Tree

sc2r:Harm
sc2r:EconomicHarm
sc2r:CompensationPayment
sc2r:DisruptedIncome
sc2r:DisruptedWork
sc2r:ExtorsionPayment
sc2r:Fine
sc2r:LossOfWork
sc2r:MitigationCost
sc2r:ScamCost
sc2r:TheftOfFinances
sc2r:TimeWasted
sc2r:PhysicalHarm
sc2r:Abused
sc2r:BodilyInjury
sc2r:Pain
sc2r:SelfHarm
sc2r:Compromised
sc2r:Corrupted
sc2r:Destroyed
sc2r:Exposed
sc2r:Infected
sc2r:LossOfLife
sc2r:ReducedPerformance
sc2r:Theft
sc2r:Unavailable
sc2r:PsychologicalHarm
sc2r:Addiction
sc2r:CognitiveImpairement
sc2r:Confusion
sc2r:Misled
sc2r:Depressed
sc2r:Discomfort
sc2r:Disempowerment
sc2r:Distraction
sc2r:Embarrassed
sc2r:FeelingUpset
sc2r:Frustration
sc2r:Gluttony
sc2r:Guilty
sc2r:IdentityTheftLoss
sc2r:LossOfConfidence
sc2r:LowMorale
sc2r:LowSatisfaction
sc2r:Mistreatment
sc2r:NegativePerception
sc2r:Overwhelmed
sc2r:Prosecution
sc2r:SelfCensorship
sc2r:Shameful
sc2r:Worried
sc2r:ReputationalHarm
sc2r:Blacklisted
sc2r:DamagedSocialPerception
sc2r:ReducedOpportunities
sc2r:UnderScrutiny
sc2r:SocialHarm
sc2r:Conflict
sc2r:DamagedRelationship
sc2r:ImpairedPrivateSocialBoundary
sc2r:Isolation
sc2r:Radicalisation
sc2r:SocialWithdrawal
sc2r:Resource
sc2r:DigitalResource
sc2r:Data
sc2r:File
sc2r:CyptoCurrency
sc2r:PersonalData
sc2r:ActivityData
sc2r:BehaviouralData
sc2r:DemographicInformation
sc2r:IdentifyingData
sc2r:Credential
sc2r:BiometricToken
sc2r:DataToken
sc2r:PhysicalToken
sc2r:FinancialData
sc2r:LocationData
sc2r:SocialContact
sc2r:UserGeneratedContent
sc2r:Software
sc2r:OnlineServices
sc2r:IndividualResource
sc2r:Agency
sc2r:MentalFaculties
sc2r:Knowledge
sc2r:Motivation
sc2r:Skills
sc2r:Identity
sc2r:Right
sc2r:Assembly
sc2r:Expression
sc2r:Information
sc2r:Opinion
sc2r:Privacy
sc2r:InformationalPrivacy
sc2r:PhysicalPrivacy
sc2r:PsychologicalPrivacy
sc2r:SocialPrivacy
sc2r:TerritorialPrivacy
sc2r:SocialCapital
sc2r:Reputation
sc2r:SocialNetwork
sc2r:InfrastructureResource
sc2r:Electricity
sc2r:InternetConnectivity
sc2r:PhysicalResource
sc2r:ComputingAsset
sc2r:Computer
sc2r:Laptop
sc2r:MobileDevice
sc2r:Server
sc2r:NetworkEquipment
sc2r:StorageAsset
sc2r:ExternalHardDrive
sc2r:SDCard
sc2r:USBDrive
sc2r:Response
sc2r:AbsorbMeasure
sc2r:EngageMeasure
sc2r:ConfrontThreat
sc2r:DisconnectMeasure
sc2r:IsolateMeasure
sc2r:RemovalMeasure
sc2r:MaliciousContactRemoval
sc2r:MaliciousContentRemoval
sc2r:MaliciousSoftwareRemoval
sc2r:Reporting
sc2r:IncidentReporting
sc2r:WithstandMeasure
sc2r:AlternativeResource
sc2r:IncreaseResources
sc2r:AdaptMeasure
sc2r:CapacityBuilding
sc2r:Evolve
sc2r:PrepareMeasure
sc2r:AnticipateMeasure
sc2r:AttitudinalMeasure
sc2r:BeCritical
sc2r:BeSuspicious
sc2r:BeVigilant
sc2r:YouAreNotImmune
sc2r:Awareness
sc2r:AssetInventory
sc2r:DigitalFootprint
sc2r:RecoveryPlan
sc2r:RedundancyMeasure
sc2r:DataRedundancy
sc2r:NetworkRedundancy
sc2r:SoftwareRedundancy
sc2r:SourceRedundancy
sc2r:Training
sc2r:MediationMeasures
sc2r:ActiveMediation
sc2r:RestrictiveMediation
sc2r:TechnicalMediation
sc2r:MonitoringMeasure
sc2r:LoggingAndAudit
sc2r:ThreatMonitoringMeasure
sc2r:FailureDetection
sc2r:IntrusionDetection
sc2r:MaliciousSoftwareDetection
sc2r:SocialMediaMonitoring
sc2r:PreventionMeasure
sc2r:AccessControl
sc2r:Firewall
sc2r:LeastPrivilege
sc2r:PhysicalRestriction
sc2r:Sandboxing
sc2r:Identification
sc2r:DeviceIdentification
sc2r:MultiFactorAuthentication
