© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. G. Oakley et al.Theoretical Cybersecurityhttps://doi.org/10.1007/978-1-4842-8300-4_2

2. A Cyber Taxonomy

Dr. Jacob G. Oakley1  , Michael Butler2, Wayne York1, Dr. Matthew Puckett3 and Dr. J. Louis Sewell3
(1)
Owens Cross Roads, AL, USA
(2)
Arlington, VA, USA
(3)
Huntsville, AL, USA
 

As we analyzed the example in the previous chapter, it becomes apparent that there is inherently a problem with the outcomes of research when it is done by people with the wrong context, knowledge experience, or backgrounds. In this chapter, we will explore what sort of people make the right choice when theoretical cybersecurity work, thought, and innovation are necessary. First though, ...

Get Theoretical Cybersecurity: Principles and Advanced Concepts now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.