objects.
Has Super Class (direct): sc2r:Privacy
Has Super Class (all): sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TerritorialPrivacy a owl:Class ; rdfs:label "Right to Territorial Privacy" ; rdfs:comment "The right to protect personal space, property, and objects." ; rdfs:subClassOf sc2r:Privacy .
Label: Theft Harm
Description: Theft Harm refers to the state in which individual's resources are physically or digitally stolen.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Theft a owl:Class ; rdfs:label "Theft Harm" ; rdfs:comment "Theft Harm refers to the state in which individual's resources are physically or digitally stolen." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Theft of Finances
Description: Theft of Finances the state in which individual's financial resources are stolen.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TheftOfFinances a owl:Class ; rdfs:label "Theft of Finances" ; rdfs:comment "Theft of Finances the state in which individual's financial resources are stolen." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Theft Threat
Description: Theft Threats aim to steal of defraud individuals of certain resources.
Has Super Class (direct): sc2r:PersonalThreat
Has Super Class (all): sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Fraud | sc2r:IdentityTheft | sc2r:Scam
Has Sub Class (all): sc2r:Fraud | sc2r:IdentityTheft | sc2r:Scam | sc2r:FakeGiveways | sc2r:SweepstakesScam
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TheftThreat a owl:Class ; rdfs:label "Theft Threat" ; rdfs:comment "Theft Threats aim to steal of defraud individuals of certain resources." ; rdfs:subClassOf sc2r:PersonalThreat .
Label: Threat
Description: A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function.
Has Sub Class (direct): sc2r:EnvironmentalThreat | sc2r:PersonalThreat | sc2r:SocialThreat | sc2r:TechnologicalThreat
Has Sub Class (all): sc2r:EnvironmentalThreat | sc2r:InstitutionalThreat | sc2r:Censorship | sc2r:Surveillance | sc2r:Violation | sc2r:ContractBreach | sc2r:NaturalDisaster | sc2r:PersonalThreat | sc2r:Abuse | sc2r:CyberPredator | sc2r:CyberStalking | sc2r:Cyberbullying | sc2r:Flaming | sc2r:InformationFlooding | sc2r:SexualAbuse | sc2r:BoyfriendingGirlfriending | sc2r:Grooming | sc2r:LoveBombing | sc2r:Luring | sc2r:Persistence | sc2r:Sextortion | sc2r:SexualAssault | sc2r:Trolling | sc2r:Sealioning | sc2r:UnsolicitedCommunication | sc2r:SpamEmail | sc2r:UnsolicitedSocialRequest | sc2r:CognitiveThreat | sc2r:DigitalHoarding | sc2r:Disinformation | sc2r:Deceit | sc2r:Forging | sc2r:PotemkinVillageEvidence | sc2r:Shilling | sc2r:EngineeredContent | sc2r:FakeNews | sc2r:InfluenceOperation | sc2r:HumorAndMeme | sc2r:Parody | sc2r:Satire | sc2r:MalignRhetoric | sc2r:Firehosing | sc2r:GishGalloping | sc2r:Strawman | sc2r:Transfer | sc2r:WhatAboutism | sc2r:OpposingInformation | sc2r:Propaganda | sc2r:InfluenceThreat | sc2r:Coercion | sc2r:Extortion | sc2r:InformationOverload | sc2r:PsychographicHacking | sc2r:BandwagonEffect | sc2r:DarkAdvertising | sc2r:Microtargeting | sc2r:Scareware | sc2r:SocialEngineering | sc2r:Baiting | sc2r:Phishing | sc2r:AnglerPhishing | sc2r:Catphishing | sc2r:Smishing | sc2r:SpearPhishing | sc2r:Whaling | sc2r:Vishing | sc2r:Pretexting | sc2r:QuidProQuo | sc2r:Tailgating | sc2r:Malinformation | sc2r:InappropriateContent | sc2r:OffensiveLanguage | sc2r:Pornography | sc2r:Profanity | sc2r:Violence | sc2r:Misinformation | sc2r:MisleadingInformation | sc2r:MisleadingAdvertising | sc2r:PrivacyThreat | sc2r:AnonymityThreat | sc2r:IntimacyThreat | sc2r:ReserveThreat | sc2r:SolitudeThreat | sc2r:TheftThreat | sc2r:Fraud | sc2r:IdentityTheft | sc2r:Scam | sc2r:FakeGiveways | sc2r:SweepstakesScam | sc2r:SocialThreat | sc2r:SocialHacking | sc2r:BlackPropaganda | sc2r:Cheerleading | sc2r:Flooding | sc2r:Laundering | sc2r:ParasocialHacking | sc2r:PointAndShriek | sc2r:Polarization | sc2r:Raiding | sc2r:SociocognitiveHacking | sc2r:SockPuppetry | sc2r:TechnologicalThreat | sc2r:AuthenticationThreat | sc2r:AccountHijacking | sc2r:Fabrication | sc2r:Masquerading | sc2r:Spoofing | sc2r:UnauthorizedAccess | sc2r:NetworkIntrusion | sc2r:Piggybacking | sc2r:AvailabilityThreat | sc2r:DenialOfService | sc2r:Disruption | sc2r:LostCredentials | sc2r:LostDevices | sc2r:Ransomware | sc2r:ConfidentialityThreat | sc2r:DataBreach | sc2r:DataLeak | sc2r:Doxing | sc2r:InadvertentDisclosure | sc2r:Interception | sc2r:Eavesdropping | sc2r:Reconnaissance | sc2r:Skimming | sc2r:IntegrityThreat | sc2r:Damage | sc2r:DataCorruption | sc2r:DataError | sc2r:Malfunction | sc2r:Malware | sc2r:Misconfiguration | sc2r:RemoteExecution | sc2r:Replay | sc2r:Vandalism | sc2r:NonRepudiationThreat
