{
  "id":1,
  "name":"Cyber Security",
  "children":[
    {
      "id":2,
      "name":"Event",
      "children":[
        {
          "id":3,
          "name":"Awareness Event",
          "children":[
            {
              "id":527,
              "name":"Red Team",
              "children":[
                {
                  "id":3705974,
                  "name":"redteam",
                  "data":{
                    "type":"Keyword",
                    "desc":"redteam"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"A red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view."
              }
            },
            {
              "id":2576550,
              "name":"cyber situational awareness",
              "data":{
                "type":"Keyword",
                "desc":"cyber situational awareness"
              }
            },
            {
              "id":2583166,
              "name":"cybersecurity awareness",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity awareness"
              }
            },
            {
              "id":2583187,
              "name":"cybersecurity awareness month",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity awareness month"
              }
            },
            {
              "id":2601899,
              "name":"data privacy day",
              "data":{
                "type":"Keyword",
                "desc":"data privacy day"
              }
            },
            {
              "id":3377631,
              "name":"national cybersecurity awareness",
              "data":{
                "type":"Keyword",
                "desc":"national cybersecurity awareness"
              }
            },
            {
              "id":3377634,
              "name":"national cybersecurity awareness month",
              "data":{
                "type":"Keyword",
                "desc":"national cybersecurity awareness month"
              }
            },
            {
              "id":3382532,
              "name":"ncsam",
              "data":{
                "type":"Keyword",
                "desc":"ncsam"
              }
            },
            {
              "id":3782758,
              "name":"safer internet day",
              "data":{
                "type":"Keyword",
                "desc":"safer internet day"
              }
            },
            {
              "id":3799791,
              "name":"school security awareness training",
              "data":{
                "type":"Keyword",
                "desc":"school security awareness training"
              }
            },
            {
              "id":3815049,
              "name":"security awareness campaign",
              "data":{
                "type":"Keyword",
                "desc":"security awareness campaign"
              }
            },
            {
              "id":3815094,
              "name":"security awareness month",
              "data":{
                "type":"Keyword",
                "desc":"security awareness month"
              }
            },
            {
              "id":3815137,
              "name":"security awareness program",
              "data":{
                "type":"Keyword",
                "desc":"security awareness program"
              }
            },
            {
              "id":3815179,
              "name":"security awareness training",
              "data":{
                "type":"Keyword",
                "desc":"security awareness training"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":16,
            "desc":"Cyber Security Awareness Event"
          }
        },
        {
          "id":4,
          "name":"Conference",
          "children":[
            {
              "id":357,
              "name":"Enigma Conference",
              "children":[
                {
                  "id":2761203,
                  "name":"enigma2017",
                  "data":{
                    "type":"Keyword",
                    "desc":"enigma2017"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Enigma Conference"
              }
            },
            {
              "id":358,
              "name":"Hack In The Box Security Conference",
              "children":[
                {
                  "id":3010478,
                  "name":"hitb",
                  "data":{
                    "type":"Keyword",
                    "desc":"hitb"
                  }
                },
                {
                  "id":3010636,
                  "name":"hitb2017ams",
                  "data":{
                    "type":"Keyword",
                    "desc":"hitb2017ams"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"https://conference.hitb.org/"
              }
            },
            {
              "id":359,
              "name":"Security BSides",
              "children":[
                {
                  "id":2324927,
                  "name":"bsideslv",
                  "data":{
                    "type":"Keyword",
                    "desc":"bsideslv"
                  }
                },
                {
                  "id":2325175,
                  "name":"bsidessf",
                  "data":{
                    "type":"Keyword",
                    "desc":"bsidessf"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Security BSides"
              }
            },
            {
              "id":370,
              "name":"CanSecWest",
              "children":[
                {
                  "id":3665381,
                  "name":"pwn2own",
                  "data":{
                    "type":"Keyword",
                    "desc":"pwn2own"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking."
              }
            },
            {
              "id":399,
              "name":"RSA Conference",
              "children":[
                {
                  "id":3770864,
                  "name":"rsac",
                  "data":{
                    "type":"Keyword",
                    "desc":"rsac"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"RSA Conference"
              }
            },
            {
              "id":407,
              "name":"REcon",
              "children":[
                {
                  "id":3701383,
                  "name":"reconmtl",
                  "data":{
                    "type":"Keyword",
                    "desc":"reconmtl"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques."
              }
            },
            {
              "id":417,
              "name":"Annual Computer Security Applications Conference",
              "children":[
                {
                  "id":2495381,
                  "name":"computer security application conference",
                  "data":{
                    "type":"Keyword",
                    "desc":"computer security application conference"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"ACSAC"
              }
            },
            {
              "id":419,
              "name":"National Computer Security Conference",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"National Computer Security Conference"
              }
            },
            {
              "id":420,
              "name":"Virus Bulletin International Conference",
              "children":[
                {
                  "id":4166705,
                  "name":"virus bulletin conference",
                  "data":{
                    "type":"Keyword",
                    "desc":"virus bulletin conference"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"VB2019"
              }
            },
            {
              "id":427,
              "name":"O’Reilly Security Conference",
              "children":[
                {
                  "id":3479664,
                  "name":"oreillysecurity",
                  "data":{
                    "type":"Keyword",
                    "desc":"oreillysecurity"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"O’Reilly Security Conference"
              }
            },
            {
              "id":443,
              "name":"cycon",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"The annual International Conference on Cyber Conflict"
              }
            },
            {
              "id":471,
              "name":"DEF CON",
              "children":[
                {
                  "id":2622220,
                  "name":"defcon",
                  "data":{
                    "type":"Keyword",
                    "desc":"defcon"
                  }
                },
                {
                  "id":2622258,
                  "name":"defcon badge",
                  "data":{
                    "type":"Keyword",
                    "desc":"defcon badge"
                  }
                },
                {
                  "id":2622932,
                  "name":"defcon talk",
                  "data":{
                    "type":"Keyword",
                    "desc":"defcon talk"
                  }
                },
                {
                  "id":2623201,
                  "name":"defcon25",
                  "data":{
                    "type":"Keyword",
                    "desc":"defcon25"
                  }
                },
                {
                  "id":3850005,
                  "name":"sevillage",
                  "data":{
                    "type":"Keyword",
                    "desc":"sevillage"
                  }
                },
                {
                  "id":4174409,
                  "name":"voting machine hacking village",
                  "data":{
                    "type":"Keyword",
                    "desc":"voting machine hacking village"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada"
              }
            },
            {
              "id":2083406,
              "name":"33c3",
              "data":{
                "type":"Keyword",
                "desc":"33c3"
              }
            },
            {
              "id":2086763,
              "name":"44con",
              "data":{
                "type":"Keyword",
                "desc":"44con"
              }
            },
            {
              "id":2177466,
              "name":"annual computer security application conference",
              "data":{
                "type":"Keyword",
                "desc":"annual computer security application conference"
              }
            },
            {
              "id":2177692,
              "name":"annual international cryptology conference",
              "data":{
                "type":"Keyword",
                "desc":"annual international cryptology conference"
              }
            },
            {
              "id":2202139,
              "name":"appsec",
              "data":{
                "type":"Keyword",
                "desc":"appsec"
              }
            },
            {
              "id":2280747,
              "name":"bhasia",
              "data":{
                "type":"Keyword",
                "desc":"bhasia"
              }
            },
            {
              "id":2280925,
              "name":"bheu",
              "data":{
                "type":"Keyword",
                "desc":"bheu"
              }
            },
            {
              "id":2281164,
              "name":"bhusa",
              "data":{
                "type":"Keyword",
                "desc":"bhusa"
              }
            },
            {
              "id":2291323,
              "name":"black hat europe",
              "data":{
                "type":"Keyword",
                "desc":"black hat europe"
              }
            },
            {
              "id":2291472,
              "name":"black hat usa",
              "data":{
                "type":"Keyword",
                "desc":"black hat usa"
              }
            },
            {
              "id":2293037,
              "name":"blackhat usa",
              "data":{
                "type":"Keyword",
                "desc":"blackhat usa"
              }
            },
            {
              "id":2293238,
              "name":"blackhatusa",
              "data":{
                "type":"Keyword",
                "desc":"blackhatusa"
              }
            },
            {
              "id":2495401,
              "name":"computer security conference",
              "data":{
                "type":"Keyword",
                "desc":"computer security conference"
              }
            },
            {
              "id":2642822,
              "name":"derbycon",
              "data":{
                "type":"Keyword",
                "desc":"derbycon"
              }
            },
            {
              "id":2784012,
              "name":"eurocrypt",
              "data":{
                "type":"Keyword",
                "desc":"eurocrypt"
              }
            },
            {
              "id":2912962,
              "name":"gartnersec",
              "data":{
                "type":"Keyword",
                "desc":"gartnersec"
              }
            },
            {
              "id":3010776,
              "name":"hitbgsec",
              "data":{
                "type":"Keyword",
                "desc":"hitbgsec"
              }
            },
            {
              "id":3501778,
              "name":"pacsec",
              "data":{
                "type":"Keyword",
                "desc":"pacsec"
              }
            },
            {
              "id":3701186,
              "name":"recon",
              "data":{
                "type":"Keyword",
                "desc":"recon"
              }
            },
            {
              "id":3771413,
              "name":"rsac2017",
              "data":{
                "type":"Keyword",
                "desc":"rsac2017"
              }
            },
            {
              "id":3860131,
              "name":"shmoocon",
              "data":{
                "type":"Keyword",
                "desc":"shmoocon"
              }
            },
            {
              "id":4242782,
              "name":"zeronights",
              "data":{
                "type":"Keyword",
                "desc":"zeronights"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":52,
            "desc":"Cyber Security Conference"
          }
        },
        {
          "id":5,
          "name":"Forum",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Forum"
          }
        },
        {
          "id":6,
          "name":"Summit",
          "children":[
            {
              "id":356,
              "name":"Security Analyst Summit",
              "children":[
                {
                  "id":4034276,
                  "name":"thesas2016",
                  "data":{
                    "type":"Keyword",
                    "desc":"thesas2016"
                  }
                },
                {
                  "id":4034356,
                  "name":"thesas2017",
                  "data":{
                    "type":"Keyword",
                    "desc":"thesas2017"
                  }
                },
                {
                  "id":4034462,
                  "name":"thesas2018",
                  "data":{
                    "type":"Keyword",
                    "desc":"thesas2018"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Security Analyst Summit"
              }
            },
            {
              "id":478,
              "name":"DFIR Summit",
              "children":[
                {
                  "id":2660004,
                  "name":"dfirsummit",
                  "data":{
                    "type":"Keyword",
                    "desc":"dfirsummit"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"SANS Digital Forensics & Incident Response (DFIR) Summit"
              }
            },
            {
              "id":2585810,
              "name":"cybersecurity summit",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity summit"
              }
            },
            {
              "id":3161823,
              "name":"kaspersky security analyst summit",
              "data":{
                "type":"Keyword",
                "desc":"kaspersky security analyst summit"
              }
            },
            {
              "id":3824031,
              "name":"security summit",
              "data":{
                "type":"Keyword",
                "desc":"security summit"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":10,
            "desc":"Summit"
          }
        },
        {
          "id":7,
          "name":"Symposium",
          "children":[
            {
              "id":182,
              "name":"USENIX Security Symposium",
              "children":[
                {
                  "id":2071454,
                  "name":"11th usenix security symposium",
                  "data":{
                    "type":"Keyword",
                    "desc":"11th usenix security symposium"
                  }
                },
                {
                  "id":2072448,
                  "name":"13th usenix security symposium",
                  "data":{
                    "type":"Keyword",
                    "desc":"13th usenix security symposium"
                  }
                },
                {
                  "id":2073400,
                  "name":"15th usenix security symposium",
                  "data":{
                    "type":"Keyword",
                    "desc":"15th usenix security symposium"
                  }
                },
                {
                  "id":4136193,
                  "name":"usenix association",
                  "data":{
                    "type":"Keyword",
                    "desc":"usenix association"
                  }
                },
                {
                  "id":4219593,
                  "name":"woot",
                  "data":{
                    "type":"Keyword",
                    "desc":"woot"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"An academic conference (one of top 4)"
              }
            },
            {
              "id":386,
              "name":"Real World Crypto Symposium",
              "children":[
                {
                  "id":3696434,
                  "name":"realworldcrypto",
                  "data":{
                    "type":"Keyword",
                    "desc":"realworldcrypto"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Real World Crypto Symposium"
              }
            },
            {
              "id":406,
              "name":"The Network and Distributed System Security Symposium (NDSS)",
              "children":[
                {
                  "id":2684433,
                  "name":"distribute system security symposium",
                  "data":{
                    "type":"Keyword",
                    "desc":"distribute system security symposium"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"NDSS fosters information exchange among researchers and practitioners of network and distributed system security"
              }
            },
            {
              "id":421,
              "name":"IEEE Computer Security Foundations Symposium",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"CSF"
              }
            },
            {
              "id":432,
              "name":"Systems Security Symposium",
              "children":[
                {
                  "id":3992390,
                  "name":"system security symposium",
                  "data":{
                    "type":"Keyword",
                    "desc":"system security symposium"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Systems Security Symposium"
              }
            },
            {
              "id":3824099,
              "name":"security symposium",
              "data":{
                "type":"Keyword",
                "desc":"security symposium"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":15,
            "desc":"Symposium"
          }
        },
        {
          "id":8,
          "name":"Expo",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Expo"
          }
        },
        {
          "id":9,
          "name":"Training Event",
          "children":[
            {
              "id":2323589,
              "name":"brucon",
              "data":{
                "type":"Keyword",
                "desc":"brucon"
              }
            },
            {
              "id":2576455,
              "name":"cyber security training",
              "data":{
                "type":"Keyword",
                "desc":"cyber security training"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Training Event"
          }
        },
        {
          "id":10,
          "name":"Workshop",
          "children":[
            {
              "id":2453565,
              "name":"cloud computing security workshop",
              "data":{
                "type":"Keyword",
                "desc":"cloud computing security workshop"
              }
            },
            {
              "id":2495450,
              "name":"computer security foundations workshop",
              "data":{
                "type":"Keyword",
                "desc":"computer security foundations workshop"
              }
            },
            {
              "id":3044625,
              "name":"ieee computer security foundations workshop",
              "data":{
                "type":"Keyword",
                "desc":"ieee computer security foundations workshop"
              }
            },
            {
              "id":3821550,
              "name":"security paradigms workshop",
              "data":{
                "type":"Keyword",
                "desc":"security paradigms workshop"
              }
            },
            {
              "id":4179010,
              "name":"w00t",
              "data":{
                "type":"Keyword",
                "desc":"w00t"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":6,
            "desc":"Workshop"
          }
        },
        {
          "id":350,
          "name":"Hackers Event",
          "children":[
            {
              "id":368,
              "name":"DefCamp",
              "children":[
                {
                  "id":2972873,
                  "name":"hacking village",
                  "data":{
                    "type":"Keyword",
                    "desc":"hacking village"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe"
              }
            },
            {
              "id":2966356,
              "name":"hacker conference",
              "data":{
                "type":"Keyword",
                "desc":"hacker conference"
              }
            },
            {
              "id":2966940,
              "name":"hacker forum",
              "data":{
                "type":"Keyword",
                "desc":"hacker forum"
              }
            },
            {
              "id":2968672,
              "name":"hacker summer camp",
              "data":{
                "type":"Keyword",
                "desc":"hacker summer camp"
              }
            },
            {
              "id":2970789,
              "name":"hacking forum",
              "data":{
                "type":"Keyword",
                "desc":"hacking forum"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":7,
            "desc":"Hackers Event"
          }
        },
        {
          "id":373,
          "name":"Challenge",
          "children":[
            {
              "id":374,
              "name":"CTF",
              "children":[
                {
                  "id":2622403,
                  "name":"defcon ctf",
                  "data":{
                    "type":"Keyword",
                    "desc":"defcon ctf"
                  }
                },
                {
                  "id":3810056,
                  "name":"sectf",
                  "data":{
                    "type":"Keyword",
                    "desc":"sectf"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Capture The Flag"
              }
            },
            {
              "id":2575716,
              "name":"cyber security challenge",
              "data":{
                "type":"Keyword",
                "desc":"cyber security challenge"
              }
            },
            {
              "id":2596888,
              "name":"darpa cyber grand challenge",
              "data":{
                "type":"Keyword",
                "desc":"darpa cyber grand challenge"
              }
            },
            {
              "id":4077059,
              "name":"trevorforget",
              "data":{
                "type":"Keyword",
                "desc":"trevorforget"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":7,
            "desc":"Cybersecurity Challenge"
          }
        },
        {
          "id":494,
          "name":"Campaign",
          "children":[
            {
              "id":2892651,
              "name":"freeanon",
              "data":{
                "type":"Keyword",
                "desc":"freeanon"
              }
            },
            {
              "id":2892734,
              "name":"freeanons",
              "data":{
                "type":"Keyword",
                "desc":"freeanons"
              }
            },
            {
              "id":2892942,
              "name":"freebogatov",
              "data":{
                "type":"Keyword",
                "desc":"freebogatov"
              }
            },
            {
              "id":2893614,
              "name":"freejeremy",
              "data":{
                "type":"Keyword",
                "desc":"freejeremy"
              }
            },
            {
              "id":2894089,
              "name":"freemattdehart",
              "data":{
                "type":"Keyword",
                "desc":"freemattdehart"
              }
            },
            {
              "id":3329106,
              "name":"millionmaskmarch",
              "data":{
                "type":"Keyword",
                "desc":"millionmaskmarch"
              }
            },
            {
              "id":3410425,
              "name":"nolove4usgov",
              "data":{
                "type":"Keyword",
                "desc":"nolove4usgov"
              }
            },
            {
              "id":3547480,
              "name":"phishing campaign",
              "data":{
                "type":"Keyword",
                "desc":"phishing campaign"
              }
            },
            {
              "id":3975005,
              "name":"support jeremy hammond",
              "data":{
                "type":"Keyword",
                "desc":"support jeremy hammond"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":10,
            "desc":"Campaign"
          }
        },
        {
          "id":2571738,
          "name":"cyber activity",
          "data":{
            "type":"Keyword",
            "desc":"cyber activity"
          }
        },
        {
          "id":2573578,
          "name":"cyber event",
          "data":{
            "type":"Keyword",
            "desc":"cyber event"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":131,
        "desc":"Event"
      }
    },
    {
      "id":28,
      "name":"Party",
      "children":[
        {
          "id":11,
          "name":"Individual",
          "children":[
            {
              "id":12,
              "name":"Expert",
              "children":[
                {
                  "id":13,
                  "name":"Consultant",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Consultant"
                  }
                },
                {
                  "id":14,
                  "name":"Trainer",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Trainer"
                  }
                },
                {
                  "id":15,
                  "name":"Engineer",
                  "children":[
                    {
                      "id":3817732,
                      "name":"security engineer",
                      "data":{
                        "type":"Keyword",
                        "desc":"security engineer"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Engineer"
                  }
                },
                {
                  "id":318,
                  "name":"Professional",
                  "children":[
                    {
                      "id":2323536,
                      "name":"bruce schneier",
                      "data":{
                        "type":"Keyword",
                        "desc":"bruce schneier"
                      }
                    },
                    {
                      "id":2585291,
                      "name":"cybersecurity professional",
                      "data":{
                        "type":"Keyword",
                        "desc":"cybersecurity professional"
                      }
                    },
                    {
                      "id":2593826,
                      "name":"dan geer",
                      "data":{
                        "type":"Keyword",
                        "desc":"dan geer"
                      }
                    },
                    {
                      "id":3083927,
                      "name":"infosec pro",
                      "data":{
                        "type":"Keyword",
                        "desc":"infosec pro"
                      }
                    },
                    {
                      "id":3083950,
                      "name":"infosec professional",
                      "data":{
                        "type":"Keyword",
                        "desc":"infosec professional"
                      }
                    },
                    {
                      "id":3822184,
                      "name":"security pro",
                      "data":{
                        "type":"Keyword",
                        "desc":"security pro"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Professional"
                  }
                },
                {
                  "id":2424867,
                  "name":"chief privacy officer",
                  "data":{
                    "type":"Keyword",
                    "desc":"chief privacy officer"
                  }
                },
                {
                  "id":2424941,
                  "name":"chief security officer",
                  "data":{
                    "type":"Keyword",
                    "desc":"chief security officer"
                  }
                },
                {
                  "id":2433029,
                  "name":"chuvakin",
                  "data":{
                    "type":"Keyword",
                    "desc":"chuvakin"
                  }
                },
                {
                  "id":2438623,
                  "name":"cisa",
                  "data":{
                    "type":"Keyword",
                    "desc":"cisa"
                  }
                },
                {
                  "id":2439479,
                  "name":"ciso",
                  "data":{
                    "type":"Keyword",
                    "desc":"ciso"
                  }
                },
                {
                  "id":2439847,
                  "name":"cissp",
                  "data":{
                    "type":"Keyword",
                    "desc":"cissp"
                  }
                },
                {
                  "id":2584004,
                  "name":"cybersecurity expert",
                  "data":{
                    "type":"Keyword",
                    "desc":"cybersecurity expert"
                  }
                },
                {
                  "id":2602276,
                  "name":"data protection officer",
                  "data":{
                    "type":"Keyword",
                    "desc":"data protection officer"
                  }
                },
                {
                  "id":2783665,
                  "name":"eugene kaspersky",
                  "data":{
                    "type":"Keyword",
                    "desc":"eugene kaspersky"
                  }
                },
                {
                  "id":3150146,
                  "name":"john mcafee",
                  "data":{
                    "type":"Keyword",
                    "desc":"john mcafee"
                  }
                },
                {
                  "id":3286648,
                  "name":"mary ann davidson",
                  "data":{
                    "type":"Keyword",
                    "desc":"mary ann davidson"
                  }
                },
                {
                  "id":3529571,
                  "name":"penetration tester",
                  "data":{
                    "type":"Keyword",
                    "desc":"penetration tester"
                  }
                },
                {
                  "id":3530544,
                  "name":"pentester",
                  "data":{
                    "type":"Keyword",
                    "desc":"pentester"
                  }
                },
                {
                  "id":3799058,
                  "name":"schneier",
                  "data":{
                    "type":"Keyword",
                    "desc":"schneier"
                  }
                },
                {
                  "id":3814513,
                  "name":"security analyst",
                  "data":{
                    "type":"Keyword",
                    "desc":"security analyst"
                  }
                },
                {
                  "id":3820210,
                  "name":"security leader",
                  "data":{
                    "type":"Keyword",
                    "desc":"security leader"
                  }
                },
                {
                  "id":3822005,
                  "name":"security practitioner",
                  "data":{
                    "type":"Keyword",
                    "desc":"security practitioner"
                  }
                },
                {
                  "id":4037726,
                  "name":"threat analyst",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat analyst"
                  }
                },
                {
                  "id":4038632,
                  "name":"threat intelligence analyst",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence analyst"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":31,
                "desc":"Expert"
              }
            },
            {
              "id":16,
              "name":"Academic",
              "children":[
                {
                  "id":17,
                  "name":"Professor",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Professor"
                  }
                },
                {
                  "id":18,
                  "name":"Researcher",
                  "children":[
                    {
                      "id":2303678,
                      "name":"boneh",
                      "data":{
                        "type":"Keyword",
                        "desc":"boneh"
                      }
                    },
                    {
                      "id":2414762,
                      "name":"chaum",
                      "data":{
                        "type":"Keyword",
                        "desc":"chaum"
                      }
                    },
                    {
                      "id":2713451,
                      "name":"dwork",
                      "data":{
                        "type":"Keyword",
                        "desc":"dwork"
                      }
                    },
                    {
                      "id":2953720,
                      "name":"grossklags",
                      "data":{
                        "type":"Keyword",
                        "desc":"grossklags"
                      }
                    },
                    {
                      "id":3141283,
                      "name":"jajodia",
                      "data":{
                        "type":"Keyword",
                        "desc":"jajodia"
                      }
                    },
                    {
                      "id":3179936,
                      "name":"kruegel",
                      "data":{
                        "type":"Keyword",
                        "desc":"kruegel"
                      }
                    },
                    {
                      "id":3282982,
                      "name":"marcus hutchins",
                      "data":{
                        "type":"Keyword",
                        "desc":"marcus hutchins"
                      }
                    },
                    {
                      "id":3822875,
                      "name":"security researcher",
                      "data":{
                        "type":"Keyword",
                        "desc":"security researcher"
                      }
                    },
                    {
                      "id":3946110,
                      "name":"stolfo",
                      "data":{
                        "type":"Keyword",
                        "desc":"stolfo"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":10,
                    "desc":"Researcher"
                  }
                },
                {
                  "id":19,
                  "name":"Student",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Student"
                  }
                },
                {
                  "id":3785205,
                  "name":"samarati",
                  "data":{
                    "type":"Keyword",
                    "desc":"samarati"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":14,
                "desc":"Academic"
              }
            },
            {
              "id":20,
              "name":"Cybercriminal",
              "children":[
                {
                  "id":2572901,
                  "name":"cyber criminal",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber criminal"
                  }
                },
                {
                  "id":2687820,
                  "name":"dmitry",
                  "data":{
                    "type":"Keyword",
                    "desc":"dmitry"
                  }
                },
                {
                  "id":3350270,
                  "name":"money mule",
                  "data":{
                    "type":"Keyword",
                    "desc":"money mule"
                  }
                },
                {
                  "id":3795310,
                  "name":"scammer",
                  "data":{
                    "type":"Keyword",
                    "desc":"scammer"
                  }
                },
                {
                  "id":3895435,
                  "name":"socialengineer",
                  "data":{
                    "type":"Keyword",
                    "desc":"socialengineer"
                  }
                },
                {
                  "id":3941619,
                  "name":"stealer",
                  "data":{
                    "type":"Keyword",
                    "desc":"stealer"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Cybercriminal"
              }
            },
            {
              "id":21,
              "name":"Hacker",
              "children":[
                {
                  "id":22,
                  "name":"Black-Hat Hacker",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Black-Hat Hacker"
                  }
                },
                {
                  "id":23,
                  "name":"White-Hat Hacker",
                  "children":[
                    {
                      "id":2782750,
                      "name":"ethical hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"ethical hacker"
                      }
                    },
                    {
                      "id":3629747,
                      "name":"professional hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"professional hacker"
                      }
                    },
                    {
                      "id":4202807,
                      "name":"white hat",
                      "data":{
                        "type":"Keyword",
                        "desc":"white hat"
                      }
                    },
                    {
                      "id":4202816,
                      "name":"white hat hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"white hat hacker"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":5,
                    "desc":"White-Hat Hacker"
                  }
                },
                {
                  "id":24,
                  "name":"Gray-Hat Hacker",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Gray-Hat Hacker"
                  }
                },
                {
                  "id":179,
                  "name":"Hacktivist",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Hacktivist"
                  }
                },
                {
                  "id":351,
                  "name":"By Nationality",
                  "children":[
                    {
                      "id":3127911,
                      "name":"iranian hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"iranian hacker"
                      }
                    },
                    {
                      "id":3777759,
                      "name":"russian hackers",
                      "data":{
                        "type":"Keyword",
                        "desc":"russian hackers"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"By Nationality"
                  }
                },
                {
                  "id":352,
                  "name":"By Target",
                  "children":[
                    {
                      "id":2546974,
                      "name":"credit card hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"credit card hacker"
                      }
                    },
                    {
                      "id":4190279,
                      "name":"web application hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"web application hacker"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"By Target"
                  }
                },
                {
                  "id":493,
                  "name":"Lauri Love",
                  "children":[
                    {
                      "id":2893743,
                      "name":"freelauri",
                      "data":{
                        "type":"Keyword",
                        "desc":"freelauri"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Lauri Love"
                  }
                },
                {
                  "id":2098242,
                  "name":"aaron swartz",
                  "data":{
                    "type":"Keyword",
                    "desc":"aaron swartz"
                  }
                },
                {
                  "id":2181435,
                  "name":"anonymous hacker jeremy hammond",
                  "data":{
                    "type":"Keyword",
                    "desc":"anonymous hacker jeremy hammond"
                  }
                },
                {
                  "id":2956814,
                  "name":"guccifer",
                  "data":{
                    "type":"Keyword",
                    "desc":"guccifer"
                  }
                },
                {
                  "id":2967145,
                  "name":"hacker hero john draper",
                  "data":{
                    "type":"Keyword",
                    "desc":"hacker hero john draper"
                  }
                },
                {
                  "id":2967537,
                  "name":"hacker lauri love",
                  "data":{
                    "type":"Keyword",
                    "desc":"hacker lauri love"
                  }
                },
                {
                  "id":2987513,
                  "name":"haxor",
                  "data":{
                    "type":"Keyword",
                    "desc":"haxor"
                  }
                },
                {
                  "id":3146178,
                  "name":"jeremy hammond",
                  "data":{
                    "type":"Keyword",
                    "desc":"jeremy hammond"
                  }
                },
                {
                  "id":3166275,
                  "name":"kevin mitnick",
                  "data":{
                    "type":"Keyword",
                    "desc":"kevin mitnick"
                  }
                },
                {
                  "id":3546770,
                  "name":"phineas fisher hack hacking team",
                  "data":{
                    "type":"Keyword",
                    "desc":"phineas fisher hack hacking team"
                  }
                },
                {
                  "id":3705424,
                  "name":"redhack",
                  "data":{
                    "type":"Keyword",
                    "desc":"redhack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":27,
                "desc":"Hacker"
              }
            },
            {
              "id":25,
              "name":"End User",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"End User"
              }
            },
            {
              "id":26,
              "name":"Journalist",
              "children":[
                {
                  "id":2263919,
                  "name":"barrett brown",
                  "data":{
                    "type":"Keyword",
                    "desc":"barrett brown"
                  }
                },
                {
                  "id":2317046,
                  "name":"brian krebs",
                  "data":{
                    "type":"Keyword",
                    "desc":"brian krebs"
                  }
                },
                {
                  "id":2726988,
                  "name":"edward snowden",
                  "data":{
                    "type":"Keyword",
                    "desc":"edward snowden"
                  }
                },
                {
                  "id":3155897,
                  "name":"julian assange",
                  "data":{
                    "type":"Keyword",
                    "desc":"julian assange"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Journalist"
              }
            },
            {
              "id":27,
              "name":"Activist",
              "children":[
                {
                  "id":2215397,
                  "name":"assange",
                  "data":{
                    "type":"Keyword",
                    "desc":"assange"
                  }
                },
                {
                  "id":2423239,
                  "name":"chelsea manning",
                  "data":{
                    "type":"Keyword",
                    "desc":"chelsea manning"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Activist"
              }
            },
            {
              "id":180,
              "name":"Threat Actor",
              "children":[
                {
                  "id":2133275,
                  "name":"advanced threat actor",
                  "data":{
                    "type":"Keyword",
                    "desc":"advanced threat actor"
                  }
                },
                {
                  "id":2202911,
                  "name":"apt actor",
                  "data":{
                    "type":"Keyword",
                    "desc":"apt actor"
                  }
                },
                {
                  "id":2576911,
                  "name":"cyber threat actor",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber threat actor"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"a threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for a security incident that impacts – or has the potential to impact – an organization's security"
              }
            },
            {
              "id":181,
              "name":"Attacker",
              "children":[
                {
                  "id":2572227,
                  "name":"cyber attacker",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber attacker"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"An attacker is the individual or organisation performing these malicious activities."
