Main Page: Difference between revisions
| (One intermediate revision by the same user not shown) | |||
| Line 740: | Line 740: | ||
|- | |- | ||
|} | |} | ||
===== Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0) ===== | |||
<br> | |||
The Cognitive Attack Taxonomy (CAT) is made available under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).<br> | |||
<br> | |||
This means that you are free to share the Cognitive Attack Taxonomy — copy and redistribute the material in any medium or format — provided that the following conditions are met:<br> | |||
<br> | |||
Attribution – You must give appropriate credit to the Cognitive Attack Taxonomy and the Cognitive Security Institute, provide a link to the license, and indicate if changes were made. | |||
<br><br> | |||
NonCommercial – You may not use the material for commercial purposes. | |||
<br><br> | |||
NoDerivatives – If you remix, transform, or build upon the material, you may not distribute the modified material. | |||
<br><br> | |||
The full legal terms of this license can be found here: | |||
https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en | |||
<br><br> | |||
By using or sharing the Cognitive Attack Taxonomy, you agree to comply with the terms of this license.<br><br> | |||
If you are interested in commercial use, derivative works, partnerships, or expanded licensing, please contact the Cognitive Security Institute to discuss collaboration opportunities. | |||
<br><br><br> | |||
== Using Media Wiki == | == Using Media Wiki == | ||
Latest revision as of 19:01, 12 March 2026
The Cognitive Attack Taxonomy (CAT)
Visit the Cognitive Security Institute to learn more about cognitive security and related topics!
The Cognitive Attack Taxonomy (CAT) is an evolving project designed to provide a common language and framework for conceiving and communicating about cognitive attack concepts, vulnerabilities, exploits, and TTPs. This is page represents a work in progress.
Learn how to interpret the Cognitive Attack Taxonomy here.
| CAT ID | CAT Name | Layer | Category |
|---|---|---|---|
| CAT-2025-002 | Habituation | 8 | Exploit |
| CAT-2025-001 | Vigilance | 8 | Vulnerability |
| CAT-2024-011 | QRishing | 8 | TTP |
| CAT-2024-007 | Need to Correct | 8 | Vulnerability |
| CAT-2024-006 | Regulatory Capture | 10 | Exploit |
| CAT-2024-005 | Perjury_Trap | 8, 10 | TTP |
| CAT-2024-004 | Stroop_Test | 8 | TTP |
| CAT-2024-003 | False_Feedback_Injection | 7 | TTP |
| CAT-2024-002 | Sleeper_Agent_Attack | 7 | TTP |
| CAT-2024-001 | Evil_Eve_Attack | 7 | TTP |
| CAT-2024-008 | Positive_Test_Strategy | 8 | Vulnerability |
| CAT-2024-010 | Hyperstition | 8 | Vulnerability |
