Main Page: Difference between revisions
From Cognitive Attack Taxonomy
(8 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
''' | |||
= '''The Cognitive Attack Taxonomy (CAT)''' = | |||
'''<br> | |||
Visit the [https://www.cognitivesecurity.institute/ '''Cognitive Security Institute'''] to learn more about cognitive security and related topics!<br> | |||
'''Learn how to interpret the Cognitive Attack Taxonomy''' [[Interpreting the Cognitive Attack Taxonomy|'''here''']].<br> | |||
The Cognitive Attack Taxonomy (CAT) | |||
[[ | |||
{| class="wikitable sortable" | |||
|+ | |||
|- | |||
! CAT ID !! CAT Name !! Layer !! Category | |||
|- CAT ID CAT Name Layer Category | |||
| CAT-2024-010 || [[QRishing ]] || 8 || TTP | |||
|- | |||
| CAT-2024-007 || [[Need to Correct ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2024-006 || [[Regulatory Capture ]] || 10 || Exploit | |||
|- | |||
| CAT-2024-005 || [[Perjury_Trap ]] || 8, 10 || TTP | |||
|- | |||
| CAT-2024-004 || [[Stroop_Test ]] || 8 || TTP | |||
|- | |||
| CAT-2024-003 || [[False_Feedback_Injection ]] || 7 || TTP | |||
|- | |||
| CAT-2024-002 || [[Sleeper_Agent_Attack ]] || 7 || TTP | |||
|- | |||
| CAT-2024-001 || [[Evil_Eve_Attack ]] || 7 || TTP | |||
|- | |||
| CAT-2024-008 || [[Positive_Test_Strategy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2024-010 || [[Hyperstition ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2024-009 || [[Psychological_Chuting ]] || 8 || Exploit | |||
|- | |||
| CAT-2023-018 || [[Repeated_Exposure ]] || 8 || Exploit | |||
|- | |||
| CAT-2023-017 || [[Model_Extraction_Attacks ]] || 7 || TTP | |||
|- | |||
| CAT-2023-016 || [[Model_Theft ]] || 7 || TTP | |||
|- | |||
| CAT-2023-015 || [[Data_Reconstruction ]] || 7 || Exploit | |||
|- | |||
| CAT-2023-014 || [[Model_Inversion_Attack ]] || 7 || Exploit | |||
|- | |||
| CAT-2023-013 || [[Membership_Inference_Attack ]] || 7 || Exploit | |||
|- | |||
| CAT-2023-012 || [[Adversarial_Examples ]] || 7 || Exploit | |||
|- | |||
| CAT-2023-011 || [[Evasion_Attacks ]] || 7 || TTP | |||
|- | |||
| CAT-2023-010 || [[Input_Manipulation_Attack ]] || 7 || TTP | |||
|- | |||
| CAT-2023-009 || [[Backdoor_Attacks ]] || 7 || TTP | |||
|- | |||
| CAT-2023-008 || [[Trigger_Based_Attack ]] || 7 || TTP | |||
|- | |||
| CAT-2023-007 || [[Training_Data_Poisoning_Attack ]] || 7 || TTP | |||
|- | |||
| CAT-2023-006 || [[Campbell’s_Law ]] || 9 || Vulnerability | |||
|- | |||
| CAT-2023-005 || [[Training_Data_Poisoning ]] || 7 || Exploit | |||
|- | |||
| CAT-2023-004 || [[Suffix_Injection ]] || 7 || TTP | |||
|- | |||
| CAT-2023-003 || [[Sensitive_Information_Disclosure ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2023-002 || [[Prompt_Injection ]] || 7 || TTP | |||
|- | |||
| CAT-2023-001 || [[Overreliance_on_Automation ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-321 || [[Impulsivity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-320 || [[Excessive_Agency ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-319 || [[Emoji_Injection ]] || 7, 8 || TTP | |||
|- | |||
| CAT-2022-318 || [[Culture_Jamming ]] || 8 || TTP | |||
|- | |||
| CAT-2022-317 || [[Chain-Of-Thought_Manipulation ]] || 7 || TTP | |||
|- | |||
| CAT-2022-316 || [[Network_Ambiance_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-315 || [[Maskarovka ]] || 8 || TTP | |||
|- | |||
| CAT-2022-314 || [[Reflexive_Control ]] || 8 || TTP | |||
|- | |||
| CAT-2022-313 || [[Zone_Flooding ]] || 8 || TTP | |||
|- | |||
| CAT-2022-312 || [[Incrementalism ]] || 8, 9 || Exploit | |||
|- | |||
| CAT-2022-311 || [[Compliance-Ladder ]] || 8 || TTP | |||
|- | |||
| CAT-2022-310 || [[Yes-Ladder ]] || 8 || TTP | |||
|- | |||
| CAT-2022-309 || [[Wing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-308 || [[Whorfian_Attack ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-307 || [[Venue_Change ]] || 8 || TTP | |||
|- | |||
| CAT-2022-306 || [[Trance-Words ]] || 8 || TTP | |||
|- | |||
| CAT-2022-305 || [[Tainted_Leak ]] || 8 || TTP | |||
|- | |||
| CAT-2022-304 || [[Social_Engineering_Toolkit ]] || 8 || TTP | |||
|- | |||
| CAT-2022-303 || [[Slander_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-302 || [[Sandbagging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-301 || [[Reframing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-300 || [[Prop ]] || 8 || TTP | |||
|- | |||
| CAT-2022-299 || [[Preloading ]] || 8 || TTP | |||
|- | |||
| CAT-2022-298 || [[Pendant_Anchoring ]] || 8 || TTP | |||
|- | |||
| CAT-2022-297 || [[Open-Ended_Question ]] || 8 || TTP | |||
|- | |||
| CAT-2022-296 || [[Negging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-295 || [[Multi-Channel_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-294 || [[Mirroring ]] || 8 || TTP | |||
|- | |||
| CAT-2022-293 || [[Micro_Expression ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-292 || [[Maltego ]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-291 || [[Leading_Question ]] || 8 || TTP | |||
|- | |||
| CAT-2022-290 || [[Journobaiting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-289 || [[Ice_Breaker ]] || 8 || TTP | |||
|- | |||
| CAT-2022-288 || [[Hot_Reading ]] || 8 || TTP | |||
|- | |||
| CAT-2022-287 || [[Honey_Channels ]] || 8 || TTP | |||
|- | |||
| CAT-2022-286 || [[Functional_Opener ]] || 8 || TTP | |||
|- | |||
| CAT-2022-285 || [[Forcing ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-284 || [[Firehose_of_Falsehood ]] || 8 || TTP | |||
|- | |||
| CAT-2022-283 || [[False_Time_Constraint ]] || 8 || TTP | |||
|- | |||
| CAT-2022-282 || [[False_Flag ]] || 8 || TTP | |||
|- | |||
| CAT-2022-281 || [[Eject_with_Explanation ]] || 8 || TTP | |||
|- | |||
| CAT-2022-280 || [[Double_Switch ]] || 8 || TTP | |||
|- | |||
| CAT-2022-279 || [[Deception-in-Depth ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-278 || [[Conversational_Threading ]] || 8 || TTP | |||
|- | |||
| CAT-2022-277 || [[Cold_Reading ]] || 8 || TTP | |||
|- | |||
| CAT-2022-276 || [[Buscador ]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-275 || [[Brushing ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-274 || [[Baiting-Trolling ]] || 8 || TTP | |||
|- | |||
| CAT-2022-273 || [[Anchor-NLP_Technique ]] || 8 || TTP | |||
|- | |||
| CAT-2022-272 || [[Active_Indicator_Probe ]] || 8 || TTP | |||
|- | |||
| CAT-2022-271 || [[Accomplished_Introduction ]] || 8 || TTP | |||
|- | |||
| CAT-2022-270 || [[Operant_Conditioning ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-269 || [[Neoteny ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-268 || [[Need ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-267 || [[Need_&_Greed_Attack ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-266 || [[Fear ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-265 || [[Jolly_Roger_Bot ]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-264 || [[eWhoring ]] || 8 || TTP | |||
