Taxonomy Distribution Report¶
Overview¶
- Total Concepts: 390
- Number of Taxonomies: 12
- Average Concepts per Taxonomy: 32.5
Distribution Summary¶
| Category | TaxonomyID | Count | Percentage | Status |
|---|---|---|---|---|
| CRYPTO | CRYPTO | 61 | 15.6% | ✅ |
| Foundation Concepts - Prerequisites | FOUND | 56 | 14.4% | ✅ |
| NET | NET | 47 | 12.1% | ✅ |
| SYS | SYS | 41 | 10.5% | ✅ |
| SOFT | SOFT | 38 | 9.7% | ✅ |
| OPS | OPS | 30 | 7.7% | ✅ |
| HUMAN | HUMAN | 28 | 7.2% | ✅ |
| ORG | ORG | 27 | 6.9% | ✅ |
| SOC | SOC | 24 | 6.2% | ✅ |
| COMP | COMP | 19 | 4.9% | ✅ |
| EMERG | EMERG | 14 | 3.6% | ✅ |
| CAP | CAP | 5 | 1.3% | ℹ️ Under |
Visual Distribution¶
CRYPTO ███████ 61 ( 15.6%)
Foundation Concepts - Pre ███████ 56 ( 14.4%)
NET ██████ 47 ( 12.1%)
SYS █████ 41 ( 10.5%)
SOFT ████ 38 ( 9.7%)
OPS ███ 30 ( 7.7%)
HUMAN ███ 28 ( 7.2%)
ORG ███ 27 ( 6.9%)
SOC ███ 24 ( 6.2%)
COMP ██ 19 ( 4.9%)
EMERG █ 14 ( 3.6%)
CAP 5 ( 1.3%)
Balance Analysis¶
✅ No Over-Represented Categories¶
All categories are under the 30% threshold. Good balance!
ℹ️ Under-Represented Categories (<3%)¶
- CAP (CAP): 5 concepts (1.3%)
- Note: Small categories are acceptable for specialized topics
Category Details¶
CRYPTO (CRYPTO)¶
Count: 61 concepts (15.6%)
Concepts:
-
- Cryptography
-
- Plaintext
-
- Ciphertext
-
- Encryption
-
- Decryption
-
- Cryptographic Key
-
- Symmetric Cryptography
-
- Block Cipher
-
- Stream Cipher
-
- AES
-
- DES
-
- 3DES
-
- Block Cipher Modes
-
- ECB Mode
-
- CBC Mode
- ...and 46 more
Foundation Concepts - Prerequisites (FOUND)¶
Count: 56 concepts (14.4%)
Concepts:
-
- Cybersecurity
-
- Information Security
-
- Confidentiality
-
- Integrity
-
- Availability
-
- CIA Triad
-
- Authentication
-
- Authorization
-
- Accounting
-
- Non-Repudiation
-
- AAA Framework
-
- Adversarial Thinking
-
- Systems Thinking
-
- Threat Modeling
-
- STRIDE
- ...and 41 more
NET (NET)¶
Count: 47 concepts (12.1%)
Concepts:
-
- Network Security
-
- OSI Model
-
- TCP/IP Model
-
- TCP
-
- UDP
-
- IP Protocol
-
- ICMP
-
- ARP Spoofing
-
- DHCP Snooping
-
- Man-in-the-Middle
-
- Packet Sniffing
-
- Firewall
-
- Stateful Firewall
-
- Next-Gen Firewall
-
- Web Application Firewall
- ...and 32 more
SYS (SYS)¶
Count: 41 concepts (10.5%)
Concepts:
-
- Operating System Security
-
- Kernel Security
-
- Process Isolation
-
- Memory Protection
-
- ASLR
-
- Stack Canary
-
- DEP
-
- Access Control
-
- DAC
-
- MAC
-
- RBAC
-
- ABAC
-
- File Permissions
-
- SELinux
-
- AppArmor
- ...and 26 more
SOFT (SOFT)¶
Count: 38 concepts (9.7%)
Concepts:
-
- Secure SDLC
-
- Secure Design
-
- Secure Coding
-
- OWASP Top Ten
-
- CWE Top 25
-
- Buffer Overflow
-
- Stack Overflow
-
- Heap Overflow
-
- Integer Overflow
-
- Format String Bug
-
- Injection Attack
-
- SQL Injection
-
- Command Injection
-
- Cross-Site Scripting
-
- Stored XSS
- ...and 23 more