| CAT-2024-009 | Psychological_Chuting | 8 | Exploit |
| CAT-2023-018 | Repeated_Exposure | 8 | Exploit |
| CAT-2023-017 | Model_Extraction_Attacks | 7 | TTP |
| CAT-2023-016 | Model_Theft | 7 | TTP |
| CAT-2023-015 | Data_Reconstruction | 7 | Exploit |
| CAT-2023-014 | Model_Inversion_Attack | 7 | Exploit |
| CAT-2023-013 | Membership_Inference_Attack | 7 | Exploit |
| CAT-2023-012 | Adversarial_Examples | 7 | Exploit |
| CAT-2023-011 | Evasion_Attacks | 7 | TTP |
| CAT-2023-010 | Input_Manipulation_Attack | 7 | TTP |
| CAT-2023-009 | Backdoor_Attacks | 7 | TTP |
| CAT-2023-008 | Trigger_Based_Attack | 7 | TTP |
| CAT-2023-007 | Training_Data_Poisoning_Attack | 7 | TTP |
| CAT-2023-006 | Campbell’s_Law | 9 | Vulnerability |
| CAT-2023-005 | Training_Data_Poisoning | 7 | Exploit |
| CAT-2023-004 | Suffix_Injection | 7 | TTP |
| CAT-2023-003 | Sensitive_Information_Disclosure | 8 | Vulnerability |
| CAT-2023-002 | Prompt_Injection | 7 | TTP |
| CAT-2023-001 | Overreliance_on_Automation | 8 | Vulnerability |
| CAT-2022-321 | Impulsivity | 8 | Vulnerability |
| CAT-2022-320 | Excessive_Agency | 8 | Vulnerability |
| CAT-2022-319 | Emoji_Injection | 7, 8 | TTP |
| CAT-2022-318 | Culture_Jamming | 8 | TTP |
| CAT-2022-317 | Chain-Of-Thought_Manipulation | 7 | TTP |
| CAT-2022-316 | Network_Ambiance_Attack | 8 | TTP |
| CAT-2022-315 | Maskarovka | 8 | TTP |
| CAT-2022-314 | Reflexive_Control | 8 | TTP |
| CAT-2022-313 | Zone_Flooding | 8 | TTP |
| CAT-2022-312 | Incrementalism | 8, 9 | Exploit |
| CAT-2022-311 | Compliance-Ladder | 8 | TTP |
| CAT-2022-310 | Yes-Ladder | 8 | TTP |
| CAT-2022-309 | Wing | 8 | TTP |
| CAT-2022-308 | Whorfian_Attack | 8 | Exploit |
| CAT-2022-307 | Venue_Change | 8 | TTP |
| CAT-2022-306 | Trance-Words | 8 | TTP |
| CAT-2022-305 | Tainted_Leak | 8 | TTP |
| CAT-2022-304 | Social_Engineering_Toolkit | 8 | TTP |
| CAT-2022-303 | Slander_Attack | 8 | TTP |
| CAT-2022-302 | Sandbagging | 8 | TTP |
| CAT-2022-301 | Reframing | 8 | TTP |
| CAT-2022-300 | Prop | 8 | TTP |
| CAT-2022-299 | Preloading | 8 | TTP |
| CAT-2022-298 | Pendant_Anchoring | 8 | TTP |
| CAT-2022-297 | Open-Ended_Question | 8 | TTP |
| CAT-2022-296 | Negging | 8 | TTP |
| CAT-2022-295 | Multi-Channel_Attack | 8 | TTP |
| CAT-2022-294 | Mirroring | 8 | TTP |
| CAT-2022-293 | Micro_Expression | 8 | Vulnerability |
| CAT-2022-292 | Maltego | 8 | Tool / TTP |
| CAT-2022-291 | Leading_Question | 8 | TTP |
| CAT-2022-290 | Journobaiting | 8 | TTP |
| CAT-2022-289 | Ice_Breaker | 8 | TTP |
| CAT-2022-288 | Hot_Reading | 8 | TTP |
| CAT-2022-287 | Honey_Channels | 8 | TTP |
| CAT-2022-286 | Functional_Opener | 8 | TTP |
| CAT-2022-285 | Forcing | 8 | Exploit |
| CAT-2022-284 | Firehose_of_Falsehood | 8 | TTP |