|- | |||
| CAT-2022-263 || [[Synthetic_Media_Social_Engineering ]] || 8 || TTP | |||
|- | |||
| CAT-2022-262 || [[Deepfake_Social_Engineering ]] || 8 || TTP | |||
|- | |||
| CAT-2022-261 || [[Virus_Hoax ]] || 8 || TTP | |||
|- | |||
| CAT-2022-260 || [[Virtual_Kidnapping ]] || 8 || TTP | |||
|- | |||
| CAT-2022-259 || [[Telemarketing_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-258 || [[Tech_Support_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-257 || [[Romance_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-256 || [[Hoax_Virus ]] || 8 || TTP | |||
|- | |||
| CAT-2022-255 || [[Gift-Card_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-254 || [[Crab_Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-253 || [[Cat_Fishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-252 || [[Business_Email_Compromise ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-251 || [[Advance_Fee_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-250 || [[War_Shipping ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-249 || [[Tailgating ]] || 8 || TTP | |||
|- | |||
| CAT-2022-248 || [[Snail_Mail_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-247 || [[Shoulder_Surfing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-246 || [[Dumpster_Diving ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-245 || [[Baiting-Drop ]] || 8 || TTP | |||
|- | |||
| CAT-2022-244 || [[Assistance_Ploy ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-243 || [[Robot_Social_Engineering ]] || 8 || TTP | |||
|- | |||
| CAT-2022-242 || [[Dolphin_Attack ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-241 || [[Acoustic_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-240 || [[Robo_Calling ]] || 8 || TTP | |||
|- | |||
| CAT-2022-239 || [[Spamigation ]] || 10 || TTP | |||
|- | |||
| CAT-2022-238 || [[Strategic_Lawsuit_Against_Public_Participation ]] || 10 || TTP | |||
|- | |||
| CAT-2022-237 || [[Patent_Trolling ]] || 10 || TTP | |||
|- | |||
| CAT-2022-236 || [[Legal_Loophole ]] || 10 || Vulnerability | |||
|- | |||
| CAT-2022-235 || [[Lawfare ]] || 10 || Exploit | |||
|- | |||
| CAT-2022-234 || [[Supply_Chain_Attack ]] || 9 || Exploit | |||
|- | |||
| CAT-2022-233 || [[Shadow_Security ]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-232 || [[Shadow_IT ]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-231 || [[Shadow_AP ]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-230 || [[Escalation_Attack ]] || 9 || TTP | |||
|- | |||
| CAT-2022-229 || [[Cybersquatting ]] || 9 || TTP | |||
|- | |||
| CAT-2022-228 || [[Spectrum_of_Allies ]] || 8 || TTP | |||
|- | |||
| CAT-2022-227 || [[Unity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-226 || [[Social_Proof ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-225 || [[Scarcity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-224 || [[Reversing_Authority ]] || 8 || TTP | |||
|- | |||
| CAT-2022-223 || [[Reciprocity-Need_for ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-222 || [[Pawn-Pivot ]] || 8 || TTP | |||
|- | |||
| CAT-2022-221 || [[Party_Crashing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-220 || [[Liking ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-219 || [[Door-in-the-Face_Technique ]] || 8 || TTP | |||
|- | |||
| CAT-2022-218 || [[Commitment-Consistency ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-217 || [[Bandwagon_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-216 || [[Authority-Deference_to ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-215 || [[Assistance-Need_to_Provide ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-214 || [[Network_Affect_Contagion ]] || 7, 8 || Vulnerability | |||
|- | |||
| CAT-2022-213 || [[Wall_Banging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-212 || [[Trolling ]] || 8 || TTP | |||
|- | |||
| CAT-2022-211 || [[Trevor's_Axiom ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-210 || [[Sympathy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-209 || [[Streisand_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-208 || [[Stereotyping ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-207 || [[Social_Desirability_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-206 || [[Outgroup_Homogeneity_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-205 || [[Network_Manipulated_Affect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-204 || [[Mass_Psychogenic_Illness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-203 || [[Ingroup_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-202 || [[Zombification ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-201 || [[Strobe_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-200 || [[Sonic_Area_Denial ]] || 8 || TTP | |||
|- | |||
| CAT-2022-199 || [[P300_Guilty_Knowledge_Test ]] || 8 || TTP | |||
|- | |||
| CAT-2022-198 || [[Interoceptive_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-197 || [[Tab-Napping ]] || 8 || TTP | |||
|- | |||
| CAT-2022-196 || [[Prevalence_Paradox ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-195 || [[Noise_Injection ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-194 || [[Human_Buffer_Overflow ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-193 || [[Gray_Signal_Attacks ]] || 8 || TTP | |||
|- | |||
| CAT-2022-192 || [[Focusing_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-191 || [[Distracted_Approach-Distraction ]] || 8 || TTP | |||
|- | |||
| CAT-2022-190 || [[Boredom ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-189 || [[Automaticity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-188 || [[Video_Puppetry ]] || 8 || TTP | |||
|- | |||
| CAT-2022-187 || [[Social_Jacking ]] || 8 || TTP | |||
|- | |||
| CAT-2022-186 || [[Perceptual_Deception ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-185 || [[Like_Jacking ]] || 8 || TTP | |||
|- | |||
| CAT-2022-184 || [[IDN_Homograph_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-183 || [[Clickjacking ]] || 8 || TTP | |||
|- | |||
| CAT-2022-182 || [[Traitor_Tracing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-181 || [[Ignorance ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-180 || [[File_Masquerading ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-179 || [[We_Know_All ]] || 8 || TTP | |||
|- | |||
| CAT-2022-178 || [[Silence ]] || 8 || TTP | |||
|- | |||
| CAT-2022-177 || [[Sensory_Matching ]] || 8 || TTP | |||
|- | |||
| CAT-2022-176 || [[Secret_Knowledge ]] || 8 || TTP | |||
|- | |||
| CAT-2022-175 || [[Rubber-Hose_Cryptanalysis ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-174 || [[Repetition ]] || 8 || TTP | |||
|- | |||
| CAT-2022-173 || [[Repeat-a-Word ]] || 8 || TTP | |||
|- | |||
| CAT-2022-172 || [[Rapid_Fire ]] || 8 || TTP | |||
|- | |||
| CAT-2022-171 || [[Quid_Pro_Quo ]] || 8 || TTP | |||
|- | |||
| CAT-2022-170 || [[Provocative_Statement ]] || 8 || TTP | |||
