33
/it/
AIzaSyAYiBZKx7MnpbEhh9jyipgxe19OcubqV5w
August 1, 2025
Public Timelines
Menu
Public Timelines
FAQ
Public Timelines
FAQ
For education
For educational institutions
For teachers
For students
Cabinet
For educational institutions
For teachers
For students
Open cabinet
Creare
Close
Create a timeline
Public timelines
Library
FAQ
Scaricare
Export
Creare una copia
Premium
Integrare nel sito Web
Share
50 years of cybersecurity taxonomies
Category:
Altro
è stato aggiornato:
14 set 2021
This timeline shows academic and commercial threat, attack, incident, risk, and vulnerability taxonomies.
0
0
804
Autori
Created by
nicspicts
Attachments
Comments
Eventi
Threats (Lackey)
Computer threats and vulnerabilities (Anderson)
Integrity flaws in operating system (McPhee)
Functional vulnerabilities (Parker)
Breaching incidents (Nielsen (SRI)
Vulnerabilities in operating systems (Abbott et al (RISOS study)
IBM VM/370 OS flaws (Attanasio)
Categories of flaws (Neumann)
Protection analysis (Bisbey & Hollingsworth)
Classification system for reporting events involving human malfunctions (EU)
Motivations of attackers (Straub & Widom)
Network communication vulnerabilities (Rissenbatt)
Computer misuse techniques (Neumann & Parker)
Operating systems (Hogan)
Types of computer crimes (Perry & Wallich)
Vulnerabilities and threats to computer security (Russell & Gangemi)
Defect classification (Brian Marick)
Common system vulnerabilities (Spafford)
Computer program security flaws (Landwehr, Bull, McDermott, Choi)
NIST800-3
Firewalls and Internet security (Cheswick & Bellovin)
Replay attacks in cryptoprotocols (Syverson)
Network security (Stallings)
Flaws in cryptographic protocols (Gritzalis)
Security faults in the Unix operating system (Aslam)
UNIX system and network vulnerabilities (Bishop)
Types of computer misuses (Brinkley & Schell)
IDS attack signatures (Kumar)
Computer crimes and computer criminals (Icove et al.)
IEEE Guide to Classification for Software Anomalies, Deception techniques (Dunnigan & Nofi)
Internet holes, attacks (Cohen)
Incidents (Howard)
System intrusions (Lindqvist & Jonsson)
Security threats to networks (Jayaram & Morse)
Attacks against information systems (Cohen)
Software errors that led to security breaches (Du and Mathur)
Software vulnerability analysis (Krsul)
The Common Language: Incident taxonomy with events & attacks (Sandia, Howard & Longstaff)
Network vulnerabilities (Ristenbatt)
Confidentiality breaches in EMR systems (Asaro, Herting, Roth, and Barnes)
Vulnerability classification (Bishop)
Internet attacks (Mostow, Bott)
Attacks in wireless networks (Lough)
Maintaining software with a security perspective (Jiwnani)
Web attacks taxonomy (Alvarez, Petrovic)
Malicious software attacks (Langweg)
Software flaws (Weber)
Honeypots (Seifert, Welck, Komisarczuk)
Vulnerabilities (Bazaz & Arthur)
Confidentiality breaches (Myers)
Threat categories in healthcare information systems (Samy, Ahmad & Ismail)
Consequences, threats, vulnerabilities (ISO 27005)
Attacks on digital signatures (Hernandez-Ardieta et al)
Cybersecurity Framework reference tool (NIST)
Cyber espionage (Fitzpatrick & Dilullo)
Cloud attack (Iqbal et al)
Cross-domain attacks (Wu, Moon)
Cyber-harms (Agrafiotis et al)
Game-theoretic taxonomy of defensive deception (Pawlick et al)
Compliant information security behavior (Padayachee)
Incident classification (Stikvoort, eCSIRT.net)
TAXII (CTI TC)
STIX (CTI TC)
MISP threat sharing, Cyber observables, CybOX (Mitre)
Threats for distributed systems (Uzunov, Fernandez)
Cyberattacks: AVOIDIT (Simmons et al)
Mobile users' security awareness (Bitton et al)
Ransomware (Al-rimy et al)
Attack for industrial control systems (Qassim et al)
Reference incident classification taxonomy (ENISA)
Cyber-physical attacks (Elhabahy et al)
Wireless Sensor Network Cyber Security Attacks (Radmand et al)
Operational cybersecurity risks (Cebula & Young (SEI)
VERIS Incident classification (Verizon)
Attacks against mobile agents (Man, Wei)
Threat categories (Alberts (OCTAVE))
Vulnerabilities to support denial of service attacks (Richardson)
Internet software vulnerabilities (Piessens)
DoS attacks in WSNs (Wood, Stankovic)
Dynamic content attacks (Kain)
Attacks on secure devices (Rae, Wildman)
eCSIRT.net
Attack classes (Cheswick)
Threats (Welch, Lathrop)
Vulnerabilities in firewalls (Kamara et al)
Vulnerabilities (Gray)
DoS attacks (Hussain et al)
Network and computer attacks (Hansman, Hunt)
Attacks on XML signatures (Hill)
Sybil attacks in WSNs (Newsome et al)
DDos Attack and defense mechanisms (Mirkovic, Reiher)
Internet attacks (Delooze)
Attacks in VANETS (Golle et al.)
Shellcode attacks (Arce)
Confidentiality breaches in healthcare (Brann and Mattson)
Anomaly in IDS (Killourhy et al)
Auditing software (Jiwnani, Zelkowitz)
Computer security Incidents (Kjaerland)
Software problems (Hoglund)
Protocol vulnerabilities (Pothamsetty, Akyol)
Privilege vulnerabilities (Yongzheng, Xiochun)
Bug taxonomy (Beizer)
Vulnerabilities (Christey)
Attacks (Hansman, Hunt)
Software security errors (Tsipenyuk)
Health information risks (van Deursen)
Periodi
Era of the pioneers
Hype wave
Specialisation
Standardization?
About & Feedback
Accordo
Privatezza
Biblioteca
FAQ
Support 24/7
Cabinet
Get premium
Donate
The service accepts bank transfer (ACH, Wire) or cards (Visa, MasterCard, etc). Processed by Stripe.
Secured with SSL
Comments