Skip to content

Layers of the ecosystem

A HOLISTIC VIEW TO CYBER SECURITY AND CYBER CRIME

Ten Ten (10) essential Layers to addressing Cyber Crime and Cyber Security

LAYER 01

The Challenges of Internet Protocol Resources

Layer 1 Addresses the challenges we face within the cyber ecosystem. Our Ecosystem is built with complexities, due to technological advances, globalization, international laws, and a host of other issues that are only magnified by a decentralized….

LAYER 02

The Stakeholders of Internet Protocol Resources

Layer 2 (The DNS Layer) is a decentralized international multi-stakeholder network of autonomous groups responsible for the management and distribution of Internet number resources such as Internet Protocol (IP) addresses and Autonomous System….

LAYER 03

The Distributors of Internet Protocol Resources,

Layer 3 (A function of the DNS layer) manages and distributes (allocates) IP resources to the ISP & Network Providers of Internet Protocol Resources, last mile, Layer 5, who in turn can be customers, owners, resellers, or the Users of Internet Protocols Resources,…. 

LAYER 04

The Routing/Pathway Providers of Internet Protocol Resources

Layer 4 consist primarily of Tier1, Tier 2 & some Tier 3 ISPs, Telco pathway/routing providers and Autonomous Systems (AS). These pathway/routing providers are companies that own, operate, and sell…..

LAYER 05

The ISP & Network Providers of Internet Protocol Resources, last mile

Layer 5 is primarily engaged in delivering Internet access to the Users of Internet Protocols Resources Layer 6 and focuses on local business and consumer market conditions(last mile service)…..

LAYER 06

The Users of Internet Protocol Resources

Layer 6 is a focus on the Attack vector. There are Five Initial Access Attack Vectors (how the attacker gains initial access) for launching unauthorized access into your environment during a cyber-attack. They are a Posting Malicious Online Activity….

LAYER 07

The Abusers of Internet Protocol Resources

Layer 7 focuses of the Adversary, they are described as: 1. Cyber-Criminal 2. Hacktivist  3. Competitors 4. Insider (knowingly or unwitting)  5. Nation State 6. Cyber Warfare 7. Cyber Terror IP Resource Abusers….

LAYER 08

The Defenders of Internet Protocol Resources

In Layer 8 the defenders are described as: 1. Government/Intelligence  2. Law enforcement 3. Cyber Security firms 4. Private sector/Businesses 5. CERTS and CSIRTS 6. Defensive Researchers/Academia 7. Non-government Organization….

LAYER 09A

The Countermeasures of Internet Protocol Resources

The Countermeasures used to secure Internet Protocol Resources are described as (Source NIST) protective measures prescribed to meet the security objectives (i.e., confidentiality, integrity, and availability) specified for an information system,….

LAYER 09B

The Responders of Internet Protocol Resources

The Responders. This layer examines the critical role of incident response in the aftermath of a cyber event. At Listcrime.com, we outline the essential steps for responding to cyber incidents, including containment, investigation,…
LAYER 10

The Security vs Privacy of Internet Protocol Resources 

Security and Privacy are both interlinked terms that are often used in conjunction with each other, while one cannot exist without the other, they are often misused….

CHATBOT ON PREVENTING AND REPORTING CYBERCRIME

LET US HELP YOU WITH PREVENTING AND REPORTING CYBERCRIME

LISTCRIME is a non-profit website. We simply want to help internet users and businesses to not become victims of cybercrime.

For the most part, references within this website appear as links to the actual site that the information came from. I revert to customary referencing when citing non-www based sources. A bibliography of all sources appears at the end of each web page. If we have not properly cited a resource please email us and it will be corrected. NASA and Wiki- above source images. This disclaimer informs readers that the views, thoughts, and opinions expressed in this document belong solely to the author, and not necessarily to the author’s employer, organization, committee, or other group or individual.

Watch Demo

The Cyber EcoSystem  Explained