              }
            },
            {
              "id":268,
              "name":"Online ID",
              "children":[
                {
                  "id":2067544,
                  "name":"0x6d6172696f",
                  "data":{
                    "type":"Keyword",
                    "desc":"0x6d6172696f"
                  }
                },
                {
                  "id":2067856,
                  "name":"0xabad1dea",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xabad1dea"
                  }
                },
                {
                  "id":2067941,
                  "name":"0xamit",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xamit"
                  }
                },
                {
                  "id":2068029,
                  "name":"0xcharlie",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xcharlie"
                  }
                },
                {
                  "id":2068175,
                  "name":"0xdade",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xdade"
                  }
                },
                {
                  "id":2068212,
                  "name":"0xdeadbabe",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xdeadbabe"
                  }
                },
                {
                  "id":2068577,
                  "name":"0xmchow",
                  "data":{
                    "type":"Keyword",
                    "desc":"0xmchow"
                  }
                },
                {
                  "id":2075727,
                  "name":"1o57",
                  "data":{
                    "type":"Keyword",
                    "desc":"1o57"
                  }
                },
                {
                  "id":2326864,
                  "name":"buffaloseller888",
                  "data":{
                    "type":"Keyword",
                    "desc":"buffaloseller888"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":10,
                "desc":"Online IDs including usernames on different online services such as OSNs"
              }
            },
            {
              "id":2299839,
              "name":"bluehat",
              "data":{
                "type":"Keyword",
                "desc":"bluehat"
              }
            },
            {
              "id":2577415,
              "name":"cyber warrior",
              "data":{
                "type":"Keyword",
                "desc":"cyber warrior"
              }
            },
            {
              "id":3083812,
              "name":"infosec people",
              "data":{
                "type":"Keyword",
                "desc":"infosec people"
              }
            },
            {
              "id":3528961,
              "name":"pen tester",
              "data":{
                "type":"Keyword",
                "desc":"pen tester"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":109,
            "desc":"Individual"
          }
        },
        {
          "id":38,
          "name":"Group",
          "children":[
            {
              "id":220,
              "name":"Group of People",
              "children":[
                {
                  "id":223,
                  "name":"Hacking Group",
                  "children":[
                    {
                      "id":224,
                      "name":"Anonymous (hacking group)",
                      "children":[
                        {
                          "id":2178925,
                          "name":"anons",
                          "data":{
                            "type":"Keyword",
                            "desc":"anons"
                          }
                        },
                        {
                          "id":2628567,
                          "name":"dehart",
                          "data":{
                            "type":"Keyword",
                            "desc":"dehart"
                          }
                        },
                        {
                          "id":3252972,
                          "name":"lulz",
                          "data":{
                            "type":"Keyword",
                            "desc":"lulz"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"The hacking group whose name is \"Anonymous\""
                      }
                    },
                    {
                      "id":401,
                      "name":"APT1",
                      "children":[
                        {
                          "id":2427682,
                          "name":"chinese apt",
                          "data":{
                            "type":"Keyword",
                            "desc":"chinese apt"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"APT1"
                      }
                    },
                    {
                      "id":528,
                      "name":"Hacking Team",
                      "children":[
                        {
                          "id":2964442,
                          "name":"hack team",
                          "data":{
                            "type":"Keyword",
                            "desc":"hack team"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Hacking Team"
                      }
                    },
                    {
                      "id":564,
                      "name":"APT28",
                      "children":[
                        {
                          "id":2831222,
                          "name":"fancy bear",
                          "data":{
                            "type":"Keyword",
                            "desc":"fancy bear"
                          }
                        },
                        {
                          "id":3897408,
                          "name":"sofacy",
                          "data":{
                            "type":"Keyword",
                            "desc":"sofacy"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Fancy Bear (also known as APT28 (by Mandiant), Pawn Storm, Sofacy Group (by Kaspersky), Sednit, Tsar Team (by FireEye) and STRONTIUM (by Microsoft)"
                      }
                    },
                    {
                      "id":565,
                      "name":"The Shadow Brokers",
                      "children":[
                        {
                          "id":3852087,
                          "name":"shadowbroker",
                          "data":{
                            "type":"Keyword",
                            "desc":"shadowbroker"
                          }
                        },
                        {
                          "id":3852192,
                          "name":"shadowbrokers",
                          "data":{
                            "type":"Keyword",
                            "desc":"shadowbrokers"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"The Shadow Brokers is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools from the National Security Agency, including several zero-day exploits."
                      }
                    },
                    {
                      "id":2178655,
                      "name":"anonghost",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonghost"
                      }
                    },
                    {
                      "id":2228322,
                      "name":"attackers",
                      "data":{
                        "type":"Keyword",
                        "desc":"attackers"
                      }
                    },
                    {
                      "id":2411608,
                      "name":"chaos computer club",
                      "data":{
                        "type":"Keyword",
                        "desc":"chaos computer club"
                      }
                    },
                    {
                      "id":3181513,
                      "name":"l0pht",
                      "data":{
                        "type":"Keyword",
                        "desc":"l0pht"
                      }
                    },
                    {
                      "id":3231846,
                      "name":"lizard squad",
                      "data":{
                        "type":"Keyword",
                        "desc":"lizard squad"
                      }
                    },
                    {
                      "id":3253207,
                      "name":"lulzsec",
                      "data":{
                        "type":"Keyword",
                        "desc":"lulzsec"
                      }
                    },
                    {
                      "id":3803635,
                      "name":"script kiddie",
                      "data":{
                        "type":"Keyword",
                        "desc":"script kiddie"
                      }
                    },
                    {
                      "id":3989090,
                      "name":"syrian electronic army",
                      "data":{
                        "type":"Keyword",
                        "desc":"syrian electronic army"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":23,
                    "desc":"Normally group of people"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":24,
                "desc":"Group of People"
              }
            },
            {
              "id":221,
              "name":"Group of Organizations",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Group of Organizations"
              }
            },
            {
              "id":222,
              "name":"Group of People and Organizations",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Group of People and Organizations (those with hybrid memberships)"
              }
            },
            {
              "id":3082249,
              "name":"infosec community",
              "data":{
                "type":"Keyword",
                "desc":"infosec community"
              }
            },
            {
              "id":3818501,
              "name":"security folk",
              "data":{
                "type":"Keyword",
                "desc":"security folk"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":29,
            "desc":"Group"
          }
        },
        {
          "id":244,
          "name":"Organization",
          "children":[
            {
              "id":29,
              "name":"Governmental Body",
              "children":[
                {
                  "id":2915561,
                  "name":"gchq",
                  "data":{
                    "type":"Keyword",
                    "desc":"gchq"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Governmental Body"
              }
            },
            {
              "id":31,
              "name":"Research Organization",
              "children":[
                {
                  "id":2440423,
                  "name":"citizen lab",
                  "data":{
                    "type":"Keyword",
                    "desc":"citizen lab"
                  }
                },
                {
                  "id":2761255,
                  "name":"enisa",
                  "data":{
                    "type":"Keyword",
                    "desc":"enisa"
                  }
                },
                {
                  "id":3574914,
                  "name":"ponemon",
                  "data":{
                    "type":"Keyword",
                    "desc":"ponemon"
                  }
                },
                {
                  "id":3574919,
                  "name":"ponemon institute",
                  "data":{
                    "type":"Keyword",
                    "desc":"ponemon institute"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Research Organization"
              }
            },
            {
              "id":32,
              "name":"Educational Institute",
              "children":[
                {
                  "id":3898854,
                  "name":"software engineering institute",
                  "data":{
                    "type":"Keyword",
                    "desc":"software engineering institute"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Educational Institute"
              }
            },
            {
              "id":33,
              "name":"Business",
              "children":[
                {
                  "id":34,
                  "name":"Enterprise",
                  "children":[
                    {
                      "id":3025859,
                      "name":"huawei",
                      "data":{
                        "type":"Keyword",
                        "desc":"huawei"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Enterprise"
                  }
                },
                {
                  "id":35,
                  "name":"IT Company",
                  "children":[
                    {
                      "id":2400881,
                      "name":"cellebrite",
                      "data":{
                        "type":"Keyword",
                        "desc":"cellebrite"
                      }
                    },
                    {
                      "id":3113385,
                      "name":"internet storm center",
                      "data":{
                        "type":"Keyword",
                        "desc":"internet storm center"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"IT Company"
                  }
                },
                {
                  "id":36,
                  "name":"Cyber Security Company",
                  "children":[
                    {
                      "id":436,
                      "name":"cisco talos",
                      "children":[
                        {
                          "id":2438708,
                          "name":"cisco asa",
                          "data":{
                            "type":"Keyword",
                            "desc":"cisco asa"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"cisco talos"
                      }
                    },
                    {
                      "id":2147231,
                      "name":"akamai",
                      "data":{
                        "type":"Keyword",
                        "desc":"akamai"
                      }
                    },
                    {
                      "id":2178061,
                      "name":"anomali",
                      "data":{
                        "type":"Keyword",
                        "desc":"anomali"
                      }
                    },
                    {
                      "id":2207027,
                      "name":"ardamax",
                      "data":{
                        "type":"Keyword",
                        "desc":"ardamax"
                      }
                    },
                    {
                      "id":2244604,
                      "name":"avast",
                      "data":{
                        "type":"Keyword",
                        "desc":"avast"
                      }
                    },
                    {
                      "id":2246058,
                      "name":"avira",
                      "data":{
                        "type":"Keyword",
                        "desc":"avira"
                      }
                    },
                    {
                      "id":2289256,
                      "name":"bitdefender",
                      "data":{
                        "type":"Keyword",
                        "desc":"bitdefender"
                      }
                    },
                    {
                      "id":2292540,
                      "name":"blackhat",
                      "data":{
                        "type":"Keyword",
                        "desc":"blackhat"
                      }
                    },
                    {
                      "id":2456676,
                      "name":"cloudflare",
                      "data":{
                        "type":"Keyword",
                        "desc":"cloudflare"
                      }
                    },
                    {
                      "id":2482558,
                      "name":"comodo",
                      "data":{
                        "type":"Keyword",
                        "desc":"comodo"
                      }
                    },
                    {
                      "id":2554088,
                      "name":"crowdstrike",
                      "data":{
                        "type":"Keyword",
                        "desc":"crowdstrike"
                      }
                    },
                    {
                      "id":2562607,
                      "name":"curity",
                      "data":{
                        "type":"Keyword",
                        "desc":"curity"
                      }
                    },
                    {
                      "id":2583457,
                      "name":"cybersecurity company",
                      "data":{
                        "type":"Keyword",
                        "desc":"cybersecurity company"
                      }
                    },
                    {
                      "id":2584104,
                      "name":"cybersecurity firm",
                      "data":{
                        "type":"Keyword",
                        "desc":"cybersecurity firm"
                      }
                    },
                    {
                      "id":2588849,
                      "name":"cylance",
                      "data":{
                        "type":"Keyword",
                        "desc":"cylance"
                      }
                    },
                    {
                      "id":2776307,
                      "name":"eset",
                      "data":{
                        "type":"Keyword",
                        "desc":"eset"
                      }
                    },
                    {
                      "id":2819541,
                      "name":"f-secure",
                      "data":{
                        "type":"Keyword",
                        "desc":"f-secure"
                      }
                    },
                    {
                      "id":2860311,
                      "name":"fireeye",
                      "data":{
                        "type":"Keyword",
                        "desc":"fireeye"
                      }
                    },
                    {
                      "id":2988106,
                      "name":"hbgary",
                      "data":{
                        "type":"Keyword",
                        "desc":"hbgary"
                      }
                    },
                    {
                      "id":3044128,
                      "name":"idss",
                      "data":{
                        "type":"Keyword",
                        "desc":"idss"
                      }
                    },
                    {
                      "id":3122531,
                      "name":"ioactive",
                      "data":{
                        "type":"Keyword",
                        "desc":"ioactive"
                      }
                    },
                    {
                      "id":3161189,
                      "name":"kaspersky",
                      "data":{
                        "type":"Keyword",
                        "desc":"kaspersky"
                      }
                    },
                    {
                      "id":3161499,
                      "name":"kaspersky lab",
                      "data":{
                        "type":"Keyword",
                        "desc":"kaspersky lab"
                      }
                    },
                    {
                      "id":3278784,
                      "name":"mandiant",
                      "data":{
                        "type":"Keyword",
                        "desc":"mandiant"
                      }
                    },
                    {
                      "id":3388413,
                      "name":"netgear",
                      "data":{
                        "type":"Keyword",
                        "desc":"netgear"
                      }
                    },
                    {
                      "id":3388956,
                      "name":"netsec",
                      "data":{
                        "type":"Keyword",
                        "desc":"netsec"
                      }
                    },
                    {
                      "id":3504546,
                      "name":"palo alto networks",
                      "data":{
                        "type":"Keyword",
                        "desc":"palo alto networks"
                      }
                    },
                    {
                      "id":3673786,
                      "name":"quick heal antivirus",
                      "data":{
                        "type":"Keyword",
                        "desc":"quick heal antivirus"
                      }
                    },
                    {
                      "id":3685125,
                      "name":"rapid7",
                      "data":{
                        "type":"Keyword",
                        "desc":"rapid7"
                      }
                    },
                    {
                      "id":3789282,
                      "name":"sans institute",
                      "data":{
                        "type":"Keyword",
                        "desc":"sans institute"
                      }
                    },
                    {
                      "id":3823872,
                      "name":"security startup",
                      "data":{
                        "type":"Keyword",
                        "desc":"security startup"
                      }
                    },
                    {
                      "id":3905920,
                      "name":"sophos",
                      "data":{
                        "type":"Keyword",
                        "desc":"sophos"
                      }
                    },
                    {
                      "id":4040295,
                      "name":"threatconnect",
                      "data":{
                        "type":"Keyword",
                        "desc":"threatconnect"
                      }
                    },
                    {
                      "id":4076561,
                      "name":"trend micro",
                      "data":{
                        "type":"Keyword",
                        "desc":"trend micro"
                      }
                    },
                    {
                      "id":4076845,
                      "name":"trendmicro",
                      "data":{
                        "type":"Keyword",
                        "desc":"trendmicro"
                      }
                    },
                    {
                      "id":4153115,
                      "name":"veracode",
                      "data":{
                        "type":"Keyword",
                        "desc":"veracode"
                      }
                    },
                    {
                      "id":4178666,
                      "name":"vupen",
                      "data":{
                        "type":"Keyword",
                        "desc":"vupen"
                      }
                    },
                    {
                      "id":4193755,
                      "name":"webroot",
                      "data":{
                        "type":"Keyword",
                        "desc":"webroot"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":40,
                    "desc":"Cyber Security Company"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":46,
                "desc":"Business"
              }
            },
            {
              "id":37,
              "name":"Not-for-profit Organization (NGO)",
              "children":[
                {
                  "id":532,
                  "name":"WikiLeaks",
                  "children":[
                    {
                      "id":4148921,
                      "name":"vault7",
                      "data":{
                        "type":"Keyword",
                        "desc":"vault7"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"WikiLeaks"
                  }
                },
                {
                  "id":2455153,
                  "name":"cloud security alliance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cloud security alliance"
                  }
                },
                {
                  "id":2575595,
                  "name":"cyber security alliance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber security alliance"
                  }
                },
                {
                  "id":3130289,
                  "name":"isac",
                  "data":{
                    "type":"Keyword",
                    "desc":"isac"
                  }
                },
                {
                  "id":3130559,
                  "name":"isc2",
                  "data":{
                    "type":"Keyword",
                    "desc":"isc2"
                  }
                },
                {
                  "id":3377548,
                  "name":"national cyber security alliance",
                  "data":{
                    "type":"Keyword",
                    "desc":"national cyber security alliance"
                  }
                },
                {
                  "id":3430932,
                  "name":"oasis cyber threat intelligence",
                  "data":{
                    "type":"Keyword",
                    "desc":"oasis cyber threat intelligence"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Not-for-profit Organization (NGO)"
              }
            },
            {
              "id":474,
              "name":"Agency",
              "children":[
                {
                  "id":2786968,
                  "name":"europol",
                  "data":{
                    "type":"Keyword",
                    "desc":"europol"
                  }
                },
                {
                  "id":3111646,
                  "name":"internet crime complaint center",
                  "data":{
                    "type":"Keyword",
                    "desc":"internet crime complaint center"
                  }
                },
                {
                  "id":3377455,
                  "name":"national crime agency",
                  "data":{
                    "type":"Keyword",
                    "desc":"national crime agency"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Agency"
              }
            },
            {
              "id":3338792,
              "name":"mitre corporation",
              "data":{
                "type":"Keyword",
                "desc":"mitre corporation"
              }
            },
            {
              "id":3665130,
              "name":"pwc",
              "data":{
                "type":"Keyword",
                "desc":"pwc"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":71,
            "desc":"Organization"
          }
        },
        {
          "id":3816349,
          "name":"security community",
          "data":{
            "type":"Keyword",
            "desc":"security community"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":211,
        "desc":"Party (Individual, Group, Organization)"
      }
    },
    {
      "id":39,
      "name":"Cybersecurity Attack",
      "children":[
        {
          "id":40,
          "name":"Physical Attack",
          "children":[
            {
              "id":2982939,
              "name":"hardware security",
              "data":{
                "type":"Keyword",
                "desc":"hardware security"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":2,
            "desc":"Physical"
          }
        },
        {
          "id":41,
          "name":"Software Attack",
          "children":[
            {
              "id":52,
              "name":"Exploit",
              "children":[
                {
                  "id":2807686,
                  "name":"exploit dev",
                  "data":{
                    "type":"Keyword",
                    "desc":"exploit dev"
                  }
                },
                {
                  "id":2808208,
                  "name":"exploit kit",
                  "data":{
                    "type":"Keyword",
                    "desc":"exploit kit"
                  }
                },
                {
                  "id":2808601,
                  "name":"exploit mitigation",
                  "data":{
                    "type":"Keyword",
                    "desc":"exploit mitigation"
                  }
                },
                {
                  "id":2809658,
                  "name":"exploitability",
                  "data":{
                    "type":"Keyword",
                    "desc":"exploitability"
                  }
                },
                {
                  "id":3720932,
                  "name":"remote root exploit",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote root exploit"
                  }
                },
                {
                  "id":4219793,
                  "name":"word document exploit kit",
                  "data":{
                    "type":"Keyword",
                    "desc":"word document exploit kit"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Exploit"
              }
            },
            {
              "id":53,
              "name":"Brute-force",
              "children":[
                {
                  "id":2324074,
                  "name":"brute force attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"brute force attack"
                  }
                },
                {
                  "id":2324202,
                  "name":"brute-force attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"brute-force attack"
                  }
                },
                {
                  "id":2324291,
                  "name":"bruteforce",
                  "data":{
                    "type":"Keyword",
                    "desc":"bruteforce"
                  }
                },
                {
                  "id":2662538,
                  "name":"dictionary attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"dictionary attack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Brute-force"
              }
            },
            {
              "id":239,
              "name":"Reverse Engineering",
              "children":[
                {
                  "id":524,
                  "name":"Reverse Engineering Tool",
                  "children":[
                    {
                      "id":552,
                      "name":"Disassembler",
                      "children":[
                        {
                          "id":3039279,
                          "name":"ida pro",
                          "data":{
                            "type":"Keyword",
                            "desc":"ida pro"
                          }
                        },
                        {
                          "id":3039533,
                          "name":"idapython",
                          "data":{
                            "type":"Keyword",
                            "desc":"idapython"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"A disassembler is a computer program that translates machine language into assembly language—the inverse operation to that of an assembler. A disassembler differs from a decompiler, which targets a high-level language rather than an assembly language."
