http://cs.unu.edu/sc2r
The Smart Citizen Cyber Resilience Ontology (SC2RO) maps the cyber resilience landscape for individuals. It identifies cyber resources, vulnerabilities, threats, responses and harms associated with and specific to individual citizen's cyber functionings.
URI | http://cs.unu.edu/sc2r#AbsorbMeasure |
---|---|
Description |
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident. |
Super-classes |
sc2r:Responsec |
Sub-classes |
sc2r:WithstandMeasurec sc2r:Reportingc sc2r:EngageMeasurec |
URI | http://cs.unu.edu/sc2r#Abuse |
---|---|
Description |
Abuse threats emanate from the harmful treatment of individuals online. |
Super-classes |
sc2r:PersonalThreatc |
Sub-classes |
sc2r:SexualAbusec sc2r:Trollingc sc2r:UnsolicitedCommunicationc sc2r:CyberStalkingc sc2r:CyberPredatorc sc2r:Flamingc sc2r:InformationFloodingc sc2r:Cyberbullyingc |
URI | http://cs.unu.edu/sc2r#Abused |
---|---|
Description |
Abused Harm refers to misuse of physical or digital assets. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#AccessControl |
---|---|
Description |
Access control is the prevention measure that involves controlling and authorizing access to cyber resources. |
Super-classes |
sc2r:PreventionMeasurec |
Sub-classes |
sc2r:LeastPrivilegec sc2r:Firewallc sc2r:Sandboxingc sc2r:PhysicalRestrictionc |
URI | http://cs.unu.edu/sc2r#AccountHijacking |
---|---|
Description |
This is the process where an individuals account is hijacked or stolen by someone else. |
Super-classes |
sc2r:AuthenticationThreatc |
URI | http://cs.unu.edu/sc2r#AccountRecovery |
---|---|
Description |
Account recovery measures involve restoring access and control of an account after an adverse cyber incident. |
Super-classes |
sc2r:RecoverMeasurec |
URI | http://cs.unu.edu/sc2r#ActiveMediation |
---|---|
Description |
Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents. |
Super-classes |
sc2r:MediationMeasuresc |
URI | http://cs.unu.edu/sc2r#ActivityData |
---|---|
Description |
Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#AdaptMeasure |
---|---|
Description |
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better” |
Super-classes |
sc2r:Responsec |
Sub-classes |
sc2r:Evolvec sc2r:CapacityBuildingc |
URI | http://cs.unu.edu/sc2r#Addiction |
---|---|
Description |
Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Agency |
---|---|
Description |
Agency is the ability to define one’s goals and act upon them. |
Super-classes |
sc2r:IndividualResourcec |
Sub-classes |
sc2r:MentalFacultiesc |
URI | http://cs.unu.edu/sc2r#AlternativeResource |
---|---|
Description |
This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources. For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized. |
Super-classes |
sc2r:WithstandMeasurec |
URI | http://cs.unu.edu/sc2r#AnglerPhishing |
---|---|
Description |
Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information. |
Super-classes |
sc2r:Phishingc |
URI | http://cs.unu.edu/sc2r#AnonymityThreat |
---|---|
Description |
Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened. |
Super-classes |
sc2r:PrivacyThreatc |
URI | http://cs.unu.edu/sc2r#AnonymousRouting |
---|---|
Description |
Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers. |
Super-classes |
sc2r:TrustedNetworkingc |
URI | http://cs.unu.edu/sc2r#AnticipateMeasure |
---|---|
Description |
Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents. |
Super-classes |
sc2r:PrepareMeasurec |
Sub-classes |
sc2r:Awarenessc sc2r:AttitudinalMeasurec sc2r:Trainingc sc2r:RecoveryPlanc sc2r:RedundancyMeasurec |
URI | http://cs.unu.edu/sc2r#Assembly |
---|---|
Description |
The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately. |
Super-classes |
sc2r:Rightc |
URI | http://cs.unu.edu/sc2r#AssetInventory |
---|---|
Description |
Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to. |
Super-classes |
sc2r:Awarenessc |
URI | http://cs.unu.edu/sc2r#AttitudinalMeasure |
---|---|
Description |
Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents. |
Super-classes |
sc2r:AnticipateMeasurec |
Sub-classes |
sc2r:BeVigilantc sc2r:BeSuspiciousc sc2r:BeCriticalc sc2r:YouAreNotImmunec |
URI | http://cs.unu.edu/sc2r#AuthenticationThreat |
---|---|
Description |
Authentication threats compromise the Authentication cyber security goal. |
Super-classes |
sc2r:TechnologicalThreatc |
Sub-classes |
sc2r:Masqueradingc sc2r:Fabricationc sc2r:AccountHijackingc sc2r:Spoofingc sc2r:UnauthorizedAccessc |
URI | http://cs.unu.edu/sc2r#AvailabilityThreat |
---|---|
Description |
Availability Threats compromise the Availability cyber security goal. |
Super-classes |
sc2r:TechnologicalThreatc |
Sub-classes |
sc2r:DenialOfServicec sc2r:Disruptionc sc2r:Ransomwarec sc2r:LostDevicesc sc2r:LostCredentialsc |
URI | http://cs.unu.edu/sc2r#Awareness |
---|---|
Description |
Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape. |
Super-classes |
sc2r:AnticipateMeasurec |
Sub-classes |
sc2r:AssetInventoryc sc2r:DigitalFootprintc |
URI | http://cs.unu.edu/sc2r#Baiting |
---|---|
Description |
Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods. |
Super-classes |
sc2r:SocialEngineeringc |
URI | http://cs.unu.edu/sc2r#BandwagonEffect |
---|---|
Description |
Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does. |
Super-classes |
sc2r:PsychographicHackingc |
URI | http://cs.unu.edu/sc2r#BeCritical |
---|---|
Description |
This attitude emphasizes the need to be critical in online engagements. For example being critical with regard to news and content consumed online. |
Super-classes |
sc2r:AttitudinalMeasurec |
URI | http://cs.unu.edu/sc2r#BeSuspicious |
---|---|
Description |
This attitude emphasizes the importance of being suspicious online. For example, being suspicious of unsolicited communication. |
Super-classes |
sc2r:AttitudinalMeasurec |
URI | http://cs.unu.edu/sc2r#BeVigilant |
---|---|
Description |
This attitude emphasizes the need to be vigilant online. |
Super-classes |
sc2r:AttitudinalMeasurec |
URI | http://cs.unu.edu/sc2r#BehaviouralData |
---|---|
Description |
Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#BiometricToken |
---|---|
Description |
Biometric Token is a biometric-based security token that is used for authentication or verification purpose. |
Super-classes |
sc2r:Credentialc |
URI | http://cs.unu.edu/sc2r#BlackPropaganda |
---|---|
Description |
Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Blacklisted |
---|---|
Description |
Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided. |
Super-classes |
sc2r:ReputationalHarmc |
URI | http://cs.unu.edu/sc2r#BodilyInjury |
---|---|
Description |
Bodily Injury refers to the wound caused to individual's body. |
Super-classes |
sc2r:PhysicalHarmc |
Sub-classes |
sc2r:Painc sc2r:SelfHarmc |
URI | http://cs.unu.edu/sc2r#BoyfriendingGirlfriending |
---|---|
Description |
Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#CapacityBuilding |
---|---|
Description |
The capacity-building measures involve increasing the level of nominal cyber functioning of individuals. |
Super-classes |
sc2r:AdaptMeasurec |
URI | http://cs.unu.edu/sc2r#Catphishing |
---|---|
Description |
Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target. |
Super-classes |
sc2r:Phishingc |
URI | http://cs.unu.edu/sc2r#Censorship |
---|---|
Description |
Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media. |
Super-classes |
sc2r:InstitutionalThreatc |
URI | http://cs.unu.edu/sc2r#Cheerleading |
---|---|
Description |
Using information influence techniques to crowd out dissent. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Coercion |
---|---|
Description |
Coercion occurs when individuals are persuaded by threats or force to do something. |
Super-classes |
sc2r:InfluenceThreatc |
URI | http://cs.unu.edu/sc2r#CognitiveImpairement |
---|---|
Description |
Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#CognitiveThreat |
---|---|
Description |
Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others. |
Super-classes |
sc2r:PersonalThreatc |
Sub-classes |
sc2r:Malinformationc sc2r:Disinformationc sc2r:Misinformationc sc2r:InfluenceThreatc sc2r:DigitalHoardingc |
URI | http://cs.unu.edu/sc2r#CompensationPayment |
---|---|
Description |
Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Compromised |
---|---|
Description |
Comprised is the state in which the resources are physically or digitally affected. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#Computer |
---|---|
Description |
Computer is an electronic device that can store, retrieve, and process data. |
Super-classes |
sc2r:ComputingAssetc |
URI | http://cs.unu.edu/sc2r#ComputingAsset |
---|---|
Description |
Computing Asset is any asset that utilises computing processes. |
Super-classes |
sc2r:PhysicalResourcec |