In Domain Of: sc2r:canResultIn | sc2r:damages | sc2r:exploits | sc2r:isMitigatedBy | sc2r:resultsIn
In Range Of: sc2r:canBeResultOf | sc2r:isDamagedBy | sc2r:isExploitedBy | sc2r:isResultOf | sc2r:mitigates
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Threat a owl:Class ; rdfs:label "Threat"@en ; rdfs:comment "A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Threat_(computer)"@en .
Label: Threat Monitoring Measure
Description: Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats.
Has Super Class (direct): sc2r:MonitoringMeasure
Has Super Class (all): sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:FailureDetection | sc2r:IntrusionDetection | sc2r:MaliciousSoftwareDetection | sc2r:SocialMediaMonitoring
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:ThreatMonitoringMeasure a owl:Class ; rdfs:label "Threat Monitoring Measure" ; rdfs:comment "Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats." ; rdfs:subClassOf sc2r:MonitoringMeasure .
Label: Time Wasted
Description: Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts.
Has Super Class (direct): sc2r:EconomicHarm
Has Super Class (all): sc2r:EconomicHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TimeWasted a owl:Class ; rdfs:label "Time Wasted" ; rdfs:comment "Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts." ; rdfs:subClassOf sc2r:EconomicHarm .
Label: Training
Description: Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents.
Has Super Class (direct): sc2r:AnticipateMeasure
Has Super Class (all): sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Training a owl:Class ; rdfs:label "Training" ; rdfs:comment "Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents." ; rdfs:subClassOf sc2r:AnticipateMeasure .
Label: Transfer Information Attack
Description: Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes.
Has Super Class (direct): sc2r:MalignRhetoric
Has Super Class (all): sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Transfer a owl:Class ; rdfs:label "Transfer Information Attack"@en ; rdfs:comment "Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes."@en ; rdfs:subClassOf sc2r:MalignRhetoric .
Label: Trolling
Description: Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:Sealioning
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Trolling a owl:Class ; rdfs:label "Trolling"@en ; rdfs:comment "Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument." ; rdfs:subClassOf sc2r:Abuse .
Label: Trusted Data
Description: Trusted data is the use of measures that ensure the safety, security and veracity of data.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TrustedData a owl:Class ; rdfs:label "Trusted Data" ; rdfs:comment "Trusted data is the use of measures that ensure the safety, security and veracity of data." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Trusted Information
Description: Trusted information is the use of information that is verified and safe, and from trusted sources.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TrustedInformation a owl:Class ; rdfs:label "Trusted Information" ; rdfs:comment "Trusted information is the use of information that is verified and safe, and from trusted sources." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Trusted Infrastructure
Description: Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:TrustedNetworking
Has Sub Class (all): sc2r:TrustedNetworking | sc2r:AnonymousRouting | sc2r:VirtualPrivateNetwork
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TrustedInfrastructure a owl:Class ; rdfs:label "Trusted Infrastructure" ; rdfs:comment "Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Trusted Networking
Description: Trusted Networking is the use of networking resources in a safe, secure, and trusted manner.
Has Super Class (direct): sc2r:TrustedInfrastructure
Has Super Class (all): sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:AnonymousRouting | sc2r:VirtualPrivateNetwork
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TrustedNetworking a owl:Class ; rdfs:label "Trusted Networking" ; rdfs:comment "Trusted Networking is the use of networking resources in a safe, secure, and trusted manner." ; rdfs:subClassOf sc2r:TrustedInfrastructure .