                      }
                    },
                    {
                      "id":3448213,
                      "name":"ollydbg",
                      "data":{
                        "type":"Keyword",
                        "desc":"ollydbg"
                      }
                    },
                    {
                      "id":3677110,
                      "name":"radare2",
                      "data":{
                        "type":"Keyword",
                        "desc":"radare2"
                      }
                    },
                    {
                      "id":3719839,
                      "name":"remnux",
                      "data":{
                        "type":"Keyword",
                        "desc":"remnux"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Reverse Engineering Tools"
                  }
                },
                {
                  "id":3749400,
                  "name":"reverse engineering malware",
                  "data":{
                    "type":"Keyword",
                    "desc":"reverse engineering malware"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Reverse Engineering"
              }
            },
            {
              "id":309,
              "name":"Malware",
              "children":[
                {
                  "id":43,
                  "name":"Malware Classification",
                  "children":[
                    {
                      "id":42,
                      "name":"Computer Virus",
                      "children":[
                        {
                          "id":3852992,
                          "name":"shamoon",
                          "data":{
                            "type":"Keyword",
                            "desc":"shamoon"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Computer Virus"
                      }
                    },
                    {
                      "id":44,
                      "name":"Ransomware",
                      "children":[
                        {
                          "id":390,
                          "name":"Ransomware Variant",
                          "children":[
                            {
                              "id":391,
                              "name":"Bad Rabbit",
                              "children":[
                                {
                                  "id":2257156,
                                  "name":"badrabbit",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"badrabbit"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"Bad Rabbit"
                              }
                            },
                            {
                              "id":392,
                              "name":"Cerber",
                              "children":[
                                {
                                  "id":2404984,
                                  "name":"cerber ransomware",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"cerber ransomware"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"Cerber"
                              }
                            },
                            {
                              "id":393,
                              "name":"Locky",
                              "children":[
                                {
                                  "id":3238091,
                                  "name":"locky ransomware",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"locky ransomware"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"Locky"
                              }
                            },
                            {
                              "id":394,
                              "name":"Petya",
                              "children":[
                                {
                                  "id":3421427,
                                  "name":"notpetya",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"notpetya"
                                  }
                                },
                                {
                                  "id":3543206,
                                  "name":"petya ransomware",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"petya ransomware"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":3,
                                "desc":"Petya"
                              }
                            },
                            {
                              "id":395,
                              "name":"Wannacry",
                              "children":[
                                {
                                  "id":4181695,
                                  "name":"wanacry ransomware technical analysis",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wanacry ransomware technical analysis"
                                  }
                                },
                                {
                                  "id":4181901,
                                  "name":"wannacry attack",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wannacry attack"
                                  }
                                },
                                {
                                  "id":4182141,
                                  "name":"wannacry ransomware",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wannacry ransomware"
                                  }
                                },
                                {
                                  "id":4182144,
                                  "name":"wannacry ransomware attack",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wannacry ransomware attack"
                                  }
                                },
                                {
                                  "id":4182174,
                                  "name":"wannacry ransomware decryption tool",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wannacry ransomware decryption tool"
                                  }
                                },
                                {
                                  "id":4187963,
                                  "name":"wcry",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"wcry"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":7,
                                "desc":"Wannacry"
                              }
                            },
                            {
                              "id":396,
                              "name":"CryptoWall",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"CryptoWall"
                              }
                            },
                            {
                              "id":397,
                              "name":"CryptoLocker",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"CryptoLocker"
                              }
                            },
                            {
                              "id":4027337,
                              "name":"teslacrypt",
                              "data":{
                                "type":"Keyword",
                                "desc":"teslacrypt"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":20,
                            "desc":"Ransomware Variants"
                          }
                        },
                        {
                          "id":3683190,
                          "name":"ransomware attack",
                          "data":{
                            "type":"Keyword",
                            "desc":"ransomware attack"
                          }
                        },
                        {
                          "id":3683370,
                          "name":"ransomware campaign",
                          "data":{
                            "type":"Keyword",
                            "desc":"ransomware campaign"
                          }
                        },
                        {
                          "id":3683516,
                          "name":"ransomware decryption tool",
                          "data":{
                            "type":"Keyword",
                            "desc":"ransomware decryption tool"
                          }
                        },
                        {
                          "id":3684056,
                          "name":"ransomware outbreak",
                          "data":{
                            "type":"Keyword",
                            "desc":"ransomware outbreak"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":25,
                        "desc":"Ransomware"
                      }
                    },
                    {
                      "id":45,
                      "name":"Computer Worm",
                      "children":[
                        {
                          "id":2501314,
                          "name":"conficker",
                          "data":{
                            "type":"Keyword",
                            "desc":"conficker"
                          }
                        },
                        {
                          "id":3680169,
                          "name":"ramnit",
                          "data":{
                            "type":"Keyword",
                            "desc":"ramnit"
                          }
                        },
                        {
                          "id":3960150,
                          "name":"stuxnet",
                          "data":{
                            "type":"Keyword",
                            "desc":"stuxnet"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Computer Worm"
                      }
                    },
                    {
                      "id":46,
                      "name":"Computer Trojan",
                      "children":[
                        {
                          "id":479,
                          "name":"Banking Trojan",
                          "children":[
                            {
                              "id":509,
                              "name":"Zeus",
                              "children":[
                                {
                                  "id":510,
                                  "name":"Gameover Zeus",
                                  "children":[
                                    {
                                      "id":2911214,
                                      "name":"gameover zeus botnet",
                                      "data":{
                                        "type":"Keyword",
                                        "desc":"gameover zeus botnet"
                                      }
                                    }
                                  ],
                                  "data":{
                                    "type":"Class",
                                    "size":2,
                                    "desc":"Gameover Zeus"
                                  }
                                },
                                {
                                  "id":4243189,
                                  "name":"zeus banking trojan",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"zeus banking trojan"
                                  }
                                },
                                {
                                  "id":4243209,
                                  "name":"zeus botnet",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"zeus botnet"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":5,
                                "desc":"Zeus"
                              }
                            },
                            {
                              "id":2703294,
                              "name":"dridex",
                              "data":{
                                "type":"Keyword",
                                "desc":"dridex"
                              }
                            },
                            {
                              "id":2712062,
                              "name":"duqu",
                              "data":{
                                "type":"Keyword",
                                "desc":"duqu"
                              }
                            },
                            {
                              "id":2715090,
                              "name":"dyre",
                              "data":{
                                "type":"Keyword",
                                "desc":"dyre"
                              }
                            },
                            {
                              "id":3179872,
                              "name":"kronos banking trojan",
                              "data":{
                                "type":"Keyword",
                                "desc":"kronos banking trojan"
                              }
                            },
                            {
                              "id":4078306,
                              "name":"trickbot banking trojan",
                              "data":{
                                "type":"Keyword",
                                "desc":"trickbot banking trojan"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":11,
                            "desc":"Banking Trojan"
                          }
                        },
                        {
                          "id":545,
                          "name":"Remote Access Trojan (RAT)",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"Remote Access Trojan (RAT)"
                          }
                        },
                        {
                          "id":2389152,
                          "name":"carberp",
                          "data":{
                            "type":"Keyword",
                            "desc":"carberp"
                          }
                        },
                        {
                          "id":2596290,
                          "name":"darkcomet",
                          "data":{
                            "type":"Keyword",
                            "desc":"darkcomet"
                          }
                        },
                        {
                          "id":2698395,
                          "name":"doublepulsar",
                          "data":{
                            "type":"Keyword",
                            "desc":"doublepulsar"
                          }
                        },
                        {
                          "id":2782138,
                          "name":"eternalblue",
                          "data":{
                            "type":"Keyword",
                            "desc":"eternalblue"
                          }
                        },
                        {
                          "id":3925406,
                          "name":"spyeye",
                          "data":{
                            "type":"Keyword",
                            "desc":"spyeye"
                          }
                        },
                        {
                          "id":4078295,
                          "name":"trickbot",
                          "data":{
                            "type":"Keyword",
                            "desc":"trickbot"
                          }
                        },
                        {
                          "id":4080415,
                          "name":"trojans",
                          "data":{
                            "type":"Keyword",
                            "desc":"trojans"
                          }
                        },
                        {
                          "id":4092498,
                          "name":"turla",
                          "data":{
                            "type":"Keyword",
                            "desc":"turla"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":21,
                        "desc":"Computer Trojan"
                      }
                    },
                    {
                      "id":47,
                      "name":"Spyware",
                      "children":[
                        {
                          "id":2586463,
                          "name":"cyberspy",
                          "data":{
                            "type":"Keyword",
                            "desc":"cyberspy"
                          }
                        },
                        {
                          "id":2858445,
                          "name":"finfisher",
                          "data":{
                            "type":"Keyword",
                            "desc":"finfisher"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Spyware"
                      }
                    },
                    {
                      "id":48,
                      "name":"Rootkit",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Rootkit"
                      }
                    },
                    {
                      "id":237,
                      "name":"Malicious Adware",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Malicious Adware"
                      }
                    },
                    {
                      "id":245,
                      "name":"Bootkit",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Bootkit"
                      }
                    },
                    {
                      "id":312,
                      "name":"Keylogger",
                      "children":[
                        {
                          "id":3167387,
                          "name":"key logger",
                          "data":{
                            "type":"Keyword",
                            "desc":"key logger"
                          }
                        },
                        {
                          "id":3168901,
                          "name":"keylogging",
                          "data":{
                            "type":"Keyword",
                            "desc":"keylogging"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"A keystroke logger, or keylogger, records every keystroke entry made on a computer, often without the permission or knowledge of the user"
                      }
                    },
                    {
                      "id":475,
                      "name":"By Operating System",
                      "children":[
                        {
                          "id":3225066,
                          "name":"linux malware",
                          "data":{
                            "type":"Keyword",
                            "desc":"linux malware"
                          }
                        },
                        {
                          "id":3256445,
                          "name":"mac malware",
                          "data":{
                            "type":"Keyword",
                            "desc":"mac malware"
                          }
                        },
                        {
                          "id":4212489,
                          "name":"windows malware",
                          "data":{
                            "type":"Keyword",
                            "desc":"windows malware"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"By Operating System"
                      }
                    },
                    {
                      "id":482,
                      "name":"Espionage",
                      "children":[
                        {
                          "id":3705821,
                          "name":"redoctober",
                          "data":{
                            "type":"Keyword",
                            "desc":"redoctober"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Espionage"
                      }
                    },
                    {
                      "id":485,
                      "name":"Polymorphic Malware",
                      "children":[
                        {
                          "id":3334238,
                          "name":"mirai",
                          "data":{
                            "type":"Keyword",
                            "desc":"mirai"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection"
                      }
                    },
                    {
                      "id":2185971,
                      "name":"anti-debugging",
                      "data":{
                        "type":"Keyword",
                        "desc":"anti-debugging"
                      }
                    },
                    {
                      "id":2187534,
                      "name":"anti-vm",
                      "data":{
                        "type":"Keyword",
                        "desc":"anti-vm"
                      }
                    },
                    {
                      "id":2203428,
                      "name":"apt malware",
                      "data":{
                        "type":"Keyword",
                        "desc":"apt malware"
                      }
                    },
                    {
                      "id":2222300,
                      "name":"atm malware",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm malware"
                      }
                    },
                    {
                      "id":2262019,
                      "name":"banking malware",
                      "data":{
                        "type":"Keyword",
                        "desc":"banking malware"
                      }
                    },
                    {
                      "id":2292432,
                      "name":"blackenergy",
                      "data":{
                        "type":"Keyword",
                        "desc":"blackenergy"
                      }
                    },
                    {
                      "id":2555276,
                      "name":"crypter",
                      "data":{
                        "type":"Keyword",
                        "desc":"crypter"
                      }
                    },
                    {
                      "id":2693572,
                      "name":"domain generation algorithm",
                      "data":{
                        "type":"Keyword",
                        "desc":"domain generation algorithm"
                      }
                    },
                    {
                      "id":2852935,
                      "name":"fileless malware",
                      "data":{
                        "type":"Keyword",
                        "desc":"fileless malware"
                      }
                    },
                    {
                      "id":3270026,
                      "name":"malware attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware attack"
                      }
                    },
                    {
                      "id":3271544,
                      "name":"malware family",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware family"
                      }
                    },
                    {
                      "id":3274117,
                      "name":"malware variant",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware variant"
                      }
                    },
                    {
                      "id":3314617,
                      "name":"meterpreter",
                      "data":{
                        "type":"Keyword",
                        "desc":"meterpreter"
                      }
                    },
                    {
                      "id":3580908,
                      "name":"pos malware",
                      "data":{
                        "type":"Keyword",
                        "desc":"pos malware"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":84,
                    "desc":"Malware types and classification"
                  }
                },
                {
                  "id":310,
                  "name":"Malware Analysis",
                  "children":[
                    {
                      "id":2240689,
                      "name":"automate dynamic malware analysis",
                      "data":{
                        "type":"Keyword",
                        "desc":"automate dynamic malware analysis"
                      }
                    },
                    {
                      "id":2241511,
                      "name":"automated malware analysis",
                      "data":{
                        "type":"Keyword",
                        "desc":"automated malware analysis"
                      }
                    },
                    {
                      "id":2561023,
                      "name":"cuckoo sandbox",
                      "data":{
                        "type":"Keyword",
                        "desc":"cuckoo sandbox"
                      }
                    },
                    {
                      "id":2714271,
                      "name":"dynamic malware analysis",
                      "data":{
                        "type":"Keyword",
                        "desc":"dynamic malware analysis"
                      }
                    },
                    {
                      "id":3269848,
                      "name":"malware analysis system",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware analysis system"
                      }
                    },
                    {
                      "id":3269861,
                      "name":"malware analysis tool",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware analysis tool"
                      }
                    },
                    {
                      "id":3269890,
                      "name":"malware analyst",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware analyst"
                      }
                    },
                    {
                      "id":3270097,
                      "name":"malware attribute enumeration",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware attribute enumeration"
                      }
                    },
                    {
                      "id":3270241,
                      "name":"malware behavior",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware behavior"
                      }
                    },
                    {
                      "id":3590388,
                      "name":"practical malware analysis",
                      "data":{
                        "type":"Keyword",
                        "desc":"practical malware analysis"
                      }
                    },
                    {
                      "id":4165615,
                      "name":"virtual machine introspection",
                      "data":{
                        "type":"Keyword",
                        "desc":"virtual machine introspection"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":12,
                    "desc":"Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor."
                  }
                },
                {
                  "id":313,
                  "name":"Malware Security",
                  "children":[
                    {
                      "id":315,
                      "name":"Protection",
                      "children":[
                        {
                          "id":3270971,
                          "name":"malware detection",
                          "data":{
                            "type":"Keyword",
                            "desc":"malware detection"
                          }
                        },
                        {
                          "id":3271002,
                          "name":"malware detection method",
                          "data":{
                            "type":"Keyword",
                            "desc":"malware detection method"
                          }
                        },
                        {
                          "id":3271023,
                          "name":"malware detection system",
                          "data":{
                            "type":"Keyword",
                            "desc":"malware detection system"
                          }
                        },
                        {
                          "id":3272987,
                          "name":"malware protection",
                          "data":{
                            "type":"Keyword",
                            "desc":"malware protection"
                          }
                        },
                        {
                          "id":3272995,
                          "name":"malware protection engine",
                          "data":{
                            "type":"Keyword",
                            "desc":"malware protection engine"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":6,
                        "desc":"Protection"
                      }
                    },
                    {
                      "id":3270430,
                      "name":"malware campaign",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware campaign"
                      }
                    },
                    {
                      "id":3272139,
                      "name":"malware infection",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware infection"
                      }
                    },
                    {
                      "id":3273724,
                      "name":"malware target",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware target"
                      }
                    },
                    {
                      "id":3273926,
                      "name":"malware threat",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware threat"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":11,
                    "desc":"Malware Security"
                  }
                },
                {
                  "id":314,
                  "name":"Malware Binary",
                  "children":[
                    {
                      "id":3270116,
                      "name":"malware author",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware author"
                      }
                    },
                    {
                      "id":3273256,
                      "name":"malware sample",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware sample"
                      }
                    },
                    {
                      "id":3274287,
                      "name":"malware writer",
                      "data":{
                        "type":"Keyword",
                        "desc":"malware writer"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Malware Binary"
                  }
                },
                {
                  "id":483,
                  "name":"Malware Propagation",
                  "children":[
                    {
                      "id":484,
                      "name":"Malvertising",
                      "children":[
                        {
                          "id":3269376,
                          "name":"malvertise",
                          "data":{
                            "type":"Keyword",
                            "desc":"malvertise"
                          }
                        },
                        {
                          "id":3269384,
                          "name":"malvertise campaign",
                          "data":{
                            "type":"Keyword",
                            "desc":"malvertise campaign"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Malicious Advertising"
                      }
                    },
                    {
                      "id":3078866,
                      "name":"infection vector",
                      "data":{
                        "type":"Keyword",
                        "desc":"infection vector"
                      }
                    },
                    {
                      "id":3269121,
                      "name":"malspam",
                      "data":{
                        "type":"Keyword",
                        "desc":"malspam"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":6,
                    "desc":"Malware Propagation"
                  }
                },
                {
                  "id":3083374,
                  "name":"infosec malware",
                  "data":{
                    "type":"Keyword",
                    "desc":"infosec malware"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":119,
                "desc":"Malware"
              }
            },
            {
              "id":319,
              "name":"Buffer Overflow",
              "children":[
                {
                  "id":522,
                  "name":"Heap Buffer Overflow",
                  "children":[
                    {
                      "id":2991657,
                      "name":"heap overflow",
                      "data":{
                        "type":"Keyword",
                        "desc":"heap overflow"
                      }
                    },
                    {
                      "id":3366179,
                      "name":"multiple heap buffer overflow",
                      "data":{
                        "type":"Keyword",
                        "desc":"multiple heap buffer overflow"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations."
                  }
                },
                {
                  "id":2326940,
                  "name":"buffer overflow attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"buffer overflow attack"
                  }
                },
                {
                  "id":2327005,
                  "name":"buffer overflow vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"buffer overflow vulnerability"
                  }
                },
                {
                  "id":3929537,
                  "name":"stack buffer overflow",
                  "data":{
                    "type":"Keyword",
                    "desc":"stack buffer overflow"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Buffer Overflow"
              }
            },
            {
              "id":513,
              "name":"drive-by download attack",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"drive-by download attack"
              }
            },
            {
              "id":2196787,
              "name":"application attack",
              "data":{
                "type":"Keyword",
                "desc":"application attack"
              }
            },
            {
              "id":2205239,
              "name":"arbitrary code execution",
              "data":{
                "type":"Keyword",
                "desc":"arbitrary code execution"
              }
            },
            {
              "id":2866736,
              "name":"flash exploit",
              "data":{
                "type":"Keyword",
                "desc":"flash exploit"
              }
            },
            {
              "id":3749701,
              "name":"reverse shell",
              "data":{
                "type":"Keyword",
                "desc":"reverse shell"
              }
            },
            {
              "id":3842989,
              "name":"server-side template injection",
              "data":{
                "type":"Keyword",
                "desc":"server-side template injection"
              }
            },
            {
              "id":3847081,
              "name":"session hijacking",
              "data":{
                "type":"Keyword",
                "desc":"session hijacking"
              }
            },
            {
              "id":4212301,
              "name":"windows kernel font fuzzing",
              "data":{
                "type":"Keyword",
                "desc":"windows kernel font fuzzing"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":156,
            "desc":"Software Attack"
          }
        },
        {
          "id":54,
          "name":"Network Attack",
          "children":[
            {
              "id":49,
              "name":"Web-based Attack",
              "children":[
                {
                  "id":51,
                  "name":"Web Application Attack",
                  "children":[
                    {
                      "id":514,
                      "name":"Injection",
                      "children":[
                        {
                          "id":3089489,
                          "name":"injection flaw",
                          "data":{
                            "type":"Keyword",
                            "desc":"injection flaw"
                          }
                        },
                        {
                          "id":3089650,
                          "name":"injection technique",
                          "data":{
                            "type":"Keyword",
                            "desc":"injection technique"
                          }
                        },
                        {
                          "id":3720502,
                          "name":"remote file inclusion",
                          "data":{
                            "type":"Keyword",
                            "desc":"remote file inclusion"
                          }
                        },
                        {
                          "id":4232847,
                          "name":"xss attack",
                          "data":{
                            "type":"Keyword",
                            "desc":"xss attack"
                          }
                        },
                        {
                          "id":4233616,
                          "name":"xxe",
                          "data":{
                            "type":"Keyword",
                            "desc":"xxe"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":6,
                        "desc":"Injection"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Web Application Attack"
                  }
                },
                {
                  "id":4190436,
                  "name":"web attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"web attack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Web-based Attack"
              }
            },
            {
              "id":55,
              "name":"APT",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"APT"
              }
            },
            {
              "id":56,
              "name":"Man in the middle",
              "children":[
                {
                  "id":3274966,
                  "name":"man-in-the-middle",
                  "data":{
                    "type":"Keyword",
                    "desc":"man-in-the-middle"
                  }
                },
                {
                  "id":3274967,
                  "name":"man-in-the-middle attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"man-in-the-middle attack"
                  }
                },
                {
                  "id":3338554,
                  "name":"mitm",
                  "data":{
                    "type":"Keyword",
                    "desc":"mitm"
                  }
                },
                {
                  "id":3338567,
                  "name":"mitm attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"mitm attack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Man in the middle"
              }
            },
            {
              "id":57,
              "name":"DOS",
              "children":[
                {
                  "id":58,
                  "name":"DDOS",
                  "children":[
                    {
                      "id":2611463,
                      "name":"ddos attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"ddos attack"
                      }
                    },
                    {
                      "id":2611623,
                      "name":"ddos botnet",
                      "data":{
                        "type":"Keyword",
                        "desc":"ddos botnet"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic."
                  }
                },
                {
                  "id":2638274,
                  "name":"denial-of-service",
                  "data":{
                    "type":"Keyword",
                    "desc":"denial-of-service"
                  }
                },
                {
                  "id":2638276,
                  "name":"denial-of-service attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"denial-of-service attack"
                  }
                },
                {
                  "id":2696955,
                  "name":"dos attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"dos attack"
                  }
                },
                {
                  "id":3987272,
                  "name":"syn flood",
                  "data":{
                    "type":"Keyword",
                    "desc":"syn flood"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet"
              }
            },
            {
              "id":59,
              "name":"DNS-based attack",
              "children":[
                {
                  "id":60,
                  "name":"Poisoning",
                  "children":[
                    {
                      "id":2571874,
                      "name":"cyber army",
                      "data":{
                        "type":"Keyword",
                        "desc":"cyber army"
                      }
                    },
                    {
                      "id":3568700,
                      "name":"poisoning attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"poisoning attack"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Poisoning"
                  }
                },
                {
                  "id":61,
                  "name":"Spoofing",
                  "children":[
                    {
                      "id":3922221,
                      "name":"spoof attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"spoof attack"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Spoofing"
                  }
                },
                {
                  "id":62,
                  "name":"Manipulation",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Manipulation"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"DNS-based network attacks"
              }
            },
            {
              "id":63,
              "name":"Botnet",
              "children":[
                {
                  "id":3124027,
                  "name":"iot botnet",
                  "data":{
                    "type":"Keyword",
                    "desc":"iot botnet"
                  }
                },
                {
                  "id":3164120,
                  "name":"kelihos botnet",
                  "data":{
                    "type":"Keyword",
                    "desc":"kelihos botnet"
                  }
                },
                {
                  "id":3383887,
                  "name":"necurs",
                  "data":{
                    "type":"Keyword",
                    "desc":"necurs"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection."
              }
            },
            {
              "id":64,
              "name":"Command & Control",
              "children":[
                {
                  "id":66,
                  "name":"Remote Command Execution",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Remote Command Execution"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Command & Control"
              }
            },
            {
              "id":67,
              "name":"Port Scanning",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Port Scanning"
              }
            },
            {
              "id":398,
              "name":"Replay Attack",
              "children":[
                {
                  "id":403,
                  "name":"KRACK",
                  "children":[
                    {
                      "id":3167766,
                      "name":"key reinstallation attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"key reinstallation attack"
                      }
                    },
                    {
                      "id":3179147,
                      "name":"krack attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"krack attack"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"KRACK (Key Re-installation Attack) is a severe replay attack (a type of exploitable flaw) on the Wi-Fi Protected Access protocol that secures Wi-Fi connections."
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed."
              }
            },
            {
              "id":3093157,
              "name":"insider attack",
              "data":{
                "type":"Keyword",
                "desc":"insider attack"
              }
            },
            {
              "id":3501392,
              "name":"packet loss",
              "data":{
                "type":"Keyword",
                "desc":"packet loss"
              }
            },
            {
              "id":3720050,
              "name":"remote attack",
              "data":{
                "type":"Keyword",
                "desc":"remote attack"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":45,
            "desc":"Network Attack"
          }
        },
        {
          "id":68,
          "name":"Social Engineering",
          "children":[
            {
              "id":69,
              "name":"Phishing",
              "children":[
                {
                  "id":70,
                  "name":"Spear Phishing",
                  "children":[
                    {
                      "id":362,
                      "name":"Email Account Compromise (EAC)",
                      "children":[
                        {
                          "id":363,
                          "name":"Business Email Compromise (BEC)",
                          "children":[
                            {
                              "id":2333691,
                              "name":"business email compromise campaign",
                              "data":{
                                "type":"Keyword",
                                "desc":"business email compromise campaign"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":2,
                            "desc":"BEC is the impersonation of executives or business contacts to obtain the transfer of funds or sensitive information"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Email Account Compromise (EAC)"
                      }
                    },
                    {
                      "id":3915040,
                      "name":"spear phishing attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"spear phishing attack"
                      }
                    },
                    {
                      "id":3915065,
                      "name":"spear phishing email",
                      "data":{
                        "type":"Keyword",
                        "desc":"spear phishing email"
                      }
                    },
                    {
                      "id":3915098,
                      "name":"spear-phishing",
                      "data":{
                        "type":"Keyword",
                        "desc":"spear-phishing"
                      }
                    },
                    {
                      "id":3915242,
                      "name":"spearphishing",
                      "data":{
                        "type":"Keyword",
                        "desc":"spearphishing"
                      }
                    },
                    {
                      "id":4206203,
                      "name":"widespread post-election spear phishing",
                      "data":{
                        "type":"Keyword",
                        "desc":"widespread post-election spear phishing"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":9,
                    "desc":"Spear Phishing"
                  }
                },
                {
                  "id":2939561,
                  "name":"google docs phish attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"google docs phish attack"
                  }
                },
                {
                  "id":2939572,
                  "name":"google docs phishing scam",
                  "data":{
                    "type":"Keyword",
                    "desc":"google docs phishing scam"
                  }
                },
                {
                  "id":3461280,
                  "name":"online dating scams",
                  "data":{
                    "type":"Keyword",
                    "desc":"online dating scams"
                  }
                },
                {
                  "id":3547123,
                  "name":"phish site",
                  "data":{
                    "type":"Keyword",
                    "desc":"phish site"
                  }
                },
                {
                  "id":3547306,
                  "name":"phishing attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"phishing attack"
                  }
                },
                {
                  "id":3547655,
                  "name":"phishing email",
                  "data":{
                    "type":"Keyword",
                    "desc":"phishing email"
                  }
                },
                {
                  "id":3548023,
                  "name":"phishing scam",
                  "data":{
                    "type":"Keyword",
                    "desc":"phishing scam"
                  }
                },
                {
                  "id":3548193,
                  "name":"phishing site",
                  "data":{
                    "type":"Keyword",
                    "desc":"phishing site"
                  }
                },
                {
                  "id":4015112,
                  "name":"tech support scam",
                  "data":{
                    "type":"Keyword",
                    "desc":"tech support scam"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":19,
                "desc":"Phishing"
              }
            },
            {
              "id":3893604,
              "name":"social engineering attack",
              "data":{
                "type":"Keyword",
                "desc":"social engineering attack"
              }
            },
            {
              "id":3893735,
              "name":"social engineering technique",
              "data":{
                "type":"Keyword",
                "desc":"social engineering technique"
              }
            },
            {
              "id":3895762,
              "name":"socialengineering",
              "data":{
                "type":"Keyword",
                "desc":"socialengineering"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":23,
            "desc":"Social Engineering"
          }
        },
        {
          "id":72,
          "name":"Unauthorized Access",
          "children":[
            {
              "id":4108862,
              "name":"unauthorised access",
              "data":{
                "type":"Keyword",
                "desc":"unauthorised access"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":2,
            "desc":"Unauthorized Access"
          }
        },
        {
          "id":73,
          "name":"Unauthorized Privilege Escalation",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Unauthorized Privilege Escalation"
          }
        },
        {
          "id":200,
          "name":"Side-Channel Attack",
          "children":[
            {
              "id":201,
              "name":"Traffic analysis",
              "children":[
                {
                  "id":2871460,
                  "name":"flow analysis",
                  "data":{
                    "type":"Keyword",
                    "desc":"flow analysis"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Traffic analysis based side-channel attack"
              }
            },
            {
              "id":202,
              "name":"Timing-based attack",
              "children":[
                {
                  "id":4048619,
                  "name":"timing attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"timing attack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Timing-based attack"
              }
            },
            {
              "id":203,
              "name":"Power analysis",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Power analysis based side-channel attack"
              }
            },
            {
              "id":204,
              "name":"TEMPEST",
              "children":[
                {
                  "id":205,
                  "name":"Van Eck phreaking",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"https://en.wikipedia.org/wiki/Van_Eck_phreaking"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Electromagnetic emanations leakage based side-channel attack"
              }
            },
            {
              "id":206,
              "name":"Acoustic attack",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Acoustic based side-channel attack"
              }
            },
            {
              "id":207,
              "name":"Optical attack",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Side-channel attack basd on optical signal analysis"
              }
            },
            {
              "id":550,
              "name":"Memory Attack",
              "children":[
                {
                  "id":400,
                  "name":"Direct Memory Access (DMA)",
                  "children":[
                    {
                      "id":4135561,
                      "name":"usb type-c dma attack",
                      "data":{
                        "type":"Keyword",
                        "desc":"usb type-c dma attack"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence of high-speed expansion ports that permit direct memory access (DMA)."