Sub-classes |
sc2r:Computerc sc2r:MobileDevicec sc2r:Laptopc sc2r:Serverc |
URI | http://cs.unu.edu/sc2r#ConfidentialityThreat |
---|---|
Description |
Confidentiality Threats compromise the Confidentiality cybersecurity goal. |
Super-classes |
sc2r:TechnologicalThreatc |
Sub-classes |
sc2r:Doxingc sc2r:Skimmingc sc2r:DataLeakc sc2r:DataBreachc sc2r:Interceptionc sc2r:InadvertentDisclosurec sc2r:Reconnaissancec |
URI | http://cs.unu.edu/sc2r#Conflict |
---|---|
Description |
Conflict refers to an active disagreement between the individual with those with opposing opinions or principles. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#ConfrontThreat |
---|---|
Description |
Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors. |
Super-classes |
sc2r:EngageMeasurec |
URI | http://cs.unu.edu/sc2r#Confusion |
---|---|
Description |
Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something. |
Super-classes |
sc2r:PsychologicalHarmc |
Sub-classes |
sc2r:Misledc |
URI | http://cs.unu.edu/sc2r#Conscientiousness |
---|---|
Description |
Conscientiousness refers to individual's ability to control, regulate, and direct their impulses. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#ContractBreach |
---|---|
Description |
A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources. |
Super-classes |
sc2r:Violationc |
URI | http://cs.unu.edu/sc2r#Corrupted |
---|---|
Description |
Corrupted is the state where the resources are being physically or digitally debased or their integrity affected. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#Credential |
---|---|
Description |
A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID. |
Super-classes |
sc2r:IdentifyingDatac |
Sub-classes |
sc2r:DataTokenc sc2r:PhysicalTokenc sc2r:BiometricTokenc |
URI | http://cs.unu.edu/sc2r#Curiosity |
---|---|
Description |
Curiosity is the desire to learn or know about anything. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#CyberPredator |
---|---|
Description |
Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes. |
Super-classes |
sc2r:Abusec |
URI | http://cs.unu.edu/sc2r#CyberStalking |
---|---|
Description |
Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes. |
Super-classes |
sc2r:Abusec |
URI | http://cs.unu.edu/sc2r#Cyberbullying |
---|---|
Description |
Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods. |
Super-classes |
sc2r:Abusec |
URI | http://cs.unu.edu/sc2r#CyptoCurrency |
---|---|
Description |
A Cryptocurrency is a digital or virtual currency that is secured by cryptography. |
Super-classes |
sc2r:Filec |
URI | http://cs.unu.edu/sc2r#Damage |
---|---|
Description |
These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#DamagedRelationship |
---|---|
Description |
Damaged Relationship refers to an adverse change in relationship between the individuals with other people. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#DamagedSocialPerception |
---|---|
Description |
Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network. |
Super-classes |
sc2r:ReputationalHarmc |
URI | http://cs.unu.edu/sc2r#DarkAdvertising |
---|---|
Description |
Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence. |
Super-classes |
sc2r:PsychographicHackingc |
URI | http://cs.unu.edu/sc2r#Data |
---|---|
Description |
Data is information that has been translated into a form that is efficient for movement or processing. |
Super-classes |
sc2r:DigitalResourcec |
Sub-classes |
sc2r:Filec sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#DataBreach |
---|---|
Description |
A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#DataCorruption |
---|---|
Description |
Data Corruption occurs when there are errors to data which compromise the integrity of the data. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#DataError |
---|---|
Description |
These are data errors that compromise the integrity of data. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#DataLeak |
---|---|
Description |
A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#DataRecovery |
---|---|
Description |
Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss. |
Super-classes |
sc2r:RecoverMeasurec |
URI | http://cs.unu.edu/sc2r#DataRedundancy |
---|---|
Description |
Data redundancy measure involves having data backups and redundant data storage. |
Super-classes |
sc2r:RedundancyMeasurec |
URI | http://cs.unu.edu/sc2r#DataToken |
---|---|
Description |
Data Token is tokenized data access that is used to secure access to data. |
Super-classes |
sc2r:Credentialc |
URI | http://cs.unu.edu/sc2r#DataVulnerability |
---|---|
Description |
Data Vulnerabilities are the weaknesses associated with data. |
Super-classes |
sc2r:Digitalc |
URI | http://cs.unu.edu/sc2r#Deceit |
---|---|
Description |
Threat of deceptive content and information |
Super-classes |
sc2r:Disinformationc |
Sub-classes |
sc2r:PotemkinVillageEvidencec sc2r:Shillingc sc2r:Forgingc |
URI | http://cs.unu.edu/sc2r#DemographicInformation |
---|---|
Description |
Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#DenialOfService |
---|---|
Description |
A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users. |
Super-classes |
sc2r:AvailabilityThreatc |
URI | http://cs.unu.edu/sc2r#Depressed |
---|---|
Description |
Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Destroyed |
---|---|
Description |
Destroyed refers to the state in which the resources being physically or digitally ruined. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#DeviceIdentification |
---|---|
Description |
Device authentication is the process is verifying the identity of the devices that are used to connect to network resources. |
Super-classes |
sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#DiffusionOfResponsibility |
---|---|
Description |
Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#Digital |
---|---|
Description |
Digital Vulnerabilities are weaknesses associated with digital resources. |
Super-classes |
sc2r:Vulnerabilityc |
Sub-classes |
sc2r:DataVulnerabilityc sc2r:NetworkVulnerabilityc sc2r:SoftwareVulnerabilityc |
URI | http://cs.unu.edu/sc2r#DigitalFootprint |
---|---|
Description |
Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings. |
Super-classes |
sc2r:Awarenessc |
URI | http://cs.unu.edu/sc2r#DigitalHoarding |
---|---|
Description |
Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user. |
Super-classes |
sc2r:CognitiveThreatc |
URI | http://cs.unu.edu/sc2r#DigitalResource |
---|---|
Description |
Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised). |
Super-classes |
sc2r:Resourcec |
Sub-classes |
sc2r:Softwarec sc2r:Datac |
URI | http://cs.unu.edu/sc2r#Discomfort |
---|---|
Description |
Discomfort is the state in which the individual experiences uneasiness or anxiety. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#DisconnectMeasure |
---|---|
Description |
The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation. For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform. |
Super-classes |
sc2r:EngageMeasurec |
URI | http://cs.unu.edu/sc2r#Disempowerment |
---|---|
Description |
Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Disinformation |
---|---|
Description |
Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional. |
Super-classes |
sc2r:CognitiveThreatc |
Sub-classes |
sc2r:Propagandac sc2r:EngineeredContentc sc2r:Deceitc sc2r:FakeNewsc sc2r:OpposingInformationc sc2r:MalignRhetoricc sc2r:InfluenceOperationc |
URI | http://cs.unu.edu/sc2r#DisruptedIncome |
---|---|
Description |
Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#DisruptedWork |
---|---|
Description |
Disrupted Work refers to the suspension of work as a result of the cyber threats. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Disruption |
---|---|
Description |
Disruption occurs when individuals' access to information and resources is disrupted. |
Super-classes |
sc2r:AvailabilityThreatc |
URI | http://cs.unu.edu/sc2r#Distraction |
---|---|
Description |
Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Doxing |
---|---|
Description |
Doxing is when private and confidential information about individuals is researched and published online with malicious intent. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#Eavesdropping |
---|---|
Description |
Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties. |
Super-classes |
sc2r:Interceptionc |
URI | http://cs.unu.edu/sc2r#EconomicHarm |
---|---|
Description |
Economic Harm is the harm that relates to negative financial or economic consequences. |
Super-classes |
sc2r:Harmc |
Sub-classes |
sc2r:MitigationCostc sc2r:ExtorsionPaymentc sc2r:TimeWastedc sc2r:CompensationPaymentc sc2r:TheftOfFinancesc sc2r:Finec sc2r:DisruptedIncomec sc2r:LossOfWorkc sc2r:ScamCostc sc2r:DisruptedWorkc |