|- | |||
| CAT-2022-169 || [[Pride_and_Ego_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-168 || [[Oblique_Reference ]] || 8 || TTP | |||
|- | |||
| CAT-2022-167 || [[Neuro-Linguistic_Programming ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-166 || [[Naïve_Mentality ]] || 8 || TTP | |||
|- | |||
| CAT-2022-165 || [[Incentive_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-164 || [[Hour_Glass_Method ]] || 8 || TTP | |||
|- | |||
| CAT-2022-163 || [[Futility ]] || 8 || TTP | |||
|- | |||
| CAT-2022-162 || [[Flattery ]] || 8 || TTP | |||
|- | |||
| CAT-2022-161 || [[File_and_Dossier ]] || 8 || TTP | |||
|- | |||
| CAT-2022-160 || [[Fear-Up_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-159 || [[Fear-Down_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-158 || [[Ethical_Dilemma ]] || 8 || TTP | |||
|- | |||
| CAT-2022-157 || [[Establish_Your_Identity ]] || 8 || TTP | |||
|- | |||
| CAT-2022-156 || [[Emotional_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-155 || [[Elicitation_of_Information ]] || 8 || TTP | |||
|- | |||
| CAT-2022-154 || [[Disbelief ]] || 8 || TTP | |||
|- | |||
| CAT-2022-153 || [[Direct_Approach ]] || 8 || TTP | |||
|- | |||
| CAT-2022-152 || [[Deliberate_False_Statement ]] || 8 || TTP | |||
|- | |||
| CAT-2022-151 || [[Criticism ]] || 8 || TTP | |||
|- | |||
| CAT-2022-150 || [[Complaining-Tendency ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-149 || [[Change_of_Scene ]] || 8 || TTP | |||
|- | |||
| CAT-2022-148 || [[Whaling ]] || 8 || TTP | |||
|- | |||
| CAT-2022-147 || [[Tailored_Messaging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-146 || [[Sniper_Ad_Targeting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-145 || [[Pluridentity_Attack ]] || 7,8,9,10 || Exploit | |||
|- | |||
| CAT-2022-144 || [[Inference_Attack ]] || 7,8,9,10 || Exploit | |||
|- | |||
| CAT-2022-143 || [[Data_Vulnerability ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-142 || [[Vishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-141 || [[Spear_Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-140 || [[Sock-Puppetry ]] || 8 || TTP | |||
|- | |||
| CAT-2022-139 || [[SMSishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-138 || [[Shilling_Attack ]] || 9 || TTP | |||
|- | |||
| CAT-2022-137 || [[Shill ]] || 8 || TTP | |||
|- | |||
| CAT-2022-136 || [[Semantic_Attack ]] || 7, 8, 9 || Exploit | |||
|- | |||
| CAT-2022-135 || [[Scambaiting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-134 || [[Reverse_Social_Engineering ]] || 8 || TTP | |||
|- | |||
| CAT-2022-133 || [[Pretext-Pretexting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-132 || [[Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-131 || [[Impersonation_Scam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-130 || [[Honey_Trap ]] || 8 || TTP | |||
|- | |||
| CAT-2022-129 || [[Honey_Token ]] || 8 || TTP | |||
|- | |||
| CAT-2022-128 || [[Honey_Pot ]] || 8 || TTP | |||
|- | |||
| CAT-2022-127 || [[Honey_Phish ]] || 8 || TTP | |||
|- | |||
| CAT-2022-126 || [[Greenwashing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-125 || [[Gaslighting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-124 || [[Cognitive_Malware_Injection ]] || 8 || TTP | |||
|- | |||
| CAT-2022-123 || [[Clone_Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-122 || [[Astro-Turfing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-121 || [[Transmission_Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-120 || [[Mis-Addressed_Email ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-119 || [[Loss_Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-118 || [[Leakage_Errors ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-117 || [[Disposal_Errors ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-116 || [[Configuration_Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-115 || [[Curiosity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-114 || [[Zeigarnik_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-113 || [[Whorfianism ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-112 || [[von_Restorff_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-111 || [[Unfinished-Magnetizer ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-110 || [[Suggestion ]] || 8 || TTP | |||
|- | |||
| CAT-2022-109 || [[Subjective_Validation ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-108 || [[Straw_Man-Argument ]] || 8 || TTP | |||
|- | |||
| CAT-2022-107 || [[Status_Quo_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-106 || [[Spotlight_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-105 || [[Spacing_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-104 || [[Source_Monitoring_Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-103 || [[Serial_Position_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-102 || [[Self-Serving_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-101 || [[Self-Relevance_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-100 || [[Search_Engine_Manipulation_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-099 || [[Satisficing ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-098 || [[Risk_Homeostasis ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-097 || [[Relativism ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-096 || [[Probability_Blindness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-095 || [[Pre-Suasion ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-094 || [[Planning_Fallacy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-093 || [[Peak-End_Rule ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-092 || [[Overconfidence ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-091 || [[Optimism_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-090 || [[Omission_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-089 || [[Next-In-Line-Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-088 || [[Neglect_of_Probability ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-087 || [[Negativity_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-086 || [[Narrative_Influence ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-085 || [[Mystery_Magnetizer ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-084 || [[Mother_Teresa_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-083 || [[Mood-Congruent_Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-082 || [[Mental_Set ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-081 || [[Malware-Induced_Misperception_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-080 || [[Self-Relevance-Magnetizer ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-079 || [[Loss_Aversion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-078 || [[Levels-of-Processing_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-077 || [[Leveling_and_Sharpening ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-076 || [[Involuntary_Musical_Imagery ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-075 || [[Involuntary_Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-074 || [[Inoculation_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-073 || [[Illusory_Correlation ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-072 || [[Illusion_of_Control ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-071 || [[IKEA_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-070 || [[Hyperbolic_Discounting ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-069 || [[Hindsight_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-068 || [[Halo_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-067 || [[Gambler's_Fallacy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-066 || [[Fundamental_Attribution_Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-065 || [[Functional_Fixedness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-064 || [[Frequency_Illusion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-063 || [[Framing_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-062 || [[Foot-In-the-Door_Technique ]] || 8 || TTP | |||
|- | |||
| CAT-2022-061 || [[Fear_of_Missing_Out ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-060 || [[False_Uniqueness_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-059 || [[False_Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-058 || [[False_Consensus_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-057 || [[Endowment_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-056 || [[Egocentric_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-055 || [[Ear_Worm ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-054 || [[Dunning–Kruger_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-053 || [[Dread_Aversion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-052 || [[Default_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-051 || [[Decoy_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-050 || [[Decision_Fatigue ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-049 || [[Context_Dependent_Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-048 || [[Confirmation_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-047 || [[Cognitive_Malware ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-046 || [[Cognitive_Dissonance ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-045 || [[Cognitive_Deception ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-044 || [[Clustering_Illusion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-043 || [[Classical_Conditioning ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-042 || [[Ben_Franklin_Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-041 || [[Belief_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-040 || [[Base_Rate_Neglect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-039 || [[Barnum_Statement ]] || 8 || TTP | |||
|- | |||
| CAT-2022-038 || [[Availability_Heuristic ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-037 || [[Anchoring ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-036 || [[Ambiguous_Self_Induced_Disinformation_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-035 || [[Ambient_Tactical_Deception_Attacks ]] || 8 || TTP | |||
|- | |||
| CAT-2022-034 || [[Actor-Observer_Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-033 || [[Wikijacking ]] || 8 || TTP | |||
|- | |||
| CAT-2022-032 || [[Wi-Fi_Evil_Twin ]] || 8 || TTP | |||
|- | |||
| CAT-2022-031 || [[Water_Hole_Attack ]] || 8 || TTP | |||
|- | |||
| CAT-2022-030 || [[Typosquatting ]] || 8 || TTP | |||
|- | |||
| CAT-2022-029 || [[Social_Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-028 || [[Lateral_Phishing ]] || 8 || TTP | |||
|- | |||
| CAT-2022-027 || [[Fluency_Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-026 || [[Familiarity ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-025 || [[Brandjacking ]] || 8 || TTP | |||
|- | |||
| CAT-2022-024 || [[DELETED DUE TO REDUNDANCY ]] || || | |||
|- | |||
| CAT-2022-023 || [[Trick_Questions ]] || 8 || TTP | |||
|- | |||
| CAT-2022-022 || [[Spam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-021 || [[Sneak_into_Basket ]] || 8 || TTP | |||
|- | |||
| CAT-2022-020 || [[Scareware ]] || 8 || TTP | |||
|- | |||
| CAT-2022-019 || [[Roach_Motel ]] || 8 || TTP | |||
|- | |||
| CAT-2022-018 || [[Privacy_Zuckering ]] || 8 || TTP | |||
|- | |||
| CAT-2022-017 || [[Price_Comparison_Prevention ]] || 8 || TTP | |||
|- | |||
| CAT-2022-016 || [[Persuasive_Technology ]] || 8 || TTP | |||
|- | |||
| CAT-2022-015 || [[Mouse-Trapping ]] || 8 || TTP | |||
|- | |||
| CAT-2022-014 || [[Misdirection-Distraction ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-013 || [[Malvertisement ]] || 8 || TTP | |||
|- | |||
| CAT-2022-012 || [[Hidden_Costs ]] || 8 || TTP | |||
|- | |||
| CAT-2022-011 || [[Friend_Spam ]] || 8 || TTP | |||
|- | |||
| CAT-2022-010 || [[Forced_Continuity ]] || 8 || TTP | |||
|- | |||
| CAT-2022-009 || [[Disguised_Ads ]] || 8 || TTP | |||
|- | |||
| CAT-2022-008 || [[Dark_Design_Patterns ]] || 8 || TTP | |||
|- | |||
| CAT-2022-007 || [[Confirm_Shaming ]] || 8 || TTP | |||
|- | |||
| CAT-2022-006 || [[Click-Bait ]] || 8 || TTP | |||
|- | |||
| CAT-2022-005 || [[Bait_and_Switch ]] || 8 || TTP | |||
|- | |||
| CAT-2022-004 || [[Addictive_Technology ]] || 8 || TTP | |||
|- | |||
| CAT-2022-003 || [[Nudging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-002 || [[Forcing_Function ]] || 8 || TTP | |||
|- | |||
| CAT-2022-001 || [[Fogg_Model_of_Behavior ]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2021-010 || [[Excitement-Appeal_to ]] || 8 || Exploit | |||
|- | |||
| CAT-2021-009 || [[Low_Agreeableness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-008 || [[Low_Extraversion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-007 || [[Low_Conscientiousness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-012 || [[Reciprocation ]] || 8 || Exploit | |||
|- | |||
| CAT-2021-011 || [[Authority ]] || 8 || Exploit | |||
|- | |||
| CAT-2021-006 || [[Low_Openness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-005 || [[High_Neuroticism ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-004 || [[High_Agreeableness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-003 || [[High_Extraversion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-002 || [[High_Conscientiousness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-001 || [[High_Openness]] || 8 || Vulnerability | |||
|- | |||
|} | |||
== Using Media Wiki == | == Using Media Wiki == |
Latest revision as of 17:59, 19 November 2024
The Cognitive Attack Taxonomy (CAT)
Visit the Cognitive Security Institute to learn more about cognitive security and related topics!
Learn how to interpret the Cognitive Attack Taxonomy here.
