The following image is the one that you’d never expect. It is a graph from a fairly large data set created using an experiemental model. Using the OSI 7 Layer model the layer 0 for kinetic and layer 8 for people set the spectrum from left to right. This is preliminary data and not something y’all are going to get your greedy little hands on cheaply, but in general the image depicts the following.
1) A volume of incidents were evaluated using open sources to determine the layer of the OSI model that “best” expresses the incident. You can find one of the mechanisms utilized elsewhere on the blog.
2) The other element evaluated was the confidential, integrity, availability element of the breach or exposure.
Some interesting patterns are obviously becoming apparent.
2 comments for “Cyber Security Over The Years”