                  }
                },
                {
                  "id":551,
                  "name":"In-Memory Key Recovery",
                  "children":[
                    {
                      "id":3057978,
                      "name":"in-memory private rsa key recovery",
                      "data":{
                        "type":"Keyword",
                        "desc":"in-memory private rsa key recovery"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"The recovery method uses a linear scan of memory to generate trial keys from all possible memory positions to decrypt the container."
                  }
                },
                {
                  "id":553,
                  "name":"Memory Corruption",
                  "children":[
                    {
                      "id":3165480,
                      "name":"kernel memory corruption",
                      "data":{
                        "type":"Keyword",
                        "desc":"kernel memory corruption"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Memory corruption occurs in a computer program when the contents of a memory location are modified due to programmatic behavior that exceeds the intention of the original programmer or program/language constructs; this is termed violating memory safety."
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Memory Attack"
              }
            },
            {
              "id":2539004,
              "name":"covert channel",
              "data":{
                "type":"Keyword",
                "desc":"covert channel"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":18,
            "desc":"In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs)."
          }
        },
        {
          "id":218,
          "name":"Attacking Tool",
          "children":[
            {
              "id":183,
              "name":"Hardware Attacking Tool",
              "children":[
                {
                  "id":256,
                  "name":"Card Skimmer",
                  "children":[
                    {
                      "id":2222391,
                      "name":"atm skimmer",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer"
                      }
                    },
                    {
                      "id":2222393,
                      "name":"atm skimmer diebold",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer diebold"
                      }
                    },
                    {
                      "id":2222394,
                      "name":"atm skimmer diebold opteva",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer diebold opteva"
                      }
                    },
                    {
                      "id":2222398,
                      "name":"atm skimmer ncr",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer ncr"
                      }
                    },
                    {
                      "id":2222409,
                      "name":"atm skimmer wincor",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer wincor"
                      }
                    },
                    {
                      "id":2222410,
                      "name":"atm skimmer wincor nixdorf",
                      "data":{
                        "type":"Keyword",
                        "desc":"atm skimmer wincor nixdorf"
                      }
                    },
                    {
                      "id":3331197,
                      "name":"mini123",
                      "data":{
                        "type":"Keyword",
                        "desc":"mini123"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":8,
                    "desc":"Card Skimmer"
                  }
                },
                {
                  "id":2081954,
                  "name":"2xcrm41",
                  "data":{
                    "type":"Keyword",
                    "desc":"2xcrm41"
                  }
                },
                {
                  "id":4135478,
                  "name":"usb rubber ducky",
                  "data":{
                    "type":"Keyword",
                    "desc":"usb rubber ducky"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":11,
                "desc":"Hardware tools used for conducting attacks"
              }
            },
            {
              "id":219,
              "name":"Software Attacking Tool",
              "children":[
                {
                  "id":518,
                  "name":"SQL Injection Tool",
                  "children":[
                    {
                      "id":2987277,
                      "name":"havij",
                      "data":{
                        "type":"Keyword",
                        "desc":"havij"
                      }
                    },
                    {
                      "id":3926021,
                      "name":"sql injection exploitation tool",
                      "data":{
                        "type":"Keyword",
                        "desc":"sql injection exploitation tool"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"SQL Injection Tool"
                  }
                },
                {
                  "id":554,
                  "name":"PowerShell",
                  "children":[
                    {
                      "id":3589179,
                      "name":"powershell script",
                      "data":{
                        "type":"Keyword",
                        "desc":"powershell script"
                      }
                    },
                    {
                      "id":3589363,
                      "name":"powerview",
                      "data":{
                        "type":"Keyword",
                        "desc":"powerview"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"PowerShell is a task-based command-line shell and scripting language built on .NET."
                  }
                },
                {
                  "id":2175091,
                  "name":"angler exploit kit",
                  "data":{
                    "type":"Keyword",
                    "desc":"angler exploit kit"
                  }
                },
                {
                  "id":2293308,
                  "name":"blackhole exploit kit",
                  "data":{
                    "type":"Keyword",
                    "desc":"blackhole exploit kit"
                  }
                },
                {
                  "id":2869123,
                  "name":"flip feng shui",
                  "data":{
                    "type":"Keyword",
                    "desc":"flip feng shui"
                  }
                },
                {
                  "id":3000321,
                  "name":"hex editor",
                  "data":{
                    "type":"Keyword",
                    "desc":"hex editor"
                  }
                },
                {
                  "id":3720986,
                  "name":"remote shell",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote shell"
                  }
                },
                {
                  "id":3857544,
                  "name":"shellcode",
                  "data":{
                    "type":"Keyword",
                    "desc":"shellcode"
                  }
                },
                {
                  "id":3891076,
                  "name":"sniffer",
                  "data":{
                    "type":"Keyword",
                    "desc":"sniffer"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":14,
                "desc":"Software tools for conducting attacks"
              }
            },
            {
              "id":438,
              "name":"Crack Tool",
              "children":[
                {
                  "id":3516481,
                  "name":"password crack",
                  "data":{
                    "type":"Keyword",
                    "desc":"password crack"
                  }
                },
                {
                  "id":3516519,
                  "name":"password crack tool",
                  "data":{
                    "type":"Keyword",
                    "desc":"password crack tool"
                  }
                },
                {
                  "id":3516530,
                  "name":"password cracker",
                  "data":{
                    "type":"Keyword",
                    "desc":"password cracker"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Crack Tool"
              }
            },
            {
              "id":2788693,
              "name":"evasion technique",
              "data":{
                "type":"Keyword",
                "desc":"evasion technique"
              }
            },
            {
              "id":3260726,
              "name":"magnitude exploit kit",
              "data":{
                "type":"Keyword",
                "desc":"magnitude exploit kit"
              }
            },
            {
              "id":3754310,
              "name":"rig exploit kit",
              "data":{
                "type":"Keyword",
                "desc":"rig exploit kit"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":33,
            "desc":"Tools used for conducting attacks"
          }
        },
        {
          "id":238,
          "name":"Database Attack",
          "children":[
            {
              "id":50,
              "name":"SQL Injection",
              "children":[
                {
                  "id":2295678,
                  "name":"blind sql injection",
                  "data":{
                    "type":"Keyword",
                    "desc":"blind sql injection"
                  }
                },
                {
                  "id":3925984,
                  "name":"sql injection attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"sql injection attack"
                  }
                },
                {
                  "id":3926023,
                  "name":"sql injection flaw",
                  "data":{
                    "type":"Keyword",
                    "desc":"sql injection flaw"
                  }
                },
                {
                  "id":3926339,
                  "name":"sqli",
                  "data":{
                    "type":"Keyword",
                    "desc":"sqli"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"SQL Injection"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":6,
            "desc":"Attacks on databases"
          }
        },
        {
          "id":240,
          "name":"Incident",
          "children":[
            {
              "id":342,
              "name":"Response",
              "children":[
                {
                  "id":343,
                  "name":"Team",
                  "children":[
                    {
                      "id":344,
                      "name":"CERT",
                      "children":[
                        {
                          "id":3037739,
                          "name":"ics-cert",
                          "data":{
                            "type":"Keyword",
                            "desc":"ics-cert"
                          }
                        },
                        {
                          "id":3377528,
                          "name":"national cyber incident response plan",
                          "data":{
                            "type":"Keyword",
                            "desc":"national cyber incident response plan"
                          }
                        },
                        {
                          "id":4131614,
                          "name":"us-cert",
                          "data":{
                            "type":"Keyword",
                            "desc":"us-cert"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Computer Emergency Readiness Team"
                      }
                    },
                    {
                      "id":2494564,
                      "name":"computer emergency response team",
                      "data":{
                        "type":"Keyword",
                        "desc":"computer emergency response team"
                      }
                    },
                    {
                      "id":2495471,
                      "name":"computer security incident response team",
                      "data":{
                        "type":"Keyword",
                        "desc":"computer security incident response team"
                      }
                    },
                    {
                      "id":2558658,
                      "name":"csirt",
                      "data":{
                        "type":"Keyword",
                        "desc":"csirt"
                      }
                    },
                    {
                      "id":3060278,
                      "name":"incident response team",
                      "data":{
                        "type":"Keyword",
                        "desc":"incident response team"
                      }
                    },
                    {
                      "id":3628537,
                      "name":"product security incident response team",
                      "data":{
                        "type":"Keyword",
                        "desc":"product security incident response team"
                      }
                    },
                    {
                      "id":3819303,
                      "name":"security incident response team",
                      "data":{
                        "type":"Keyword",
                        "desc":"security incident response team"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":11,
                    "desc":"Team"
                  }
                },
                {
                  "id":2314649,
                  "name":"breach response",
                  "data":{
                    "type":"Keyword",
                    "desc":"breach response"
                  }
                },
                {
                  "id":2314666,
                  "name":"breach response plan",
                  "data":{
                    "type":"Keyword",
                    "desc":"breach response plan"
                  }
                },
                {
                  "id":2574062,
                  "name":"cyber incident response plan",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber incident response plan"
                  }
                },
                {
                  "id":2598922,
                  "name":"data breach response",
                  "data":{
                    "type":"Keyword",
                    "desc":"data breach response"
                  }
                },
                {
                  "id":3059991,
                  "name":"incident responder",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident responder"
                  }
                },
                {
                  "id":3059998,
                  "name":"incident response",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident response"
                  }
                },
                {
                  "id":3060000,
                  "name":"incident response activity",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident response activity"
                  }
                },
                {
                  "id":3060024,
                  "name":"incident response capability",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident response capability"
                  }
                },
                {
                  "id":3060172,
                  "name":"incident response plan",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident response plan"
                  }
                },
                {
                  "id":3060206,
                  "name":"incident response process",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident response process"
                  }
                },
                {
                  "id":3823061,
                  "name":"security response",
                  "data":{
                    "type":"Keyword",
                    "desc":"security response"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":23,
                "desc":"Response"
              }
            },
            {
              "id":346,
              "name":"Operation",
              "children":[
                {
                  "id":347,
                  "name":"Incident Reporting",
                  "children":[
                    {
                      "id":348,
                      "name":"Incident Data",
                      "children":[
                        {
                          "id":3059832,
                          "name":"incident object description",
                          "data":{
                            "type":"Keyword",
                            "desc":"incident object description"
                          }
                        },
                        {
                          "id":3059834,
                          "name":"incident object description exchange format",
                          "data":{
                            "type":"Keyword",
                            "desc":"incident object description exchange format"
                          }
                        },
                        {
                          "id":4234144,
                          "name":"yahoo breach",
                          "data":{
                            "type":"Keyword",
                            "desc":"yahoo breach"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Incident Data"
                      }
                    },
                    {
                      "id":442,
                      "name":"Data Breach Report",
                      "children":[
                        {
                          "id":492,
                          "name":"Verizon DBIR",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides analysis of information security incidents, with a specific focus on data breaches."
                          }
                        },
                        {
                          "id":2314616,
                          "name":"breach report",
                          "data":{
                            "type":"Keyword",
                            "desc":"breach report"
                          }
                        },
                        {
                          "id":2598797,
                          "name":"data breach investigations report",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach investigations report"
                          }
                        },
                        {
                          "id":2598841,
                          "name":"data breach notification",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach notification"
                          }
                        },
                        {
                          "id":2598846,
                          "name":"data breach notification law",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach notification law"
                          }
                        },
                        {
                          "id":2610162,
                          "name":"dbir",
                          "data":{
                            "type":"Keyword",
                            "desc":"dbir"
                          }
                        },
                        {
                          "id":3726037,
                          "name":"report data breach",
                          "data":{
                            "type":"Keyword",
                            "desc":"report data breach"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":8,
                        "desc":"Data Breach Report"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":13,
                    "desc":"Incident Reporting"
                  }
                },
                {
                  "id":2495465,
                  "name":"computer security incident handling",
                  "data":{
                    "type":"Keyword",
                    "desc":"computer security incident handling"
                  }
                },
                {
                  "id":3059498,
                  "name":"incident detection",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident detection"
                  }
                },
                {
                  "id":3059599,
                  "name":"incident handling",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident handling"
                  }
                },
                {
                  "id":3059738,
                  "name":"incident management",
                  "data":{
                    "type":"Keyword",
                    "desc":"incident management"
                  }
                },
                {
                  "id":3819239,
                  "name":"security incident handling",
                  "data":{
                    "type":"Keyword",
                    "desc":"security incident handling"
                  }
                },
                {
                  "id":3819259,
                  "name":"security incident management",
                  "data":{
                    "type":"Keyword",
                    "desc":"security incident management"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":20,
                "desc":"Operation"
              }
            },
            {
              "id":455,
              "name":"Data Incident",
              "children":[
                {
                  "id":454,
                  "name":"Publicly Exposed Data",
                  "children":[
                    {
                      "id":445,
                      "name":"Data Leakage",
                      "children":[
                        {
                          "id":3907673,
                          "name":"source code leak",
                          "data":{
                            "type":"Keyword",
                            "desc":"source code leak"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Data Leakage"
                      }
                    },
                    {
                      "id":447,
                      "name":"Data Breach",
                      "children":[
                        {
                          "id":575,
                          "name":"Data Breach Cases",
                          "children":[
                            {
                              "id":2770750,
                              "name":"equifax data breach",
                              "data":{
                                "type":"Keyword",
                                "desc":"equifax data breach"
                              }
                            },
                            {
                              "id":3504826,
                              "name":"panama papers",
                              "data":{
                                "type":"Keyword",
                                "desc":"panama papers"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":3,
                            "desc":"Data Breach Cases"
                          }
                        },
                        {
                          "id":2575656,
                          "name":"cyber security breach",
                          "data":{
                            "type":"Keyword",
                            "desc":"cyber security breach"
                          }
                        },
                        {
                          "id":2598682,
                          "name":"data breach cost",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach cost"
                          }
                        },
                        {
                          "id":2598796,
                          "name":"data breach investigations",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach investigations"
                          }
                        },
                        {
                          "id":2598821,
                          "name":"data breach lawsuit",
                          "data":{
                            "type":"Keyword",
                            "desc":"data breach lawsuit"
                          }
                        },
                        {
                          "id":3540084,
                          "name":"personal data breach",
                          "data":{
                            "type":"Keyword",
                            "desc":"personal data breach"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":9,
                        "desc":"Data Breach"
                      }
                    },
                    {
                      "id":2812590,
                      "name":"expose sensitive data",
                      "data":{
                        "type":"Keyword",
                        "desc":"expose sensitive data"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":13,
                    "desc":"Publicly Exposed Data"
                  }
                },
                {
                  "id":456,
                  "name":"Data Theft",
                  "children":[
                    {
                      "id":457,
                      "name":"Data Exfiltration",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Data Exfiltration"
                      }
                    },
                    {
                      "id":2603496,
                      "name":"data steal",
                      "data":{
                        "type":"Keyword",
                        "desc":"data steal"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Data Theft"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":17,
                "desc":"Data Incident"
              }
            },
            {
              "id":2188294,
              "name":"antisec",
              "data":{
                "type":"Keyword",
                "desc":"antisec"
              }
            },
            {
              "id":2213824,
              "name":"ashley madison hack",
              "data":{
                "type":"Keyword",
                "desc":"ashley madison hack"
              }
            },
            {
              "id":2495460,
              "name":"computer security incident",
              "data":{
                "type":"Keyword",
                "desc":"computer security incident"
              }
            },
            {
              "id":2572348,
              "name":"cyber breach",
              "data":{
                "type":"Keyword",
                "desc":"cyber breach"
              }
            },
            {
              "id":2574005,
              "name":"cyber incident",
              "data":{
                "type":"Keyword",
                "desc":"cyber incident"
              }
            },
            {
              "id":2584425,
              "name":"cybersecurity incident",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity incident"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":67,
            "desc":"Attacking incidents (actual attacks as events)"
          }
        },
        {
          "id":257,
          "name":"General Term",
          "children":[
            {
              "id":2224630,
              "name":"attack graph",
              "data":{
                "type":"Keyword",
                "desc":"attack graph"
              }
            },
            {
              "id":2224670,
              "name":"attack graph generation",
              "data":{
                "type":"Keyword",
                "desc":"attack graph generation"
              }
            },
            {
              "id":2225513,
              "name":"attack model",
              "data":{
                "type":"Keyword",
                "desc":"attack model"
              }
            },
            {
              "id":2225757,
              "name":"attack path",
              "data":{
                "type":"Keyword",
                "desc":"attack path"
              }
            },
            {
              "id":2225769,
              "name":"attack pattern",
              "data":{
                "type":"Keyword",
                "desc":"attack pattern"
              }
            },
            {
              "id":2226228,
              "name":"attack scenario",
              "data":{
                "type":"Keyword",
                "desc":"attack scenario"
              }
            },
            {
              "id":2226585,
              "name":"attack surface",
              "data":{
                "type":"Keyword",
                "desc":"attack surface"
              }
            },
            {
              "id":2226967,
              "name":"attack tree",
              "data":{
                "type":"Keyword",
                "desc":"attack tree"
              }
            },
            {
              "id":2227112,
              "name":"attack vector",
              "data":{
                "type":"Keyword",
                "desc":"attack vector"
              }
            },
            {
              "id":2253816,
              "name":"backdoors",
              "data":{
                "type":"Keyword",
                "desc":"backdoors"
              }
            },
            {
              "id":2254018,
              "name":"background knowledge attack",
              "data":{
                "type":"Keyword",
                "desc":"background knowledge attack"
              }
            },
            {
              "id":2408052,
              "name":"chain attack",
              "data":{
                "type":"Keyword",
                "desc":"chain attack"
              }
            },
            {
              "id":2574592,
              "name":"cyber kill chain",
              "data":{
                "type":"Keyword",
                "desc":"cyber kill chain"
              }
            },
            {
              "id":2574994,
              "name":"cyber pearl harbor",
              "data":{
                "type":"Keyword",
                "desc":"cyber pearl harbor"
              }
            },
            {
              "id":3905485,
              "name":"sophisticated cyber attack",
              "data":{
                "type":"Keyword",
                "desc":"sophisticated cyber attack"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":16,
            "desc":"General Term"
          }
        },
        {
          "id":520,
          "name":"Negative Effects",
          "children":[
            {
              "id":2107502,
              "name":"account compromise",
              "data":{
                "type":"Keyword",
                "desc":"account compromise"
              }
            },
            {
              "id":3078413,
              "name":"infected computer",
              "data":{
                "type":"Keyword",
                "desc":"infected computer"
              }
            },
            {
              "id":3078477,
              "name":"infected host",
              "data":{
                "type":"Keyword",
                "desc":"infected host"
              }
            },
            {
              "id":3078624,
              "name":"infected system",
              "data":{
                "type":"Keyword",
                "desc":"infected system"
              }
            },
            {
              "id":3841716,
              "name":"server crash",
              "data":{
                "type":"Keyword",
                "desc":"server crash"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":6,
            "desc":"Negative Effects Of A Cyber Breach/Attack"
          }
        },
        {
          "id":2107815,
          "name":"account hack",
          "data":{
            "type":"Keyword",
            "desc":"account hack"
          }
        },
        {
          "id":2181222,
          "name":"anonymous hack",
          "data":{
            "type":"Keyword",
            "desc":"anonymous hack"
          }
        },
        {
          "id":2202962,
          "name":"apt attack",
          "data":{
            "type":"Keyword",
            "desc":"apt attack"
          }
        },
        {
          "id":2572179,
          "name":"cyber attack target",
          "data":{
            "type":"Keyword",
            "desc":"cyber attack target"
          }
        },
        {
          "id":2579523,
          "name":"cyberattacks",
          "data":{
            "type":"Keyword",
            "desc":"cyberattacks"
          }
        },
        {
          "id":2810004,
          "name":"exploitation technique",
          "data":{
            "type":"Keyword",
            "desc":"exploitation technique"
          }
        },
        {
          "id":2810241,
          "name":"exploits",
          "data":{
            "type":"Keyword",
            "desc":"exploits"
          }
        },
        {
          "id":3426751,
          "name":"nuclear exploit kit",
          "data":{
            "type":"Keyword",
            "desc":"nuclear exploit kit"
          }
        },
        {
          "id":3474495,
          "name":"opisrael",
          "data":{
            "type":"Keyword",
            "desc":"opisrael"
          }
        },
        {
          "id":3814903,
          "name":"security attack",
          "data":{
            "type":"Keyword",
            "desc":"security attack"
          }
        },
        {
          "id":3973145,
          "name":"supply chain attack",
          "data":{
            "type":"Keyword",
            "desc":"supply chain attack"
          }
        },
        {
          "id":4187262,
          "name":"watering hole attack",
          "data":{
            "type":"Keyword",
            "desc":"watering hole attack"
          }
        },
        {
          "id":4190670,
          "name":"web cache deception attack",
          "data":{
            "type":"Keyword",
            "desc":"web cache deception attack"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":389,
        "desc":"Cybersecurity Attack"
      }
    },
    {
      "id":74,
      "name":"Cybersecurity Vulnerability",
      "children":[
        {
          "id":75,
          "name":"Vulnerability Database",
          "children":[
            {
              "id":76,
              "name":"CVE",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Common Vulnerabilities and Exposures (CVE) is a dictionary-type list of standardized names for vulnerabilities and other information related to security exposures."
              }
            },
            {
              "id":77,
              "name":"CWE",
              "children":[
                {
                  "id":2479614,
                  "name":"common weakness enumeration",
                  "data":{
                    "type":"Keyword",
                    "desc":"common weakness enumeration"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Common Weakness Enumeration (CWE) is a list of software weaknesses."
              }
            },
            {
              "id":538,
              "name":"GHDB",
              "children":[
                {
                  "id":2939594,
                  "name":"google dork",
                  "data":{
                    "type":"Keyword",
                    "desc":"google dork"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Google Hacking Database (GHDB)"
              }
            },
            {
              "id":2386060,
              "name":"capec",
              "data":{
                "type":"Keyword",
                "desc":"capec"
              }
            },
            {
              "id":3378874,
              "name":"national vulnerability database",
              "data":{
                "type":"Keyword",
                "desc":"national vulnerability database"
              }
            },
            {
              "id":3429125,
              "name":"nvd",
              "data":{
                "type":"Keyword",
                "desc":"nvd"
              }
            },
            {
              "id":4176944,
              "name":"vulnerability database",
              "data":{
                "type":"Keyword",
                "desc":"vulnerability database"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":10,
            "desc":"Vulnerability Database/Dataset"
          }
        },
        {
          "id":78,
          "name":"Vulnerability Classification",
          "children":[
            {
              "id":79,
              "name":"OS",
              "children":[
                {
                  "id":328,
                  "name":"Privilege Escalation Vulnerability",
                  "children":[
                    {
                      "id":3165642,
                      "name":"kernel privilege escalation vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"kernel privilege escalation vulnerability"
                      }
                    },
                    {
                      "id":3235653,
                      "name":"local privilege escalation vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"local privilege escalation vulnerability"
                      }
                    },
                    {
                      "id":4212440,
                      "name":"windows local privilege escalation",
                      "data":{
                        "type":"Keyword",
                        "desc":"windows local privilege escalation"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources."
                  }
                },
                {
                  "id":568,
                  "name":"Kernel Exploitation",
                  "children":[
                    {
                      "id":4212292,
                      "name":"windows kernel exploitation",
                      "data":{
                        "type":"Keyword",
                        "desc":"windows kernel exploitation"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Kernel Exploitation"
                  }
                },
                {
                  "id":569,
                  "name":"Memory Vulnerability",
                  "children":[
                    {
                      "id":570,
                      "name":"Use-After-Free Vulnerability",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."
                      }
                    },
                    {
                      "id":3307549,
                      "name":"memory corruption vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"memory corruption vulnerability"
                      }
                    },
                    {
                      "id":3720728,
                      "name":"remote memory corruption vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"remote memory corruption vulnerability"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Memory Vulnerability"
                  }
                },
                {
                  "id":3235772,
                  "name":"local root exploit",
                  "data":{
                    "type":"Keyword",
                    "desc":"local root exploit"
                  }
                },
                {
                  "id":3765619,
                  "name":"root exploit",
                  "data":{
                    "type":"Keyword",
                    "desc":"root exploit"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":13,
                "desc":"OS"
              }
            },
            {
              "id":80,
              "name":"Application Vulnerability",
              "children":[
                {
                  "id":472,
                  "name":"Type Confusion Vulnerability",
                  "children":[
                    {
                      "id":3721463,
                      "name":"remotely exploitable type confusion",
                      "data":{
                        "type":"Keyword",
                        "desc":"remotely exploitable type confusion"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Type Confusion Vulnerability"
                  }
                },
                {
                  "id":3100697,
                  "name":"intel amt vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"intel amt vulnerability"
                  }
                },
                {
                  "id":3899721,
                  "name":"software security vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"software security vulnerability"
                  }
                },
                {
                  "id":3900003,
                  "name":"software vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"software vulnerability"
                  }
                },
                {
                  "id":4098806,
                  "name":"type confusion vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"type confusion vulnerability"
                  }
                },
                {
                  "id":4178125,
                  "name":"vulnerable code",
                  "data":{
                    "type":"Keyword",
                    "desc":"vulnerable code"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"Application Vulnerability"
              }
            },
            {
              "id":326,
              "name":"Web Vulnerability",
              "children":[
                {
                  "id":81,
                  "name":"Web Server",
                  "children":[
                    {
                      "id":2190017,
                      "name":"apache strut flaw",
                      "data":{
                        "type":"Keyword",
                        "desc":"apache strut flaw"
                      }
                    },
                    {
                      "id":2190049,
                      "name":"apache strut vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"apache strut vulnerability"
                      }
                    },
                    {
                      "id":2370042,
                      "name":"bypass vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"bypass vulnerability"
                      }
                    },
                    {
                      "id":2552651,
                      "name":"cross site script vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"cross site script vulnerability"
                      }
                    },
                    {
                      "id":2852553,
                      "name":"file upload vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"file upload vulnerability"
                      }
                    },
                    {
                      "id":4190398,
                      "name":"web application vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"web application vulnerability"
                      }
                    },
                    {
                      "id":4233221,
                      "name":"xss vulnerability",
                      "data":{
                        "type":"Keyword",
                        "desc":"xss vulnerability"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":8,
                    "desc":"Web Server"
                  }
                },
                {
                  "id":3528516,
                  "name":"pegasus ios kernel vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"pegasus ios kernel vulnerability"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":10,
                "desc":"Web Vulnerability"
              }
            },
            {
              "id":327,
              "name":"RCE Vulnerability",
              "children":[
                {
                  "id":3720221,
                  "name":"remote code execution vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code execution vulnerability"
                  }
                },
                {
                  "id":3720250,
                  "name":"remote command execution vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote command execution vulnerability"
                  }
                },
                {
                  "id":4135962,
                  "name":"use-after-free remote code execution vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"use-after-free remote code execution vulnerability"
                  }
                },
                {
                  "id":4193263,
                  "name":"webex remote code execution vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"webex remote code execution vulnerability"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Remote code execution is the ability an attacker has to access someone else's computing device and make changes, no matter where the device is geographically located."