Label: Trusted Software
Description: Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:TrustedSoftware a owl:Class ; rdfs:label "Trusted Software" ; rdfs:comment "Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: USB Drive
Description: USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port.
Has Super Class (direct): sc2r:StorageAsset
Has Super Class (all): sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:USBDrive a owl:Class ; rdfs:label "USB Drive" ; rdfs:comment "USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port." ; rdfs:subClassOf sc2r:StorageAsset .
Label: Unauthorized Access
Description: Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to.
Has Super Class (direct): sc2r:AuthenticationThreat
Has Super Class (all): sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:NetworkIntrusion | sc2r:Piggybacking
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UnauthorizedAccess a owl:Class ; rdfs:label "Unauthorized Access"@en ; rdfs:comment "Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to."@en ; rdfs:subClassOf sc2r:AuthenticationThreat .
Label: Unavailable
Description: Unavailable is the state in which the resources become physically or digitally unavailable to use.
Has Super Class (direct): sc2r:PhysicalHarm
Has Super Class (all): sc2r:PhysicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Unavailable a owl:Class ; rdfs:label "Unavailable" ; rdfs:comment "Unavailable is the state in which the resources become physically or digitally unavailable to use." ; rdfs:subClassOf sc2r:PhysicalHarm .
Label: Under Scrutiny
Description: Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised.
Has Super Class (direct): sc2r:ReputationalHarm
Has Super Class (all): sc2r:ReputationalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UnderScrutiny a owl:Class ; rdfs:label "Under Scrutiny" ; rdfs:comment "Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised." ; rdfs:subClassOf sc2r:ReputationalHarm .
Label: Unsolicited Communication
Description: Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited.
Has Super Class (direct): sc2r:Abuse
Has Super Class (all): sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:SpamEmail | sc2r:UnsolicitedSocialRequest
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UnsolicitedCommunication a owl:Class ; rdfs:label "Unsolicited Communication"@en ; rdfs:comment "Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited." ; rdfs:subClassOf sc2r:Abuse .
Label: Unsolicited Social Request
Description: Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them.
Has Super Class (direct): sc2r:UnsolicitedCommunication
Has Super Class (all): sc2r:UnsolicitedCommunication | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UnsolicitedSocialRequest a owl:Class ; rdfs:label "Unsolicited Social Request"@en ; rdfs:comment "Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them." ; rdfs:subClassOf sc2r:UnsolicitedCommunication .
Label: Urgency
Description: Urgency is the need to deal with something quickly; the feeling of wanting something very much.
Has Super Class (direct): sc2r:Individual
Has Super Class (all): sc2r:Individual | sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Urgency a owl:Class ; rdfs:label "Urgency" ; rdfs:comment "Urgency is the need to deal with something quickly; the feeling of wanting something very much." ; rdfs:subClassOf sc2r:Individual .
Label: User-Generated Content
Description: User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms.
Has Super Class (direct): sc2r:PersonalData
Has Super Class (all): sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UserGeneratedContent a owl:Class ; rdfs:label "User-Generated Content" ; rdfs:comment "User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms." ; rdfs:subClassOf sc2r:PersonalData .
Label: User Identification
Description: Use identification is the confirmation of the claimed identify of users.
Has Super Class (direct): sc2r:Identification
Has Super Class (all): sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:UserIdentification a owl:Class ; rdfs:label "User Identification" ; rdfs:comment "Use identification is the confirmation of the claimed identify of users." ; rdfs:subClassOf sc2r:Identification .
Label: Vandalism
Description: Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged.
Has Super Class (direct): sc2r:IntegrityThreat
Has Super Class (all): sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Vandalism a owl:Class ; rdfs:label "Vandalism"@en ; rdfs:comment "Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged."@en ; rdfs:subClassOf sc2r:IntegrityThreat .
Label: Violation
Description: Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts.
Has Super Class (direct): sc2r:InstitutionalThreat
Has Super Class (all): sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat
Has Sub Class (direct): sc2r:ContractBreach
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Violation a owl:Class ; rdfs:label "Violation"@en ; rdfs:comment "Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts."@en ; rdfs:subClassOf sc2r:InstitutionalThreat .
Label: Voilent Content
Description: This is content of violent nature that may be inappropriate to individuals.
Has Super Class (direct): sc2r:InappropriateContent
Has Super Class (all): sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Violence a owl:Class ; rdfs:label "Voilent Content"@en ; rdfs:comment "This is content of violent nature that may be inappropriate to individuals."@en ; rdfs:subClassOf sc2r:InappropriateContent .