| CAT-2022-283 | False_Time_Constraint | 8 | TTP |
| CAT-2022-282 | False_Flag | 8 | TTP |
| CAT-2022-281 | Eject_with_Explanation | 8 | TTP |
| CAT-2022-280 | Double_Switch | 8 | TTP |
| CAT-2022-279 | Deception-in-Depth | 8, 9 | TTP |
| CAT-2022-278 | Conversational_Threading | 8 | TTP |
| CAT-2022-277 | Cold_Reading | 8 | TTP |
| CAT-2022-276 | Buscador | 8 | Tool / TTP |
| CAT-2022-275 | Brushing | 8, 9 | TTP |
| CAT-2022-274 | Baiting-Trolling | 8 | TTP |
| CAT-2022-273 | Anchor-NLP_Technique | 8 | TTP |
| CAT-2022-272 | Active_Indicator_Probe | 8 | TTP |
| CAT-2022-271 | Accomplished_Introduction | 8 | TTP |
| CAT-2022-270 | Operant_Conditioning | 8 | Exploit |
| CAT-2022-269 | Neoteny | 8 | Vulnerability |
| CAT-2022-268 | Need | 8 | Vulnerability |
| CAT-2022-267 | Need_&_Greed_Attack | 8 | Exploit |
| CAT-2022-266 | Fear | 8 | Vulnerability |
| CAT-2022-265 | Jolly_Roger_Bot | 8 | Tool / TTP |
| CAT-2022-264 | eWhoring | 8 | TTP |
| CAT-2022-263 | Synthetic_Media_Social_Engineering | 8 | TTP |
| CAT-2022-262 | Deepfake_Social_Engineering | 8 | TTP |
| CAT-2022-261 | Virus_Hoax | 8 | TTP |
| CAT-2022-260 | Virtual_Kidnapping | 8 | TTP |
| CAT-2022-259 | Telemarketing_Scam | 8 | TTP |
| CAT-2022-258 | Tech_Support_Scam | 8 | TTP |
| CAT-2022-257 | Romance_Scam | 8 | TTP |
| CAT-2022-256 | Hoax_Virus | 8 | TTP |
| CAT-2022-255 | Gift-Card_Scam | 8 | TTP |
| CAT-2022-254 | Crab_Phishing | 8 | TTP |
| CAT-2022-253 | Cat_Fishing | 8 | TTP |
| CAT-2022-252 | Business_Email_Compromise | 8, 9 | TTP |
| CAT-2022-251 | Advance_Fee_Scam | 8 | TTP |
| CAT-2022-250 | War_Shipping | 8, 9 | TTP |
| CAT-2022-249 | Tailgating | 8 | TTP |
| CAT-2022-248 | Snail_Mail_Attack | 8 | TTP |
| CAT-2022-247 | Shoulder_Surfing | 8 | TTP |
| CAT-2022-246 | Dumpster_Diving | 8, 9 | TTP |
| CAT-2022-245 | Baiting-Drop | 8 | TTP |
| CAT-2022-244 | Assistance_Ploy | 8 | Exploit |
| CAT-2022-243 | Robot_Social_Engineering | 8 | TTP |
| CAT-2022-242 | Dolphin_Attack | 8 | Exploit |
| CAT-2022-241 | Acoustic_Attack | 8 | TTP |
| CAT-2022-240 | Robo_Calling | 8 | TTP |
| CAT-2022-239 | Spamigation | 10 | TTP |
| CAT-2022-238 | Strategic_Lawsuit_Against_Public_Participation | 10 | TTP |
| CAT-2022-237 | Patent_Trolling | 10 | TTP |
| CAT-2022-236 | Legal_Loophole | 10 | Vulnerability |
| CAT-2022-235 | Lawfare | 10 | Exploit |
| CAT-2022-234 | Supply_Chain_Attack | 9 | Exploit |
| CAT-2022-233 | Shadow_Security | 9 | Vulnerability |
| CAT-2022-232 | Shadow_IT | 9 | Vulnerability |
| CAT-2022-231 | Shadow_AP | 9 | Vulnerability |
| CAT-2022-230 | Escalation_Attack | 9 | TTP |
| CAT-2022-229 | Cybersquatting | 9 | TTP |
| CAT-2022-228 | Spectrum_of_Allies | 8 | TTP |