CAT ID | CAT Name | Layer | Category |
---|---|---|---|
CAT-2024-010 | QRishing | 8 | TTP |
CAT-2024-007 | Need to Correct | 8 | Vulnerability |
CAT-2024-006 | Regulatory Capture | 10 | Exploit |
CAT-2024-005 | Perjury_Trap | 8, 10 | TTP |
CAT-2024-004 | Stroop_Test | 8 | TTP |
CAT-2024-003 | False_Feedback_Injection | 7 | TTP |
CAT-2024-002 | Sleeper_Agent_Attack | 7 | TTP |
CAT-2024-001 | Evil_Eve_Attack | 7 | TTP |
CAT-2024-008 | Positive_Test_Strategy | 8 | Vulnerability |
CAT-2024-010 | Hyperstition | 8 | Vulnerability |
CAT-2024-009 | Psychological_Chuting | 8 | Exploit |
CAT-2023-018 | Repeated_Exposure | 8 | Exploit |
CAT-2023-017 | Model_Extraction_Attacks | 7 | TTP |
CAT-2023-016 | Model_Theft | 7 | TTP |
CAT-2023-015 | Data_Reconstruction | 7 | Exploit |
CAT-2023-014 | Model_Inversion_Attack | 7 | Exploit |
CAT-2023-013 | Membership_Inference_Attack | 7 | Exploit |
CAT-2023-012 | Adversarial_Examples | 7 | Exploit |
CAT-2023-011 | Evasion_Attacks | 7 | TTP |
CAT-2023-010 | Input_Manipulation_Attack | 7 | TTP |
CAT-2023-009 | Backdoor_Attacks | 7 | TTP |
CAT-2023-008 | Trigger_Based_Attack | 7 | TTP |
CAT-2023-007 | Training_Data_Poisoning_Attack | 7 | TTP |
CAT-2023-006 | Campbell’s_Law | 9 | Vulnerability |
CAT-2023-005 | Training_Data_Poisoning | 7 | Exploit |
CAT-2023-004 | Suffix_Injection | 7 | TTP |
CAT-2023-003 | Sensitive_Information_Disclosure | 8 | Vulnerability |
CAT-2023-002 | Prompt_Injection | 7 | TTP |
CAT-2023-001 | Overreliance_on_Automation | 8 | Vulnerability |
CAT-2022-321 | Impulsivity | 8 | Vulnerability |
CAT-2022-320 | Excessive_Agency | 8 | Vulnerability |
CAT-2022-319 | Emoji_Injection | 7, 8 | TTP |
CAT-2022-318 | Culture_Jamming | 8 | TTP |
CAT-2022-317 | Chain-Of-Thought_Manipulation | 7 | TTP |
CAT-2022-316 | Network_Ambiance_Attack | 8 | TTP |
CAT-2022-315 | Maskarovka | 8 | TTP |
CAT-2022-314 | Reflexive_Control | 8 | TTP |
CAT-2022-313 | Zone_Flooding | 8 | TTP |
CAT-2022-312 | Incrementalism | 8, 9 | Exploit |
CAT-2022-311 | Compliance-Ladder | 8 | TTP |
CAT-2022-310 | Yes-Ladder | 8 | TTP |
CAT-2022-309 | Wing | 8 | TTP |
CAT-2022-308 | Whorfian_Attack | 8 | Exploit |
CAT-2022-307 | Venue_Change | 8 | TTP |
CAT-2022-306 | Trance-Words | 8 | TTP |
CAT-2022-305 | Tainted_Leak | 8 | TTP |
CAT-2022-304 | Social_Engineering_Toolkit | 8 | TTP |
CAT-2022-303 | Slander_Attack | 8 | TTP |
CAT-2022-302 | Sandbagging | 8 | TTP |
CAT-2022-301 | Reframing | 8 | TTP |
CAT-2022-300 | Prop | 8 | TTP |
CAT-2022-299 | Preloading | 8 | TTP |
CAT-2022-298 | Pendant_Anchoring | 8 | TTP |
CAT-2022-297 | Open-Ended_Question | 8 | TTP |
CAT-2022-296 | Negging | 8 | TTP |
CAT-2022-295 | Multi-Channel_Attack | 8 | TTP |
CAT-2022-294 | Mirroring | 8 | TTP |
CAT-2022-293 | Micro_Expression | 8 | Vulnerability |
CAT-2022-292 | Maltego | 8 | Tool / TTP |
CAT-2022-291 | Leading_Question | 8 | TTP |
CAT-2022-290 | Journobaiting | 8 | TTP |
CAT-2022-289 | Ice_Breaker | 8 | TTP |
CAT-2022-288 | Hot_Reading | 8 | TTP |
CAT-2022-287 | Honey_Channels | 8 | TTP |
CAT-2022-286 | Functional_Opener | 8 | TTP |
CAT-2022-285 | Forcing | 8 | Exploit |
CAT-2022-284 | Firehose_of_Falsehood | 8 | TTP |
CAT-2022-283 | False_Time_Constraint | 8 | TTP |
CAT-2022-282 | False_Flag | 8 | TTP |
CAT-2022-281 | Eject_with_Explanation | 8 | TTP |
CAT-2022-280 | Double_Switch | 8 | TTP |
CAT-2022-279 | Deception-in-Depth | 8, 9 | TTP |
CAT-2022-278 | Conversational_Threading | 8 | TTP |
CAT-2022-277 | Cold_Reading | 8 | TTP |
CAT-2022-276 | Buscador | 8 | Tool / TTP |
CAT-2022-275 | Brushing | 8, 9 | TTP |
CAT-2022-274 | Baiting-Trolling | 8 | TTP |
CAT-2022-273 | Anchor-NLP_Technique | 8 | TTP |
CAT-2022-272 | Active_Indicator_Probe | 8 | TTP |
CAT-2022-271 | Accomplished_Introduction | 8 | TTP |
CAT-2022-270 | Operant_Conditioning | 8 | Exploit |
CAT-2022-269 | Neoteny | 8 | Vulnerability |
CAT-2022-268 | Need | 8 | Vulnerability |
CAT-2022-267 | Need_&_Greed_Attack | 8 | Exploit |
CAT-2022-266 | Fear | 8 | Vulnerability |
CAT-2022-265 | Jolly_Roger_Bot | 8 | Tool / TTP |
CAT-2022-264 | eWhoring | 8 | TTP |
CAT-2022-263 | Synthetic_Media_Social_Engineering | 8 | TTP |
CAT-2022-262 | Deepfake_Social_Engineering | 8 | TTP |
CAT-2022-261 | Virus_Hoax | 8 | TTP |
CAT-2022-260 | Virtual_Kidnapping | 8 | TTP |
CAT-2022-259 | Telemarketing_Scam | 8 | TTP |
CAT-2022-258 | Tech_Support_Scam | 8 | TTP |
CAT-2022-257 | Romance_Scam | 8 | TTP |