OPS (OPS)¶
Count: 30 concepts (7.7%)
Concepts:
-
- Penetration Testing
-
- Red Team
-
- Blue Team
-
- Purple Team
-
- MITRE ATT&CK
-
- Threat Intelligence
-
- OSINT
-
- Threat Hunting
-
- Vulnerability Management
-
- Vulnerability Scanning
-
- Incident Response
-
- PICERL Lifecycle
-
- Incident Preparation
-
- Incident Identification
-
- Incident Containment
- ...and 15 more
HUMAN (HUMAN)¶
Count: 28 concepts (7.2%)
Concepts:
-
- Identity Management
-
- Access Management
-
- IAM System
-
- Single Sign-On
-
- Federated Identity
-
- Password Authentication
-
- Password Policy
-
- Multi-Factor Authentication
-
- Biometric Authentication
-
- FIDO2
-
- Passkey
-
- OAuth 2.0
-
- OIDC
-
- SAML
-
- Social Engineering
- ...and 13 more
ORG (ORG)¶
Count: 27 concepts (6.9%)
Concepts:
-
- Governance Risk Compliance
-
- Security Policy
-
- Acceptable Use Policy
-
- Security Standard
-
- Security Procedure
-
- NIST CSF
-
- ISO 27001
-
- SOC 2
-
- PCI-DSS
-
- HIPAA Compliance
-
- Security Program Mgmt
-
- CISO Role
-
- Business Continuity
-
- Disaster Recovery
-
- Business Impact Analysis
- ...and 12 more
SOC (SOC)¶
Count: 24 concepts (6.2%)
Concepts:
-
- Cyber Law
-
- CFAA
-
- ECPA
-
- GDPR
-
- CCPA
-
- HIPAA Law
-
- GLBA
-
- FERPA
-
- NIS2 Directive
-
- Cybercrime
-
- Digital Forensics
-
- Chain of Custody
-
- Forensic Imaging
-
- Memory Forensics
-
- Mobile Forensics
- ...and 9 more
COMP (COMP)¶
Count: 19 concepts (4.9%)
Concepts:
-
- Hardware Security
-
- Trusted Platform Module
-
- Hardware Security Module
-
- Secure Enclave
-
- Trusted Execution Env
-
- Firmware Security
-
- Secure Boot
-
- Measured Boot
-
- UEFI Security
-
- Side-Channel Attack
-
- Timing Attack
-
- Power Analysis Attack
-
- Cache Side-Channel
-
- Rowhammer
-
- Hardware Supply Chain
- ...and 4 more
EMERG (EMERG)¶
Count: 14 concepts (3.6%)
Concepts:
-
- AI Security
-
- Adversarial ML
-
- Model Theft
-
- Prompt Injection
-
- Data Poisoning
-
- Model Evasion
-
- Quantum Threat
-
- Post-Quantum Cryptography
-
- Lattice-Based Crypto
-
- Confidential Computing
-
- Operational Technology
-
- OT Security
-
- Smart Grid Security
-
- Blockchain Security
CAP (CAP)¶
Count: 5 concepts (1.3%)
Concepts:
-
- Capstone Secure System
-
- Capstone Security Program
-
- Capstone Applied Research
-
- Technical Communication
-
- Team Collaboration
Recommendations¶
- ✅ Excellent balance: Categories are evenly distributed (spread: 14.4%)
- ✅ MISC category minimal: Good categorization specificity
Educational Use Recommendations¶
- Use taxonomy categories for color-coding in graph visualizations
- Design curriculum modules based on taxonomy groupings
- Create filtered views for focused learning paths
- Use categories for assessment organization
- Enable navigation by topic area in interactive tools
Report generated by learning-graph-reports/taxonomy_distribution.py