Layers of the ecosystem
A HOLISTIC VIEW TO CYBER SECURITY AND CYBER CRIME
Ten Ten (10) essential Layers to addressing Cyber Crime and Cyber Security
LAYER 01
The Challenges of Internet Protocol Resources
Layer 1 Addresses the challenges we face within the cyber ecosystem. Our Ecosystem is built with complexities, due to technological advances, globalization, international laws, and a host of other issues that are only magnified by a decentralized….
LAYER 02
The Stakeholders of Internet Protocol Resources
Layer 2 (The DNS Layer) is a decentralized international multi-stakeholder network of autonomous groups responsible for the management and distribution of Internet number resources such as Internet Protocol (IP) addresses and Autonomous System….
LAYER 03
The Distributors of Internet Protocol Resources,
Layer 3 (A function of the DNS layer) manages and distributes (allocates) IP resources to the ISP & Network Providers of Internet Protocol Resources, last mile, Layer 5, who in turn can be customers, owners, resellers, or the Users of Internet Protocols Resources,….Â
LAYER 04
The Routing/Pathway Providers of Internet Protocol Resources
Layer 4 consist primarily of Tier1, Tier 2 & some Tier 3 ISPs, Telco pathway/routing providers and Autonomous Systems (AS). These pathway/routing providers are companies that own, operate, and sell…..
LAYER 05
The ISP & Network Providers of Internet Protocol Resources, last mile
Layer 5 is primarily engaged in delivering Internet access to the Users of Internet Protocols Resources Layer 6 and focuses on local business and consumer market conditions(last mile service)…..
LAYER 06
The Users of Internet Protocol Resources
Layer 6 is a focus on the Attack vector. There are Five Initial Access Attack Vectors (how the attacker gains initial access) for launching unauthorized access into your environment during a cyber-attack. They are a Posting Malicious Online Activity….
LAYER 07
The Abusers of Internet Protocol Resources
Layer 7 focuses of the Adversary, they are described as: 1. Cyber-Criminal 2. Hacktivist  3. Competitors 4. Insider (knowingly or unwitting)  5. Nation State 6. Cyber Warfare 7. Cyber Terror IP Resource Abusers….
LAYER 08
The Defenders of Internet Protocol Resources
In Layer 8 the defenders are described as: 1. Government/Intelligence  2. Law enforcement 3. Cyber Security firms 4. Private sector/Businesses 5. CERTS and CSIRTS 6. Defensive Researchers/Academia 7. Non-government Organization….
LAYER 09A
The Countermeasures of Internet Protocol Resources
The Countermeasures used to secure Internet Protocol Resources are described as (Source NIST) protective measures prescribed to meet the security objectives (i.e., confidentiality, integrity, and availability) specified for an information system,….
LAYER 09B
The Responders of Internet Protocol Resources
LAYER 10
The Security vs Privacy of Internet Protocol ResourcesÂ
CHATBOT ON PREVENTING AND REPORTING CYBERCRIME
LET US HELP YOU WITH PREVENTING AND REPORTING CYBERCRIME
LISTCRIME is a non-profit website. We simply want to help internet users and businesses to not become victims of cybercrime.
For the most part, references within this website appear as links to the actual site that the information came from. I revert to customary referencing when citing non-www based sources. A bibliography of all sources appears at the end of each web page. If we have not properly cited a resource please email us and it will be corrected. NASA and Wiki- above source images. This disclaimer informs readers that the views, thoughts, and opinions expressed in this document belong solely to the author, and not necessarily to the author’s employer, organization, committee, or other group or individual.