URI | http://cs.unu.edu/sc2r#Electricity |
---|---|
Description |
Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings. |
Super-classes |
sc2r:InfrastructureResourcec |
URI | http://cs.unu.edu/sc2r#EmailHygiene |
---|---|
Description |
Email hygiene are measures and practices that contribute to safe and secure use of email. |
Super-classes |
sc2r:WebHygienec |
URI | http://cs.unu.edu/sc2r#Embarrassed |
---|---|
Description |
Embarrassed is the state in which the individual feels humiliated or shameful. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#EngageMeasure |
---|---|
Description |
Engage measures involve direct handling of and engagement with the adverse cyber incident. |
Super-classes |
sc2r:AbsorbMeasurec |
Sub-classes |
sc2r:ConfrontThreatc sc2r:IsolateMeasurec sc2r:DisconnectMeasurec sc2r:RemovalMeasurec |
URI | http://cs.unu.edu/sc2r#EngineeredContent |
---|---|
Description |
Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives. |
Super-classes |
sc2r:Disinformationc |
URI | http://cs.unu.edu/sc2r#EnvironmentalThreat |
---|---|
Description |
Environmental Threats emanate from individuals' wider environmental and institutional context. |
Super-classes |
sc2r:Threatc |
Sub-classes |
sc2r:InstitutionalThreatc sc2r:NaturalDisasterc |
URI | http://cs.unu.edu/sc2r#Evolve |
---|---|
Description |
The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning. |
Super-classes |
sc2r:AdaptMeasurec |
URI | http://cs.unu.edu/sc2r#Exposed |
---|---|
Description |
Exposed is the state in which the resources are physically or digitally disclosed. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#Expression |
---|---|
Description |
The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues. |
Super-classes |
sc2r:Rightc |
URI | http://cs.unu.edu/sc2r#ExternalHardDrive |
---|---|
Description |
External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection. |
Super-classes |
sc2r:StorageAssetc |
URI | http://cs.unu.edu/sc2r#ExternalSupport |
---|---|
Description |
External support involves receiving external input and support towards recovering and restoring cyber functioning. |
Super-classes |
sc2r:RecoverMeasurec |
Sub-classes |
sc2r:ProfessionalSupportc sc2r:SocialSupportc |
URI | http://cs.unu.edu/sc2r#ExtorsionPayment |
---|---|
Description |
Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents). |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Extortion |
---|---|
Description |
Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target. |
Super-classes |
sc2r:InfluenceThreatc |
URI | http://cs.unu.edu/sc2r#Fabrication |
---|---|
Description |
Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity. |
Super-classes |
sc2r:AuthenticationThreatc |
URI | http://cs.unu.edu/sc2r#Fact-checking |
---|---|
Description |
Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident. In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident. |
Super-classes |
sc2r:RecoverMeasurec |
URI | http://cs.unu.edu/sc2r#FailureDetection |
---|---|
Description |
Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources. |
Super-classes |
sc2r:ThreatMonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#FakeGiveways |
---|---|
Description |
Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee. |
Super-classes |
sc2r:Scamc |
URI | http://cs.unu.edu/sc2r#FakeNews |
---|---|
Description |
Fake News is news that include deliberate disinformation content. |
Super-classes |
sc2r:Disinformationc |
URI | http://cs.unu.edu/sc2r#Fear |
---|---|
Description |
Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#FeelingUpset |
---|---|
Description |
Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#File |
---|---|
Description |
A File is an object on a computer that stores data, information, settings, or commands used with a computer program. |
Super-classes |
sc2r:Datac |
Sub-classes |
sc2r:CyptoCurrencyc |
URI | http://cs.unu.edu/sc2r#FinancialData |
---|---|
Description |
Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow. |
Super-classes |
sc2r:IdentifyingDatac |
URI | http://cs.unu.edu/sc2r#Fine |
---|---|
Description |
Fine Payment refers to the fine that the individual is liable to pay. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Firehosing |
---|---|
Description |
Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues. |
Super-classes |
sc2r:MalignRhetoricc |
URI | http://cs.unu.edu/sc2r#Firewall |
---|---|
Description |
Firewall is a mechanism for allowing and denying access to specific network resources. |
Super-classes |
sc2r:AccessControlc |
URI | http://cs.unu.edu/sc2r#Flaming |
---|---|
Description |
Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites. |
Super-classes |
sc2r:Abusec |
URI | http://cs.unu.edu/sc2r#Flooding |
---|---|
Description |
Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Forging |
---|---|
Description |
Forging is the illegitimate dissemination of falsified evidence. |
Super-classes |
sc2r:Deceitc |
URI | http://cs.unu.edu/sc2r#Fraud |
---|---|
Description |
Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud. |
Super-classes |
sc2r:TheftThreatc |
URI | http://cs.unu.edu/sc2r#Frustration |
---|---|
Description |
Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#GishGalloping |
---|---|
Description |
Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting. |
Super-classes |
sc2r:MalignRhetoricc |
URI | http://cs.unu.edu/sc2r#Gluttony |
---|---|
Description |
Gluttony refers to over-indulgence in being online. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Greed |
---|---|
Description |
Greed is an overwhelming urge to have more of something, usually more than needed. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#Grooming |
---|---|
Description |
Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#Guilt |
---|---|
Description |
Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#Guilty |
---|---|
Description |
Guilty refers to the state in which the individual feels regretful or remorse. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#HardwareVulnerability |
---|---|
Description |
Hardware Vulnerability |
Super-classes |
sc2r:Physicalc |
URI | http://cs.unu.edu/sc2r#Harm |
---|---|
Description |
A Harm, also called Impact, is the negative consequences of unmitigated Threats |
Sub-classes |
sc2r:SocialHarmc sc2r:PhysicalHarmc sc2r:PsychologicalHarmc sc2r:EconomicHarmc sc2r:ReputationalHarmc |
In domain of |
sc2r:isResultOfop sc2r:canBeResultOfop |
In range of |
sc2r:canResultInop sc2r:resultsInop |
URI | http://cs.unu.edu/sc2r#Helpfulness |
---|---|
Description |
Helpfulness is the quality of being ready to give help. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#HumorAndMeme |
---|---|
Description |
Humor and Memes that are employed to influence individuals and shape narratives. |
Super-classes |
sc2r:InfluenceOperationc |
URI | http://cs.unu.edu/sc2r#Identification |
---|---|
Description |
Identification is a prevention measure that involves confirming claimed identity online. |
Super-classes |
sc2r:PreventionMeasurec |
Sub-classes |
sc2r:UserIdentificationc sc2r:MultiFactorAuthenticationc sc2r:MutualAuthenticationc sc2r:DeviceIdentificationc sc2r:PasswordManagementc |
URI | http://cs.unu.edu/sc2r#IdentifyingData |
---|---|
Description |
Identifying Data includes all kinds of data that can be used to identify an individual and their personal information. |
Super-classes |
sc2r:PersonalDatac |
Sub-classes |
sc2r:Credentialc sc2r:FinancialDatac |
URI | http://cs.unu.edu/sc2r#Identity |
---|---|
Description |
Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status. |
Super-classes |
sc2r:IndividualResourcec |
URI | http://cs.unu.edu/sc2r#IdentityTheft |
---|---|
Description |
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. |
Super-classes |
sc2r:TheftThreatc |
URI | http://cs.unu.edu/sc2r#IdentityTheftLoss |
---|---|
Description |
Identity Theft Loss refers to the state in which the individual's personal information is stolen. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#ImpairedPrivateSocialBoundary |
---|---|
Description |
Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#Impulsiveness |
---|---|
Description |
Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#InadvertentDisclosure |
---|---|
Description |
Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#InappropriateContent |
---|---|
Description |
Inappropriate information is content that causes harm to individuals who consume it. |
Super-classes |
sc2r:Malinformationc |
Sub-classes |
sc2r:Profanityc sc2r:Violencec sc2r:Pornographyc sc2r:OffensiveLanguagec |
URI | http://cs.unu.edu/sc2r#IncidentReporting |
---|---|
Description |
Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals. |
Super-classes |
sc2r:Reportingc |
URI | http://cs.unu.edu/sc2r#IncreaseResources |
