Skip to content

Taxonomy Distribution Report

Overview

  • Total Concepts: 390
  • Number of Taxonomies: 12
  • Average Concepts per Taxonomy: 32.5

Distribution Summary

Category TaxonomyID Count Percentage Status
CRYPTO CRYPTO 61 15.6%
Foundation Concepts - Prerequisites FOUND 56 14.4%
NET NET 47 12.1%
SYS SYS 41 10.5%
SOFT SOFT 38 9.7%
OPS OPS 30 7.7%
HUMAN HUMAN 28 7.2%
ORG ORG 27 6.9%
SOC SOC 24 6.2%
COMP COMP 19 4.9%
EMERG EMERG 14 3.6%
CAP CAP 5 1.3% ℹ️ Under

Visual Distribution

CRYPTO                    ███████  61 ( 15.6%)
Foundation Concepts - Pre ███████  56 ( 14.4%)
NET                       ██████  47 ( 12.1%)
SYS                       █████  41 ( 10.5%)
SOFT                      ████  38 (  9.7%)
OPS                       ███  30 (  7.7%)
HUMAN                     ███  28 (  7.2%)
ORG                       ███  27 (  6.9%)
SOC                       ███  24 (  6.2%)
COMP                      ██  19 (  4.9%)
EMERG                     █  14 (  3.6%)
CAP                          5 (  1.3%)

Balance Analysis

✅ No Over-Represented Categories

All categories are under the 30% threshold. Good balance!

ℹ️ Under-Represented Categories (<3%)

  • CAP (CAP): 5 concepts (1.3%)
  • Note: Small categories are acceptable for specialized topics

Category Details

CRYPTO (CRYPTO)

Count: 61 concepts (15.6%)

Concepts:

    1. Cryptography
    1. Plaintext
    1. Ciphertext
    1. Encryption
    1. Decryption
    1. Cryptographic Key
    1. Symmetric Cryptography
    1. Block Cipher
    1. Stream Cipher
    1. AES
    1. DES
    1. 3DES
    1. Block Cipher Modes
    1. ECB Mode
    1. CBC Mode
  • ...and 46 more

Foundation Concepts - Prerequisites (FOUND)

Count: 56 concepts (14.4%)

Concepts:

    1. Cybersecurity
    1. Information Security
    1. Confidentiality
    1. Integrity
    1. Availability
    1. CIA Triad
    1. Authentication
    1. Authorization
    1. Accounting
    1. Non-Repudiation
    1. AAA Framework
    1. Adversarial Thinking
    1. Systems Thinking
    1. Threat Modeling
    1. STRIDE
  • ...and 41 more

NET (NET)

Count: 47 concepts (12.1%)

Concepts:

    1. Network Security
    1. OSI Model
    1. TCP/IP Model
    1. TCP
    1. UDP
    1. IP Protocol
    1. ICMP
    1. ARP Spoofing
    1. DHCP Snooping
    1. Man-in-the-Middle
    1. Packet Sniffing
    1. Firewall
    1. Stateful Firewall
    1. Next-Gen Firewall
    1. Web Application Firewall
  • ...and 32 more

SYS (SYS)

Count: 41 concepts (10.5%)

Concepts:

    1. Operating System Security
    1. Kernel Security
    1. Process Isolation
    1. Memory Protection
    1. ASLR
    1. Stack Canary
    1. DEP
    1. Access Control
    1. DAC
    1. MAC
    1. RBAC
    1. ABAC
    1. File Permissions
    1. SELinux
    1. AppArmor
  • ...and 26 more

SOFT (SOFT)

Count: 38 concepts (9.7%)

Concepts:

    1. Secure SDLC
    1. Secure Design
    1. Secure Coding
    1. OWASP Top Ten
    1. CWE Top 25
    1. Buffer Overflow
    1. Stack Overflow
    1. Heap Overflow
    1. Integer Overflow
    1. Format String Bug
    1. Injection Attack
    1. SQL Injection
    1. Command Injection
    1. Cross-Site Scripting
    1. Stored XSS
  • ...and 23 more