sc2r:MutualAuthentication
sc2r:PasswordManagement
sc2r:UserIdentification
sc2r:TrustedData
sc2r:TrustedInformation
sc2r:TrustedInfrastructure
sc2r:TrustedNetworking
sc2r:AnonymousRouting
sc2r:VirtualPrivateNetwork
sc2r:TrustedSoftware
sc2r:WebHygiene
sc2r:EmailHygiene
sc2r:SocialMediaHygiene
sc2r:RecoverMeasure
sc2r:AccountRecovery
sc2r:DataRecovery
sc2r:ExternalSupport
sc2r:ProfessionalSupport
sc2r:SocialSupport
sc2r:Fact-checking
sc2r:SystemRecovery
sc2r:Threat
sc2r:EnvironmentalThreat
sc2r:InstitutionalThreat
sc2r:Censorship
sc2r:Surveillance
sc2r:Violation
sc2r:ContractBreach
sc2r:NaturalDisaster
sc2r:PersonalThreat
sc2r:Abuse
sc2r:CyberPredator
sc2r:CyberStalking
sc2r:Cyberbullying
sc2r:Flaming
sc2r:InformationFlooding
sc2r:SexualAbuse
sc2r:BoyfriendingGirlfriending
sc2r:Grooming
sc2r:LoveBombing
sc2r:Luring
sc2r:Persistence
sc2r:Sextortion
sc2r:SexualAssault
sc2r:Trolling
sc2r:Sealioning
sc2r:UnsolicitedCommunication
sc2r:SpamEmail
sc2r:UnsolicitedSocialRequest
sc2r:CognitiveThreat
sc2r:DigitalHoarding
sc2r:Disinformation
sc2r:Deceit
sc2r:Forging
sc2r:PotemkinVillageEvidence
sc2r:Shilling
sc2r:EngineeredContent
sc2r:FakeNews
sc2r:InfluenceOperation
sc2r:HumorAndMeme
sc2r:Parody
sc2r:Satire
sc2r:MalignRhetoric
sc2r:Firehosing
sc2r:GishGalloping
sc2r:Strawman
sc2r:Transfer
sc2r:WhatAboutism
sc2r:OpposingInformation
sc2r:Propaganda
sc2r:InfluenceThreat
sc2r:Coercion
sc2r:Extortion
sc2r:InformationOverload
sc2r:PsychographicHacking
sc2r:BandwagonEffect
sc2r:DarkAdvertising
sc2r:Microtargeting
sc2r:Scareware
sc2r:SocialEngineering
sc2r:Baiting
sc2r:Phishing
sc2r:AnglerPhishing
sc2r:Catphishing
sc2r:Smishing
sc2r:SpearPhishing
sc2r:Whaling
sc2r:Vishing
sc2r:Pretexting
sc2r:QuidProQuo
sc2r:Tailgating
sc2r:Malinformation
sc2r:InappropriateContent
sc2r:OffensiveLanguage
sc2r:Pornography
sc2r:Profanity
sc2r:Violence
sc2r:Misinformation
sc2r:MisleadingInformation
sc2r:MisleadingAdvertising
sc2r:PrivacyThreat
sc2r:AnonymityThreat
sc2r:IntimacyThreat
sc2r:ReserveThreat
sc2r:SolitudeThreat
sc2r:TheftThreat
sc2r:Fraud
sc2r:IdentityTheft
sc2r:Scam
sc2r:FakeGiveways
sc2r:SweepstakesScam
sc2r:SocialThreat
sc2r:SocialHacking
sc2r:BlackPropaganda
sc2r:Cheerleading
sc2r:Flooding
sc2r:Laundering
sc2r:ParasocialHacking
sc2r:PointAndShriek
sc2r:Polarization
sc2r:Raiding
sc2r:SociocognitiveHacking
sc2r:SockPuppetry
sc2r:TechnologicalThreat
sc2r:AuthenticationThreat
sc2r:AccountHijacking
sc2r:Fabrication
sc2r:Masquerading
sc2r:Spoofing
sc2r:UnauthorizedAccess
sc2r:NetworkIntrusion
sc2r:Piggybacking
sc2r:AvailabilityThreat
sc2r:DenialOfService
sc2r:Disruption
sc2r:LostCredentials
sc2r:LostDevices
sc2r:Ransomware
sc2r:ConfidentialityThreat
sc2r:DataBreach
sc2r:DataLeak
sc2r:Doxing
sc2r:InadvertentDisclosure
sc2r:Interception
sc2r:Eavesdropping
sc2r:Reconnaissance
sc2r:Skimming
sc2r:IntegrityThreat
sc2r:Damage
sc2r:DataCorruption
sc2r:DataError
sc2r:Malfunction
sc2r:Malware
sc2r:Misconfiguration
sc2r:RemoteExecution
sc2r:Replay
sc2r:Vandalism
sc2r:NonRepudiationThreat
sc2r:Vulnerability
sc2r:Digital
sc2r:DataVulnerability
sc2r:NetworkVulnerability
sc2r:SoftwareVulnerability
sc2r:Individual
sc2r:Conscientiousness
sc2r:Curiosity
sc2r:DiffusionOfResponsibility
sc2r:Fear
sc2r:Greed
sc2r:Guilt
sc2r:Helpfulness
sc2r:Impulsiveness
sc2r:Sympathy
sc2r:Urgency
sc2r:Physical
sc2r:HardwareVulnerability