---|---|
Description |
This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources. For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning. |
Super-classes |
sc2r:WithstandMeasurec |
URI | http://cs.unu.edu/sc2r#Individual |
---|---|
Description |
Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats. |
Super-classes |
sc2r:Vulnerabilityc |
Sub-classes |
sc2r:Impulsivenessc sc2r:Fearc sc2r:Sympathyc sc2r:DiffusionOfResponsibilityc sc2r:Greedc sc2r:Guiltc sc2r:Curiosityc sc2r:Urgencyc sc2r:Conscientiousnessc sc2r:Helpfulnessc |
URI | http://cs.unu.edu/sc2r#IndividualResource |
---|---|
Description |
Individual resources are a combination of natural endowments and what is acquired through social relationships. |
Super-classes |
sc2r:Resourcec |
Sub-classes |
sc2r:Identityc sc2r:Rightc sc2r:Agencyc sc2r:SocialCapitalc |
URI | http://cs.unu.edu/sc2r#Infected |
---|---|
Description |
Infected is the state in which the resources are physically or digitally contaminated. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#InfluenceOperation |
---|---|
Description |
Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others. |
Super-classes |
sc2r:Disinformationc |
Sub-classes |
sc2r:HumorAndMemec sc2r:Satirec sc2r:Parodyc |
URI | http://cs.unu.edu/sc2r#InfluenceThreat |
---|---|
Description |
Influence Threat is any threat that is intended to influence individual's perceptions and prejudices. |
Super-classes |
sc2r:CognitiveThreatc |
Sub-classes |
sc2r:PsychographicHackingc sc2r:Coercionc sc2r:Extortionc sc2r:SocialEngineeringc sc2r:Scarewarec sc2r:InformationOverloadc |
URI | http://cs.unu.edu/sc2r#Information |
---|---|
Description |
The Right to Information is individual's right to access personal and non-personal information held by government. |
Super-classes |
sc2r:Rightc |
URI | http://cs.unu.edu/sc2r#InformationFlooding |
---|---|
Description |
Information Flooding occurs when individuals are exposed to too much information and data. |
Super-classes |
sc2r:Abusec |
URI | http://cs.unu.edu/sc2r#InformationOverload |
---|---|
Description |
Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions. |
Super-classes |
sc2r:InfluenceThreatc |
URI | http://cs.unu.edu/sc2r#InformationalPrivacy |
---|---|
Description |
Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others. |
Super-classes |
sc2r:Privacyc |
URI | http://cs.unu.edu/sc2r#InfrastructureResource |
---|---|
Description |
Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data. |
Super-classes |
sc2r:Resourcec |
Sub-classes |
sc2r:InternetConnectivityc sc2r:Electricityc |
URI | http://cs.unu.edu/sc2r#InstitutionalThreat |
---|---|
Description |
Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context. |
Super-classes |
sc2r:EnvironmentalThreatc |
Sub-classes |
sc2r:Surveillancec sc2r:Censorshipc sc2r:Violationc |
URI | http://cs.unu.edu/sc2r#IntegrityThreat |
---|---|
Description |
Integrity Threats compromise the Integrity cybersecurity goal. |
Super-classes |
sc2r:TechnologicalThreatc |
Sub-classes |
sc2r:Misconfigurationc sc2r:Malwarec sc2r:Replayc sc2r:DataErrorc sc2r:Damagec sc2r:RemoteExecutionc sc2r:Malfunctionc sc2r:Vandalismc sc2r:DataCorruptionc |
URI | http://cs.unu.edu/sc2r#Interception |
---|---|
Description |
Interception occurs when unauthorized access is gained to private or confidential information. |
Super-classes |
sc2r:ConfidentialityThreatc |
Sub-classes |
sc2r:Eavesdroppingc |
URI | http://cs.unu.edu/sc2r#InternetConnectivity |
---|---|
Description |
Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices. |
Super-classes |
sc2r:InfrastructureResourcec |
URI | http://cs.unu.edu/sc2r#IntimacyThreat |
---|---|
Description |
Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened. |
Super-classes |
sc2r:PrivacyThreatc |
URI | http://cs.unu.edu/sc2r#IntrusionDetection |
---|---|
Description |
Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources. |
Super-classes |
sc2r:ThreatMonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#IsolateMeasure |
---|---|
Description |
The isolate measure involves isolating the affected cyber resources from the connection with the threat. While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context. |
Super-classes |
sc2r:EngageMeasurec |
URI | http://cs.unu.edu/sc2r#Isolation |
---|---|
Description |
Isolation refers to the individual's act of completely separating themselves from others. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#Knowledge |
---|---|
Description |
Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education. |
Super-classes |
sc2r:MentalFacultiesc |
URI | http://cs.unu.edu/sc2r#Laptop |
---|---|
Description |
A Laptop is a portable computer. |
Super-classes |
sc2r:ComputingAssetc |
URI | http://cs.unu.edu/sc2r#Laundering |
---|---|
Description |
Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#LeastPrivilege |
---|---|
Description |
Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions. |
Super-classes |
sc2r:AccessControlc |
URI | http://cs.unu.edu/sc2r#LocationData |
---|---|
Description |
Location data is geographial information about a specific device's whereabouts associated to a time identifier. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#LoggingAndAudit |
---|---|
Description |
Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources. |
Super-classes |
sc2r:MonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#LossOfConfidence |
---|---|
Description |
Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#LossOfLife |
---|---|
Description |
Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#LossOfWork |
---|---|
Description |
Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#LostCredentials |
---|---|
Description |
Lost Credentials is when access to information and services is not possible due to lost account creditials. |
Super-classes |
sc2r:AvailabilityThreatc |
URI | http://cs.unu.edu/sc2r#LostDevices |
---|---|
Description |
This is a loss of computing devices that results in lack of access to the associated information and services. |
Super-classes |
sc2r:AvailabilityThreatc |
URI | http://cs.unu.edu/sc2r#LoveBombing |
---|---|
Description |
Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#LowMorale |
---|---|
Description |
Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#LowSatisfaction |
---|---|
Description |
Low Satisfaction refers to the state in which the individual experiences a lack of contentment. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Luring |
---|---|
Description |
Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#Malfunction |
---|---|
Description |
Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#MaliciousContactRemoval |
---|---|
Description |
This measures involves the removal and elimination of contact with an individual who is a threat actor. |
Super-classes |
sc2r:RemovalMeasurec |
URI | http://cs.unu.edu/sc2r#MaliciousContentRemoval |
---|---|
Description |
This measures involves the removal and elimination of content that is a cause of a cyber threat. |
Super-classes |
sc2r:RemovalMeasurec |
URI | http://cs.unu.edu/sc2r#MaliciousSoftwareDetection |
---|---|
Description |
Malicious software detection involves scanning computing equipment to check for the presence of malicious software. |
Super-classes |
sc2r:ThreatMonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#MaliciousSoftwareRemoval |
---|---|
Description |
This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat. |
Super-classes |
sc2r:RemovalMeasurec |
URI | http://cs.unu.edu/sc2r#MalignRhetoric |
---|---|
Description |
Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold. |
Super-classes |
sc2r:Disinformationc |
Sub-classes |
sc2r:WhatAboutismc sc2r:Strawmanc sc2r:Transferc sc2r:GishGallopingc sc2r:Firehosingc |
URI | http://cs.unu.edu/sc2r#Malinformation |
---|---|
Description |
Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm. |
Super-classes |
sc2r:CognitiveThreatc |
Sub-classes |
sc2r:InappropriateContentc |
URI | http://cs.unu.edu/sc2r#Malware |
---|---|
Description |
Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#Masquerading |
---|---|
Description |
Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim. |
Super-classes |
sc2r:AuthenticationThreatc |
URI | http://cs.unu.edu/sc2r#MediationMeasures |
---|---|
Description |
Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents. For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming. |
Super-classes |
sc2r:PrepareMeasurec |
Sub-classes |
sc2r:ActiveMediationc sc2r:RestrictiveMediationc sc2r:TechnicalMediationc |
URI | http://cs.unu.edu/sc2r#MentalFaculties |
---|---|
Description |
Mental Faculties are the various functions of the mind, or things the mind can "do". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process. |