CAT-2022-256 | Hoax_Virus | 8 | TTP |
CAT-2022-255 | Gift-Card_Scam | 8 | TTP |
CAT-2022-254 | Crab_Phishing | 8 | TTP |
CAT-2022-253 | Cat_Fishing | 8 | TTP |
CAT-2022-252 | Business_Email_Compromise | 8, 9 | TTP |
CAT-2022-251 | Advance_Fee_Scam | 8 | TTP |
CAT-2022-250 | War_Shipping | 8, 9 | TTP |
CAT-2022-249 | Tailgating | 8 | TTP |
CAT-2022-248 | Snail_Mail_Attack | 8 | TTP |
CAT-2022-247 | Shoulder_Surfing | 8 | TTP |
CAT-2022-246 | Dumpster_Diving | 8, 9 | TTP |
CAT-2022-245 | Baiting-Drop | 8 | TTP |
CAT-2022-244 | Assistance_Ploy | 8 | Exploit |
CAT-2022-243 | Robot_Social_Engineering | 8 | TTP |
CAT-2022-242 | Dolphin_Attack | 8 | Exploit |
CAT-2022-241 | Acoustic_Attack | 8 | TTP |
CAT-2022-240 | Robo_Calling | 8 | TTP |
CAT-2022-239 | Spamigation | 10 | TTP |
CAT-2022-238 | Strategic_Lawsuit_Against_Public_Participation | 10 | TTP |
CAT-2022-237 | Patent_Trolling | 10 | TTP |
CAT-2022-236 | Legal_Loophole | 10 | Vulnerability |
CAT-2022-235 | Lawfare | 10 | Exploit |
CAT-2022-234 | Supply_Chain_Attack | 9 | Exploit |
CAT-2022-233 | Shadow_Security | 9 | Vulnerability |
CAT-2022-232 | Shadow_IT | 9 | Vulnerability |
CAT-2022-231 | Shadow_AP | 9 | Vulnerability |
CAT-2022-230 | Escalation_Attack | 9 | TTP |
CAT-2022-229 | Cybersquatting | 9 | TTP |
CAT-2022-228 | Spectrum_of_Allies | 8 | TTP |
CAT-2022-227 | Unity | 8 | Vulnerability |
CAT-2022-226 | Social_Proof | 8 | Vulnerability |
CAT-2022-225 | Scarcity | 8 | Vulnerability |
CAT-2022-224 | Reversing_Authority | 8 | TTP |
CAT-2022-223 | Reciprocity-Need_for | 8 | Vulnerability |
CAT-2022-222 | Pawn-Pivot | 8 | TTP |
CAT-2022-221 | Party_Crashing | 8 | TTP |
CAT-2022-220 | Liking | 8 | Vulnerability |
CAT-2022-219 | Door-in-the-Face_Technique | 8 | TTP |
CAT-2022-218 | Commitment-Consistency | 8 | Vulnerability |
CAT-2022-217 | Bandwagon_Effect | 8 | Exploit |
CAT-2022-216 | Authority-Deference_to | 8 | Vulnerability |
CAT-2022-215 | Assistance-Need_to_Provide | 8 | Vulnerability |
CAT-2022-214 | Network_Affect_Contagion | 7, 8 | Vulnerability |
CAT-2022-213 | Wall_Banging | 8 | TTP |
CAT-2022-212 | Trolling | 8 | TTP |
CAT-2022-211 | Trevor's_Axiom | 8 | Exploit |
CAT-2022-210 | Sympathy | 8 | Vulnerability |
CAT-2022-209 | Streisand_Effect | 8 | Vulnerability |
CAT-2022-208 | Stereotyping | 8 | Vulnerability |
CAT-2022-207 | Social_Desirability_Bias | 8 | Vulnerability |
CAT-2022-206 | Outgroup_Homogeneity_Bias | 8 | Vulnerability |
CAT-2022-205 | Network_Manipulated_Affect | 8 | Vulnerability |
CAT-2022-204 | Mass_Psychogenic_Illness | 8 | Vulnerability |
CAT-2022-203 | Ingroup_Bias | 8 | Vulnerability |
CAT-2022-202 | Zombification | 8 | Exploit |
CAT-2022-201 | Strobe_Attack | 8 | TTP |
CAT-2022-200 | Sonic_Area_Denial | 8 | TTP |
CAT-2022-199 | P300_Guilty_Knowledge_Test | 8 | TTP |
CAT-2022-198 | Interoceptive_Bias | 8 | Vulnerability |
CAT-2022-197 | Tab-Napping | 8 | TTP |
CAT-2022-196 | Prevalence_Paradox | 8 | Vulnerability |
CAT-2022-195 | Noise_Injection | 8, 9 | TTP |
CAT-2022-194 | Human_Buffer_Overflow | 8 | Exploit |
CAT-2022-193 | Gray_Signal_Attacks | 8 | TTP |
CAT-2022-192 | Focusing_Effect | 8 | Vulnerability |
CAT-2022-191 | Distracted_Approach-Distraction | 8 | TTP |
CAT-2022-190 | Boredom | 8 | Vulnerability |
CAT-2022-189 | Automaticity | 8 | Vulnerability |
CAT-2022-188 | Video_Puppetry | 8 | TTP |
CAT-2022-187 | Social_Jacking | 8 | TTP |
CAT-2022-186 | Perceptual_Deception | 8 | Vulnerability |
CAT-2022-185 | Like_Jacking | 8 | TTP |
CAT-2022-184 | IDN_Homograph_Attack | 8 | TTP |
CAT-2022-183 | Clickjacking | 8 | TTP |
CAT-2022-182 | Traitor_Tracing | 8 | TTP |
CAT-2022-181 | Ignorance | 8 | Vulnerability |
CAT-2022-180 | File_Masquerading | 8, 9 | TTP |
CAT-2022-179 | We_Know_All | 8 | TTP |
CAT-2022-178 | Silence | 8 | TTP |
CAT-2022-177 | Sensory_Matching | 8 | TTP |
CAT-2022-176 | Secret_Knowledge | 8 | TTP |
CAT-2022-175 | Rubber-Hose_Cryptanalysis | 8 | Exploit |
CAT-2022-174 | Repetition | 8 | TTP |
CAT-2022-173 | Repeat-a-Word | 8 | TTP |
CAT-2022-172 | Rapid_Fire | 8 | TTP |
CAT-2022-171 | Quid_Pro_Quo | 8 | TTP |
CAT-2022-170 | Provocative_Statement | 8 | TTP |
CAT-2022-169 | Pride_and_Ego_Approach | 8 | TTP |
CAT-2022-168 | Oblique_Reference | 8 | TTP |
CAT-2022-167 | Neuro-Linguistic_Programming | 8 | Exploit |
CAT-2022-166 | Naïve_Mentality | 8 | TTP |
CAT-2022-165 | Incentive_Approach | 8 | TTP |