              }
            },
            {
              "id":329,
              "name":"Injection Vulnerability",
              "children":[
                {
                  "id":2465591,
                  "name":"code injection",
                  "data":{
                    "type":"Keyword",
                    "desc":"code injection"
                  }
                },
                {
                  "id":2465615,
                  "name":"code injection technique",
                  "data":{
                    "type":"Keyword",
                    "desc":"code injection technique"
                  }
                },
                {
                  "id":2475425,
                  "name":"command injection vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"command injection vulnerability"
                  }
                },
                {
                  "id":2551987,
                  "name":"crlf",
                  "data":{
                    "type":"Keyword",
                    "desc":"crlf"
                  }
                },
                {
                  "id":2687319,
                  "name":"dll injection",
                  "data":{
                    "type":"Keyword",
                    "desc":"dll injection"
                  }
                },
                {
                  "id":3089365,
                  "name":"injection attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"injection attack"
                  }
                },
                {
                  "id":3588890,
                  "name":"powershell code injection vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"powershell code injection vulnerability"
                  }
                },
                {
                  "id":3625666,
                  "name":"process injection",
                  "data":{
                    "type":"Keyword",
                    "desc":"process injection"
                  }
                },
                {
                  "id":3625669,
                  "name":"process injection technique",
                  "data":{
                    "type":"Keyword",
                    "desc":"process injection technique"
                  }
                },
                {
                  "id":3708388,
                  "name":"reflect xss",
                  "data":{
                    "type":"Keyword",
                    "desc":"reflect xss"
                  }
                },
                {
                  "id":3926112,
                  "name":"sql injection vulnerability",
                  "data":{
                    "type":"Keyword",
                    "desc":"sql injection vulnerability"
                  }
                },
                {
                  "id":4232839,
                  "name":"xss",
                  "data":{
                    "type":"Keyword",
                    "desc":"xss"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":14,
                "desc":"Injection attacks refer to a broad class of attack vectors. In an injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command."
              }
            },
            {
              "id":371,
              "name":"Code Execution Vulnerability",
              "children":[
                {
                  "id":2465304,
                  "name":"code execution exploit",
                  "data":{
                    "type":"Keyword",
                    "desc":"code execution exploit"
                  }
                },
                {
                  "id":2465309,
                  "name":"code execution flaw",
                  "data":{
                    "type":"Keyword",
                    "desc":"code execution flaw"
                  }
                },
                {
                  "id":2465336,
                  "name":"code execution vuln",
                  "data":{
                    "type":"Keyword",
                    "desc":"code execution vuln"
                  }
                },
                {
                  "id":2551353,
                  "name":"critical remote code execution",
                  "data":{
                    "type":"Keyword",
                    "desc":"critical remote code execution"
                  }
                },
                {
                  "id":2907710,
                  "name":"fuzz arbitrary binary code",
                  "data":{
                    "type":"Keyword",
                    "desc":"fuzz arbitrary binary code"
                  }
                },
                {
                  "id":3720174,
                  "name":"remote code exec",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code exec"
                  }
                },
                {
                  "id":3720183,
                  "name":"remote code execution",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code execution"
                  }
                },
                {
                  "id":3720199,
                  "name":"remote code execution exploit",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code execution exploit"
                  }
                },
                {
                  "id":3720202,
                  "name":"remote code execution flaw",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code execution flaw"
                  }
                },
                {
                  "id":3720218,
                  "name":"remote code execution vuln",
                  "data":{
                    "type":"Keyword",
                    "desc":"remote code execution vuln"
                  }
                },
                {
                  "id":4108823,
                  "name":"unauthenticated remote code execution",
                  "data":{
                    "type":"Keyword",
                    "desc":"unauthenticated remote code execution"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":12,
                "desc":"Code Execution Vulnerability"
              }
            },
            {
              "id":409,
              "name":"Security Bug",
              "children":[
                {
                  "id":412,
                  "name":"OS Bug",
                  "children":[
                    {
                      "id":413,
                      "name":"Kernel Bug",
                      "children":[
                        {
                          "id":410,
                          "name":"Linux Kernel Bug",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"Linux Kernel Bug"
                          }
                        },
                        {
                          "id":415,
                          "name":"Windows Kernel Bug",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"Windows Kernel Bug"
                          }
                        },
                        {
                          "id":3165616,
                          "name":"kernel pool overflow",
                          "data":{
                            "type":"Keyword",
                            "desc":"kernel pool overflow"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Kernel Bug"
                      }
                    },
                    {
                      "id":414,
                      "name":"Privilege Escalation Bug",
                      "children":[
                        {
                          "id":3621146,
                          "name":"privilege escalation exploit",
                          "data":{
                            "type":"Keyword",
                            "desc":"privilege escalation exploit"
                          }
                        },
                        {
                          "id":3769562,
                          "name":"rowhammer",
                          "data":{
                            "type":"Keyword",
                            "desc":"rowhammer"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Privilege Escalation Bug"
                      }
                    },
                    {
                      "id":416,
                      "name":"Memory Bug",
                      "children":[
                        {
                          "id":3307523,
                          "name":"memory corruption bug",
                          "data":{
                            "type":"Keyword",
                            "desc":"memory corruption bug"
                          }
                        },
                        {
                          "id":3720726,
                          "name":"remote memory corruption",
                          "data":{
                            "type":"Keyword",
                            "desc":"remote memory corruption"
                          }
                        },
                        {
                          "id":4212321,
                          "name":"windows kernel memory disclosure bug",
                          "data":{
                            "type":"Keyword",
                            "desc":"windows kernel memory disclosure bug"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Memory Bug"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":12,
                    "desc":"OS Bug"
                  }
                },
                {
                  "id":534,
                  "name":"Flaw",
                  "children":[
                    {
                      "id":3676330,
                      "name":"race condition",
                      "data":{
                        "type":"Keyword",
                        "desc":"race condition"
                      }
                    },
                    {
                      "id":3721442,
                      "name":"remotely exploitable",
                      "data":{
                        "type":"Keyword",
                        "desc":"remotely exploitable"
                      }
                    },
                    {
                      "id":3721449,
                      "name":"remotely exploitable flaw",
                      "data":{
                        "type":"Keyword",
                        "desc":"remotely exploitable flaw"
                      }
                    },
                    {
                      "id":3818443,
                      "name":"security flaw",
                      "data":{
                        "type":"Keyword",
                        "desc":"security flaw"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":5,
                    "desc":"Flaw"
                  }
                },
                {
                  "id":2495121,
                  "name":"computer program security flaw",
                  "data":{
                    "type":"Keyword",
                    "desc":"computer program security flaw"
                  }
                },
                {
                  "id":2940628,
                  "name":"google project zero bug",
                  "data":{
                    "type":"Keyword",
                    "desc":"google project zero bug"
                  }
                },
                {
                  "id":2992452,
                  "name":"heartbleed",
                  "data":{
                    "type":"Keyword",
                    "desc":"heartbleed"
                  }
                },
                {
                  "id":3857754,
                  "name":"shellshock",
                  "data":{
                    "type":"Keyword",
                    "desc":"shellshock"
                  }
                },
                {
                  "id":3930628,
                  "name":"stagefright",
                  "data":{
                    "type":"Keyword",
                    "desc":"stagefright"
                  }
                },
                {
                  "id":4200644,
                  "name":"western union bug",
                  "data":{
                    "type":"Keyword",
                    "desc":"western union bug"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":24,
                "desc":"Security Bug"
              }
            },
            {
              "id":439,
              "name":"Cross Site",
              "children":[
                {
                  "id":2552632,
                  "name":"cross site request forgery",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross site request forgery"
                  }
                },
                {
                  "id":2552636,
                  "name":"cross site script",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross site script"
                  }
                },
                {
                  "id":2552637,
                  "name":"cross site script attack",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross site script attack"
                  }
                },
                {
                  "id":2552656,
                  "name":"cross site scripting",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross site scripting"
                  }
                },
                {
                  "id":2553289,
                  "name":"cross-site request forgery",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross-site request forgery"
                  }
                },
                {
                  "id":2553298,
                  "name":"cross-site scripting",
                  "data":{
                    "type":"Keyword",
                    "desc":"cross-site scripting"
                  }
                },
                {
                  "id":2559172,
                  "name":"csrf",
                  "data":{
                    "type":"Keyword",
                    "desc":"csrf"
                  }
                },
                {
                  "id":4142759,
                  "name":"uxss",
                  "data":{
                    "type":"Keyword",
                    "desc":"uxss"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Cross Site"
              }
            },
            {
              "id":539,
              "name":"Authentication Vulnerability",
              "children":[
                {
                  "id":3517096,
                  "name":"password recovery",
                  "data":{
                    "type":"Keyword",
                    "desc":"password recovery"
                  }
                },
                {
                  "id":3517151,
                  "name":"password reset",
                  "data":{
                    "type":"Keyword",
                    "desc":"password reset"
                  }
                },
                {
                  "id":4188427,
                  "name":"weak password",
                  "data":{
                    "type":"Keyword",
                    "desc":"weak password"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Authentication Vulnerability"
              }
            },
            {
              "id":2171466,
              "name":"ancient font driver code",
              "data":{
                "type":"Keyword",
                "desc":"ancient font driver code"
              }
            },
            {
              "id":3099391,
              "name":"integer overflow",
              "data":{
                "type":"Keyword",
                "desc":"integer overflow"
              }
            },
            {
              "id":3566808,
              "name":"poc exploit",
              "data":{
                "type":"Keyword",
                "desc":"poc exploit"
              }
            },
            {
              "id":3788066,
              "name":"sandbox escape",
              "data":{
                "type":"Keyword",
                "desc":"sandbox escape"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":104,
            "desc":"Vulnerability Classification and Types"
          }
        },
        {
          "id":217,
          "name":"0-day Vulnerability",
          "children":[
            {
              "id":2060575,
              "name":"0-day exploit",
              "data":{
                "type":"Keyword",
                "desc":"0-day exploit"
              }
            },
            {
              "id":2065599,
              "name":"0day",
              "data":{
                "type":"Keyword",
                "desc":"0day"
              }
            },
            {
              "id":2065739,
              "name":"0day exploit",
              "data":{
                "type":"Keyword",
                "desc":"0day exploit"
              }
            },
            {
              "id":2867162,
              "name":"flash zero-day",
              "data":{
                "type":"Keyword",
                "desc":"flash zero-day"
              }
            },
            {
              "id":4241829,
              "name":"zero day vulnerability",
              "data":{
                "type":"Keyword",
                "desc":"zero day vulnerability"
              }
            },
            {
              "id":4242200,
              "name":"zero-day",
              "data":{
                "type":"Keyword",
                "desc":"zero-day"
              }
            },
            {
              "id":4242222,
              "name":"zero-day attack",
              "data":{
                "type":"Keyword",
                "desc":"zero-day attack"
              }
            },
            {
              "id":4242276,
              "name":"zero-day exploit",
              "data":{
                "type":"Keyword",
                "desc":"zero-day exploit"
              }
            },
            {
              "id":4242319,
              "name":"zero-day flaw",
              "data":{
                "type":"Keyword",
                "desc":"zero-day flaw"
              }
            },
            {
              "id":4242420,
              "name":"zero-day vulnerability",
              "data":{
                "type":"Keyword",
                "desc":"zero-day vulnerability"
              }
            },
            {
              "id":4242622,
              "name":"zeroday",
              "data":{
                "type":"Keyword",
                "desc":"zeroday"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":12,
            "desc":"0-day Vulnerability"
          }
        },
        {
          "id":322,
          "name":"Vulnerability Operation",
          "children":[
            {
              "id":321,
              "name":"Vulnerability Disclosure",
              "children":[
                {
                  "id":3740384,
                  "name":"responsible disclosure",
                  "data":{
                    "type":"Keyword",
                    "desc":"responsible disclosure"
                  }
                },
                {
                  "id":4176159,
                  "name":"vuln disclosure",
                  "data":{
                    "type":"Keyword",
                    "desc":"vuln disclosure"
                  }
                },
                {
                  "id":4177063,
                  "name":"vulnerability discovery",
                  "data":{
                    "type":"Keyword",
                    "desc":"vulnerability discovery"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware."
              }
            },
            {
              "id":323,
              "name":"Vulnerability Assessment",
              "children":[
                {
                  "id":324,
                  "name":"CVSS",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities."
                  }
                },
                {
                  "id":4176464,
                  "name":"vulnerabilities equities process",
                  "data":{
                    "type":"Keyword",
                    "desc":"vulnerabilities equities process"
                  }
                },
                {
                  "id":4177105,
                  "name":"vulnerability equity process",
                  "data":{
                    "type":"Keyword",
                    "desc":"vulnerability equity process"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Vulnerability Assessment"
              }
            },
            {
              "id":4176589,
              "name":"vulnerability analysis",
              "data":{
                "type":"Keyword",
                "desc":"vulnerability analysis"
              }
            },
            {
              "id":4177132,
              "name":"vulnerability exploit",
              "data":{
                "type":"Keyword",
                "desc":"vulnerability exploit"
              }
            },
            {
              "id":4177419,
              "name":"vulnerability management",
              "data":{
                "type":"Keyword",
                "desc":"vulnerability management"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":12,
            "desc":"Vulnerability Operations"
          }
        },
        {
          "id":2237179,
          "name":"authentication bypass vulnerability",
          "data":{
            "type":"Keyword",
            "desc":"authentication bypass vulnerability"
          }
        },
        {
          "id":3335040,
          "name":"misconfiguration",
          "data":{
            "type":"Keyword",
            "desc":"misconfiguration"
          }
        },
        {
          "id":3469730,
          "name":"openflow",
          "data":{
            "type":"Keyword",
            "desc":"openflow"
          }
        },
        {
          "id":4122380,
          "name":"unpatched vulnerability",
          "data":{
            "type":"Keyword",
            "desc":"unpatched vulnerability"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":143,
        "desc":"In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system."
      }
    },
    {
      "id":88,
      "name":"Security Control",
      "children":[
        {
          "id":89,
          "name":"Firewall",
          "children":[
            {
              "id":2197190,
              "name":"application firewall",
              "data":{
                "type":"Keyword",
                "desc":"application firewall"
              }
            },
            {
              "id":2198223,
              "name":"application whitelisting",
              "data":{
                "type":"Keyword",
                "desc":"application whitelisting"
              }
            },
            {
              "id":2861494,
              "name":"firewall rule",
              "data":{
                "type":"Keyword",
                "desc":"firewall rule"
              }
            },
            {
              "id":2861611,
              "name":"firewalls",
              "data":{
                "type":"Keyword",
                "desc":"firewalls"
              }
            },
            {
              "id":4190267,
              "name":"web application firewall",
              "data":{
                "type":"Keyword",
                "desc":"web application firewall"
              }
            },
            {
              "id":4204072,
              "name":"whitelist",
              "data":{
                "type":"Keyword",
                "desc":"whitelist"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":7,
            "desc":"Firewall"
          }
        },
        {
          "id":90,
          "name":"Access Control",
          "children":[
            {
              "id":92,
              "name":"Authorization",
              "children":[
                {
                  "id":3431016,
                  "name":"oauth",
                  "data":{
                    "type":"Keyword",
                    "desc":"oauth"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Authorization"
              }
            },
            {
              "id":93,
              "name":"Usage Control",
              "children":[
                {
                  "id":3516862,
                  "name":"password manager",
                  "data":{
                    "type":"Keyword",
                    "desc":"password manager"
                  }
                },
                {
                  "id":4102960,
                  "name":"uconabc usage control model",
                  "data":{
                    "type":"Keyword",
                    "desc":"uconabc usage control model"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Usage Control"
              }
            },
            {
              "id":194,
              "name":"Access Control Model",
              "children":[
                {
                  "id":195,
                  "name":"Role-based Access Control (RBAC)",
                  "children":[
                    {
                      "id":2128008,
                      "name":"admin account",
                      "data":{
                        "type":"Keyword",
                        "desc":"admin account"
                      }
                    },
                    {
                      "id":2128322,
                      "name":"admin rights",
                      "data":{
                        "type":"Keyword",
                        "desc":"admin rights"
                      }
                    },
                    {
                      "id":3764036,
                      "name":"role base access control",
                      "data":{
                        "type":"Keyword",
                        "desc":"role base access control"
                      }
                    },
                    {
                      "id":3764316,
                      "name":"role-based access control model",
                      "data":{
                        "type":"Keyword",
                        "desc":"role-based access control model"
                      }
                    },
                    {
                      "id":3765779,
                      "name":"root privilege",
                      "data":{
                        "type":"Keyword",
                        "desc":"root privilege"
                      }
                    },
                    {
                      "id":3989456,
                      "name":"sysadmin",
                      "data":{
                        "type":"Keyword",
                        "desc":"sysadmin"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Role-based Access Control (RBAC)"
                  }
                },
                {
                  "id":196,
                  "name":"Mandatory Access Control (MAC)",
                  "children":[
                    {
                      "id":117,
                      "name":"Sandboxing",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Sandboxing"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Mandatory Access Control (MAC)"
                  }
                },
                {
                  "id":197,
                  "name":"Discretionary Access Control (DAC)",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Discretionary Access Control (DAC)"
                  }
                },
                {
                  "id":198,
                  "name":"Rule-based Access Control (RuBAC)",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Rule-based Access Control (RuBAC)"
                  }
                },
                {
                  "id":199,
                  "name":"Attribute-based Access Control (ABAC)",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Attribute-based Access Control (ABAC)"
                  }
                },
                {
                  "id":2104806,
                  "name":"access control list",
                  "data":{
                    "type":"Keyword",
                    "desc":"access control list"
                  }
                },
                {
                  "id":4134699,
                  "name":"usage control model",
                  "data":{
                    "type":"Keyword",
                    "desc":"usage control model"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":15,
                "desc":"Different models of access control"
              }
            },
            {
              "id":480,
              "name":"Standard",
              "children":[
                {
                  "id":517,
                  "name":"LDAP",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Lightweight Directory Access Protocol"
                  }
                },
                {
                  "id":555,
                  "name":"XACML",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"eXtensible Access Control Markup Language"
                  }
                },
                {
                  "id":574,
                  "name":"SAML",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Security Assertion Markup Language"
                  }
                },
                {
                  "id":3814810,
                  "name":"security assertion markup language",
                  "data":{
                    "type":"Keyword",
                    "desc":"security assertion markup language"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Access Control Standard"
              }
            },
            {
              "id":2104743,
              "name":"access control decision",
              "data":{
                "type":"Keyword",
                "desc":"access control decision"
              }
            },
            {
              "id":2104836,
              "name":"access control mechanism",
              "data":{
                "type":"Keyword",
                "desc":"access control mechanism"
              }
            },
            {
              "id":2104940,
              "name":"access control scheme",
              "data":{
                "type":"Keyword",
                "desc":"access control scheme"
              }
            },
            {
              "id":2104957,
              "name":"access control system",
              "data":{
                "type":"Keyword",
                "desc":"access control system"
              }
            },
            {
              "id":2105424,
              "name":"access management",
              "data":{
                "type":"Keyword",
                "desc":"access management"
              }
            },
            {
              "id":2105847,
              "name":"access request",
              "data":{
                "type":"Keyword",
                "desc":"access request"
              }
            },
            {
              "id":2106139,
              "name":"access token",
              "data":{
                "type":"Keyword",
                "desc":"access token"
              }
            },
            {
              "id":2106310,
              "name":"access-control",
              "data":{
                "type":"Keyword",
                "desc":"access-control"
              }
            },
            {
              "id":2841746,
              "name":"federated identity management",
              "data":{
                "type":"Keyword",
                "desc":"federated identity management"
              }
            },
            {
              "id":2858157,
              "name":"fine-grained access control",
              "data":{
                "type":"Keyword",
                "desc":"fine-grained access control"
              }
            },
            {
              "id":3042806,
              "name":"identity management",
              "data":{
                "type":"Keyword",
                "desc":"identity management"
              }
            },
            {
              "id":3164861,
              "name":"kerberos",
              "data":{
                "type":"Keyword",
                "desc":"kerberos"
              }
            },
            {
              "id":3190781,
              "name":"lastpass",
              "data":{
                "type":"Keyword",
                "desc":"lastpass"
              }
            },
            {
              "id":3235636,
              "name":"local privilege",
              "data":{
                "type":"Keyword",
                "desc":"local privilege"
              }
            },
            {
              "id":3390638,
              "name":"network access control",
              "data":{
                "type":"Keyword",
                "desc":"network access control"
              }
            },
            {
              "id":3516842,
              "name":"password management",
              "data":{
                "type":"Keyword",
                "desc":"password management"
              }
            },
            {
              "id":3528968,
              "name":"pen testing",
              "data":{
                "type":"Keyword",
                "desc":"pen testing"
              }
            },
            {
              "id":3537781,
              "name":"permissions",
              "data":{
                "type":"Keyword",
                "desc":"permissions"
              }
            },
            {
              "id":3765486,
              "name":"root access",
              "data":{
                "type":"Keyword",
                "desc":"root access"
              }
            },
            {
              "id":3928371,
              "name":"ssid",
              "data":{
                "type":"Keyword",
                "desc":"ssid"
              }
            },
            {
              "id":4067509,
              "name":"traditional access control",
              "data":{
                "type":"Keyword",
                "desc":"traditional access control"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":47,
            "desc":"Access Control"
          }
        },
        {
          "id":111,
          "name":"Regulations",
          "children":[
            {
              "id":275,
              "name":"Data Protection Law",
              "children":[
                {
                  "id":277,
                  "name":"EU GDPR",
                  "children":[
                    {
                      "id":2599548,
                      "name":"data controller",
                      "data":{
                        "type":"Keyword",
                        "desc":"data controller"
                      }
                    },
                    {
                      "id":2602115,
                      "name":"data protection authority",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection authority"
                      }
                    },
                    {
                      "id":2602172,
                      "name":"data protection directive",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection directive"
                      }
                    },
                    {
                      "id":2602209,
                      "name":"data protection impact assessment",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection impact assessment"
                      }
                    },
                    {
                      "id":2602254,
                      "name":"data protection legislation",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection legislation"
                      }
                    },
                    {
                      "id":2602290,
                      "name":"data protection principle",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection principle"
                      }
                    },
                    {
                      "id":2602313,
                      "name":"data protection regulation",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection regulation"
                      }
                    },
                    {
                      "id":2602335,
                      "name":"data protection requirement",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection requirement"
                      }
                    },
                    {
                      "id":2602346,
                      "name":"data protection rule",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection rule"
                      }
                    },
                    {
                      "id":2602367,
                      "name":"data protection supervisor",
                      "data":{
                        "type":"Keyword",
                        "desc":"data protection supervisor"
                      }
                    },
                    {
                      "id":2786369,
                      "name":"european data protection directive",
                      "data":{
                        "type":"Keyword",
                        "desc":"european data protection directive"
                      }
                    },
                    {
                      "id":2786373,
                      "name":"european data protection law",
                      "data":{
                        "type":"Keyword",
                        "desc":"european data protection law"
                      }
                    },
                    {
                      "id":2786384,
                      "name":"european data protection supervisor",
                      "data":{
                        "type":"Keyword",
                        "desc":"european data protection supervisor"
                      }
                    },
                    {
                      "id":3040372,
                      "name":"identifiable natural person",
                      "data":{
                        "type":"Keyword",
                        "desc":"identifiable natural person"
                      }
                    },
                    {
                      "id":3377688,
                      "name":"national data protection authority",
                      "data":{
                        "type":"Keyword",
                        "desc":"national data protection authority"
                      }
                    },
                    {
                      "id":3555048,
                      "name":"pii",
                      "data":{
                        "type":"Keyword",
                        "desc":"pii"
                      }
                    },
                    {
                      "id":3625941,
                      "name":"process personal data",
                      "data":{
                        "type":"Keyword",
                        "desc":"process personal data"
                      }
                    },
                    {
                      "id":3837001,
                      "name":"sensitive personal data",
                      "data":{
                        "type":"Keyword",
                        "desc":"sensitive personal data"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":19,
                    "desc":"The General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area."
                  }
                },
                {
                  "id":278,
                  "name":"UK DPA 2018",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"UK DPA (Data Protection Act) 2018"
                  }
                },
                {
                  "id":577,
                  "name":"Privacy Shield",
                  "children":[
                    {
                      "id":2783440,
                      "name":"eu-us privacy shield",
                      "data":{
                        "type":"Keyword",
                        "desc":"eu-us privacy shield"
                      }
                    },
                    {
                      "id":3617904,
                      "name":"privacy shield",
                      "data":{
                        "type":"Keyword",
                        "desc":"privacy shield"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"The EU-U.S. and Swiss-U.S. Privacy Shield Frameworks were designed by the U.S. Department of Commerce and the European Commission and Swiss Administration to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce."
                  }
                },
                {
                  "id":578,
                  "name":"Safe Harbor",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"The International Safe Harbor Privacy Principles or Safe Harbour Privacy Principles were principles developed between 1998 and 2000 in order to prevent private organizations within the European Union or United States which store customer data from accidentally disclosing or losing personal information."