Super-classes |
sc2r:Agencyc |
Sub-classes |
sc2r:Motivationc sc2r:Knowledgec sc2r:Skillsc |
URI | http://cs.unu.edu/sc2r#Microtargeting |
---|---|
Description |
Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions. |
Super-classes |
sc2r:PsychographicHackingc |
URI | http://cs.unu.edu/sc2r#Misconfiguration |
---|---|
Description |
Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#Misinformation |
---|---|
Description |
Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda. |
Super-classes |
sc2r:CognitiveThreatc |
Sub-classes |
sc2r:MisleadingInformationc |
URI | http://cs.unu.edu/sc2r#MisleadingAdvertising |
---|---|
Description |
This is advertising content that is meant to mislead consumers. |
Super-classes |
sc2r:MisleadingInformationc |
URI | http://cs.unu.edu/sc2r#MisleadingInformation |
---|---|
Description |
Misleading Information is content that is meant to mislead or misinform. |
Super-classes |
sc2r:Misinformationc |
Sub-classes |
sc2r:MisleadingAdvertisingc |
URI | http://cs.unu.edu/sc2r#Misled |
---|---|
Description |
Misled is the state in which the individual is led to believe something that is not true. |
Super-classes |
sc2r:Confusionc |
URI | http://cs.unu.edu/sc2r#Mistreatment |
---|---|
Description |
Mistreatment refers to the state in which the individual feels mistreated. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#MitigationCost |
---|---|
Description |
Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#MobileDevice |
---|---|
Description |
Mobile Device is any portable computing device, such as a smartphone or tablet computer. |
Super-classes |
sc2r:ComputingAssetc |
URI | http://cs.unu.edu/sc2r#MonitoringMeasure |
---|---|
Description |
Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources. |
Super-classes |
sc2r:PrepareMeasurec |
Sub-classes |
sc2r:LoggingAndAuditc sc2r:ThreatMonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#Motivation |
---|---|
Description |
Motivation is the internal needs, desires, wants or drives of individuals. |
Super-classes |
sc2r:MentalFacultiesc |
URI | http://cs.unu.edu/sc2r#MultiFactorAuthentication |
---|---|
Description |
Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity. |
Super-classes |
sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#MutualAuthentication |
---|---|
Description |
Mutual authentication is a process of two-way authentication between the communicating entities. |
Super-classes |
sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#NaturalDisaster |
---|---|
Description |
Natural disasters affect the cyber resources that support individuals' cyber functionings. |
Super-classes |
sc2r:EnvironmentalThreatc |
URI | http://cs.unu.edu/sc2r#NegativePerception |
---|---|
Description |
Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#NetworkEquipment |
---|---|
Description |
Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network. |
Super-classes |
sc2r:PhysicalResourcec |
URI | http://cs.unu.edu/sc2r#NetworkIntrusion |
---|---|
Description |
Network intrusion occurs when there is unauthorized access to a digital network. |
Super-classes |
sc2r:UnauthorizedAccessc |
URI | http://cs.unu.edu/sc2r#NetworkRedundancy |
---|---|
Description |
Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents. |
Super-classes |
sc2r:RedundancyMeasurec |
URI | http://cs.unu.edu/sc2r#NetworkVulnerability |
---|---|
Description |
Network Vulnerabilities are weaknesses in the network resources. |
Super-classes |
sc2r:Digitalc |
URI | http://cs.unu.edu/sc2r#NonRepudiationThreat |
---|---|
Description |
Non-repudiation Threats compromise the non-repudiation cybersecurity goal. |
Super-classes |
sc2r:TechnologicalThreatc |
URI | http://cs.unu.edu/sc2r#OffensiveLanguage |
---|---|
Description |
This is information and content that uses language that is offensive to individuals under specific contexts. |
Super-classes |
sc2r:InappropriateContentc |
URI | http://cs.unu.edu/sc2r#OnlineServices |
---|---|
Description |
An Online Service refers to any information and services provided over the Internet. |
Super-classes |
sc2r:Softwarec |
URI | http://cs.unu.edu/sc2r#Opinion |
---|---|
Description |
The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction. |
Super-classes |
sc2r:Rightc |
URI | http://cs.unu.edu/sc2r#OpposingInformation |
---|---|
Description |
This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives. |
Super-classes |
sc2r:Disinformationc |
URI | http://cs.unu.edu/sc2r#Overwhelmed |
---|---|
Description |
Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Pain |
---|---|
Description |
Pain refers to the experience of agony of the individual. |
Super-classes |
sc2r:BodilyInjuryc |
URI | http://cs.unu.edu/sc2r#ParasocialHacking |
---|---|
Description |
Parasocial Hacking exploits the biases arising from individual's parasocial relationships. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Parody |
---|---|
Description |
Parody used in the context of an influence campaign to shape narratives and influence individuals. |
Super-classes |
sc2r:InfluenceOperationc |
URI | http://cs.unu.edu/sc2r#PasswordManagement |
---|---|
Description |
Password management is the use of password of authentication in a safe and secure manner. |
Super-classes |
sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#Persistence |
---|---|
Description |
Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.” |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#PersonalData |
---|---|
Description |
Personal data is any data relating to an identified or identifiable natural person (‘data subject’). |
Super-classes |
sc2r:Datac |
Sub-classes |
sc2r:SocialContactc sc2r:IdentifyingDatac sc2r:ActivityDatac sc2r:LocationDatac sc2r:DemographicInformationc sc2r:BehaviouralDatac sc2r:UserGeneratedContentc |
URI | http://cs.unu.edu/sc2r#PersonalThreat |
---|---|
Description |
Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats. |
Super-classes |
sc2r:Threatc |
Sub-classes |
sc2r:TheftThreatc sc2r:Abusec sc2r:CognitiveThreatc sc2r:PrivacyThreatc |
URI | http://cs.unu.edu/sc2r#Phishing |
---|---|
Description |
Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source. |
Super-classes |
sc2r:SocialEngineeringc |
Sub-classes |
sc2r:SpearPhishingc sc2r:AnglerPhishingc sc2r:Smishingc sc2r:Catphishingc sc2r:Vishingc |
URI | http://cs.unu.edu/sc2r#Physical |
---|---|
Description |
Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own. |
Super-classes |
sc2r:Vulnerabilityc |
Sub-classes |
sc2r:HardwareVulnerabilityc |
URI | http://cs.unu.edu/sc2r#PhysicalHarm |
---|---|
Description |
Physical harm is the negative effect on physical or digital resources. |
Super-classes |
sc2r:Harmc |
Sub-classes |
sc2r:Corruptedc sc2r:Exposedc sc2r:Abusedc sc2r:Destroyedc sc2r:ReducedPerformancec sc2r:Theftc sc2r:Infectedc sc2r:BodilyInjuryc sc2r:LossOfLifec sc2r:Compromisedc sc2r:Unavailablec |
URI | http://cs.unu.edu/sc2r#PhysicalPrivacy |
---|---|
Description |
Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude. |
Super-classes |
sc2r:Privacyc |
URI | http://cs.unu.edu/sc2r#PhysicalResource |
---|---|
Description |
Physical resources are technological resources in material form. |
Super-classes |
sc2r:Resourcec |
Sub-classes |
sc2r:NetworkEquipmentc sc2r:StorageAssetc sc2r:ComputingAssetc |
URI | http://cs.unu.edu/sc2r#PhysicalRestriction |
---|---|
Description |
This is the measure for restricting and limiting access to physical resources. |
Super-classes |
sc2r:AccessControlc |
URI | http://cs.unu.edu/sc2r#PhysicalToken |
---|---|
Description |
Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service. |
Super-classes |
sc2r:Credentialc |
URI | http://cs.unu.edu/sc2r#Piggybacking |
---|---|
Description |
Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network. |
Super-classes |
sc2r:UnauthorizedAccessc |
URI | http://cs.unu.edu/sc2r#PointAndShriek |
---|---|
Description |
Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Polarization |
---|---|
Description |
Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Pornography |
---|---|
Description |
Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals. |
Super-classes |
sc2r:InappropriateContentc |
URI | http://cs.unu.edu/sc2r#PotemkinVillageEvidence |
---|---|
Description |
Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration. |
Super-classes |
sc2r:Deceitc |
URI | http://cs.unu.edu/sc2r#PrepareMeasure |
---|---|
Description |
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases. |
Super-classes |
sc2r:Responsec |
Sub-classes |
sc2r:MediationMeasuresc sc2r:AnticipateMeasurec sc2r:PreventionMeasurec sc2r:MonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#Pretexting |
---|---|
Description |
Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust. |
Super-classes |
