|
| 1 | +title defence-cybersecurity |
| 2 | +evolution genesis / concept -> custom / emerging -> product/ converging -> commodity / accepted |
| 3 | +style wardley |
| 4 | + |
| 5 | +note unused [0.83, 0.03] |
| 6 | +component criminal activity [0.34, 0.41] label [-16, -38] |
| 7 | +component defense in depth [0.29, 0.59] label [-24, 12] |
| 8 | +component defensive tools [0.29, 0.66] label [-10, -33] |
| 9 | +component separation of concerns [0.29, 0.71] label [-2, 10] |
| 10 | +component threshold [0.71, 0.28] label [-54, -22] |
| 11 | +component risk [0.64, 0.24] label [-48, -1] |
| 12 | +component appetite [0.54, 0.19] label [-25, 24] |
| 13 | + |
| 14 | +component military [0.89, 0.58] label [-59, -14] |
| 15 | +component citizen [0.87, 0.70] |
| 16 | +component government [0.94, 0.66] label [-47, -10] |
| 17 | +component information operations [0.86, 0.52] label [-77, -23] |
| 18 | + |
| 19 | +component orchestration [0.30, 0.26] label [-51, 17] |
| 20 | + |
| 21 | +component target [0.31, 0.49] label [-57, -7] |
| 22 | +pipeline target [0.39, 0.8] |
| 23 | + |
| 24 | +component power to the edge [0.03, 0.39] label [-73, -40] |
| 25 | +component awareness [0.17, 0.48] label [-35, 22] |
| 26 | +component education [0.17, 0.57] label [-13, 24] |
| 27 | +component historical constraints [0.78, 0.04] label [22, -6] |
| 28 | + |
| 29 | +component protect [0.76, 0.56] label [-10, -16] |
| 30 | +component information extraction [0.49, 0.64] label [-29, 13] |
| 31 | +component political effect [0.65, 0.55] label [-26, 17] |
| 32 | +component economic effect [0.65, 0.43] label [-39, 13] |
| 33 | +component target location [0.49, 0.55] label [-36, 13] |
| 34 | +component social media [0.49, 0.60] label [-68, -16] |
| 35 | +component hacktivism [0.49, 0.35] label [2, -13] |
| 36 | +component deniability [0.78, 0.42] label [-22, -16] |
| 37 | +component deep fakes [0.49, 0.48] label [-33, -17] |
| 38 | +component trust [0.03, 0.53] label [-50, 11] |
| 39 | + |
| 40 | +component command and control [0.08, 0.63] label [6, -43] |
| 41 | +pipeline command and control [0.4, 0.8] |
| 42 | +component centralised [0.06, 0.69] label [-18, 28] |
| 43 | +component decentralised [0.06, 0.46] label [-39, -11] |
| 44 | + |
| 45 | +component exploits [0.51, 0.66] label [13, -10] |
| 46 | +pipeline exploits [0.3, 0.8] |
| 47 | + |
| 48 | +component material effect [0.65, 0.64] label [-15, 14] |
| 49 | +component infiltration [0.49, 0.70] label [2, 23] |
| 50 | + |
| 51 | +component effect [0.67, 0.51] label [-46, -11] |
| 52 | +pipeline effect [0.35, 0.77] |
| 53 | +component offense [0.77, 0.53] label [-58, -5] |
| 54 | +component society [0.95, 0.46] |
| 55 | +component beliefs [0.87, 0.38] label [-55, -5] |
| 56 | +component espionage [0.37, 0.68] label [6, 3] |
| 57 | +component success [0.56, 0.31] label [-28, -19] |
| 58 | +component cost [0.78, 0.69] label [-1, -15] |
| 59 | +component skillsets [0.71, 0.70] label [9, -10] |
| 60 | +component marketplace [0.41, 0.59] label [-20, 21] |
| 61 | + |
| 62 | +component cybersecurity doctrine [0.19, 0.53] label [-81, -26] |
| 63 | +pipeline cybersecurity doctrine [0.4, 0.62] |
| 64 | +//links |
| 65 | +military->information operations |
| 66 | +information operations->deniability |
| 67 | +information operations->protect |
| 68 | +protect->effect |
| 69 | +information operations->offense |
| 70 | +offense->effect |
| 71 | +government->political effect |
| 72 | +citizen->political effect |
| 73 | +government->citizen |
| 74 | +effect->exploits |
| 75 | +deep fakes->trust |
| 76 | +exploits->command and control |
| 77 | +centralised->trust |
| 78 | +government->military |
| 79 | +society->citizen |
| 80 | +society->beliefs |
| 81 | + |
| 82 | +infiltration->espionage |
| 83 | +espionage->deniability |
| 84 | +beliefs->success |
| 85 | +effect->success |
| 86 | +success->hacktivism |
| 87 | +information operations->cost of war |
| 88 | +skillsets->information operations |
| 89 | +skillsets->exploits |
| 90 | +cost->information operations |
| 91 | +exploits->marketplace |
| 92 | +cost->marketplace |
| 93 | +government->trust |
| 94 | +hacktivism->orchestration |
| 95 | +decentralised->power to the edge |
| 96 | +hacktivism->power to the edge |
| 97 | +exploits->target |
| 98 | +target->cybersecurity doctrine |
| 99 | +protect->cybersecurity doctrine |
| 100 | +offense->threshold |
| 101 | +threshold->risk |
| 102 | +risk->awareness |
| 103 | +risk->appetite |
| 104 | +marketplace->criminal activity |
| 105 | +criminal activity->marketplace |
| 106 | +hacktivism->criminal activity |
0 commit comments