Deborah Servili 2019-10-17 10:28:43 +02:00
parent 68b3490d8b
commit 0b68907559
No known key found for this signature in database
GPG Key ID: 7E3A832850D4D7D1
2 changed files with 25 additions and 0 deletions

View File

@ -62,6 +62,7 @@ bfuscation techniques. This taxonomy lists all the known or official packer used
- [Binary Classification](./binary-class) safe/malicious binary tagging - [Binary Classification](./binary-class) safe/malicious binary tagging
- [Workflow](./workflow) support language is a common language to support intelligence analysts to perform their analysis on data and information. - [Workflow](./workflow) support language is a common language to support intelligence analysts to perform their analysis on data and information.
- [file-type](./file-type) - List of known file types. - [file-type](./file-type) - List of known file types.
- [iot](./iot) - Interbet of Things Taxonomy
### [Admiralty Scale](./admiralty-scale) ### [Admiralty Scale](./admiralty-scale)

24
iot/machinetag.json Normal file
View File

@ -0,0 +1,24 @@
{
"namespace": "iot",
"description": "Internet of Things taxonomy, based on IOT UK report https://iotuk.org.uk/wp-content/uploads/2017/01/IOT-Taxonomy-Report.pdf",
"version": 1,
"expanded": "Internet of Things",
"predicates": [
{
"value": "TCom",
"expanded": "Technical complexity",
"description":"IoT projects vary tremendously in terms of their technical sophistication . Digital Catapult has developed a scale based on technology complexity (TCom) that enables us to understand the state of IoT in the UK, and to assess what is currently being researched, trialled or deployed in real-life implementations ."
},
{
"value": "SSL",
"expanded": "System Security Level",
"description": "A second characteristic of an IoT system concerns the inherent level of safety, privacy and security of that system . At one end of the spectrum, an IoT system may not gather data that is sensitive either in terms of safety or privacy, while at the other it may collect data about identifiable individuals or groups of individuals, involve financial transactions, or access to system data or have the ability to control objects that could compromise health, safety or security."
},
{
"value": "DSL",
"expanded": "Data Sharing Level",
"description": "A third characteristic of IoT systems concerns the degree of sharing of sensitive data between the object and the system, and subsequently between the system and the system operator(s) or participants, and third parties .Systems do not always need to share data, so IoT product, platform, service and system designers must be clear about when data is shared, what is shared and why."
}
]
}