Sie sind auf Seite 1von 2

SINET Cybersecurity Taxonomy 2018

Active Response Confidentiality of Data in Storage


• Active Response • Data Shredding
• Adversary Exploitation Tools • Email Archiving
• Cyber Warfare • Removable Media Security
• Deception Security • Shared Data Repository Security
• Moving Target Defense
Device Access Control
Adversary Analysis • Device Reputation
• Anti Reconnaissance • Network Access Control
• Attack Attribution • Reputation System
• Attack Intelligence Service • Web Access Control
• Predictive Attack Intelligence • Device Location

Authentication Digital Rights Management


• Biometrics • Digital Rights Management
• Context Based
• Device Email & Messaging Security
• Digital • Compromised Email Account Detection
• Federated • Email Archiving & Retrieval
• Geolocation • Email Wiping & Self Destruction
• Identity Theft • Malicious Email Detection
• Knowledge Based • Phishing / Pharming Prevention
• Password Management • SPAM Filters & Protection
• Phone Based
• Physical Document Validation Employee Governance
• PKI Certificate Authorities • Data Loss Prevention (DLP)
• RFID Cards • Insider Threats
• Single Sign On • Instant Messenger
• Smart Cards • Security Education
• SofToken & Capcha Graphic OTP • Social Engineering
• Tokens (Hardware) • Social Network Security & Management
• User Activity Recording & Management
Browsing Securely • Website Filtering
• DNS protection
• Hardened Browsing Enterprise Security Management
• Hijack protection • Auditing
• JavaScript Protection • Behavior Analytics
• No ad-data tracking • Big Data Security
• Phishing / Pharming Protection • Brand Protection
• Private Searching • BYOD
• Safe Banking & Shopping • Cloud Security
• Site Blocking (Malicious Site Detection) • Data Discovery and Management
• URL Validation • E-Discovery
• Forensics
Confidentiality of Data in Transit • Incident Response
• Computer Screen Eavesdropping • Key Management
• Email: Encryption • Policy & Configuration Management
• Encryption: Cell or Mobile Phones • Security Analytics
• Encryption: Transmission • SIEM (Security Information & Event
• Keystroke Recording Interference Management)
• Messaging Security • Security Visualization
• SSL Acceleration • Situational Awareness
• VOIP Security • Software Defined Security
• VPN • Threat Intelligence Sharing
• Wireless • Unstructured Data Security
• User Authorization

SINET Taxonomy of Cyber Security Sectors 1


Fraud & Transaction Security
• Bitcoin Security Secure Peripherals and Hardware
• Blockchain • Embedded Security
• Data Integrity • Removable Media Security
• Data Provenance and Origin • Secure Hardware Peripherals
• Device Authentication
• Document Signing & Security Secure Product Development
• eTransactions / Digital Signatures • Application code security assessment:
• Fraud Detection & Prevention • Certification Services
• Secure Browsing • Secure DevOps
• Secure Time Services
Systems Integrity
Identity & Access Management • Android Security
• Behavior Analytics • Application Security
• Identity Provisioning & Management • Botnet Protection
• Password Management • Browser Security
• Secure Supply Chain • Configuration Management
• Single Sign-On • Data Recovery - Disaster Recovery
• DDOS
Network Security • Directory Services
• APT (Advanced Persistent Threat) • DNS Security
• Instant Messenger • Email: Security
• Peer to Peer Security & Management • End Point Security
• Secure Switches • Firewall: Application, Enterprise, SIP
• Traffic Analysis • Intrusion Detection/Prevention
• Insider Threat
Parental Controls • iOS Security
• Activity recorder • Mobile Device / Phone / Tablet
• Computing Time Management • Packet Capture
• Email monitoring • Patch Management
• Game Filter • Penetration Testing
• Instant Message / Chat Monitoring • Platform Reset
• Key Word Alert • Recovery Services
• Parental controls for Android • Scanning & Risk Assessments
• Parental controls for iOS • Secure Architecture / Platform Provider
• Program Blocking • Security Product QA
• Social Media Monitoring • Software Hardening
• Web site filter • Spyware Prevention & Adblocking
• Steganography
• Traffic Analysis
Personal Privacy • User & Entity Behavior Analysis (UEBA)
• Anonymous email • Virtualization
• Browsing Trace Removal • Malware Detection – Sandbox
• Data & Message Shredding • Malware Detection – Endpoint
• Document metadata removal • Malware Detection – Ransomware
• Identity Theft Monitoring • Web Site/Server Security
• Location hiding / Anonymity networks • White-list Security
• Photo metadata removal • Zero Day Vulnerability
• Secure File Transfer
• Social Networking Security Internet of Things (IoT)
• VPN • IoT Authentication
• IoT Network Security
Regulatory Compliance • IoT encryption
• GDPR • IoT PKI
• Government Standards • IoT Security Analytics
• Industrial Controls
• Healthcare Compliance
• PCI Compliance

SINET Taxonomy of Cyber Security Sectors 2

Das könnte Ihnen auch gefallen