                  }
                },
                {
                  "id":579,
                  "name":"CISPA",
                  "children":[
                    {
                      "id":2439744,
                      "name":"cispa",
                      "data":{
                        "type":"Keyword",
                        "desc":"cispa"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Cyber Intelligence Sharing and Protection Act"
                  }
                },
                {
                  "id":580,
                  "name":"FISMA",
                  "children":[
                    {
                      "id":2863657,
                      "name":"fisma",
                      "data":{
                        "type":"Keyword",
                        "desc":"fisma"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"The Federal Information Security Management Act of 2002 is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002."
                  }
                },
                {
                  "id":581,
                  "name":"Net Neutrality Rule",
                  "children":[
                    {
                      "id":3387461,
                      "name":"net neutrality rule",
                      "data":{
                        "type":"Keyword",
                        "desc":"net neutrality rule"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"In the United States, net neutrality, the principle that Internet service providers (ISPs) treat all data on the Internet the same, and not discriminate, has been an issue of contention between network users and access providers since the 1990s."
                  }
                },
                {
                  "id":2601922,
                  "name":"data privacy law",
                  "data":{
                    "type":"Keyword",
                    "desc":"data privacy law"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":32,
                "desc":"Data Protection Law"
              }
            },
            {
              "id":276,
              "name":"Cyber Crime Law",
              "children":[
                {
                  "id":279,
                  "name":"UK Computer Misuse Act 1990",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"UK Computer Misuse Act 1990"
                  }
                },
                {
                  "id":2407284,
                  "name":"cfaa",
                  "data":{
                    "type":"Keyword",
                    "desc":"cfaa"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Cyber Crime Law"
              }
            },
            {
              "id":515,
              "name":"Digital Rights",
              "children":[
                {
                  "id":2667099,
                  "name":"digital geneva convention",
                  "data":{
                    "type":"Keyword",
                    "desc":"digital geneva convention"
                  }
                },
                {
                  "id":2667522,
                  "name":"digital rights management",
                  "data":{
                    "type":"Keyword",
                    "desc":"digital rights management"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Digital Rights"
              }
            },
            {
              "id":2314437,
              "name":"breach notification",
              "data":{
                "type":"Keyword",
                "desc":"breach notification"
              }
            },
            {
              "id":2314448,
              "name":"breach notification law",
              "data":{
                "type":"Keyword",
                "desc":"breach notification law"
              }
            },
            {
              "id":2314464,
              "name":"breach notification requirement",
              "data":{
                "type":"Keyword",
                "desc":"breach notification requirement"
              }
            },
            {
              "id":2574627,
              "name":"cyber law",
              "data":{
                "type":"Keyword",
                "desc":"cyber law"
              }
            },
            {
              "id":2584839,
              "name":"cybersecurity law",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity law"
              }
            },
            {
              "id":2787367,
              "name":"evade breach notification law",
              "data":{
                "type":"Keyword",
                "desc":"evade breach notification law"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":45,
            "desc":"Regulations"
          }
        },
        {
          "id":113,
          "name":"Detection",
          "children":[
            {
              "id":114,
              "name":"Intrusion Detection System",
              "children":[
                {
                  "id":231,
                  "name":"Network-based IDS",
                  "children":[
                    {
                      "id":2683977,
                      "name":"distribute intrusion detection system",
                      "data":{
                        "type":"Keyword",
                        "desc":"distribute intrusion detection system"
                      }
                    },
                    {
                      "id":3392211,
                      "name":"network intrusion detection system",
                      "data":{
                        "type":"Keyword",
                        "desc":"network intrusion detection system"
                      }
                    },
                    {
                      "id":3394177,
                      "name":"network-based intrusion detection system",
                      "data":{
                        "type":"Keyword",
                        "desc":"network-based intrusion detection system"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Network-based IDS"
                  }
                },
                {
                  "id":232,
                  "name":"Host-based IDS",
                  "children":[
                    {
                      "id":116,
                      "name":"Anti-malware",
                      "children":[
                        {
                          "id":115,
                          "name":"Anti-virus",
                          "children":[
                            {
                              "id":2185388,
                              "name":"anti virus",
                              "data":{
                                "type":"Keyword",
                                "desc":"anti virus"
                              }
                            },
                            {
                              "id":2188525,
                              "name":"antivirus",
                              "data":{
                                "type":"Keyword",
                                "desc":"antivirus"
                              }
                            },
                            {
                              "id":2188860,
                              "name":"antivirus program",
                              "data":{
                                "type":"Keyword",
                                "desc":"antivirus program"
                              }
                            },
                            {
                              "id":2188913,
                              "name":"antivirus software",
                              "data":{
                                "type":"Keyword",
                                "desc":"antivirus software"
                              }
                            },
                            {
                              "id":2482603,
                              "name":"comodo internet security",
                              "data":{
                                "type":"Keyword",
                                "desc":"comodo internet security"
                              }
                            },
                            {
                              "id":2775670,
                              "name":"escan internet security suite",
                              "data":{
                                "type":"Keyword",
                                "desc":"escan internet security suite"
                              }
                            },
                            {
                              "id":2819559,
                              "name":"f-secure internet security",
                              "data":{
                                "type":"Keyword",
                                "desc":"f-secure internet security"
                              }
                            },
                            {
                              "id":3161476,
                              "name":"kaspersky internet security",
                              "data":{
                                "type":"Keyword",
                                "desc":"kaspersky internet security"
                              }
                            },
                            {
                              "id":3324358,
                              "name":"microsoft security essentials",
                              "data":{
                                "type":"Keyword",
                                "desc":"microsoft security essentials"
                              }
                            },
                            {
                              "id":3986142,
                              "name":"symantec endpoint protection",
                              "data":{
                                "type":"Keyword",
                                "desc":"symantec endpoint protection"
                              }
                            },
                            {
                              "id":4076625,
                              "name":"trend micro internet security",
                              "data":{
                                "type":"Keyword",
                                "desc":"trend micro internet security"
                              }
                            },
                            {
                              "id":4167024,
                              "name":"virus scan",
                              "data":{
                                "type":"Keyword",
                                "desc":"virus scan"
                              }
                            },
                            {
                              "id":4211788,
                              "name":"windows defender",
                              "data":{
                                "type":"Keyword",
                                "desc":"windows defender"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":14,
                            "desc":"Anti-virus"
                          }
                        },
                        {
                          "id":3274595,
                          "name":"malwarebytes",
                          "data":{
                            "type":"Keyword",
                            "desc":"malwarebytes"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":16,
                        "desc":"Anti-malware"
                      }
                    },
                    {
                      "id":2756217,
                      "name":"endpoint protection",
                      "data":{
                        "type":"Keyword",
                        "desc":"endpoint protection"
                      }
                    },
                    {
                      "id":2756246,
                      "name":"endpoint protection platforms",
                      "data":{
                        "type":"Keyword",
                        "desc":"endpoint protection platforms"
                      }
                    },
                    {
                      "id":3020193,
                      "name":"host-based intrusion detection system",
                      "data":{
                        "type":"Keyword",
                        "desc":"host-based intrusion detection system"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":20,
                    "desc":"Host-based IDS"
                  }
                },
                {
                  "id":233,
                  "name":"Hybrid IDS",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Hybrid (network- and host-based)"
                  }
                },
                {
                  "id":487,
                  "name":"Anomaly Detection",
                  "children":[
                    {
                      "id":2178234,
                      "name":"anomaly detection approach",
                      "data":{
                        "type":"Keyword",
                        "desc":"anomaly detection approach"
                      }
                    },
                    {
                      "id":2178254,
                      "name":"anomaly detection method",
                      "data":{
                        "type":"Keyword",
                        "desc":"anomaly detection method"
                      }
                    },
                    {
                      "id":2178276,
                      "name":"anomaly detection system",
                      "data":{
                        "type":"Keyword",
                        "desc":"anomaly detection system"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Anomaly Detection"
                  }
                },
                {
                  "id":2469425,
                  "name":"collaborative intrusion detection",
                  "data":{
                    "type":"Keyword",
                    "desc":"collaborative intrusion detection"
                  }
                },
                {
                  "id":3117929,
                  "name":"intrusion detection systems",
                  "data":{
                    "type":"Keyword",
                    "desc":"intrusion detection systems"
                  }
                },
                {
                  "id":3865008,
                  "name":"siem",
                  "data":{
                    "type":"Keyword",
                    "desc":"siem"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":33,
                "desc":"Intrusion Detection System"
              }
            },
            {
              "id":234,
              "name":"Vulnerability Scanner",
              "children":[
                {
                  "id":2120270,
                  "name":"acunetix web vulnerability scanner",
                  "data":{
                    "type":"Keyword",
                    "desc":"acunetix web vulnerability scanner"
                  }
                },
                {
                  "id":3386905,
                  "name":"nessus",
                  "data":{
                    "type":"Keyword",
                    "desc":"nessus"
                  }
                },
                {
                  "id":4192360,
                  "name":"web vulnerability scanner",
                  "data":{
                    "type":"Keyword",
                    "desc":"web vulnerability scanner"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Vulnerability scanner and detector"
              }
            },
            {
              "id":320,
              "name":"Bug Bounty",
              "children":[
                {
                  "id":332,
                  "name":"Bug Bounty Program",
                  "children":[
                    {
                      "id":333,
                      "name":"iOS Bug Bounty",
                      "children":[
                        {
                          "id":3126211,
                          "name":"iphone secure boot firmware component",
                          "data":{
                            "type":"Keyword",
                            "desc":"iphone secure boot firmware component"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"iOS Bug Bounty"
                      }
                    },
                    {
                      "id":3815650,
                      "name":"security bug bounty program",
                      "data":{
                        "type":"Keyword",
                        "desc":"security bug bounty program"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Bug Bounty Program"
                  }
                },
                {
                  "id":2327248,
                  "name":"bug bounty hunter",
                  "data":{
                    "type":"Keyword",
                    "desc":"bug bounty hunter"
                  }
                },
                {
                  "id":2327290,
                  "name":"bug bounty program",
                  "data":{
                    "type":"Keyword",
                    "desc":"bug bounty program"
                  }
                },
                {
                  "id":2327601,
                  "name":"bug hunter",
                  "data":{
                    "type":"Keyword",
                    "desc":"bug hunter"
                  }
                },
                {
                  "id":2327614,
                  "name":"bug hunting",
                  "data":{
                    "type":"Keyword",
                    "desc":"bug hunting"
                  }
                },
                {
                  "id":2327987,
                  "name":"bugbounty",
                  "data":{
                    "type":"Keyword",
                    "desc":"bugbounty"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":10,
                "desc":"Bug Bounty"
              }
            },
            {
              "id":341,
              "name":"Monitoring Tool",
              "children":[
                {
                  "id":3789294,
                  "name":"sans internet storm center",
                  "data":{
                    "type":"Keyword",
                    "desc":"sans internet storm center"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Monitoring Tool"
              }
            },
            {
              "id":530,
              "name":"Project",
              "children":[
                {
                  "id":531,
                  "name":"Project Zero",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Google Project Zero"
                  }
                },
                {
                  "id":543,
                  "name":"Metasploit Project",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7."
                  }
                },
                {
                  "id":566,
                  "name":"ZDI",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Zero Day Initiative"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Project"
              }
            },
            {
              "id":2726221,
              "name":"edr",
              "data":{
                "type":"Keyword",
                "desc":"edr"
              }
            },
            {
              "id":2787402,
              "name":"evade detection",
              "data":{
                "type":"Keyword",
                "desc":"evade detection"
              }
            },
            {
              "id":2887263,
              "name":"fraud detection",
              "data":{
                "type":"Keyword",
                "desc":"fraud detection"
              }
            },
            {
              "id":3015786,
              "name":"honeynet",
              "data":{
                "type":"Keyword",
                "desc":"honeynet"
              }
            },
            {
              "id":3015840,
              "name":"honeypot",
              "data":{
                "type":"Keyword",
                "desc":"honeypot"
              }
            },
            {
              "id":3165488,
              "name":"kernel memory infoleak detector",
              "data":{
                "type":"Keyword",
                "desc":"kernel memory infoleak detector"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":60,
            "desc":"Detection"
          }
        },
        {
          "id":119,
          "name":"Cryptography",
          "children":[
            {
              "id":132,
              "name":"Hashing",
              "children":[
                {
                  "id":133,
                  "name":"Algorithm",
                  "children":[
                    {
                      "id":134,
                      "name":"BSD",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"BSD"
                      }
                    },
                    {
                      "id":135,
                      "name":"CRC-32",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"CRC-32"
                      }
                    },
                    {
                      "id":136,
                      "name":"MD5",
                      "children":[
                        {
                          "id":3297579,
                          "name":"md5 hash",
                          "data":{
                            "type":"Keyword",
                            "desc":"md5 hash"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"MD5"
                      }
                    },
                    {
                      "id":137,
                      "name":"SHA-1",
                      "children":[
                        {
                          "id":3851395,
                          "name":"sha-1 collision",
                          "data":{
                            "type":"Keyword",
                            "desc":"sha-1 collision"
                          }
                        },
                        {
                          "id":3851513,
                          "name":"sha1",
                          "data":{
                            "type":"Keyword",
                            "desc":"sha1"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"SHA-1"
                      }
                    },
                    {
                      "id":138,
                      "name":"SHA-256",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"SHA-256"
                      }
                    },
                    {
                      "id":2557261,
                      "name":"cryptographic hash function",
                      "data":{
                        "type":"Keyword",
                        "desc":"cryptographic hash function"
                      }
                    },
                    {
                      "id":2984678,
                      "name":"hash algorithm",
                      "data":{
                        "type":"Keyword",
                        "desc":"hash algorithm"
                      }
                    },
                    {
                      "id":2984828,
                      "name":"hash function",
                      "data":{
                        "type":"Keyword",
                        "desc":"hash function"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":12,
                    "desc":"Algorithm"
                  }
                },
                {
                  "id":139,
                  "name":"Salted Hash",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Salted Hash"
                  }
                },
                {
                  "id":140,
                  "name":"Rainbow Table",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Rainbow Table"
                  }
                },
                {
                  "id":375,
                  "name":"Hash",
                  "children":[
                    {
                      "id":2557254,
                      "name":"cryptographic hash",
                      "data":{
                        "type":"Keyword",
                        "desc":"cryptographic hash"
                      }
                    },
                    {
                      "id":2985029,
                      "name":"hash table",
                      "data":{
                        "type":"Keyword",
                        "desc":"hash table"
                      }
                    },
                    {
                      "id":2985068,
                      "name":"hash value",
                      "data":{
                        "type":"Keyword",
                        "desc":"hash value"
                      }
                    },
                    {
                      "id":3516734,
                      "name":"password hash",
                      "data":{
                        "type":"Keyword",
                        "desc":"password hash"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":5,
                    "desc":"Hash"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":20,
                "desc":"Hashing"
              }
            },
            {
              "id":388,
              "name":"Crypto System",
              "children":[
                {
                  "id":120,
                  "name":"Encryption",
                  "children":[
                    {
                      "id":121,
                      "name":"Symmetric",
                      "children":[
                        {
                          "id":270,
                          "name":"Block Cipher",
                          "children":[
                            {
                              "id":122,
                              "name":"DES",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. "
                              }
                            },
                            {
                              "id":123,
                              "name":"Triple DES",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"Triple DES"
                              }
                            },
                            {
                              "id":124,
                              "name":"AES",
                              "children":[
                                {
                                  "id":2132359,
                                  "name":"advanced encryption standard",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"advanced encryption standard"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"AES"
                              }
                            },
                            {
                              "id":125,
                              "name":"Blowfish",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"Blowfish"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":6,
                            "desc":"Block Cipher"
                          }
                        },
                        {
                          "id":271,
                          "name":"Stream Cipher",
                          "children":[
                            {
                              "id":272,
                              "name":"RC4",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"RC4"
                              }
                            },
                            {
                              "id":273,
                              "name":"ChaCha",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"ChaCha"
                              }
                            },
                            {
                              "id":274,
                              "name":"Salsa20",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"Salsa20"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":4,
                            "desc":"Stream Cipher"
                          }
                        },
                        {
                          "id":3987005,
                          "name":"symmetric encryption",
                          "data":{
                            "type":"Keyword",
                            "desc":"symmetric encryption"
                          }
                        },
                        {
                          "id":3987028,
                          "name":"symmetric key",
                          "data":{
                            "type":"Keyword",
                            "desc":"symmetric key"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":13,
                        "desc":"Symmetric"
                      }
                    },
                    {
                      "id":126,
                      "name":"Asymmetric",
                      "children":[
                        {
                          "id":127,
                          "name":"Diffie-Hellman",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"Diffie-Hellman"
                          }
                        },
                        {
                          "id":128,
                          "name":"RSA",
                          "children":[
                            {
                              "id":3770563,
                              "name":"rsa key",
                              "data":{
                                "type":"Keyword",
                                "desc":"rsa key"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":2,
                            "desc":"RSA"
                          }
                        },
                        {
                          "id":2738297,
                          "name":"elliptic curve cryptography",
                          "data":{
                            "type":"Keyword",
                            "desc":"elliptic curve cryptography"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Asymmetric"
                      }
                    },
                    {
                      "id":496,
                      "name":"Disk Encryption",
                      "children":[
                        {
                          "id":497,
                          "name":"Disk Encryption Software",
                          "children":[
                            {
                              "id":269,
                              "name":"Full Disk Encryption",
                              "children":[
                                {
                                  "id":2289428,
                                  "name":"bitlocker",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"bitlocker"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"Full Disk Encryption"
                              }
                            },
                            {
                              "id":2891147,
                              "name":"free open-source disk encryption software",
                              "data":{
                                "type":"Keyword",
                                "desc":"free open-source disk encryption software"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":4,
                            "desc":"Disk Encryption Software"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume."
                      }
                    },
                    {
                      "id":498,
                      "name":"Encryption Backdoor",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"An encryption backdoor is a deliberate weakness in encryption intended to let governments have easy access to encrypted data"
                      }
                    },
                    {
                      "id":512,
                      "name":"encryption scheme",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"encryption scheme"
                      }
                    },
                    {
                      "id":544,
                      "name":"Email Encryption",
                      "children":[
                        {
                          "id":2753722,
                          "name":"encrypted email",
                          "data":{
                            "type":"Keyword",
                            "desc":"encrypted email"
                          }
                        },
                        {
                          "id":3543704,
                          "name":"pgp key",
                          "data":{
                            "type":"Keyword",
                            "desc":"pgp key"
                          }
                        },
                        {
                          "id":3543750,
                          "name":"pgp public key",
                          "data":{
                            "type":"Keyword",
                            "desc":"pgp public key"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Email Encryption"
                      }
                    },
                    {
                      "id":2437360,
                      "name":"ciphertext",
                      "data":{
                        "type":"Keyword",
                        "desc":"ciphertext"
                      }
                    },
                    {
                      "id":2447044,
                      "name":"cleartext",
                      "data":{
                        "type":"Keyword",
                        "desc":"cleartext"
                      }
                    },
                    {
                      "id":2599975,
                      "name":"data encryption",
                      "data":{
                        "type":"Keyword",
                        "desc":"data encryption"
                      }
                    },
                    {
                      "id":2720222,
                      "name":"eax",
                      "data":{
                        "type":"Keyword",
                        "desc":"eax"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":35,
                    "desc":"Encryption"
                  }
                },
                {
                  "id":129,
                  "name":"Key",
                  "children":[
                    {
                      "id":307,
                      "name":"Generation",
                      "children":[
                        {
                          "id":3166880,
                          "name":"key distribution",
                          "data":{
                            "type":"Keyword",
                            "desc":"key distribution"
                          }
                        },
                        {
                          "id":3167136,
                          "name":"key generation algorithm",
                          "data":{
                            "type":"Keyword",
                            "desc":"key generation algorithm"
                          }
                        },
                        {
                          "id":3168649,
                          "name":"keygen",
                          "data":{
                            "type":"Keyword",
                            "desc":"keygen"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Key Generation"
                      }
                    },
                    {
                      "id":308,
                      "name":"Key Pair",
                      "children":[
                        {
                          "id":130,
                          "name":"Public Key",
                          "children":[
                            {
                              "id":345,
                              "name":"PKI",
                              "children":[
                                {
                                  "id":3656136,
                                  "name":"public key infrastructure certificate",
                                  "data":{
                                    "type":"Keyword",
                                    "desc":"public key infrastructure certificate"
                                  }
                                }
                              ],
                              "data":{
                                "type":"Class",
                                "size":2,
                                "desc":"PKI"
                              }
                            },
                            {
                              "id":404,
                              "name":"Public Key Infrastructure (PKI)",
                              "children":[],
                              "data":{
                                "type":"Class",
                                "size":1,
                                "desc":"A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption."
                              }
                            },
                            {
                              "id":2490633,
                              "name":"composite degree residuosity class",
                              "data":{
                                "type":"Keyword",
                                "desc":"composite degree residuosity class"
                              }
                            },
                            {
                              "id":3656064,
                              "name":"public key certificate",
                              "data":{
                                "type":"Keyword",
                                "desc":"public key certificate"
                              }
                            },
                            {
                              "id":3656090,
                              "name":"public key cryptography",
                              "data":{
                                "type":"Keyword",
                                "desc":"public key cryptography"
                              }
                            },
                            {
                              "id":3656100,
                              "name":"public key cryptosystem",
                              "data":{
                                "type":"Keyword",
                                "desc":"public key cryptosystem"
                              }
                            },
                            {
                              "id":3656118,
                              "name":"public key encryption",
                              "data":{
                                "type":"Keyword",
                                "desc":"public key encryption"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":9,
                            "desc":"Public Key"
                          }
                        },
                        {
                          "id":131,
                          "name":"Private Key",
                          "children":[],
                          "data":{
                            "type":"Class",
                            "size":1,
                            "desc":"Private Key"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":11,
                        "desc":"Key Pair"
                      }
                    },
                    {
                      "id":2556073,
                      "name":"crypto key",
                      "data":{
                        "type":"Keyword",
                        "desc":"crypto key"
                      }
                    },
                    {
                      "id":2557283,
                      "name":"cryptographic key",
                      "data":{
                        "type":"Keyword",
                        "desc":"cryptographic key"
                      }
                    },
                    {
                      "id":2619378,
                      "name":"decryption key",
                      "data":{
                        "type":"Keyword",
                        "desc":"decryption key"
                      }
                    },
                    {
                      "id":3166762,
                      "name":"key cryptography",
                      "data":{
                        "type":"Keyword",
                        "desc":"key cryptography"
                      }
                    },
                    {
                      "id":3166959,
                      "name":"key encryption",
                      "data":{
                        "type":"Keyword",
                        "desc":"key encryption"
                      }
                    },
                    {
                      "id":3167578,
                      "name":"key pair",
                      "data":{
                        "type":"Keyword",
                        "desc":"key pair"
                      }
                    },
                    {
                      "id":3167959,
                      "name":"key size",
                      "data":{
                        "type":"Keyword",
                        "desc":"key size"
                      }
                    },
                    {
                      "id":3289495,
                      "name":"master decryption key",
                      "data":{
                        "type":"Keyword",
                        "desc":"master decryption key"
                      }
                    },
                    {
                      "id":3289566,
                      "name":"master key",
                      "data":{
                        "type":"Keyword",
                        "desc":"master key"
                      }
                    },
                    {
                      "id":3808722,
                      "name":"secret key",
                      "data":{
                        "type":"Keyword",
                        "desc":"secret key"
                      }
                    },
                    {
                      "id":3847127,
                      "name":"session key",
                      "data":{
                        "type":"Keyword",
                        "desc":"session key"
                      }
                    },
                    {
                      "id":3867888,
                      "name":"signing key",
                      "data":{
                        "type":"Keyword",
                        "desc":"signing key"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":28,
                    "desc":"Key"
                  }
                },
                {
                  "id":389,
                  "name":"Decryption",
                  "children":[
                    {
                      "id":2619456,
                      "name":"decryption tool",
                      "data":{
                        "type":"Keyword",
                        "desc":"decryption tool"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Decryption is generally the reverse process of encryption. It is the process of decoding the data which has been encrypted into a secret format. An authorized user can only decrypt data because decryption requires a secret key or password."
                  }
                },
                {
                  "id":3311333,
                  "name":"message authentication code",
                  "data":{
                    "type":"Keyword",
                    "desc":"message authentication code"
                  }
                },
                {
                  "id":3584163,
                  "name":"post-quantum",
                  "data":{
                    "type":"Keyword",
                    "desc":"post-quantum"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":68,
                "desc":"A cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality. Typically, a cryptosystem consists of three algorithms:one for key generation, one for encryption, and one for decryption"
              }
            },
            {
              "id":405,
              "name":"Digital Signature",
              "children":[
                {
                  "id":2466230,
                  "name":"code signing",
                  "data":{
                    "type":"Keyword",
                    "desc":"code signing"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer."
              }
            },
            {
              "id":431,
              "name":"Certificate",
              "children":[
                {
                  "id":2406000,
                  "name":"certificate authority",
                  "data":{
                    "type":"Keyword",
                    "desc":"certificate authority"
                  }
                },
                {
                  "id":2406212,
                  "name":"certificate revocation list",
                  "data":{
                    "type":"Keyword",
                    "desc":"certificate revocation list"
                  }
                },
                {
                  "id":2406264,
                  "name":"certificate transparency",
                  "data":{
                    "type":"Keyword",
                    "desc":"certificate transparency"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Certificate"
              }
            },
            {
              "id":511,
              "name":"cryptanalysis",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"cryptanalysis"
              }
            },
            {
              "id":2555548,
              "name":"crypto backdoor",
              "data":{
                "type":"Keyword",
                "desc":"crypto backdoor"
              }
            },
            {
              "id":2557135,
              "name":"cryptographic algorithm",
              "data":{
                "type":"Keyword",
                "desc":"cryptographic algorithm"
              }
            },
            {
              "id":2557372,
              "name":"cryptographic protocol",
              "data":{
                "type":"Keyword",
                "desc":"cryptographic protocol"
              }
            },
            {
              "id":2557447,
              "name":"cryptographic technique",
              "data":{
                "type":"Keyword",
                "desc":"cryptographic technique"
              }
            },
            {
              "id":2557884,
              "name":"cryptology",
              "data":{
                "type":"Keyword",
                "desc":"cryptology"
              }
            },
            {
              "id":3809181,
              "name":"secret sharing",
              "data":{
                "type":"Keyword",
                "desc":"secret sharing"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":102,
            "desc":"Cryptography"
          }
        },
        {
          "id":141,
          "name":"Security Protocol",
          "children":[
            {
              "id":142,
              "name":"HTTPS",
              "children":[
                {
                  "id":3025518,
                  "name":"http public key pinning",
                  "data":{
                    "type":"Keyword",
                    "desc":"http public key pinning"
                  }
                },
                {
                  "id":3656163,
                  "name":"public key pinning",
                  "data":{
                    "type":"Keyword",
                    "desc":"public key pinning"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"HTTPS"
              }
            },
            {
              "id":143,
              "name":"SFTP",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"SFTP"
              }
            },
            {
              "id":144,
              "name":"SSL",
              "children":[
                {
                  "id":3812932,
                  "name":"secure socket layer",
                  "data":{
                    "type":"Keyword",
                    "desc":"secure socket layer"
                  }
                },
                {
                  "id":3928466,
                  "name":"ssl certificate",
                  "data":{
                    "type":"Keyword",
                    "desc":"ssl certificate"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"SSL"
              }
            },
            {
              "id":145,
              "name":"SSH",
              "children":[
                {
                  "id":3470335,
                  "name":"openssh",
                  "data":{
                    "type":"Keyword",
                    "desc":"openssh"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"SSH"
              }
            },
            {
              "id":533,
              "name":"WiFi",
              "children":[
                {
                  "id":4199741,
                  "name":"wep",
                  "data":{
                    "type":"Keyword",
                    "desc":"wep"
                  }
                },
                {
                  "id":4224630,
                  "name":"wpa2",
                  "data":{
                    "type":"Keyword",
                    "desc":"wpa2"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"WiFi"
              }
            },
            {
              "id":573,
              "name":"IPSec",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets."