| CAT-2022-227 | Unity | 8 | Vulnerability |
| CAT-2022-226 | Social_Proof | 8 | Vulnerability |
| CAT-2022-225 | Scarcity | 8 | Vulnerability |
| CAT-2022-224 | Reversing_Authority | 8 | TTP |
| CAT-2022-223 | Reciprocity-Need_for | 8 | Vulnerability |
| CAT-2022-222 | Pawn-Pivot | 8 | TTP |
| CAT-2022-221 | Party_Crashing | 8 | TTP |
| CAT-2022-220 | Liking | 8 | Vulnerability |
| CAT-2022-219 | Door-in-the-Face_Technique | 8 | TTP |
| CAT-2022-218 | Commitment-Consistency | 8 | Vulnerability |
| CAT-2022-217 | Bandwagon_Effect | 8 | Exploit |
| CAT-2022-216 | Authority-Deference_to | 8 | Vulnerability |
| CAT-2022-215 | Assistance-Need_to_Provide | 8 | Vulnerability |
| CAT-2022-214 | Network_Affect_Contagion | 7, 8 | Vulnerability |
| CAT-2022-213 | Wall_Banging | 8 | TTP |
| CAT-2022-212 | Trolling | 8 | TTP |
| CAT-2022-211 | Trevor's_Axiom | 8 | Exploit |
| CAT-2022-210 | Sympathy | 8 | Vulnerability |
| CAT-2022-209 | Streisand_Effect | 8 | Vulnerability |
| CAT-2022-208 | Stereotyping | 8 | Vulnerability |
| CAT-2022-207 | Social_Desirability_Bias | 8 | Vulnerability |
| CAT-2022-206 | Outgroup_Homogeneity_Bias | 8 | Vulnerability |
| CAT-2022-205 | Network_Manipulated_Affect | 8 | Vulnerability |
| CAT-2022-204 | Mass_Psychogenic_Illness | 8 | Vulnerability |
| CAT-2022-203 | Ingroup_Bias | 8 | Vulnerability |
| CAT-2022-202 | Zombification | 8 | Exploit |
| CAT-2022-201 | Strobe_Attack | 8 | TTP |
| CAT-2022-200 | Sonic_Area_Denial | 8 | TTP |
| CAT-2022-199 | P300_Guilty_Knowledge_Test | 8 | TTP |
| CAT-2022-198 | Interoceptive_Bias | 8 | Vulnerability |
| CAT-2022-197 | Tab-Napping | 8 | TTP |
| CAT-2022-196 | Prevalence_Paradox | 8 | Vulnerability |
| CAT-2022-195 | Noise_Injection | 8, 9 | TTP |
| CAT-2022-194 | Human_Buffer_Overflow | 8 | Exploit |
| CAT-2022-193 | Gray_Signal_Attacks | 8 | TTP |
| CAT-2022-192 | Focusing_Effect | 8 | Vulnerability |
| CAT-2022-191 | Distracted_Approach-Distraction | 8 | TTP |
| CAT-2022-190 | Boredom | 8 | Vulnerability |
| CAT-2022-189 | Automaticity | 8 | Vulnerability |
| CAT-2022-188 | Video_Puppetry | 8 | TTP |
| CAT-2022-187 | Social_Jacking | 8 | TTP |
| CAT-2022-186 | Perceptual_Deception | 8 | Vulnerability |
| CAT-2022-185 | Like_Jacking | 8 | TTP |
| CAT-2022-184 | IDN_Homograph_Attack | 8 | TTP |
| CAT-2022-183 | Clickjacking | 8 | TTP |
| CAT-2022-182 | Traitor_Tracing | 8 | TTP |
| CAT-2022-181 | Ignorance | 8 | Vulnerability |
| CAT-2022-180 | File_Masquerading | 8, 9 | TTP |
| CAT-2022-179 | We_Know_All | 8 | TTP |
| CAT-2022-178 | Silence | 8 | TTP |
| CAT-2022-177 | Sensory_Matching | 8 | TTP |
| CAT-2022-176 | Secret_Knowledge | 8 | TTP |
| CAT-2022-175 | Rubber-Hose_Cryptanalysis | 8 | Exploit |