CAT-2022-164 | Hour_Glass_Method | 8 | TTP |
CAT-2022-163 | Futility | 8 | TTP |
CAT-2022-162 | Flattery | 8 | TTP |
CAT-2022-161 | File_and_Dossier | 8 | TTP |
CAT-2022-160 | Fear-Up_Approach | 8 | TTP |
CAT-2022-159 | Fear-Down_Approach | 8 | TTP |
CAT-2022-158 | Ethical_Dilemma | 8 | TTP |
CAT-2022-157 | Establish_Your_Identity | 8 | TTP |
CAT-2022-156 | Emotional_Approach | 8 | TTP |
CAT-2022-155 | Elicitation_of_Information | 8 | TTP |
CAT-2022-154 | Disbelief | 8 | TTP |
CAT-2022-153 | Direct_Approach | 8 | TTP |
CAT-2022-152 | Deliberate_False_Statement | 8 | TTP |
CAT-2022-151 | Criticism | 8 | TTP |
CAT-2022-150 | Complaining-Tendency | 8 | Vulnerability |
CAT-2022-149 | Change_of_Scene | 8 | TTP |
CAT-2022-148 | Whaling | 8 | TTP |
CAT-2022-147 | Tailored_Messaging | 8 | TTP |
CAT-2022-146 | Sniper_Ad_Targeting | 8 | TTP |
CAT-2022-145 | Pluridentity_Attack | 7,8,9,10 | Exploit |
CAT-2022-144 | Inference_Attack | 7,8,9,10 | Exploit |
CAT-2022-143 | Data_Vulnerability | 8 | Vulnerability |
CAT-2022-142 | Vishing | 8 | TTP |
CAT-2022-141 | Spear_Phishing | 8 | TTP |
CAT-2022-140 | Sock-Puppetry | 8 | TTP |
CAT-2022-139 | SMSishing | 8 | TTP |
CAT-2022-138 | Shilling_Attack | 9 | TTP |
CAT-2022-137 | Shill | 8 | TTP |
CAT-2022-136 | Semantic_Attack | 7, 8, 9 | Exploit |
CAT-2022-135 | Scambaiting | 8 | TTP |
CAT-2022-134 | Reverse_Social_Engineering | 8 | TTP |
CAT-2022-133 | Pretext-Pretexting | 8 | TTP |
CAT-2022-132 | Phishing | 8 | TTP |
CAT-2022-131 | Impersonation_Scam | 8 | TTP |
CAT-2022-130 | Honey_Trap | 8 | TTP |
CAT-2022-129 | Honey_Token | 8 | TTP |
CAT-2022-128 | Honey_Pot | 8 | TTP |
CAT-2022-127 | Honey_Phish | 8 | TTP |
CAT-2022-126 | Greenwashing | 8 | TTP |
CAT-2022-125 | Gaslighting | 8 | TTP |
CAT-2022-124 | Cognitive_Malware_Injection | 8 | TTP |
CAT-2022-123 | Clone_Phishing | 8 | TTP |
CAT-2022-122 | Astro-Turfing | 8 | TTP |
CAT-2022-121 | Transmission_Error | 8 | Vulnerability |
CAT-2022-120 | Mis-Addressed_Email | 8 | Vulnerability |
CAT-2022-119 | Loss_Error | 8 | Vulnerability |
CAT-2022-118 | Leakage_Errors | 8 | Vulnerability |
CAT-2022-117 | Disposal_Errors | 8 | Vulnerability |
CAT-2022-116 | Configuration_Error | 8 | Vulnerability |
CAT-2022-115 | Curiosity | 8 | Vulnerability |
CAT-2022-114 | Zeigarnik_Effect | 8 | Vulnerability |
CAT-2022-113 | Whorfianism | 8 | Vulnerability |
CAT-2022-112 | von_Restorff_Effect | 8 | Vulnerability |
CAT-2022-111 | Unfinished-Magnetizer | 8 | Exploit |
CAT-2022-110 | Suggestion | 8 | TTP |
CAT-2022-109 | Subjective_Validation | 8 | Vulnerability |
CAT-2022-108 | Straw_Man-Argument | 8 | TTP |
CAT-2022-107 | Status_Quo_Bias | 8 | Vulnerability |
CAT-2022-106 | Spotlight_Effect | 8 | Vulnerability |
CAT-2022-105 | Spacing_Effect | 8 | Exploit |
CAT-2022-104 | Source_Monitoring_Error | 8 | Vulnerability |
CAT-2022-103 | Serial_Position_Effect | 8 | Vulnerability |
CAT-2022-102 | Self-Serving_Bias | 8 | Vulnerability |
CAT-2022-101 | Self-Relevance_Effect | 8 | Vulnerability |
CAT-2022-100 | Search_Engine_Manipulation_Effect | 8 | Exploit |
CAT-2022-099 | Satisficing | 8 | Vulnerability |
CAT-2022-098 | Risk_Homeostasis | 8 | Vulnerability |
CAT-2022-097 | Relativism | 8 | Vulnerability |
CAT-2022-096 | Probability_Blindness | 8 | Vulnerability |
CAT-2022-095 | Pre-Suasion | 8 | Exploit |
CAT-2022-094 | Planning_Fallacy | 8 | Vulnerability |
CAT-2022-093 | Peak-End_Rule | 8 | Vulnerability |
CAT-2022-092 | Overconfidence | 8 | Vulnerability |
CAT-2022-091 | Optimism_Bias | 8 | Vulnerability |
CAT-2022-090 | Omission_Bias | 8 | Vulnerability |
CAT-2022-089 | Next-In-Line-Effect | 8 | Vulnerability |
CAT-2022-088 | Neglect_of_Probability | 8 | Vulnerability |
CAT-2022-087 | Negativity_Bias | 8 | Vulnerability |
CAT-2022-086 | Narrative_Influence | 8 | Exploit |
CAT-2022-085 | Mystery_Magnetizer | 8 | Exploit |
CAT-2022-084 | Mother_Teresa_Effect | 8 | Vulnerability |
CAT-2022-083 | Mood-Congruent_Memory | 8 | Vulnerability |
CAT-2022-082 | Mental_Set | 8 | Vulnerability |
CAT-2022-081 | Malware-Induced_Misperception_Attack | 8 | TTP |
CAT-2022-080 | Self-Relevance-Magnetizer | 8 | Exploit |
CAT-2022-079 | Loss_Aversion | 8 | Vulnerability |
CAT-2022-078 | Levels-of-Processing_Effect | 8 | Vulnerability |
CAT-2022-077 | Leveling_and_Sharpening | 8 | Vulnerability |
CAT-2022-076 | Involuntary_Musical_Imagery | 8 | Exploit |
CAT-2022-075 | Involuntary_Memory | 8 | Vulnerability |