              }
            },
            {
              "id":2132648,
              "name":"advanced message queuing protocol",
              "data":{
                "type":"Keyword",
                "desc":"advanced message queuing protocol"
              }
            },
            {
              "id":2237465,
              "name":"authentication protocol",
              "data":{
                "type":"Keyword",
                "desc":"authentication protocol"
              }
            },
            {
              "id":3470388,
              "name":"openssl",
              "data":{
                "type":"Keyword",
                "desc":"openssl"
              }
            },
            {
              "id":3816660,
              "name":"security content automation protocol",
              "data":{
                "type":"Keyword",
                "desc":"security content automation protocol"
              }
            },
            {
              "id":3851697,
              "name":"sha256",
              "data":{
                "type":"Keyword",
                "desc":"sha256"
              }
            },
            {
              "id":3897220,
              "name":"socks5",
              "data":{
                "type":"Keyword",
                "desc":"socks5"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":20,
            "desc":"Security Protocol"
          }
        },
        {
          "id":172,
          "name":"Information Security Management (ISM)",
          "children":[
            {
              "id":95,
              "name":"Policy",
              "children":[
                {
                  "id":96,
                  "name":"Data Policies",
                  "children":[
                    {
                      "id":97,
                      "name":"Data Handle Policy",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Data Handle Policy"
                      }
                    },
                    {
                      "id":98,
                      "name":"Data Protection Policy",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Data Protection Policy"
                      }
                    },
                    {
                      "id":99,
                      "name":"Data Retention Policy",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Data Retention Policy"
                      }
                    },
                    {
                      "id":100,
                      "name":"Data Sharing Agreement",
                      "children":[
                        {
                          "id":4068887,
                          "name":"traffic light protocol",
                          "data":{
                            "type":"Keyword",
                            "desc":"traffic light protocol"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Data Sharing Agreement"
                      }
                    },
                    {
                      "id":2603247,
                      "name":"data share agreement",
                      "data":{
                        "type":"Keyword",
                        "desc":"data share agreement"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Data Policies"
                  }
                },
                {
                  "id":101,
                  "name":"Access Control Policies",
                  "children":[
                    {
                      "id":102,
                      "name":"Access Control Policy",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Access Control Policy"
                      }
                    },
                    {
                      "id":103,
                      "name":"Usage Control Policy",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Usage Control Policy"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Access Control Policies"
                  }
                },
                {
                  "id":104,
                  "name":"Code Integrity Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Code Integrity Policy"
                  }
                },
                {
                  "id":105,
                  "name":"Computer Security Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Computer Security Policy"
                  }
                },
                {
                  "id":106,
                  "name":"Content Security Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Content Security Policy"
                  }
                },
                {
                  "id":108,
                  "name":"Cyber Security Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Cyber Security Policy"
                  }
                },
                {
                  "id":109,
                  "name":"Device Guard Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Device Guard Policy"
                  }
                },
                {
                  "id":110,
                  "name":"Vulnerability Disclosure Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Vulnerability Disclosure Policy"
                  }
                },
                {
                  "id":2575045,
                  "name":"cyber policy",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber policy"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":18,
                "desc":"Policy"
              }
            },
            {
              "id":112,
              "name":"Training",
              "children":[
                {
                  "id":3824705,
                  "name":"security training",
                  "data":{
                    "type":"Keyword",
                    "desc":"security training"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Training"
              }
            },
            {
              "id":170,
              "name":"Cyber Insurance",
              "children":[
                {
                  "id":107,
                  "name":"Cyber Insurance Policy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Cyber Insurance Policy"
                  }
                },
                {
                  "id":2574224,
                  "name":"cyber insurance market",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber insurance market"
                  }
                },
                {
                  "id":2574673,
                  "name":"cyber liability insurance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber liability insurance"
                  }
                },
                {
                  "id":2575385,
                  "name":"cyber risk insurance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber risk insurance"
                  }
                },
                {
                  "id":2577910,
                  "name":"cyber-insurance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber-insurance"
                  }
                },
                {
                  "id":2578020,
                  "name":"cyber-insurer",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber-insurer"
                  }
                },
                {
                  "id":2581996,
                  "name":"cyberinsurance",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyberinsurance"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"Cyber Insurance"
              }
            },
            {
              "id":173,
              "name":"Standard",
              "children":[
                {
                  "id":174,
                  "name":"ISO 27000",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"ISO 27000"
                  }
                },
                {
                  "id":2603079,
                  "name":"data security standard",
                  "data":{
                    "type":"Keyword",
                    "desc":"data security standard"
                  }
                },
                {
                  "id":3823837,
                  "name":"security standard",
                  "data":{
                    "type":"Keyword",
                    "desc":"security standard"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Standard"
              }
            },
            {
              "id":267,
              "name":"Auditing",
              "children":[
                {
                  "id":2232180,
                  "name":"audit log",
                  "data":{
                    "type":"Keyword",
                    "desc":"audit log"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Auditing"
              }
            },
            {
              "id":360,
              "name":"General Terms",
              "children":[
                {
                  "id":361,
                  "name":"Business Continuity",
                  "children":[
                    {
                      "id":2333500,
                      "name":"business continuity management",
                      "data":{
                        "type":"Keyword",
                        "desc":"business continuity management"
                      }
                    },
                    {
                      "id":2333502,
                      "name":"business continuity plan",
                      "data":{
                        "type":"Keyword",
                        "desc":"business continuity plan"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Business Continuity"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"General Terms"
              }
            },
            {
              "id":423,
              "name":"Framework",
              "children":[
                {
                  "id":3469871,
                  "name":"openioc",
                  "data":{
                    "type":"Keyword",
                    "desc":"openioc"
                  }
                },
                {
                  "id":3818559,
                  "name":"security framework",
                  "data":{
                    "type":"Keyword",
                    "desc":"security framework"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Framework"
              }
            },
            {
              "id":2576208,
              "name":"cyber security practice",
              "data":{
                "type":"Keyword",
                "desc":"cyber security practice"
              }
            },
            {
              "id":2576467,
              "name":"cyber security unit",
              "data":{
                "type":"Keyword",
                "desc":"cyber security unit"
              }
            },
            {
              "id":2584144,
              "name":"cybersecurity framework",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity framework"
              }
            },
            {
              "id":2585768,
              "name":"cybersecurity strategy",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity strategy"
              }
            },
            {
              "id":3788316,
              "name":"sandboxing",
              "data":{
                "type":"Keyword",
                "desc":"sandboxing"
              }
            },
            {
              "id":3820556,
              "name":"security management system",
              "data":{
                "type":"Keyword",
                "desc":"security management system"
              }
            },
            {
              "id":3820878,
              "name":"security model",
              "data":{
                "type":"Keyword",
                "desc":"security model"
              }
            },
            {
              "id":3821987,
              "name":"security practice",
              "data":{
                "type":"Keyword",
                "desc":"security practice"
              }
            },
            {
              "id":3822244,
              "name":"security process",
              "data":{
                "type":"Keyword",
                "desc":"security process"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":51,
            "desc":"Information Security Management"
          }
        },
        {
          "id":184,
          "name":"Protection/Prevention",
          "children":[
            {
              "id":185,
              "name":"DRM",
              "children":[
                {
                  "id":2115170,
                  "name":"activation code",
                  "data":{
                    "type":"Keyword",
                    "desc":"activation code"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Digital Right Management"
              }
            },
            {
              "id":317,
              "name":"ASLR",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Address Space Layout Randomization"
              }
            },
            {
              "id":458,
              "name":"Data Loss Prevention",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Data Loss Prevention"
              }
            },
            {
              "id":2133304,
              "name":"advanced threat protection",
              "data":{
                "type":"Keyword",
                "desc":"advanced threat protection"
              }
            },
            {
              "id":2145296,
              "name":"air-gapped",
              "data":{
                "type":"Keyword",
                "desc":"air-gapped"
              }
            },
            {
              "id":2293292,
              "name":"blackhole",
              "data":{
                "type":"Keyword",
                "desc":"blackhole"
              }
            },
            {
              "id":2308535,
              "name":"botnet takedown",
              "data":{
                "type":"Keyword",
                "desc":"botnet takedown"
              }
            },
            {
              "id":2369159,
              "name":"bypass application whitelisting",
              "data":{
                "type":"Keyword",
                "desc":"bypass application whitelisting"
              }
            },
            {
              "id":3030901,
              "name":"hxxp",
              "data":{
                "type":"Keyword",
                "desc":"hxxp"
              }
            },
            {
              "id":3117984,
              "name":"intrusion prevention",
              "data":{
                "type":"Keyword",
                "desc":"intrusion prevention"
              }
            },
            {
              "id":3117995,
              "name":"intrusion prevention system",
              "data":{
                "type":"Keyword",
                "desc":"intrusion prevention system"
              }
            },
            {
              "id":3822486,
              "name":"security protection",
              "data":{
                "type":"Keyword",
                "desc":"security protection"
              }
            },
            {
              "id":4232958,
              "name":"xss filter bypass",
              "data":{
                "type":"Keyword",
                "desc":"xss filter bypass"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":15,
            "desc":"Mechanism protecting cyber assets against attacks (excluding detection)"
          }
        },
        {
          "id":190,
          "name":"Authentication",
          "children":[
            {
              "id":91,
              "name":"User Authentication",
              "children":[
                {
                  "id":186,
                  "name":"Knowledge-based Authentication",
                  "children":[
                    {
                      "id":193,
                      "name":"Password",
                      "children":[
                        {
                          "id":2128237,
                          "name":"admin password",
                          "data":{
                            "type":"Keyword",
                            "desc":"admin password"
                          }
                        },
                        {
                          "id":3516114,
                          "name":"passphrase",
                          "data":{
                            "type":"Keyword",
                            "desc":"passphrase"
                          }
                        },
                        {
                          "id":4138101,
                          "name":"user password",
                          "data":{
                            "type":"Keyword",
                            "desc":"user password"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Password-based authentication and related concepts"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":6,
                    "desc":"User authentication based on \"What you know\""
                  }
                },
                {
                  "id":187,
                  "name":"Possession-based Authentication",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"User authentication based on \"What you have\""
                  }
                },
                {
                  "id":188,
                  "name":"Inherence-based Authentication",
                  "children":[
                    {
                      "id":189,
                      "name":"Biometrics-based Authentication",
                      "children":[
                        {
                          "id":2823022,
                          "name":"facial recognition",
                          "data":{
                            "type":"Keyword",
                            "desc":"facial recognition"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"The main type of inherence-based authentication"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"User authentication based on \"who you are\""
                  }
                },
                {
                  "id":2237229,
                  "name":"authentication credentials",
                  "data":{
                    "type":"Keyword",
                    "desc":"authentication credentials"
                  }
                },
                {
                  "id":4136898,
                  "name":"user credentials",
                  "data":{
                    "type":"Keyword",
                    "desc":"user credentials"
                  }
                },
                {
                  "id":4137535,
                  "name":"user identity",
                  "data":{
                    "type":"Keyword",
                    "desc":"user identity"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":14,
                "desc":"User Authentication"
              }
            },
            {
              "id":191,
              "name":"Device Authentication",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Authentication of hardware devices"
              }
            },
            {
              "id":192,
              "name":"Software Attestation",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Remote attestation of software"
              }
            },
            {
              "id":504,
              "name":"Multi-Factor Authentication",
              "children":[
                {
                  "id":505,
                  "name":"Two-Factor Authentication",
                  "children":[
                    {
                      "id":2080781,
                      "name":"2fa",
                      "data":{
                        "type":"Keyword",
                        "desc":"2fa"
                      }
                    },
                    {
                      "id":4101275,
                      "name":"u2f",
                      "data":{
                        "type":"Keyword",
                        "desc":"u2f"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Two-Factor Authentication"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Multi-Factor Authentication"
              }
            },
            {
              "id":3955336,
              "name":"strong authentication",
              "data":{
                "type":"Keyword",
                "desc":"strong authentication"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":22,
            "desc":"Authentication of users, hardware and software and other entities within a cyber security ecosystem"
          }
        },
        {
          "id":258,
          "name":"Digital Forensics",
          "children":[
            {
              "id":259,
              "name":"Network Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Network Forensics"
              }
            },
            {
              "id":260,
              "name":"Computer Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Computer Forensics"
              }
            },
            {
              "id":261,
              "name":"Live Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Live Forensics"
              }
            },
            {
              "id":262,
              "name":"Memory Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Memory Forensics"
              }
            },
            {
              "id":263,
              "name":"Malware Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Malware Forensics"
              }
            },
            {
              "id":264,
              "name":"Email Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Email Forensics"
              }
            },
            {
              "id":265,
              "name":"Database Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Database Forensics"
              }
            },
            {
              "id":266,
              "name":"Multimedia Forensics",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Multimedia Forensics"
              }
            },
            {
              "id":2659424,
              "name":"dfir",
              "data":{
                "type":"Keyword",
                "desc":"dfir"
              }
            },
            {
              "id":2659633,
              "name":"dfir infosec",
              "data":{
                "type":"Keyword",
                "desc":"dfir infosec"
              }
            },
            {
              "id":3269230,
              "name":"maltego",
              "data":{
                "type":"Keyword",
                "desc":"maltego"
              }
            },
            {
              "id":3307669,
              "name":"memory forensic",
              "data":{
                "type":"Keyword",
                "desc":"memory forensic"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":13,
            "desc":"Digital Forensics"
          }
        },
        {
          "id":364,
          "name":"Systems and Tools",
          "children":[
            {
              "id":365,
              "name":"Testing",
              "children":[
                {
                  "id":519,
                  "name":"Penetration Test",
                  "children":[
                    {
                      "id":516,
                      "name":"Penetration Testing Tools",
                      "children":[
                        {
                          "id":2808763,
                          "name":"exploit pack",
                          "data":{
                            "type":"Keyword",
                            "desc":"exploit pack"
                          }
                        },
                        {
                          "id":3249202,
                          "name":"low orbit ion cannon",
                          "data":{
                            "type":"Keyword",
                            "desc":"low orbit ion cannon"
                          }
                        },
                        {
                          "id":3314100,
                          "name":"metasploit framework",
                          "data":{
                            "type":"Keyword",
                            "desc":"metasploit framework"
                          }
                        },
                        {
                          "id":3314145,
                          "name":"metasploit module",
                          "data":{
                            "type":"Keyword",
                            "desc":"metasploit module"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Penetration Testing Tools"
                      }
                    },
                    {
                      "id":2975049,
                      "name":"hak5",
                      "data":{
                        "type":"Keyword",
                        "desc":"hak5"
                      }
                    },
                    {
                      "id":3529585,
                      "name":"penetration testing",
                      "data":{
                        "type":"Keyword",
                        "desc":"penetration testing"
                      }
                    },
                    {
                      "id":3530616,
                      "name":"pentesting",
                      "data":{
                        "type":"Keyword",
                        "desc":"pentesting"
                      }
                    },
                    {
                      "id":3579834,
                      "name":"port scan",
                      "data":{
                        "type":"Keyword",
                        "desc":"port scan"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":10,
                    "desc":"A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system."
                  }
                },
                {
                  "id":536,
                  "name":"Testing Programs",
                  "children":[
                    {
                      "id":537,
                      "name":"Fuzzing",
                      "children":[
                        {
                          "id":2907916,
                          "name":"fuzzer",
                          "data":{
                            "type":"Keyword",
                            "desc":"fuzzer"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"Fuzzing"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Testing Programs"
                  }
                },
                {
                  "id":2332604,
                  "name":"burp suite",
                  "data":{
                    "type":"Keyword",
                    "desc":"burp suite"
                  }
                },
                {
                  "id":2332625,
                  "name":"burp suite pro",
                  "data":{
                    "type":"Keyword",
                    "desc":"burp suite pro"
                  }
                },
                {
                  "id":3329712,
                  "name":"mimikatz",
                  "data":{
                    "type":"Keyword",
                    "desc":"mimikatz"
                  }
                },
                {
                  "id":3824409,
                  "name":"security testing",
                  "data":{
                    "type":"Keyword",
                    "desc":"security testing"
                  }
                },
                {
                  "id":3937945,
                  "name":"static analysis",
                  "data":{
                    "type":"Keyword",
                    "desc":"static analysis"
                  }
                },
                {
                  "id":3938011,
                  "name":"static analysis technique",
                  "data":{
                    "type":"Keyword",
                    "desc":"static analysis technique"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":20,
                "desc":"Testing"
              }
            },
            {
              "id":408,
              "name":"Security Privileges Control",
              "children":[
                {
                  "id":3965830,
                  "name":"sudo",
                  "data":{
                    "type":"Keyword",
                    "desc":"sudo"
                  }
                },
                {
                  "id":4136327,
                  "name":"user account control",
                  "data":{
                    "type":"Keyword",
                    "desc":"user account control"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Security Privileges Control"
              }
            },
            {
              "id":424,
              "name":"Patch",
              "children":[
                {
                  "id":2551250,
                  "name":"critical patch update",
                  "data":{
                    "type":"Keyword",
                    "desc":"critical patch update"
                  }
                },
                {
                  "id":3360350,
                  "name":"ms17-010",
                  "data":{
                    "type":"Keyword",
                    "desc":"ms17-010"
                  }
                },
                {
                  "id":3518549,
                  "name":"patch management",
                  "data":{
                    "type":"Keyword",
                    "desc":"patch management"
                  }
                },
                {
                  "id":3818427,
                  "name":"security fix",
                  "data":{
                    "type":"Keyword",
                    "desc":"security fix"
                  }
                },
                {
                  "id":3821578,
                  "name":"security patch",
                  "data":{
                    "type":"Keyword",
                    "desc":"security patch"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Patch"
              }
            },
            {
              "id":449,
              "name":"Web Technique",
              "children":[
                {
                  "id":450,
                  "name":"Human Test",
                  "children":[
                    {
                      "id":2387493,
                      "name":"captcha",
                      "data":{
                        "type":"Keyword",
                        "desc":"captcha"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Human Test"
                  }
                },
                {
                  "id":501,
                  "name":"Secure Communication",
                  "children":[
                    {
                      "id":502,
                      "name":"Anonymous Communication",
                      "children":[
                        {
                          "id":503,
                          "name":"Tor (anonymity network)",
                          "children":[
                            {
                              "id":3451499,
                              "name":"onion service",
                              "data":{
                                "type":"Keyword",
                                "desc":"onion service"
                              }
                            },
                            {
                              "id":4059769,
                              "name":"tor exit node",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor exit node"
                              }
                            },
                            {
                              "id":4059845,
                              "name":"tor hidden",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor hidden"
                              }
                            },
                            {
                              "id":4059848,
                              "name":"tor hidden service",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor hidden service"
                              }
                            },
                            {
                              "id":4059988,
                              "name":"tor onion service",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor onion service"
                              }
                            },
                            {
                              "id":4060029,
                              "name":"tor project",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor project"
                              }
                            },
                            {
                              "id":4060073,
                              "name":"tor relay",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor relay"
                              }
                            },
                            {
                              "id":4060172,
                              "name":"tor user",
                              "data":{
                                "type":"Keyword",
                                "desc":"tor user"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":9,
                            "desc":"Tor is free and open-source software for enabling anonymous communication."
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":10,
                        "desc":"Anonymous Communication"
                      }
                    },
                    {
                      "id":506,
                      "name":"VPN",
                      "children":[
                        {
                          "id":2892285,
                          "name":"free vpn",
                          "data":{
                            "type":"Keyword",
                            "desc":"free vpn"
                          }
                        },
                        {
                          "id":3021653,
                          "name":"hotspot shield vpn",
                          "data":{
                            "type":"Keyword",
                            "desc":"hotspot shield vpn"
                          }
                        },
                        {
                          "id":3471172,
                          "name":"openvpn",
                          "data":{
                            "type":"Keyword",
                            "desc":"openvpn"
                          }
                        },
                        {
                          "id":4175207,
                          "name":"vpn server",
                          "data":{
                            "type":"Keyword",
                            "desc":"vpn server"
                          }
                        },
                        {
                          "id":4175215,
                          "name":"vpn service",
                          "data":{
                            "type":"Keyword",
                            "desc":"vpn service"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":6,
                        "desc":"Virtual Private Network (VPN)"
                      }
                    },
                    {
                      "id":2753959,
                      "name":"encrypted messaging app",
                      "data":{
                        "type":"Keyword",
                        "desc":"encrypted messaging app"
                      }
                    },
                    {
                      "id":2755300,
                      "name":"end-to-end encryption",
                      "data":{
                        "type":"Keyword",
                        "desc":"end-to-end encryption"
                      }
                    },
                    {
                      "id":3811252,
                      "name":"secure communication channel",
                      "data":{
                        "type":"Keyword",
                        "desc":"secure communication channel"
                      }
                    },
                    {
                      "id":3866800,
                      "name":"signal desktop",
                      "data":{
                        "type":"Keyword",
                        "desc":"signal desktop"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":21,
                    "desc":"Secure Communication"
                  }
                },
                {
                  "id":3497194,
                  "name":"owasp",
                  "data":{
                    "type":"Keyword",
                    "desc":"owasp"
                  }
                },
                {
                  "id":3497451,
                  "name":"owasp zed attack proxy",
                  "data":{
                    "type":"Keyword",
                    "desc":"owasp zed attack proxy"
                  }
                },
                {
                  "id":4241007,
                  "name":"zed attack proxy",
                  "data":{
                    "type":"Keyword",
                    "desc":"zed attack proxy"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":27,
                "desc":"Web Technique"
              }
            },
            {
              "id":468,
              "name":"Operating System Level",
              "children":[
                {
                  "id":469,
                  "name":"Secure Boot",
                  "children":[
                    {
                      "id":3100772,
                      "name":"intel boot guard",
                      "data":{
                        "type":"Keyword",
                        "desc":"intel boot guard"
                      }
                    },
                    {
                      "id":4103488,
                      "name":"uefi secure boot",
                      "data":{
                        "type":"Keyword",
                        "desc":"uefi secure boot"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Secure Boot"
                  }
                },
                {
                  "id":481,
                  "name":"Windows",
                  "children":[
                    {
                      "id":2519427,
                      "name":"control flow guard",
                      "data":{
                        "type":"Keyword",
                        "desc":"control flow guard"
                      }
                    },
                    {
                      "id":3989733,
                      "name":"sysmon",
                      "data":{
                        "type":"Keyword",
                        "desc":"sysmon"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Windows"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Operating System Level"
              }
            },
            {
              "id":525,
              "name":"Network Tool",
              "children":[
                {
                  "id":430,
                  "name":"Secure Network",
                  "children":[
                    {
                      "id":3501572,
                      "name":"packet trace anonymization",
                      "data":{
                        "type":"Keyword",
                        "desc":"packet trace anonymization"
                      }
                    },
                    {
                      "id":3912419,
                      "name":"spam filter",
                      "data":{
                        "type":"Keyword",
                        "desc":"spam filter"
                      }
                    },
                    {
                      "id":4059944,
                      "name":"tor network",
                      "data":{
                        "type":"Keyword",
                        "desc":"tor network"
                      }
                    },
                    {
                      "id":4165863,
                      "name":"virtual private network",
                      "data":{
                        "type":"Keyword",
                        "desc":"virtual private network"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":5,
                    "desc":"Secure Network"
                  }
                },
                {
                  "id":526,
                  "name":"Network Monitoring",
                  "children":[
                    {
                      "id":560,
                      "name":"Packet Analyzer",
                      "children":[
                        {
                          "id":559,
                          "name":"Packet Capture",
                          "children":[
                            {
                              "id":3525390,
                              "name":"pcap",
                              "data":{
                                "type":"Keyword",
                                "desc":"pcap"
                              }
                            }
                          ],
                          "data":{
                            "type":"Class",
                            "size":2,
                            "desc":"Packet capture is a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network."
                          }
                        },
                        {
                          "id":2620381,
                          "name":"deep packet inspection",
                          "data":{
                            "type":"Keyword",
                            "desc":"deep packet inspection"
                          }
                        },
                        {
                          "id":4216076,
                          "name":"wireshark",
                          "data":{
                            "type":"Keyword",
                            "desc":"wireshark"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Packet Analyzer"
                      }
                    },
                    {
                      "id":2783268,
                      "name":"ettercap",
                      "data":{
                        "type":"Keyword",
                        "desc":"ettercap"
                      }
                    },
                    {
                      "id":3407784,
                      "name":"nmap",
                      "data":{
                        "type":"Keyword",
                        "desc":"nmap"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":8,
                    "desc":"Network Monitoring"
                  }
                },
                {
                  "id":529,
                  "name":"Remote Access Tool (RAT)",
                  "children":[
                    {
                      "id":3654037,
                      "name":"psexec",
                      "data":{
                        "type":"Keyword",
                        "desc":"psexec"
                      }
                    },
                    {
                      "id":3720361,
                      "name":"remote desktop",
                      "data":{
                        "type":"Keyword",
                        "desc":"remote desktop"
                      }
                    },
                    {
                      "id":3720387,
                      "name":"remote desktop protocol",
                      "data":{
                        "type":"Keyword",
                        "desc":"remote desktop protocol"
                      }
                    },
                    {
                      "id":3720477,
                      "name":"remote exploit",
                      "data":{
                        "type":"Keyword",
                        "desc":"remote exploit"
                      }
                    },
                    {
                      "id":4013783,
                      "name":"teamviewer",
                      "data":{
                        "type":"Keyword",
                        "desc":"teamviewer"
                      }
                    },
                    {
                      "id":4171086,
                      "name":"vnc",
                      "data":{
                        "type":"Keyword",
                        "desc":"vnc"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Remote Access Tool (RAT)"
                  }
                },
                {
                  "id":3387927,
                  "name":"netcat",
                  "data":{
                    "type":"Keyword",
                    "desc":"netcat"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":22,
                "desc":"Network Tool (Securing & Monitoring)"
              }
            },
            {
              "id":549,
              "name":"Security-Focused Operating System",
              "children":[
                {
                  "id":3159513,
                  "name":"kali linux",
                  "data":{
                    "type":"Keyword",
                    "desc":"kali linux"
                  }
                },
                {
                  "id":3469511,
                  "name":"openbsd",
                  "data":{
                    "type":"Keyword",
                    "desc":"openbsd"
                  }
                },
                {
                  "id":3671429,
                  "name":"qubes",
                  "data":{
                    "type":"Keyword",
                    "desc":"qubes"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Security-Focused Operating System"
              }
            },
            {
              "id":563,
              "name":"SCADA",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Supervisory Control and Data Acquisition"
              }
            },
            {
              "id":567,
              "name":"Online Tool",
              "children":[
                {
                  "id":571,
                  "name":"Shodan",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters."