| CAT-2022-174 | Repetition | 8 | TTP |
| CAT-2022-173 | Repeat-a-Word | 8 | TTP |
| CAT-2022-172 | Rapid_Fire | 8 | TTP |
| CAT-2022-171 | Quid_Pro_Quo | 8 | TTP |
| CAT-2022-170 | Provocative_Statement | 8 | TTP |
| CAT-2022-169 | Pride_and_Ego_Approach | 8 | TTP |
| CAT-2022-168 | Oblique_Reference | 8 | TTP |
| CAT-2022-167 | Neuro-Linguistic_Programming | 8 | Exploit |
| CAT-2022-166 | Naïve_Mentality | 8 | TTP |
| CAT-2022-165 | Incentive_Approach | 8 | TTP |
| CAT-2022-164 | Hour_Glass_Method | 8 | TTP |
| CAT-2022-163 | Futility | 8 | TTP |
| CAT-2022-162 | Flattery | 8 | TTP |
| CAT-2022-161 | File_and_Dossier | 8 | TTP |
| CAT-2022-160 | Fear-Up_Approach | 8 | TTP |
| CAT-2022-159 | Fear-Down_Approach | 8 | TTP |
| CAT-2022-158 | Ethical_Dilemma | 8 | TTP |
| CAT-2022-157 | Establish_Your_Identity | 8 | TTP |
| CAT-2022-156 | Emotional_Approach | 8 | TTP |
| CAT-2022-155 | Elicitation_of_Information | 8 | TTP |
| CAT-2022-154 | Disbelief | 8 | TTP |
| CAT-2022-153 | Direct_Approach | 8 | TTP |
| CAT-2022-152 | Deliberate_False_Statement | 8 | TTP |
| CAT-2022-151 | Criticism | 8 | TTP |
| CAT-2022-150 | Complaining-Tendency | 8 | Vulnerability |
| CAT-2022-149 | Change_of_Scene | 8 | TTP |
| CAT-2022-148 | Whaling | 8 | TTP |
| CAT-2022-147 | Tailored_Messaging | 8 | TTP |
| CAT-2022-146 | Sniper_Ad_Targeting | 8 | TTP |
| CAT-2022-145 | Pluridentity_Attack | 7,8,9,10 | Exploit |
| CAT-2022-144 | Inference_Attack | 7,8,9,10 | Exploit |
| CAT-2022-143 | Data_Vulnerability | 8 | Vulnerability |
| CAT-2022-142 | Vishing | 8 | TTP |
| CAT-2022-141 | Spear_Phishing | 8 | TTP |
| CAT-2022-140 | Sock-Puppetry | 8 | TTP |
| CAT-2022-139 | SMSishing | 8 | TTP |
| CAT-2022-138 | Shilling_Attack | 9 | TTP |
| CAT-2022-137 | Shill | 8 | TTP |
| CAT-2022-136 | Semantic_Attack | 7, 8, 9 | Exploit |
| CAT-2022-135 | Scambaiting | 8 | TTP |
| CAT-2022-134 | Reverse_Social_Engineering | 8 | TTP |
| CAT-2022-133 | Pretext-Pretexting | 8 | TTP |
| CAT-2022-132 | Phishing | 8 | TTP |
| CAT-2022-131 | Impersonation_Scam | 8 | TTP |
| CAT-2022-130 | Honey_Trap | 8 | TTP |
| CAT-2022-129 | Honey_Token | 8 | TTP |
| CAT-2022-128 | Honey_Pot | 8 | TTP |
| CAT-2022-127 | Honey_Phish | 8 | TTP |
| CAT-2022-126 | Greenwashing | 8 | TTP |
| CAT-2022-125 | Gaslighting | 8 | TTP |
| CAT-2022-124 | Cognitive_Malware_Injection | 8 | TTP |
| CAT-2022-123 | Clone_Phishing | 8 | TTP |
| CAT-2022-122 | Astro-Turfing | 8 | TTP |
| CAT-2022-121 | Transmission_Error | 8 | Vulnerability |
| CAT-2022-120 | Mis-Addressed_Email | 8 | Vulnerability |
| CAT-2022-119 | Loss_Error | 8 | Vulnerability |
| CAT-2022-118 | Leakage_Errors | 8 | Vulnerability |