sc2r:SocialEngineeringc |
URI | http://cs.unu.edu/sc2r#PreventionMeasure |
---|---|
Description |
Prevention measures are put in place to limit and stop the occurance of specific cyber threats. |
Super-classes |
sc2r:PrepareMeasurec |
Sub-classes |
sc2r:TrustedDatac sc2r:TrustedSoftwarec sc2r:TrustedInformationc sc2r:WebHygienec sc2r:AccessControlc sc2r:TrustedInfrastructurec sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#Privacy |
---|---|
Description |
The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature. |
Super-classes |
sc2r:Rightc |
Sub-classes |
sc2r:InformationalPrivacyc sc2r:SocialPrivacyc sc2r:TerritorialPrivacyc sc2r:PsychologicalPrivacyc sc2r:PhysicalPrivacyc |
URI | http://cs.unu.edu/sc2r#PrivacyThreat |
---|---|
Description |
Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy. |
Super-classes |
sc2r:PersonalThreatc |
Sub-classes |
sc2r:SolitudeThreatc sc2r:AnonymityThreatc sc2r:IntimacyThreatc sc2r:ReserveThreatc |
URI | http://cs.unu.edu/sc2r#Profanity |
---|---|
Description |
This is information and content that uses language that is offensive to individuals under specific contexts. |
Super-classes |
sc2r:InappropriateContentc |
URI | http://cs.unu.edu/sc2r#ProfessionalSupport |
---|---|
Description |
This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning. |
Super-classes |
sc2r:ExternalSupportc |
URI | http://cs.unu.edu/sc2r#Propaganda |
---|---|
Description |
Propaganda is information that is used to promote and advance a specific political perspective or point of view. |
Super-classes |
sc2r:Disinformationc |
URI | http://cs.unu.edu/sc2r#Prosecution |
---|---|
Description |
Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#PsychographicHacking |
---|---|
Description |
Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles. |
Super-classes |
sc2r:InfluenceThreatc |
Sub-classes |
sc2r:BandwagonEffectc sc2r:DarkAdvertisingc sc2r:Microtargetingc |
URI | http://cs.unu.edu/sc2r#PsychologicalHarm |
---|---|
Description |
Psychological harm is the harm which focuses on an individual and their mental well-being and psyche. |
Super-classes |
sc2r:Harmc |
Sub-classes |
sc2r:FeelingUpsetc sc2r:Frustrationc sc2r:IdentityTheftLossc sc2r:NegativePerceptionc sc2r:Addictionc sc2r:Disempowermentc sc2r:Worriedc sc2r:Guiltyc sc2r:LowSatisfactionc sc2r:Confusionc sc2r:CognitiveImpairementc sc2r:Discomfortc sc2r:Shamefulc sc2r:Distractionc sc2r:Embarrassedc sc2r:SelfCensorshipc sc2r:Mistreatmentc sc2r:Overwhelmedc sc2r:LossOfConfidencec sc2r:Gluttonyc sc2r:Depressedc sc2r:Prosecutionc sc2r:LowMoralec |
URI | http://cs.unu.edu/sc2r#PsychologicalPrivacy |
---|---|
Description |
Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed. |
Super-classes |
sc2r:Privacyc |
URI | http://cs.unu.edu/sc2r#QuidProQuo |
---|---|
Description |
Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services. |
Super-classes |
sc2r:SocialEngineeringc |
URI | http://cs.unu.edu/sc2r#Radicalisation |
---|---|
Description |
Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#Raiding |
---|---|
Description |
Rapid and coordinated influence attacks. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Ransomware |
---|---|
Description |
Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid. |
Super-classes |
sc2r:AvailabilityThreatc |
URI | http://cs.unu.edu/sc2r#Reconnaissance |
---|---|
Description |
Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#RecoverMeasure |
---|---|
Description |
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning. |
Super-classes |
sc2r:Responsec |
Sub-classes |
sc2r:ExternalSupportc sc2r:DataRecoveryc sc2r:Fact-checkingc sc2r:SystemRecoveryc sc2r:AccountRecoveryc |
URI | http://cs.unu.edu/sc2r#RecoveryPlan |
---|---|
Description |
Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur. |
Super-classes |
sc2r:AnticipateMeasurec |
URI | http://cs.unu.edu/sc2r#ReducedOpportunities |
---|---|
Description |
Reduced Opportunities refers to an adverse change in the established reputation of the individual's. |
Super-classes |
sc2r:ReputationalHarmc |
URI | http://cs.unu.edu/sc2r#ReducedPerformance |
---|---|
Description |
Reduced Performance refers to the state in which the ability of resources to function is lowered. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#RedundancyMeasure |
---|---|
Description |
Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents. |
Super-classes |
sc2r:AnticipateMeasurec |
Sub-classes |
sc2r:DataRedundancyc sc2r:SourceRedundancyc sc2r:SoftwareRedundancyc sc2r:NetworkRedundancyc |
URI | http://cs.unu.edu/sc2r#RemoteExecution |
---|---|
Description |
Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#RemovalMeasure |
---|---|
Description |
Removal measure involve the direct removal and elimination of the cyber threat. |
Super-classes |
sc2r:EngageMeasurec |
Sub-classes |
sc2r:MaliciousSoftwareRemovalc sc2r:MaliciousContentRemovalc sc2r:MaliciousContactRemovalc |
URI | http://cs.unu.edu/sc2r#Replay |
---|---|
Description |
Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#Reporting |
---|---|
Description |
Reporting measure is the reporting of an adverse cyber incident to external responders. |
Super-classes |
sc2r:AbsorbMeasurec |
Sub-classes |
sc2r:IncidentReportingc |
URI | http://cs.unu.edu/sc2r#Reputation |
---|---|
Description |
Reputation is the overall quality or character as recognised by other people. |
Super-classes |
sc2r:SocialCapitalc |
URI | http://cs.unu.edu/sc2r#ReputationalHarm |
---|---|
Description |
Reputational harm is the harm pertaining to the general opinion held about an entity. |
Super-classes |
sc2r:Harmc |
Sub-classes |
sc2r:UnderScrutinyc sc2r:DamagedSocialPerceptionc sc2r:ReducedOpportunitiesc sc2r:Blacklistedc |
URI | http://cs.unu.edu/sc2r#ReserveThreat |
---|---|
Description |
Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened. |
Super-classes |
sc2r:PrivacyThreatc |
URI | http://cs.unu.edu/sc2r#Resource |
---|---|
Description |
A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources. |
Sub-classes |
sc2r:InfrastructureResourcec sc2r:PhysicalResourcec sc2r:DigitalResourcec sc2r:IndividualResourcec |
In domain of |
sc2r:hasVulnerabilityop sc2r:isDamagedByop |
In range of |
sc2r:damagesop sc2r:isAVulnerabilityOfop |
URI | http://cs.unu.edu/sc2r#Response |
---|---|
Description |
A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt. |
Sub-classes |
sc2r:RecoverMeasurec sc2r:AbsorbMeasurec sc2r:PrepareMeasurec sc2r:AdaptMeasurec |
In domain of |
sc2r:reducesop sc2r:mitigatesop |
In range of |
sc2r:isMitigatedByop sc2r:isReducedByop |
URI | http://cs.unu.edu/sc2r#RestrictiveMediation |
---|---|
Description |
Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources. |
Super-classes |
sc2r:MediationMeasuresc |
URI | http://cs.unu.edu/sc2r#Right |
---|---|
Description |
Rights are non-negotiable entitlements grounded in the idea of justice. |
Super-classes |
sc2r:IndividualResourcec |
Sub-classes |
sc2r:Privacyc sc2r:Opinionc sc2r:Expressionc sc2r:Assemblyc sc2r:Informationc |
URI | http://cs.unu.edu/sc2r#SDCard |
---|---|
Description |
SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size. |
Super-classes |
sc2r:StorageAssetc |
URI | http://cs.unu.edu/sc2r#Sandboxing |
---|---|
Description |
Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents. |
Super-classes |
sc2r:AccessControlc |
URI | http://cs.unu.edu/sc2r#Satire |
---|---|
Description |
Satire used as part of an influence campaign. |
Super-classes |
sc2r:InfluenceOperationc |
URI | http://cs.unu.edu/sc2r#Scam |
---|---|
Description |
Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam. |
Super-classes |
sc2r:TheftThreatc |
Sub-classes |
sc2r:SweepstakesScamc sc2r:FakeGivewaysc |
URI | http://cs.unu.edu/sc2r#ScamCost |
---|---|
Description |
Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Scareware |
---|---|
Description |
Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection. |
Super-classes |
sc2r:InfluenceThreatc |
URI | http://cs.unu.edu/sc2r#Sealioning |
---|---|
Description |
Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity. |
Super-classes |
sc2r:Trollingc |
URI | http://cs.unu.edu/sc2r#SelfCensorship |
---|---|
Description |
Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#SelfHarm |
---|---|
Description |
Self Harm refers to intentional damage or injury done to the individual's body. |
Super-classes |
sc2r:BodilyInjuryc |
URI | http://cs.unu.edu/sc2r#Server |
---|---|
Description |
A Server is a computer or system that provides resources, data services, or programs to other computers. |
Super-classes |
sc2r:ComputingAssetc |
URI | http://cs.unu.edu/sc2r#Sextortion |
---|---|
Description |
Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#SexualAbuse |
---|---|
Description |
Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication. |