CAT-2022-074 | Inoculation_Effect | 8 | Exploit |
CAT-2022-073 | Illusory_Correlation | 8 | Vulnerability |
CAT-2022-072 | Illusion_of_Control | 8 | Vulnerability |
CAT-2022-071 | IKEA_Effect | 8 | Vulnerability |
CAT-2022-070 | Hyperbolic_Discounting | 8 | Vulnerability |
CAT-2022-069 | Hindsight_Bias | 8 | Vulnerability |
CAT-2022-068 | Halo_Effect | 8 | Vulnerability |
CAT-2022-067 | Gambler's_Fallacy | 8 | Vulnerability |
CAT-2022-066 | Fundamental_Attribution_Error | 8 | Vulnerability |
CAT-2022-065 | Functional_Fixedness | 8 | Vulnerability |
CAT-2022-064 | Frequency_Illusion | 8 | Vulnerability |
CAT-2022-063 | Framing_Effect | 8 | Vulnerability |
CAT-2022-062 | Foot-In-the-Door_Technique | 8 | TTP |
CAT-2022-061 | Fear_of_Missing_Out | 8 | Exploit |
CAT-2022-060 | False_Uniqueness_Bias | 8 | Vulnerability |
CAT-2022-059 | False_Memory | 8 | Vulnerability |
CAT-2022-058 | False_Consensus_Effect | 8 | Vulnerability |
CAT-2022-057 | Endowment_Effect | 8 | Vulnerability |
CAT-2022-056 | Egocentric_Bias | 8 | Vulnerability |
CAT-2022-055 | Ear_Worm | 8 | Exploit |
CAT-2022-054 | Dunning–Kruger_Effect | 8 | Vulnerability |
CAT-2022-053 | Dread_Aversion | 8 | Vulnerability |
CAT-2022-052 | Default_Bias | 8 | Vulnerability |
CAT-2022-051 | Decoy_Effect | 8 | Exploit |
CAT-2022-050 | Decision_Fatigue | 8 | Vulnerability |
CAT-2022-049 | Context_Dependent_Memory | 8 | Vulnerability |
CAT-2022-048 | Confirmation_Bias | 8 | Vulnerability |
CAT-2022-047 | Cognitive_Malware | 8 | Exploit |
CAT-2022-046 | Cognitive_Dissonance | 8 | Vulnerability |
CAT-2022-045 | Cognitive_Deception | 8 | Exploit |
CAT-2022-044 | Clustering_Illusion | 8 | Vulnerability |
CAT-2022-043 | Classical_Conditioning | 8 | Exploit |
CAT-2022-042 | Ben_Franklin_Effect | 8 | Exploit |
CAT-2022-041 | Belief_Bias | 8 | Vulnerability |
CAT-2022-040 | Base_Rate_Neglect | 8 | Vulnerability |
CAT-2022-039 | Barnum_Statement | 8 | TTP |
CAT-2022-038 | Availability_Heuristic | 8 | Vulnerability |
CAT-2022-037 | Anchoring | 8 | Vulnerability |
CAT-2022-036 | Ambiguous_Self_Induced_Disinformation_Attack | 8 | TTP |
CAT-2022-035 | Ambient_Tactical_Deception_Attacks | 8 | TTP |
CAT-2022-034 | Actor-Observer_Bias | 8 | Vulnerability |
CAT-2022-033 | Wikijacking | 8 | TTP |
CAT-2022-032 | Wi-Fi_Evil_Twin | 8 | TTP |
CAT-2022-031 | Water_Hole_Attack | 8 | TTP |
CAT-2022-030 | Typosquatting | 8 | TTP |
CAT-2022-029 | Social_Phishing | 8 | TTP |
CAT-2022-028 | Lateral_Phishing | 8 | TTP |
CAT-2022-027 | Fluency_Effect | 8 | Vulnerability |
CAT-2022-026 | Familiarity | 8 | Vulnerability |
CAT-2022-025 | Brandjacking | 8 | TTP |
CAT-2022-024 | DELETED DUE TO REDUNDANCY | ||
CAT-2022-023 | Trick_Questions | 8 | TTP |
CAT-2022-022 | Spam | 8 | TTP |
CAT-2022-021 | Sneak_into_Basket | 8 | TTP |
CAT-2022-020 | Scareware | 8 | TTP |
CAT-2022-019 | Roach_Motel | 8 | TTP |
CAT-2022-018 | Privacy_Zuckering | 8 | TTP |
CAT-2022-017 | Price_Comparison_Prevention | 8 | TTP |
CAT-2022-016 | Persuasive_Technology | 8 | TTP |
CAT-2022-015 | Mouse-Trapping | 8 | TTP |
CAT-2022-014 | Misdirection-Distraction | 8 | Exploit |
CAT-2022-013 | Malvertisement | 8 | TTP |
CAT-2022-012 | Hidden_Costs | 8 | TTP |
CAT-2022-011 | Friend_Spam | 8 | TTP |
CAT-2022-010 | Forced_Continuity | 8 | TTP |
CAT-2022-009 | Disguised_Ads | 8 | TTP |
CAT-2022-008 | Dark_Design_Patterns | 8 | TTP |
CAT-2022-007 | Confirm_Shaming | 8 | TTP |
CAT-2022-006 | Click-Bait | 8 | TTP |
CAT-2022-005 | Bait_and_Switch | 8 | TTP |
CAT-2022-004 | Addictive_Technology | 8 | TTP |
CAT-2022-003 | Nudging | 8 | TTP |
CAT-2022-002 | Forcing_Function | 8 | TTP |
CAT-2022-001 | Fogg_Model_of_Behavior | 8 | Tool / TTP |
CAT-2021-010 | Excitement-Appeal_to | 8 | Exploit |
CAT-2021-009 | Low_Agreeableness | 8 | Vulnerability |
CAT-2021-008 | Low_Extraversion | 8 | Vulnerability |
CAT-2021-007 | Low_Conscientiousness | 8 | Vulnerability |
CAT-2021-012 | Reciprocation | 8 | Exploit |
CAT-2021-011 | Authority | 8 | Exploit |
CAT-2021-006 | Low_Openness | 8 | Vulnerability |
CAT-2021-005 | High_Neuroticism | 8 | Vulnerability |
CAT-2021-004 | High_Agreeableness | 8 | Vulnerability |
CAT-2021-003 | High_Extraversion | 8 | Vulnerability |
CAT-2021-002 | High_Conscientiousness | 8 | Vulnerability |
CAT-2021-001 | High_Openness | 8 | Vulnerability |
Using Media Wiki
Consult the User's Guide for information on using the wiki software.