| CAT-2022-117 | Disposal_Errors | 8 | Vulnerability |
| CAT-2022-116 | Configuration_Error | 8 | Vulnerability |
| CAT-2022-115 | Curiosity | 8 | Vulnerability |
| CAT-2022-114 | Zeigarnik_Effect | 8 | Vulnerability |
| CAT-2022-113 | Whorfianism | 8 | Vulnerability |
| CAT-2022-112 | von_Restorff_Effect | 8 | Vulnerability |
| CAT-2022-111 | Unfinished-Magnetizer | 8 | Exploit |
| CAT-2022-110 | Suggestion | 8 | TTP |
| CAT-2022-109 | Subjective_Validation | 8 | Vulnerability |
| CAT-2022-108 | Straw_Man-Argument | 8 | TTP |
| CAT-2022-107 | Status_Quo_Bias | 8 | Vulnerability |
| CAT-2022-106 | Spotlight_Effect | 8 | Vulnerability |
| CAT-2022-105 | Spacing_Effect | 8 | Exploit |
| CAT-2022-104 | Source_Monitoring_Error | 8 | Vulnerability |
| CAT-2022-103 | Serial_Position_Effect | 8 | Vulnerability |
| CAT-2022-102 | Self-Serving_Bias | 8 | Vulnerability |
| CAT-2022-101 | Self-Relevance_Effect | 8 | Vulnerability |
| CAT-2022-100 | Search_Engine_Manipulation_Effect | 8 | Exploit |
| CAT-2022-099 | Satisficing | 8 | Vulnerability |
| CAT-2022-098 | Risk_Homeostasis | 8 | Vulnerability |
| CAT-2022-097 | Relativism | 8 | Vulnerability |
| CAT-2022-096 | Probability_Blindness | 8 | Vulnerability |
| CAT-2022-095 | Pre-Suasion | 8 | Exploit |
| CAT-2022-094 | Planning_Fallacy | 8 | Vulnerability |
| CAT-2022-093 | Peak-End_Rule | 8 | Vulnerability |
| CAT-2022-092 | Overconfidence | 8 | Vulnerability |
| CAT-2022-091 | Optimism_Bias | 8 | Vulnerability |
| CAT-2022-090 | Omission_Bias | 8 | Vulnerability |
| CAT-2022-089 | Next-In-Line-Effect | 8 | Vulnerability |
| CAT-2022-088 | Neglect_of_Probability | 8 | Vulnerability |
| CAT-2022-087 | Negativity_Bias | 8 | Vulnerability |
| CAT-2022-086 | Narrative_Influence | 8 | Exploit |
| CAT-2022-085 | Mystery_Magnetizer | 8 | Exploit |
| CAT-2022-084 | Mother_Teresa_Effect | 8 | Vulnerability |
| CAT-2022-083 | Mood-Congruent_Memory | 8 | Vulnerability |
| CAT-2022-082 | Mental_Set | 8 | Vulnerability |
| CAT-2022-081 | Malware-Induced_Misperception_Attack | 8 | TTP |
| CAT-2022-080 | Self-Relevance-Magnetizer | 8 | Exploit |
| CAT-2022-079 | Loss_Aversion | 8 | Vulnerability |
| CAT-2022-078 | Levels-of-Processing_Effect | 8 | Vulnerability |
| CAT-2022-077 | Leveling_and_Sharpening | 8 | Vulnerability |
| CAT-2022-076 | Involuntary_Musical_Imagery | 8 | Exploit |
| CAT-2022-075 | Involuntary_Memory | 8 | Vulnerability |
| CAT-2022-074 | Inoculation_Effect | 8 | Exploit |
| CAT-2022-073 | Illusory_Correlation | 8 | Vulnerability |
| CAT-2022-072 | Illusion_of_Control | 8 | Vulnerability |
| CAT-2022-071 | IKEA_Effect | 8 | Vulnerability |
| CAT-2022-070 | Hyperbolic_Discounting | 8 | Vulnerability |
