Malware, social engineering, network attacks, application attacks, and insider threat taxonomy for cybersecurity - Global
dct_network Network-Based Attacks
Cyber Threat Types classification code dct_network covers "Network-Based Attacks" at level 1 of the Cyber Threat Types hierarchy.
Level 14 direct subcategories2 cross-system mappings
Is your business really a dct_network?Classify itWhere dct_network sits in the Cyber Threat Types hierarchy
- >dct_network Network-Based Attacks
- >dct_network Network-Based Attacks
dct_network in other classification systems
Equivalent and related codes across 1 other system. Click any code to see its full definition, hierarchy, and crosswalks.
Subcategories of dct_network Network-Based Attacks
Frequently asked questions
- What is Cyber Threat Types dct_network?
- Cyber Threat Types dct_network is "Network-Based Attacks". Cyber Threat Types code dct_network covers "Network-Based Attacks" at level 1 of the Cyber Threat Types hierarchy.
- What does Cyber Threat Types dct_network include?
- dct_network Network-Based Attacks contains 4 direct subcategories: dct_network_ddos DDoS Attacks (volumetric, protocol, application layer); dct_network_dns DNS Attacks (poisoning, tunneling, hijacking, typosquat); dct_network_lateral Lateral Movement (pass-the-hash, Kerberoasting, RDP); dct_network_mitm Man-in-the-Middle Attacks (ARP spoofing, SSL stripping).
- How does Cyber Threat Types dct_network map to other classification systems?
- dct_network Network-Based Attacks has equivalents in NAICS 2022 (5415, 5417). These crosswalks let you translate this code between Cyber Threat Types and 1 other classification system.
- What is the parent category of dct_network?
- dct_network Network-Based Attacks sits under dct_network Network-Based Attacks in the Cyber Threat Types hierarchy.
Classify my business
Describe your business in plain English and get matching codes across Cyber Threat Types and other major systems.
Interactive browser
Open dct_network in the full interactive explorer with tree view, search, and drill-downs.