OPS (OPS)

Count: 30 concepts (7.7%)

Concepts:

    1. Penetration Testing
    1. Red Team
    1. Blue Team
    1. Purple Team
    1. MITRE ATT&CK
    1. Threat Intelligence
    1. OSINT
    1. Threat Hunting
    1. Vulnerability Management
    1. Vulnerability Scanning
    1. Incident Response
    1. PICERL Lifecycle
    1. Incident Preparation
    1. Incident Identification
    1. Incident Containment
  • ...and 15 more

HUMAN (HUMAN)

Count: 28 concepts (7.2%)

Concepts:

    1. Identity Management
    1. Access Management
    1. IAM System
    1. Single Sign-On
    1. Federated Identity
    1. Password Authentication
    1. Password Policy
    1. Multi-Factor Authentication
    1. Biometric Authentication
    1. FIDO2
    1. Passkey
    1. OAuth 2.0
    1. OIDC
    1. SAML
    1. Social Engineering
  • ...and 13 more

ORG (ORG)

Count: 27 concepts (6.9%)

Concepts:

    1. Governance Risk Compliance
    1. Security Policy
    1. Acceptable Use Policy
    1. Security Standard
    1. Security Procedure
    1. NIST CSF
    1. ISO 27001
    1. SOC 2
    1. PCI-DSS
    1. HIPAA Compliance
    1. Security Program Mgmt
    1. CISO Role
    1. Business Continuity
    1. Disaster Recovery
    1. Business Impact Analysis
  • ...and 12 more

SOC (SOC)

Count: 24 concepts (6.2%)

Concepts:

    1. Cyber Law
    1. CFAA
    1. ECPA
    1. GDPR
    1. CCPA
    1. HIPAA Law
    1. GLBA
    1. FERPA
    1. NIS2 Directive
    1. Cybercrime
    1. Digital Forensics
    1. Chain of Custody
    1. Forensic Imaging
    1. Memory Forensics
    1. Mobile Forensics
  • ...and 9 more

COMP (COMP)

Count: 19 concepts (4.9%)

Concepts:

    1. Hardware Security
    1. Trusted Platform Module
    1. Hardware Security Module
    1. Secure Enclave
    1. Trusted Execution Env
    1. Firmware Security
    1. Secure Boot
    1. Measured Boot
    1. UEFI Security
    1. Side-Channel Attack
    1. Timing Attack
    1. Power Analysis Attack
    1. Cache Side-Channel
    1. Rowhammer
    1. Hardware Supply Chain
  • ...and 4 more

EMERG (EMERG)

Count: 14 concepts (3.6%)

Concepts:

    1. AI Security
    1. Adversarial ML
    1. Model Theft
    1. Prompt Injection
    1. Data Poisoning
    1. Model Evasion
    1. Quantum Threat
    1. Post-Quantum Cryptography
    1. Lattice-Based Crypto
    1. Confidential Computing
    1. Operational Technology
    1. OT Security
    1. Smart Grid Security
    1. Blockchain Security

CAP (CAP)

Count: 5 concepts (1.3%)

Concepts:

    1. Capstone Secure System
    1. Capstone Security Program
    1. Capstone Applied Research
    1. Technical Communication
    1. Team Collaboration

Recommendations

  • Excellent balance: Categories are evenly distributed (spread: 14.4%)
  • MISC category minimal: Good categorization specificity

Educational Use Recommendations

  • Use taxonomy categories for color-coding in graph visualizations
  • Design curriculum modules based on taxonomy groupings
  • Create filtered views for focused learning paths
  • Use categories for assessment organization
  • Enable navigation by topic area in interactive tools

Report generated by learning-graph-reports/taxonomy_distribution.py