Label: Virtual Private Network
Description: A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security.
Has Super Class (direct): sc2r:TrustedNetworking
Has Super Class (all): sc2r:TrustedNetworking | sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:VirtualPrivateNetwork a owl:Class ; rdfs:label "Virtual Private Network" ; rdfs:comment "A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security." ; rdfs:subClassOf sc2r:TrustedNetworking .
Label: Vishing
Description: Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information.
Has Super Class (direct): sc2r:Phishing
Has Super Class (all): sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Vishing a owl:Class ; rdfs:label "Vishing"@en ; rdfs:comment "Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information." ; rdfs:subClassOf sc2r:Phishing .
Label: Vulnerability
Description: A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat.
Has Sub Class (direct): sc2r:Digital | sc2r:Individual | sc2r:Physical
Has Sub Class (all): sc2r:Digital | sc2r:DataVulnerability | sc2r:NetworkVulnerability | sc2r:SoftwareVulnerability | sc2r:Individual | sc2r:Conscientiousness | sc2r:Curiosity | sc2r:DiffusionOfResponsibility | sc2r:Fear | sc2r:Greed | sc2r:Guilt | sc2r:Helpfulness | sc2r:Impulsiveness | sc2r:Sympathy | sc2r:Urgency | sc2r:Physical | sc2r:HardwareVulnerability
In Domain Of: sc2r:isAVulnerabilityOf | sc2r:isExploitedBy | sc2r:isReducedBy
In Range Of: sc2r:exploits | sc2r:hasVulnerability | sc2r:reduces
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Vulnerability a owl:Class ; rdfs:label "Vulnerability"@en ; rdfs:comment "A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat."@en ; rdfs:seeAlso "https://en.wikipedia.org/wiki/Vulnerability_(computing)"@en .
Label: Web Hygiene
Description: Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety.
Has Super Class (direct): sc2r:PreventionMeasure
Has Super Class (all): sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response
Has Sub Class (direct): sc2r:EmailHygiene | sc2r:SocialMediaHygiene
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:WebHygiene a owl:Class ; rdfs:label "Web Hygiene" ; rdfs:comment "Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety." ; rdfs:subClassOf sc2r:PreventionMeasure .
Label: Whaling Phishing
Description: Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information.
Has Super Class (direct): sc2r:SpearPhishing
Has Super Class (all): sc2r:SpearPhishing | sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Whaling a owl:Class ; rdfs:label "Whaling Phishing"@en ; rdfs:comment "Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information." ; rdfs:subClassOf sc2r:SpearPhishing .
Label: WhatAboutism
Description: WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another.
Has Super Class (direct): sc2r:MalignRhetoric
Has Super Class (all): sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:WhatAboutism a owl:Class ; rdfs:label "WhatAboutism"@en ; rdfs:comment "WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another."@en ; rdfs:subClassOf sc2r:MalignRhetoric .
Label: Withstand Measure
Description: Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning.
Has Super Class (direct): sc2r:AbsorbMeasure
Has Super Class (all): sc2r:AbsorbMeasure | sc2r:Response
Has Sub Class (direct): sc2r:AlternativeResource | sc2r:IncreaseResources
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:WithstandMeasure a owl:Class ; rdfs:label "Withstand Measure" ; rdfs:comment "Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning." ; rdfs:subClassOf sc2r:AbsorbMeasure .
Label: Worried
Description: Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated.
Has Super Class (direct): sc2r:PsychologicalHarm
Has Super Class (all): sc2r:PsychologicalHarm | sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:Worried a owl:Class ; rdfs:label "Worried" ; rdfs:comment "Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated." ; rdfs:subClassOf sc2r:PsychologicalHarm .
Label: You Are Not Immune
Description: This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents.
Has Super Class (direct): sc2r:AttitudinalMeasure
Has Super Class (all): sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:YouAreNotImmune a owl:Class ; rdfs:label "You Are Not Immune" ; rdfs:comment "This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents." ; rdfs:subClassOf sc2r:AttitudinalMeasure .
Label: Creator
@prefix dc1: <http://purl.org/dc/elements/1.1/> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc1:creator a owl:AnnotationProperty .
Label: Description
@prefix dc1: <http://purl.org/dc/elements/1.1/> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc1:description a owl:AnnotationProperty .
Label: Rights
@prefix dc1: <http://purl.org/dc/elements/1.1/> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc1:rights a owl:AnnotationProperty .
Label: Creator
@prefix dc: <http://purl.org/dc/elements/1.1/#> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc:creator a owl:AnnotationProperty .