Super-classes |
sc2r:Abusec |
Sub-classes |
sc2r:BoyfriendingGirlfriendingc sc2r:Persistencec sc2r:SexualAssaultc sc2r:Sextortionc sc2r:Luringc sc2r:LoveBombingc sc2r:Groomingc |
URI | http://cs.unu.edu/sc2r#SexualAssault |
---|---|
Description |
Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online. |
Super-classes |
sc2r:SexualAbusec |
URI | http://cs.unu.edu/sc2r#Shameful |
---|---|
Description |
Shameful refers to the state in which the individual experiences disgracefulness. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#Shilling |
---|---|
Description |
Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate. |
Super-classes |
sc2r:Deceitc |
URI | http://cs.unu.edu/sc2r#Skills |
---|---|
Description |
A Skill is the ability and capacity to perform an action with determined results. |
Super-classes |
sc2r:MentalFacultiesc |
URI | http://cs.unu.edu/sc2r#Skimming |
---|---|
Description |
Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services. |
Super-classes |
sc2r:ConfidentialityThreatc |
URI | http://cs.unu.edu/sc2r#Smishing |
---|---|
Description |
Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information. |
Super-classes |
sc2r:Phishingc |
URI | http://cs.unu.edu/sc2r#SocialCapital |
---|---|
Description |
Social capital is the accumulation of actual and potential resources linked to the possession of a social network. |
Super-classes |
sc2r:IndividualResourcec |
Sub-classes |
sc2r:Reputationc sc2r:SocialNetworkc |
URI | http://cs.unu.edu/sc2r#SocialContact |
---|---|
Description |
Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#SocialEngineering |
---|---|
Description |
Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. |
Super-classes |
sc2r:InfluenceThreatc |
Sub-classes |
sc2r:Pretextingc sc2r:Baitingc sc2r:QuidProQuoc sc2r:Phishingc sc2r:Tailgatingc |
URI | http://cs.unu.edu/sc2r#SocialHacking |
---|---|
Description |
Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. |
Super-classes |
sc2r:SocialThreatc |
Sub-classes |
sc2r:SockPuppetryc sc2r:SociocognitiveHackingc sc2r:ParasocialHackingc sc2r:Raidingc sc2r:Floodingc sc2r:Cheerleadingc sc2r:PointAndShriekc sc2r:BlackPropagandac sc2r:Polarizationc sc2r:Launderingc |
URI | http://cs.unu.edu/sc2r#SocialHarm |
---|---|
Description |
Social harm is the harm that may result in a social context or society more broadly. |
Super-classes |
sc2r:Harmc |
Sub-classes |
sc2r:Isolationc sc2r:Conflictc sc2r:SocialWithdrawalc sc2r:DamagedRelationshipc sc2r:Radicalisationc sc2r:ImpairedPrivateSocialBoundaryc |
URI | http://cs.unu.edu/sc2r#SocialMediaHygiene |
---|---|
Description |
Social media hygiene are measures and practices that contribute to safe and secure use of social media. |
Super-classes |
sc2r:WebHygienec |
URI | http://cs.unu.edu/sc2r#SocialMediaMonitoring |
---|---|
Description |
Social media monitoring involves observing and checking social media resources for signs of adverse incidents. |
Super-classes |
sc2r:ThreatMonitoringMeasurec |
URI | http://cs.unu.edu/sc2r#SocialNetwork |
---|---|
Description |
Social Network refers to individual's network of social interactions and personal relationships. |
Super-classes |
sc2r:SocialCapitalc |
URI | http://cs.unu.edu/sc2r#SocialPrivacy |
---|---|
Description |
Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network. |
Super-classes |
sc2r:Privacyc |
URI | http://cs.unu.edu/sc2r#SocialSupport |
---|---|
Description |
This involves leveraging individuals social capital towards recovery to the lost cyber functioning. For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts. |
Super-classes |
sc2r:ExternalSupportc |
URI | http://cs.unu.edu/sc2r#SocialThreat |
---|---|
Description |
Social Threats are associated with individuals' social and societal context. |
Super-classes |
sc2r:Threatc |
Sub-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#SocialWithdrawal |
---|---|
Description |
Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation. |
Super-classes |
sc2r:SocialHarmc |
URI | http://cs.unu.edu/sc2r#SociocognitiveHacking |
---|---|
Description |
Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#SockPuppetry |
---|---|
Description |
Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website. |
Super-classes |
sc2r:SocialHackingc |
URI | http://cs.unu.edu/sc2r#Software |
---|---|
Description |
A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks. |
Super-classes |
sc2r:DigitalResourcec |
Sub-classes |
sc2r:OnlineServicesc |
URI | http://cs.unu.edu/sc2r#SoftwareRedundancy |
---|---|
Description |
Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents. |
Super-classes |
sc2r:RedundancyMeasurec |
URI | http://cs.unu.edu/sc2r#SoftwareVulnerability |
---|---|
Description |
Sofware Vulnerabilities are weaknesses in software resources. |
Super-classes |
sc2r:Digitalc |
URI | http://cs.unu.edu/sc2r#SolitudeThreat |
---|---|
Description |
Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened. |
Super-classes |
sc2r:PrivacyThreatc |
URI | http://cs.unu.edu/sc2r#SourceRedundancy |
---|---|
Description |
Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents. |
Super-classes |
sc2r:RedundancyMeasurec |
URI | http://cs.unu.edu/sc2r#SpamEmail |
---|---|
Description |
Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent. |
Super-classes |
sc2r:UnsolicitedCommunicationc |
URI | http://cs.unu.edu/sc2r#SpearPhishing |
---|---|
Description |
Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information. |
Super-classes |
sc2r:Phishingc |
Sub-classes |
sc2r:Whalingc |
URI | http://cs.unu.edu/sc2r#Spoofing |
---|---|
Description |
Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address. |
Super-classes |
sc2r:AuthenticationThreatc |
URI | http://cs.unu.edu/sc2r#StorageAsset |
---|---|
Description |
Storage Asset comprises any recording media used to retain data using computers or other devices. |
Super-classes |
sc2r:PhysicalResourcec |
Sub-classes |
sc2r:USBDrivec sc2r:ExternalHardDrivec sc2r:SDCardc |
URI | http://cs.unu.edu/sc2r#Strawman |
---|---|
Description |
Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition. |
Super-classes |
sc2r:MalignRhetoricc |
URI | http://cs.unu.edu/sc2r#Surveillance |
---|---|
Description |
Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing. |
Super-classes |
sc2r:InstitutionalThreatc |
URI | http://cs.unu.edu/sc2r#SweepstakesScam |
---|---|
Description |
Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize. |
Super-classes |
sc2r:Scamc |
URI | http://cs.unu.edu/sc2r#Sympathy |
---|---|
Description |
Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#SystemRecovery |
---|---|
Description |
System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident. |
Super-classes |
sc2r:RecoverMeasurec |
URI | http://cs.unu.edu/sc2r#Tailgating |
---|---|
Description |
Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area. |
Super-classes |
sc2r:SocialEngineeringc |
URI | http://cs.unu.edu/sc2r#TechnicalMediation |
---|---|
Description |
Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents. |
Super-classes |
sc2r:MediationMeasuresc |
URI | http://cs.unu.edu/sc2r#TechnologicalThreat |
---|---|
Description |
Technological Threats are associated with and affect individuals' computing resources. |
Super-classes |
sc2r:Threatc |
Sub-classes |
sc2r:NonRepudiationThreatc sc2r:IntegrityThreatc sc2r:ConfidentialityThreatc sc2r:AvailabilityThreatc sc2r:AuthenticationThreatc |
URI | http://cs.unu.edu/sc2r#TerritorialPrivacy |
---|---|
Description |
The right to protect personal space, property, and objects. |
Super-classes |
sc2r:Privacyc |
URI | http://cs.unu.edu/sc2r#Theft |
---|---|
Description |
Theft Harm refers to the state in which individual's resources are physically or digitally stolen. |
Super-classes |
sc2r:PhysicalHarmc |
URI | http://cs.unu.edu/sc2r#TheftOfFinances |
---|---|
Description |
Theft of Finances the state in which individual's financial resources are stolen. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#TheftThreat |
---|---|
Description |
Theft Threats aim to steal of defraud individuals of certain resources. |
Super-classes |
sc2r:PersonalThreatc |
Sub-classes |
sc2r:IdentityTheftc sc2r:Fraudc sc2r:Scamc |
URI | http://cs.unu.edu/sc2r#Threat |
---|---|
Description |
A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function. |
Sub-classes |
sc2r:TechnologicalThreatc sc2r:PersonalThreatc sc2r:EnvironmentalThreatc sc2r:SocialThreatc |
In domain of |
sc2r:isMitigatedByop sc2r:canResultInop sc2r:exploitsop sc2r:resultsInop sc2r:damagesop |
In range of |
sc2r:mitigatesop sc2r:isExploitedByop sc2r:isResultOfop sc2r:isDamagedByop sc2r:canBeResultOfop |
URI | http://cs.unu.edu/sc2r#ThreatMonitoringMeasure |
---|---|
Description |
Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats. |