| CAT-2022-069 | Hindsight_Bias | 8 | Vulnerability |
| CAT-2022-068 | Halo_Effect | 8 | Vulnerability |
| CAT-2022-067 | Gambler's_Fallacy | 8 | Vulnerability |
| CAT-2022-066 | Fundamental_Attribution_Error | 8 | Vulnerability |
| CAT-2022-065 | Functional_Fixedness | 8 | Vulnerability |
| CAT-2022-064 | Frequency_Illusion | 8 | Vulnerability |
| CAT-2022-063 | Framing_Effect | 8 | Vulnerability |
| CAT-2022-062 | Foot-In-the-Door_Technique | 8 | TTP |
| CAT-2022-061 | Fear_of_Missing_Out | 8 | Exploit |
| CAT-2022-060 | False_Uniqueness_Bias | 8 | Vulnerability |
| CAT-2022-059 | False_Memory | 8 | Vulnerability |
| CAT-2022-058 | False_Consensus_Effect | 8 | Vulnerability |
| CAT-2022-057 | Endowment_Effect | 8 | Vulnerability |
| CAT-2022-056 | Egocentric_Bias | 8 | Vulnerability |
| CAT-2022-055 | Ear_Worm | 8 | Exploit |
| CAT-2022-054 | Dunning–Kruger_Effect | 8 | Vulnerability |
| CAT-2022-053 | Dread_Aversion | 8 | Vulnerability |
| CAT-2022-052 | Default_Bias | 8 | Vulnerability |
| CAT-2022-051 | Decoy_Effect | 8 | Exploit |
| CAT-2022-050 | Decision_Fatigue | 8 | Vulnerability |
| CAT-2022-049 | Context_Dependent_Memory | 8 | Vulnerability |
| CAT-2022-048 | Confirmation_Bias | 8 | Vulnerability |
| CAT-2022-047 | Cognitive_Malware | 8 | Exploit |
| CAT-2022-046 | Cognitive_Dissonance | 8 | Vulnerability |
| CAT-2022-045 | Cognitive_Deception | 8 | Exploit |
| CAT-2022-044 | Clustering_Illusion | 8 | Vulnerability |
| CAT-2022-043 | Classical_Conditioning | 8 | Exploit |
| CAT-2022-042 | Ben_Franklin_Effect | 8 | Exploit |
| CAT-2022-041 | Belief_Bias | 8 | Vulnerability |
| CAT-2022-040 | Base_Rate_Neglect | 8 | Vulnerability |
| CAT-2022-039 | Barnum_Statement | 8 | TTP |
| CAT-2022-038 | Availability_Heuristic | 8 | Vulnerability |
| CAT-2022-037 | Anchoring | 8 | Vulnerability |
| CAT-2022-036 | Ambiguous_Self_Induced_Disinformation_Attack | 8 | TTP |
| CAT-2022-035 | Ambient_Tactical_Deception_Attacks | 8 | TTP |
| CAT-2022-034 | Actor-Observer_Bias | 8 | Vulnerability |
| CAT-2022-033 | Wikijacking | 8 | TTP |
| CAT-2022-032 | Wi-Fi_Evil_Twin | 8 | TTP |
| CAT-2022-031 | Water_Hole_Attack | 8 | TTP |
| CAT-2022-030 | Typosquatting | 8 | TTP |
| CAT-2022-029 | Social_Phishing | 8 | TTP |
| CAT-2022-028 | Lateral_Phishing | 8 | TTP |
| CAT-2022-027 | Fluency_Effect | 8 | Vulnerability |
| CAT-2022-026 | Familiarity | 8 | Vulnerability |
| CAT-2022-025 | Brandjacking | 8 | TTP |
| CAT-2022-024 | DELETED DUE TO REDUNDANCY | 8 | TTP |
| CAT-2022-023 | Trick_Questions | 8 | TTP |
| CAT-2022-022 | Spam | 8 | TTP |
| CAT-2022-021 | Sneak_into_Basket | 8 | TTP |
| CAT-2022-020 | Scareware | 8 | TTP |
| CAT-2022-019 | Roach_Motel | 8 | TTP |
