+ + | ++data-classification namespace available in JSON format at this location. The JSON format can be freely reused in your application or automatically enabled in MISP taxonomy. + | +
Data classification for data potentially at risk of exfiltration based on table 2.1 of Solving Cyber Risk book.
+Data which is regulated under a specific regulation or law such as PII, SPD, PCI or PHI.
+Regulated data
+Data which is regulated under a specific regulation or law such as PII, SPD, PCI or PHI.
+Data which represents a specific commercial value and is confidential to an organisation such as trade secrets, customer accounts.
+Commercially confidential information (CCI)
+Data which represents a specific commercial value and is confidential to an organisation such as trade secrets, customer accounts.
+Data which represents a specific financial value to an organisation such as payroll, investment information.
+Financially sensitive information (FSI)
+Data which represents a specific financial value to an organisation such as payroll, investment information.
+Data which is sensitive to the valuation of an organisation such as inside information (as defined by a Financial Services Authority).
+Valuation sensitive information (VSI)
+Data which is sensitive to the valuation of an organisation such as inside information (as defined by a Financial Services Authority).
+Data which is sensitive such as email or letters.
+Sensitive information
+Data which is sensitive such as email or letters.
++ + | ++type namespace available in JSON format at this location. The JSON format can be freely reused in your application or automatically enabled in MISP taxonomy. + | +
Taxonomy to describe different types of intelligence gathering discipline which can be described the origin of intelligence.
+gathered from open sources
+Open Source Intelligence
+gathered from open sources
+gathered from interception of signals
+Signal Intelligence
+gathered from interception of signals
+gathered from analysis of weapons and equipment used by the armed forces of foreign nations, or environmental conditions
+Technical Intelligence
+gathered from analysis of weapons and equipment used by the armed forces of foreign nations, or environmental conditions
+gathered from active or passive exploitation (CNE) in the cyberspace
+Cyberspace Intelligence
+gathered from active or passive exploitation (CNE) in the cyberspace
+gathered from active or passive expoilation (CNE) in the digital network.
+Digital Network Intelligence
+gathered from active or passive expoilation (CNE) in the digital network.
+gathered from a person in the location in question
+Human Intelligence
+gathered from a person in the location in question
+gathered from analysis of medical records and/or actual physiological examinations to determine health and/or particular ailments/allergetic conditions for consideration
+Medical Intelligence
+gathered from analysis of medical records and/or actual physiological examinations to determine health and/or particular ailments/allergetic conditions for consideration
+gathered from satellite, aerial photography, mapping/terrain data
+Geospatial Intelligence
+gathered from satellite, aerial photography, mapping/terrain data
+gathered from satellite and aerial photography
+Imagery Intelligence
+gathered from satellite and aerial photography
+gathered from electro-optical, nuclear survey, geophysical measurements, radar, materials analysis
+Measurement and signature intelligence
+gathered from electro-optical, nuclear survey, geophysical measurements, radar, materials analysis
+gathered from analysis of monetary or financial transactions
+Financial Intelligence
+gathered from analysis of monetary or financial transactions
+