Super-classes |
sc2r:MonitoringMeasurec |
Sub-classes |
sc2r:FailureDetectionc sc2r:MaliciousSoftwareDetectionc sc2r:SocialMediaMonitoringc sc2r:IntrusionDetectionc |
URI | http://cs.unu.edu/sc2r#TimeWasted |
---|---|
Description |
Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts. |
Super-classes |
sc2r:EconomicHarmc |
URI | http://cs.unu.edu/sc2r#Training |
---|---|
Description |
Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents. |
Super-classes |
sc2r:AnticipateMeasurec |
URI | http://cs.unu.edu/sc2r#Transfer |
---|---|
Description |
Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes. |
Super-classes |
sc2r:MalignRhetoricc |
URI | http://cs.unu.edu/sc2r#Trolling |
---|---|
Description |
Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument. |
Super-classes |
sc2r:Abusec |
Sub-classes |
sc2r:Sealioningc |
URI | http://cs.unu.edu/sc2r#TrustedData |
---|---|
Description |
Trusted data is the use of measures that ensure the safety, security and veracity of data. |
Super-classes |
sc2r:PreventionMeasurec |
URI | http://cs.unu.edu/sc2r#TrustedInformation |
---|---|
Description |
Trusted information is the use of information that is verified and safe, and from trusted sources. |
Super-classes |
sc2r:PreventionMeasurec |
URI | http://cs.unu.edu/sc2r#TrustedInfrastructure |
---|---|
Description |
Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure. |
Super-classes |
sc2r:PreventionMeasurec |
Sub-classes |
sc2r:TrustedNetworkingc |
URI | http://cs.unu.edu/sc2r#TrustedNetworking |
---|---|
Description |
Trusted Networking is the use of networking resources in a safe, secure, and trusted manner. |
Super-classes |
sc2r:TrustedInfrastructurec |
Sub-classes |
sc2r:VirtualPrivateNetworkc sc2r:AnonymousRoutingc |
URI | http://cs.unu.edu/sc2r#TrustedSoftware |
---|---|
Description |
Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources. |
Super-classes |
sc2r:PreventionMeasurec |
URI | http://cs.unu.edu/sc2r#USBDrive |
---|---|
Description |
USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port. |
Super-classes |
sc2r:StorageAssetc |
URI | http://cs.unu.edu/sc2r#UnauthorizedAccess |
---|---|
Description |
Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to. |
Super-classes |
sc2r:AuthenticationThreatc |
Sub-classes |
sc2r:Piggybackingc sc2r:NetworkIntrusionc |
URI | http://cs.unu.edu/sc2r#UnderScrutiny |
---|---|
Description |
Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised. |
Super-classes |
sc2r:ReputationalHarmc |
URI | http://cs.unu.edu/sc2r#UnsolicitedCommunication |
---|---|
Description |
Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited. |
Super-classes |
sc2r:Abusec |
Sub-classes |
sc2r:UnsolicitedSocialRequestc sc2r:SpamEmailc |
URI | http://cs.unu.edu/sc2r#UnsolicitedSocialRequest |
---|---|
Description |
Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them. |
Super-classes |
sc2r:UnsolicitedCommunicationc |
URI | http://cs.unu.edu/sc2r#Urgency |
---|---|
Description |
Urgency is the need to deal with something quickly; the feeling of wanting something very much. |
Super-classes |
sc2r:Individualc |
URI | http://cs.unu.edu/sc2r#UserGeneratedContent |
---|---|
Description |
User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms. |
Super-classes |
sc2r:PersonalDatac |
URI | http://cs.unu.edu/sc2r#UserIdentification |
---|---|
Description |
Use identification is the confirmation of the claimed identify of users. |
Super-classes |
sc2r:Identificationc |
URI | http://cs.unu.edu/sc2r#Vandalism |
---|---|
Description |
Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged. |
Super-classes |
sc2r:IntegrityThreatc |
URI | http://cs.unu.edu/sc2r#Violation |
---|---|
Description |
Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts. |
Super-classes |
sc2r:InstitutionalThreatc |
Sub-classes |
sc2r:ContractBreachc |
URI | http://cs.unu.edu/sc2r#Violence |
---|---|
Description |
This is content of violent nature that may be inappropriate to individuals. |
Super-classes |
sc2r:InappropriateContentc |
URI | http://cs.unu.edu/sc2r#VirtualPrivateNetwork |
---|---|
Description |
A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security. |
Super-classes |
sc2r:TrustedNetworkingc |
URI | http://cs.unu.edu/sc2r#Vishing |
---|---|
Description |
Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information. |
Super-classes |
sc2r:Phishingc |
URI | http://cs.unu.edu/sc2r#Vulnerability |
---|---|
Description |
A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat. |
Sub-classes |
sc2r:Individualc sc2r:Physicalc sc2r:Digitalc |
In domain of |
sc2r:isReducedByop sc2r:isAVulnerabilityOfop sc2r:isExploitedByop |
In range of |
sc2r:hasVulnerabilityop sc2r:reducesop sc2r:exploitsop |
URI | http://cs.unu.edu/sc2r#WebHygiene |
---|---|
Description |
Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety. |
Super-classes |
sc2r:PreventionMeasurec |
Sub-classes |
sc2r:EmailHygienec sc2r:SocialMediaHygienec |
URI | http://cs.unu.edu/sc2r#Whaling |
---|---|
Description |
Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information. |
Super-classes |
sc2r:SpearPhishingc |
URI | http://cs.unu.edu/sc2r#WhatAboutism |
---|---|
Description |
WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another. |
Super-classes |
sc2r:MalignRhetoricc |
URI | http://cs.unu.edu/sc2r#WithstandMeasure |
---|---|
Description |
Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning. |
Super-classes |
sc2r:AbsorbMeasurec |
Sub-classes |
sc2r:AlternativeResourcec sc2r:IncreaseResourcesc |
URI | http://cs.unu.edu/sc2r#Worried |
---|---|
Description |
Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated. |
Super-classes |
sc2r:PsychologicalHarmc |
URI | http://cs.unu.edu/sc2r#YouAreNotImmune |
---|---|
Description |
This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents. |
Super-classes |
sc2r:AttitudinalMeasurec |
URI | http://cs.unu.edu/sc2r#canBeResultOf |
---|---|
Inverse properties | sc2r:canResultInop |
Domain(s) | sc2r:Harmc |
Range(s) | sc2r:Threatc |
URI | http://cs.unu.edu/sc2r#canResultIn |
---|---|
Domain(s) | sc2r:Threatc |
Range(s) | sc2r:Harmc |
URI | http://cs.unu.edu/sc2r#damages |
---|---|
Inverse properties | sc2r:isDamagedByop |
Domain(s) | sc2r:Threatc |
Range(s) | sc2r:Resourcec |
URI | http://cs.unu.edu/sc2r#exploits |
---|---|
Inverse properties | sc2r:isExploitedByop |
Domain(s) | sc2r:Threatc |
Range(s) | sc2r:Vulnerabilityc |
URI | http://cs.unu.edu/sc2r#hasVulnerability |
---|---|
Inverse properties | sc2r:isAVulnerabilityOfop |
Domain(s) | sc2r:Resourcec |
Range(s) | sc2r:Vulnerabilityc |
URI | http://cs.unu.edu/sc2r#isAVulnerabilityOf |
---|---|
Domain(s) | sc2r:Vulnerabilityc |
Range(s) | sc2r:Resourcec |
URI | http://cs.unu.edu/sc2r#isDamagedBy |
---|---|
Domain(s) | sc2r:Resourcec |
Range(s) | sc2r:Threatc |
URI | http://cs.unu.edu/sc2r#isExploitedBy |
---|---|
Domain(s) | sc2r:Vulnerabilityc |
Range(s) | sc2r:Threatc |
URI | http://cs.unu.edu/sc2r#isMitigatedBy |
---|---|
Inverse properties | sc2r:mitigatesop |
Domain(s) | sc2r:Threatc |
Range(s) | sc2r:Responsec |
URI | http://cs.unu.edu/sc2r#isReducedBy |
---|---|
Inverse properties | sc2r:reducesop |
Domain(s) | sc2r:Vulnerabilityc |
Range(s) | sc2r:Responsec |
URI | http://cs.unu.edu/sc2r#isResultOf |
---|---|
Super-properties | sc2r:canBeResultOfop |
Inverse properties | sc2r:resultsInop |
Domain(s) | sc2r:Harmc |
Range(s) | sc2r:Threatc |
URI | http://cs.unu.edu/sc2r#mitigates |
---|---|
Domain(s) | sc2r:Responsec |
Range(s) | sc2r:Threatc |
URI | http://cs.unu.edu/sc2r#reduces |
---|---|
Domain(s) | sc2r:Responsec |
Range(s) | sc2r:Vulnerabilityc |
URI | http://cs.unu.edu/sc2r#relatesTo |
---|
URI | http://cs.unu.edu/sc2r#resultsIn |
---|---|
Super-properties | sc2r:canResultInop |
Domain(s) | sc2r:Threatc |
Range(s) | sc2r:Harmc |
URI | http://cs.unu.edu/sc2r#hasDescription |
---|---|
Domain(s) | owl:Thingc |
Range(s) | rdfs:Literalc |
URI | http://cs.unu.edu/sc2r#hasID |
---|
URI | http://purl.org/dc/elements/1.1/#creator |
---|
URI | http://purl.org/dc/elements/1.1/#description |
---|
URI | http://purl.org/dc/elements/1.1/#rights |
---|
URI | http://purl.org/dc/elements/1.1/creator |
---|
URI | http://purl.org/dc/elements/1.1/description |
---|
URI | http://purl.org/dc/elements/1.1/rights |
---|
http://www.semanticweb.org/mamello/ontologies/2020/5/sc2r#
http://purl.org/dc/elements/1.1/#
http://www.w3.org/2002/07/owl#
http://www.w3.org/ns/prov#
http://www.w3.org/1999/02/22-rdf-syntax-ns#
http://www.w3.org/2000/01/rdf-schema#
http://cs.unu.edu/sc2r#
https://schema.org/
http://www.w3.org/2004/02/skos/core#
http://www.w3.org/2001/XMLSchema#
c | Classes |
op | Object Properties |
fp | Functional Properties |
dp | Data Properties |
dp | Annotation Properties |
p | Properties |
ni | Named Individuals |