| CAT-2022-018 | Privacy_Zuckering | 8 | TTP |
| CAT-2022-017 | Price_Comparison_Prevention | 8 | TTP |
| CAT-2022-016 | Persuasive_Technology | 8 | TTP |
| CAT-2022-015 | Mouse-Trapping | 8 | TTP |
| CAT-2022-014 | Misdirection-Distraction | 8 | Exploit |
| CAT-2022-013 | Malvertisement | 8 | TTP |
| CAT-2022-012 | Hidden_Costs | 8 | TTP |
| CAT-2022-011 | Friend_Spam | 8 | TTP |
| CAT-2022-010 | Forced_Continuity | 8 | TTP |
| CAT-2022-009 | Disguised_Ads | 8 | TTP |
| CAT-2022-008 | Dark_Design_Patterns | 8 | TTP |
| CAT-2022-007 | Confirm_Shaming | 8 | TTP |
| CAT-2022-006 | Click-Bait | 8 | TTP |
| CAT-2022-005 | Bait_and_Switch | 8 | TTP |
| CAT-2022-004 | Addictive_Technology | 8 | TTP |
| CAT-2022-003 | Nudging | 8 | TTP |
| CAT-2022-002 | Forcing_Function | 8 | TTP |
| CAT-2022-001 | Fogg_Model_of_Behavior | 8 | Tool / TTP |
| CAT-2021-010 | Excitement-Appeal_to | 8 | Exploit |
| CAT-2021-009 | Low_Agreeableness | 8 | Vulnerability |
| CAT-2021-008 | Low_Extraversion | 8 | Vulnerability |
| CAT-2021-007 | Low_Conscientiousness | 8 | Vulnerability |
| CAT-2021-012 | Reciprocation | 8 | Exploit |
| CAT-2021-011 | Authority | 8 | Exploit |
| CAT-2021-006 | Low_Openness | 8 | Vulnerability |
| CAT-2021-005 | High_Neuroticism | 8 | Vulnerability |
| CAT-2021-004 | High_Agreeableness | 8 | Vulnerability |
| CAT-2021-003 | High_Extraversion | 8 | Vulnerability |
| CAT-2021-002 | High_Conscientiousness | 8 | Vulnerability |
| CAT-2021-001 | High_Openness | 8 | Vulnerability |
Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0)
The Cognitive Attack Taxonomy (CAT) is made available under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
This means that you are free to share the Cognitive Attack Taxonomy — copy and redistribute the material in any medium or format — provided that the following conditions are met:
Attribution – You must give appropriate credit to the Cognitive Attack Taxonomy and the Cognitive Security Institute, provide a link to the license, and indicate if changes were made.
NonCommercial – You may not use the material for commercial purposes.
NoDerivatives – If you remix, transform, or build upon the material, you may not distribute the modified material.
The full legal terms of this license can be found here:
https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en
By using or sharing the Cognitive Attack Taxonomy, you agree to comply with the terms of this license.
If you are interested in commercial use, derivative works, partnerships, or expanded licensing, please contact the Cognitive Security Institute to discuss collaboration opportunities.
Using Media Wiki
Consult the User's Guide for information on using the wiki software.