Label: Description
@prefix dc: <http://purl.org/dc/elements/1.1/#> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc:description a owl:AnnotationProperty .
Label: Rights
@prefix dc: <http://purl.org/dc/elements/1.1/#> . @prefix owl: <http://www.w3.org/2002/07/owl#> . dc:rights a owl:AnnotationProperty .
Label: CanBeResultOf
Has Sub Property (direct): sc2r:isResultOf
Domain: sc2r:Harm
Range: sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:canBeResultOf a owl:ObjectProperty ; rdfs:domain sc2r:Harm ; rdfs:range sc2r:Threat ; owl:inverseOf sc2r:canResultIn .
Label: CanResultIn
Has Sub Property (direct): sc2r:resultsIn
Domain: sc2r:Threat
Range: sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:canResultIn a owl:ObjectProperty ; rdfs:domain sc2r:Threat ; rdfs:range sc2r:Harm .
Label: Damages
Domain: sc2r:Threat
Range: sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:damages a owl:ObjectProperty ; rdfs:domain sc2r:Threat ; rdfs:range sc2r:Resource ; owl:inverseOf sc2r:isDamagedBy .
Label: Exploits
Domain: sc2r:Threat
Range: sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:exploits a owl:ObjectProperty ; rdfs:domain sc2r:Threat ; rdfs:range sc2r:Vulnerability ; owl:inverseOf sc2r:isExploitedBy .
Label: HasDescription
Domain: owl:Thing
Range: rdfs:Literal
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:hasDescription a owl:DatatypeProperty ; rdfs:domain owl:Thing ; rdfs:range rdfs:Literal .
Label: HasID
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:hasID a owl:DatatypeProperty .
Label: HasVulnerability
Domain: sc2r:Resource
Range: sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:hasVulnerability a owl:ObjectProperty ; rdfs:domain sc2r:Resource ; rdfs:range sc2r:Vulnerability ; owl:inverseOf sc2r:isAVulnerabilityOf .
Label: IsAVulnerabilityOf
Domain: sc2r:Vulnerability
Range: sc2r:Resource
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isAVulnerabilityOf a owl:ObjectProperty ; rdfs:domain sc2r:Vulnerability ; rdfs:range sc2r:Resource .
Label: IsDamagedBy
Domain: sc2r:Resource
Range: sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isDamagedBy a owl:ObjectProperty ; rdfs:domain sc2r:Resource ; rdfs:range sc2r:Threat .
Label: IsExploitedBy
Domain: sc2r:Vulnerability
Range: sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isExploitedBy a owl:ObjectProperty ; rdfs:domain sc2r:Vulnerability ; rdfs:range sc2r:Threat .
Label: IsMitigatedBy
Domain: sc2r:Threat
Range: sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isMitigatedBy a owl:ObjectProperty ; rdfs:domain sc2r:Threat ; rdfs:range sc2r:Response ; owl:inverseOf sc2r:mitigates .
Label: IsReducedBy
Domain: sc2r:Vulnerability
Range: sc2r:Response
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isReducedBy a owl:ObjectProperty ; rdfs:domain sc2r:Vulnerability ; rdfs:range sc2r:Response ; owl:inverseOf sc2r:reduces .
Label: IsResultOf
Has Super Property (direct): sc2r:canBeResultOf
Domain: sc2r:Harm
Range: sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:isResultOf a owl:ObjectProperty ; rdfs:domain sc2r:Harm ; rdfs:range sc2r:Threat ; rdfs:subPropertyOf sc2r:canBeResultOf ; owl:inverseOf sc2r:resultsIn .
Label: Mitigates
Domain: sc2r:Response
Range: sc2r:Threat
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:mitigates a owl:ObjectProperty ; rdfs:domain sc2r:Response ; rdfs:range sc2r:Threat .
Label: Reduces
Domain: sc2r:Response
Range: sc2r:Vulnerability
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:reduces a owl:ObjectProperty ; rdfs:domain sc2r:Response ; rdfs:range sc2r:Vulnerability .
Label: RelatesTo
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:relatesTo a owl:ObjectProperty, owl:SymmetricProperty .
Label: ResultsIn
Has Super Property (direct): sc2r:canResultIn
Domain: sc2r:Threat
Range: sc2r:Harm
@prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix sc2r: <http://cs.unu.edu/sc2r#> . sc2r:resultsIn a owl:ObjectProperty ; rdfs:domain sc2r:Threat ; rdfs:range sc2r:Harm ; rdfs:subPropertyOf sc2r:canResultIn .