                  }
                },
                {
                  "id":3517846,
                  "name":"pastebin",
                  "data":{
                    "type":"Keyword",
                    "desc":"pastebin"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Online Tool"
              }
            },
            {
              "id":572,
              "name":"Secure Code",
              "children":[
                {
                  "id":3432087,
                  "name":"obfuscation technique",
                  "data":{
                    "type":"Keyword",
                    "desc":"obfuscation technique"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Secure Code"
              }
            },
            {
              "id":2398056,
              "name":"ccleaner",
              "data":{
                "type":"Keyword",
                "desc":"ccleaner"
              }
            },
            {
              "id":2460109,
              "name":"cobalt strike",
              "data":{
                "type":"Keyword",
                "desc":"cobalt strike"
              }
            },
            {
              "id":2495379,
              "name":"computer security application",
              "data":{
                "type":"Keyword",
                "desc":"computer security application"
              }
            },
            {
              "id":2576225,
              "name":"cyber security program",
              "data":{
                "type":"Keyword",
                "desc":"cyber security program"
              }
            },
            {
              "id":2576333,
              "name":"cyber security solution",
              "data":{
                "type":"Keyword",
                "desc":"cyber security solution"
              }
            },
            {
              "id":2624593,
              "name":"defender exploit guard",
              "data":{
                "type":"Keyword",
                "desc":"defender exploit guard"
              }
            },
            {
              "id":2746834,
              "name":"emet",
              "data":{
                "type":"Keyword",
                "desc":"emet"
              }
            },
            {
              "id":2973410,
              "name":"hackrf",
              "data":{
                "type":"Keyword",
                "desc":"hackrf"
              }
            },
            {
              "id":2973637,
              "name":"hacksys extreme vulnerable driver",
              "data":{
                "type":"Keyword",
                "desc":"hacksys extreme vulnerable driver"
              }
            },
            {
              "id":2985136,
              "name":"hashcat",
              "data":{
                "type":"Keyword",
                "desc":"hashcat"
              }
            },
            {
              "id":3625492,
              "name":"process explorer",
              "data":{
                "type":"Keyword",
                "desc":"process explorer"
              }
            },
            {
              "id":3814675,
              "name":"security application",
              "data":{
                "type":"Keyword",
                "desc":"security application"
              }
            },
            {
              "id":3926486,
              "name":"sqlmap",
              "data":{
                "type":"Keyword",
                "desc":"sqlmap"
              }
            },
            {
              "id":3985848,
              "name":"symantec",
              "data":{
                "type":"Keyword",
                "desc":"symantec"
              }
            },
            {
              "id":4059572,
              "name":"tor browser",
              "data":{
                "type":"Keyword",
                "desc":"tor browser"
              }
            },
            {
              "id":4059588,
              "name":"tor browser bundle",
              "data":{
                "type":"Keyword",
                "desc":"tor browser bundle"
              }
            },
            {
              "id":4082496,
              "name":"truecrypt",
              "data":{
                "type":"Keyword",
                "desc":"truecrypt"
              }
            },
            {
              "id":4211804,
              "name":"windows defender exploit guard",
              "data":{
                "type":"Keyword",
                "desc":"windows defender exploit guard"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":114,
            "desc":"Systems and Tools"
          }
        },
        {
          "id":535,
          "name":"Anti-Fraud",
          "children":[
            {
              "id":2547278,
              "name":"credit monitoring service",
              "data":{
                "type":"Keyword",
                "desc":"credit monitoring service"
              }
            },
            {
              "id":4149505,
              "name":"vbv",
              "data":{
                "type":"Keyword",
                "desc":"vbv"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Anti-Fraud"
          }
        },
        {
          "id":3101505,
          "name":"intel software guard extension",
          "data":{
            "type":"Keyword",
            "desc":"intel software guard extension"
          }
        },
        {
          "id":3443599,
          "name":"offsec",
          "data":{
            "type":"Keyword",
            "desc":"offsec"
          }
        },
        {
          "id":3816775,
          "name":"security controls",
          "data":{
            "type":"Keyword",
            "desc":"security controls"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":503,
        "desc":"Methods and solutions for providing security control"
      }
    },
    {
      "id":150,
      "name":"Risk",
      "children":[
        {
          "id":151,
          "name":"Risk Type",
          "children":[
            {
              "id":152,
              "name":"Application Risk",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Application Risk"
              }
            },
            {
              "id":153,
              "name":"Insider Risk",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Insider Risk"
              }
            },
            {
              "id":154,
              "name":"Internet Risk",
              "children":[
                {
                  "id":4125131,
                  "name":"untraceable internet protocol",
                  "data":{
                    "type":"Keyword",
                    "desc":"untraceable internet protocol"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Internet Risk"
              }
            },
            {
              "id":155,
              "name":"IoT Risk",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"IoT Risk"
              }
            },
            {
              "id":156,
              "name":"Privacy Risk",
              "children":[
                {
                  "id":540,
                  "name":"Surveillance",
                  "children":[
                    {
                      "id":2945361,
                      "name":"government surveillance",
                      "data":{
                        "type":"Keyword",
                        "desc":"government surveillance"
                      }
                    },
                    {
                      "id":3113415,
                      "name":"internet surveillance",
                      "data":{
                        "type":"Keyword",
                        "desc":"internet surveillance"
                      }
                    },
                    {
                      "id":3287872,
                      "name":"mass surveillance",
                      "data":{
                        "type":"Keyword",
                        "desc":"mass surveillance"
                      }
                    },
                    {
                      "id":3425005,
                      "name":"nsa surveillance",
                      "data":{
                        "type":"Keyword",
                        "desc":"nsa surveillance"
                      }
                    },
                    {
                      "id":3894372,
                      "name":"social media surveillance",
                      "data":{
                        "type":"Keyword",
                        "desc":"social media surveillance"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":6,
                    "desc":"Surveillance"
                  }
                },
                {
                  "id":3424927,
                  "name":"nsa spy",
                  "data":{
                    "type":"Keyword",
                    "desc":"nsa spy"
                  }
                },
                {
                  "id":3615539,
                  "name":"privacy breach",
                  "data":{
                    "type":"Keyword",
                    "desc":"privacy breach"
                  }
                },
                {
                  "id":3616535,
                  "name":"privacy impact",
                  "data":{
                    "type":"Keyword",
                    "desc":"privacy impact"
                  }
                },
                {
                  "id":3616538,
                  "name":"privacy impact assessment",
                  "data":{
                    "type":"Keyword",
                    "desc":"privacy impact assessment"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":11,
                "desc":"Privacy Risk"
              }
            },
            {
              "id":157,
              "name":"Technical Risk",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Technical Risk"
              }
            },
            {
              "id":158,
              "name":"Third-party Risk",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Third-party Risk"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":19,
            "desc":"Risk Type"
          }
        },
        {
          "id":159,
          "name":"Score",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Score"
          }
        },
        {
          "id":160,
          "name":"Operation",
          "children":[
            {
              "id":161,
              "name":"Aggregation",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Aggregation"
              }
            },
            {
              "id":162,
              "name":"Assessment",
              "children":[
                {
                  "id":2575327,
                  "name":"cyber risk assessment",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber risk assessment"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Assessment"
              }
            },
            {
              "id":163,
              "name":"Identification",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Identification"
              }
            },
            {
              "id":164,
              "name":"Management",
              "children":[
                {
                  "id":2575404,
                  "name":"cyber risk management",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber risk management"
                  }
                },
                {
                  "id":2764486,
                  "name":"enterprise risk management",
                  "data":{
                    "type":"Keyword",
                    "desc":"enterprise risk management"
                  }
                },
                {
                  "id":3275307,
                  "name":"manage cyber risk",
                  "data":{
                    "type":"Keyword",
                    "desc":"manage cyber risk"
                  }
                },
                {
                  "id":3757782,
                  "name":"risk management approach",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk management approach"
                  }
                },
                {
                  "id":3757828,
                  "name":"risk management framework",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk management framework"
                  }
                },
                {
                  "id":3757932,
                  "name":"risk management solution",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk management solution"
                  }
                },
                {
                  "id":3757938,
                  "name":"risk management strategy",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk management strategy"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"Management"
              }
            },
            {
              "id":165,
              "name":"Mitigation",
              "children":[
                {
                  "id":3758078,
                  "name":"risk mitigation",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk mitigation"
                  }
                },
                {
                  "id":3758105,
                  "name":"risk mitigation strategy",
                  "data":{
                    "type":"Keyword",
                    "desc":"risk mitigation strategy"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Mitigation"
              }
            },
            {
              "id":166,
              "name":"Modeling",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Modeling"
              }
            },
            {
              "id":3756997,
              "name":"risk assessment process",
              "data":{
                "type":"Keyword",
                "desc":"risk assessment process"
              }
            },
            {
              "id":3757890,
              "name":"risk management process",
              "data":{
                "type":"Keyword",
                "desc":"risk management process"
              }
            },
            {
              "id":3823112,
              "name":"security risk analysis",
              "data":{
                "type":"Keyword",
                "desc":"security risk analysis"
              }
            },
            {
              "id":3823161,
              "name":"security risk management",
              "data":{
                "type":"Keyword",
                "desc":"security risk management"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":21,
            "desc":"Operation"
          }
        },
        {
          "id":2575316,
          "name":"cyber risk",
          "data":{
            "type":"Keyword",
            "desc":"cyber risk"
          }
        },
        {
          "id":2578248,
          "name":"cyber-risk",
          "data":{
            "type":"Keyword",
            "desc":"cyber-risk"
          }
        },
        {
          "id":2585484,
          "name":"cybersecurity risk",
          "data":{
            "type":"Keyword",
            "desc":"cybersecurity risk"
          }
        },
        {
          "id":3757974,
          "name":"risk manager",
          "data":{
            "type":"Keyword",
            "desc":"risk manager"
          }
        },
        {
          "id":3973233,
          "name":"supply chain risk",
          "data":{
            "type":"Keyword",
            "desc":"supply chain risk"
          }
        },
        {
          "id":3973236,
          "name":"supply chain risk management",
          "data":{
            "type":"Keyword",
            "desc":"supply chain risk management"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":48,
        "desc":"Risk"
      }
    },
    {
      "id":167,
      "name":"Sub-domain",
      "children":[
        {
          "id":168,
          "name":"Automotive Security",
          "children":[
            {
              "id":2388535,
              "name":"car hacking",
              "data":{
                "type":"Keyword",
                "desc":"car hacking"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":2,
            "desc":"Automotive Security"
          }
        },
        {
          "id":169,
          "name":"Cloud Security",
          "children":[
            {
              "id":2452902,
              "name":"cloud access security broker",
              "data":{
                "type":"Keyword",
                "desc":"cloud access security broker"
              }
            },
            {
              "id":2453542,
              "name":"cloud computing security",
              "data":{
                "type":"Keyword",
                "desc":"cloud computing security"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Cloud Security"
          }
        },
        {
          "id":175,
          "name":"IoT Security",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"IoT Security"
          }
        },
        {
          "id":176,
          "name":"Mobile Security",
          "children":[
            {
              "id":216,
              "name":"Mobile Malware",
              "children":[
                {
                  "id":2172616,
                  "name":"android banking malware",
                  "data":{
                    "type":"Keyword",
                    "desc":"android banking malware"
                  }
                },
                {
                  "id":2172630,
                  "name":"android banking trojan",
                  "data":{
                    "type":"Keyword",
                    "desc":"android banking trojan"
                  }
                },
                {
                  "id":2173719,
                  "name":"android ransomware",
                  "data":{
                    "type":"Keyword",
                    "desc":"android ransomware"
                  }
                },
                {
                  "id":2174150,
                  "name":"android trojan",
                  "data":{
                    "type":"Keyword",
                    "desc":"android trojan"
                  }
                },
                {
                  "id":2705388,
                  "name":"droidjack",
                  "data":{
                    "type":"Keyword",
                    "desc":"droidjack"
                  }
                },
                {
                  "id":3057368,
                  "name":"imsi catcher",
                  "data":{
                    "type":"Keyword",
                    "desc":"imsi catcher"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Malware on mobile devices"
              }
            },
            {
              "id":331,
              "name":"Phone Hacking",
              "children":[
                {
                  "id":2173053,
                  "name":"android hacking",
                  "data":{
                    "type":"Keyword",
                    "desc":"android hacking"
                  }
                },
                {
                  "id":3126042,
                  "name":"iphone hack",
                  "data":{
                    "type":"Keyword",
                    "desc":"iphone hack"
                  }
                },
                {
                  "id":3944784,
                  "name":"stingray",
                  "data":{
                    "type":"Keyword",
                    "desc":"stingray"
                  }
                },
                {
                  "id":4029930,
                  "name":"text message interception",
                  "data":{
                    "type":"Keyword",
                    "desc":"text message interception"
                  }
                },
                {
                  "id":4029933,
                  "name":"text message interception hack",
                  "data":{
                    "type":"Keyword",
                    "desc":"text message interception hack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Phone Hacking"
              }
            },
            {
              "id":2173260,
              "name":"android malware analysis",
              "data":{
                "type":"Keyword",
                "desc":"android malware analysis"
              }
            },
            {
              "id":2173295,
              "name":"android malware detection",
              "data":{
                "type":"Keyword",
                "desc":"android malware detection"
              }
            },
            {
              "id":2173775,
              "name":"android rat",
              "data":{
                "type":"Keyword",
                "desc":"android rat"
              }
            },
            {
              "id":2173881,
              "name":"android security",
              "data":{
                "type":"Keyword",
                "desc":"android security"
              }
            },
            {
              "id":2193485,
              "name":"app security",
              "data":{
                "type":"Keyword",
                "desc":"app security"
              }
            },
            {
              "id":3057363,
              "name":"imsi",
              "data":{
                "type":"Keyword",
                "desc":"imsi"
              }
            },
            {
              "id":3123688,
              "name":"ios security",
              "data":{
                "type":"Keyword",
                "desc":"ios security"
              }
            },
            {
              "id":3340792,
              "name":"mobile app security",
              "data":{
                "type":"Keyword",
                "desc":"mobile app security"
              }
            },
            {
              "id":3341202,
              "name":"mobile device security",
              "data":{
                "type":"Keyword",
                "desc":"mobile device security"
              }
            },
            {
              "id":3341686,
              "name":"mobile phone hacking",
              "data":{
                "type":"Keyword",
                "desc":"mobile phone hacking"
              }
            },
            {
              "id":3341813,
              "name":"mobile pwn2own",
              "data":{
                "type":"Keyword",
                "desc":"mobile pwn2own"
              }
            },
            {
              "id":3342101,
              "name":"mobile threat",
              "data":{
                "type":"Keyword",
                "desc":"mobile threat"
              }
            },
            {
              "id":3342382,
              "name":"mobilesecurity",
              "data":{
                "type":"Keyword",
                "desc":"mobilesecurity"
              }
            },
            {
              "id":3811716,
              "name":"secure enclave",
              "data":{
                "type":"Keyword",
                "desc":"secure enclave"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":28,
            "desc":"Mobile Security"
          }
        },
        {
          "id":177,
          "name":"Smart Grid Security",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Smart Grid Security"
          }
        },
        {
          "id":178,
          "name":"Trust",
          "children":[
            {
              "id":281,
              "name":"Centralized Trust",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Centralized Trust"
              }
            },
            {
              "id":282,
              "name":"Distributed Trust",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Distributed Trust"
              }
            },
            {
              "id":283,
              "name":"Trust Computing",
              "children":[
                {
                  "id":284,
                  "name":"Trusted Platform Module (TPM)",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Trusted Platform Module (TPM)"
                  }
                },
                {
                  "id":285,
                  "name":"Trusted Execution Environment (TEE)",
                  "children":[
                    {
                      "id":286,
                      "name":"TrustZone",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"TrustZone"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Trusted Execution Environment (TEE)"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Trust Computing"
              }
            },
            {
              "id":507,
              "name":"Operation",
              "children":[
                {
                  "id":508,
                  "name":"Trust Management",
                  "children":[
                    {
                      "id":4086177,
                      "name":"trust management framework",
                      "data":{
                        "type":"Keyword",
                        "desc":"trust management framework"
                      }
                    },
                    {
                      "id":4086208,
                      "name":"trust management system",
                      "data":{
                        "type":"Keyword",
                        "desc":"trust management system"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Trust Management"
                  }
                },
                {
                  "id":4085756,
                  "name":"trust evaluation",
                  "data":{
                    "type":"Keyword",
                    "desc":"trust evaluation"
                  }
                },
                {
                  "id":4086375,
                  "name":"trust negotiation",
                  "data":{
                    "type":"Keyword",
                    "desc":"trust negotiation"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Operation"
              }
            },
            {
              "id":2241721,
              "name":"automated trust negotiation",
              "data":{
                "type":"Keyword",
                "desc":"automated trust negotiation"
              }
            },
            {
              "id":3730642,
              "name":"reputation system",
              "data":{
                "type":"Keyword",
                "desc":"reputation system"
              }
            },
            {
              "id":4085556,
              "name":"trust decision",
              "data":{
                "type":"Keyword",
                "desc":"trust decision"
              }
            },
            {
              "id":4086106,
              "name":"trust level",
              "data":{
                "type":"Keyword",
                "desc":"trust level"
              }
            },
            {
              "id":4086267,
              "name":"trust metric",
              "data":{
                "type":"Keyword",
                "desc":"trust metric"
              }
            },
            {
              "id":4086299,
              "name":"trust model",
              "data":{
                "type":"Keyword",
                "desc":"trust model"
              }
            },
            {
              "id":4086452,
              "name":"trust network",
              "data":{
                "type":"Keyword",
                "desc":"trust network"
              }
            },
            {
              "id":4086542,
              "name":"trust party",
              "data":{
                "type":"Keyword",
                "desc":"trust party"
              }
            },
            {
              "id":4087074,
              "name":"trust platform module",
              "data":{
                "type":"Keyword",
                "desc":"trust platform module"
              }
            },
            {
              "id":4087134,
              "name":"trust propagation",
              "data":{
                "type":"Keyword",
                "desc":"trust propagation"
              }
            },
            {
              "id":4087231,
              "name":"trust relation",
              "data":{
                "type":"Keyword",
                "desc":"trust relation"
              }
            },
            {
              "id":4087327,
              "name":"trust requirement",
              "data":{
                "type":"Keyword",
                "desc":"trust requirement"
              }
            },
            {
              "id":4088417,
              "name":"trustor",
              "data":{
                "type":"Keyword",
                "desc":"trustor"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":26,
            "desc":"Trust"
          }
        },
        {
          "id":241,
          "name":"Software Security",
          "children":[
            {
              "id":2197814,
              "name":"application security",
              "data":{
                "type":"Keyword",
                "desc":"application security"
              }
            },
            {
              "id":2197898,
              "name":"application security test",
              "data":{
                "type":"Keyword",
                "desc":"application security test"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Software Security"
          }
        },
        {
          "id":242,
          "name":"Hardware Security",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Hardware Security"
          }
        },
        {
          "id":243,
          "name":"Systems Security",
          "children":[
            {
              "id":2243954,
              "name":"autorun",
              "data":{
                "type":"Keyword",
                "desc":"autorun"
              }
            },
            {
              "id":3824140,
              "name":"security systems",
              "data":{
                "type":"Keyword",
                "desc":"security systems"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Systems Security"
          }
        },
        {
          "id":246,
          "name":"Distributed Ledger",
          "children":[
            {
              "id":247,
              "name":"Blockchain",
              "children":[
                {
                  "id":250,
                  "name":"Public Blockchain",
                  "children":[
                    {
                      "id":253,
                      "name":"Ethereum",
                      "children":[],
                      "data":{
                        "type":"Class",
                        "size":1,
                        "desc":"Ethereum"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Public Blockchain"
                  }
                },
                {
                  "id":251,
                  "name":"Permissioned (Consortium) Blockchain",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Permissioned (Consortium) Blockchain"
                  }
                },
                {
                  "id":252,
                  "name":"Private Blockchain",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Private Blockchain"
                  }
                },
                {
                  "id":3886372,
                  "name":"smart contract",
                  "data":{
                    "type":"Keyword",
                    "desc":"smart contract"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Blockchain"
              }
            },
            {
              "id":248,
              "name":"Cryptocurrency",
              "children":[
                {
                  "id":249,
                  "name":"Bitcoin",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Bitcoin"
                  }
                },
                {
                  "id":2325595,
                  "name":"btc-e",
                  "data":{
                    "type":"Keyword",
                    "desc":"btc-e"
                  }
                },
                {
                  "id":2398178,
                  "name":"ccn",
                  "data":{
                    "type":"Keyword",
                    "desc":"ccn"
                  }
                },
                {
                  "id":2556972,
                  "name":"cryptocurrency miner",
                  "data":{
                    "type":"Keyword",
                    "desc":"cryptocurrency miner"
                  }
                },
                {
                  "id":2782394,
                  "name":"ethereum",
                  "data":{
                    "type":"Keyword",
                    "desc":"ethereum"
                  }
                },
                {
                  "id":4240730,
                  "name":"zcash",
                  "data":{
                    "type":"Keyword",
                    "desc":"zcash"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Cryptocurrency"
              }
            },
            {
              "id":254,
              "name":"Smart Contract",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Smart Contract"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":15,
            "desc":"Distributed Ledger"
          }
        },
        {
          "id":280,
          "name":"Usable Security",
          "children":[],
          "data":{
            "type":"Class",
            "size":1,
            "desc":"Usable Security"
          }
        },
        {
          "id":425,
          "name":"Physical Security",
          "children":[
            {
              "id":2658205,
              "name":"device security",
              "data":{
                "type":"Keyword",
                "desc":"device security"
              }
            },
            {
              "id":3085741,
              "name":"infrastructure security",
              "data":{
                "type":"Keyword",
                "desc":"infrastructure security"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Physical Security"
          }
        },
        {
          "id":428,
          "name":"Network Security",
          "children":[
            {
              "id":2605915,
              "name":"datagram transport layer security",
              "data":{
                "type":"Keyword",
                "desc":"datagram transport layer security"
              }
            },
            {
              "id":3391829,
              "name":"network flow data",
              "data":{
                "type":"Keyword",
                "desc":"network flow data"
              }
            },
            {
              "id":3393116,
              "name":"network security analysis",
              "data":{
                "type":"Keyword",
                "desc":"network security analysis"
              }
            },
            {
              "id":3393234,
              "name":"network security monitoring",
              "data":{
                "type":"Keyword",
                "desc":"network security monitoring"
              }
            },
            {
              "id":3393776,
              "name":"network traffic analysis",
              "data":{
                "type":"Keyword",
                "desc":"network traffic analysis"
              }
            },
            {
              "id":3393806,
              "name":"network traffic data",
              "data":{
                "type":"Keyword",
                "desc":"network traffic data"
              }
            },
            {
              "id":4073879,
              "name":"transport layer security",
              "data":{
                "type":"Keyword",
                "desc":"transport layer security"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":8,
            "desc":"Network Security"
          }
        },
        {
          "id":429,
          "name":"Cybersecurity Industry",
          "children":[
            {
              "id":3276010,
              "name":"managed security service",
              "data":{
                "type":"Keyword",
                "desc":"managed security service"
              }
            },
            {
              "id":3361333,
              "name":"mssp",
              "data":{
                "type":"Keyword",
                "desc":"mssp"
              }
            },
            {
              "id":3823507,
              "name":"security service provider",
              "data":{
                "type":"Keyword",
                "desc":"security service provider"
              }
            },
            {
              "id":3824906,
              "name":"security vendor",
              "data":{
                "type":"Keyword",
                "desc":"security vendor"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":5,
            "desc":"Cybersecurity Industry"
          }
        },
        {
          "id":2323110,
          "name":"browser security",
          "data":{
            "type":"Keyword",
            "desc":"browser security"
          }
        },
        {
          "id":2480958,
          "name":"communications security",
          "data":{
            "type":"Keyword",
            "desc":"communications security"
          }
        },
        {
          "id":2667570,
          "name":"digital security",
          "data":{
            "type":"Keyword",
            "desc":"digital security"
          }
        },
        {
          "id":2756290,
          "name":"endpoint security",
          "data":{
            "type":"Keyword",
            "desc":"endpoint security"
          }
        },
        {
          "id":2764512,
          "name":"enterprise security",
          "data":{
            "type":"Keyword",
            "desc":"enterprise security"
          }
        },
        {
          "id":3025660,
          "name":"http strict transport security",
          "data":{
            "type":"Keyword",
            "desc":"http strict transport security"
          }
        },
        {
          "id":3037606,
          "name":"ics security",
          "data":{
            "type":"Keyword",
            "desc":"ics security"
          }
        },
        {
          "id":3075965,
          "name":"industrial control system security",
          "data":{
            "type":"Keyword",
            "desc":"industrial control system security"
          }
        },
        {
          "id":3138521,
          "name":"itsecurity",
          "data":{
            "type":"Keyword",
            "desc":"itsecurity"
          }
        },
        {
          "id":3473103,
          "name":"operational security",
          "data":{
            "type":"Keyword",
            "desc":"operational security"
          }
        },
        {
          "id":3517227,
          "name":"password security",
          "data":{
            "type":"Keyword",
            "desc":"password security"
          }
        },
        {
          "id":3671471,
          "name":"qubes security bulletin",
          "data":{
            "type":"Keyword",
            "desc":"qubes security bulletin"
          }
        },
        {
          "id":3894318,
          "name":"social media security",
          "data":{
            "type":"Keyword",
            "desc":"social media security"
          }
        },
        {
          "id":4138591,
          "name":"user security",
          "data":{
            "type":"Keyword",
            "desc":"user security"
          }
        },
        {
          "id":4190336,
          "name":"web application security",
          "data":{
            "type":"Keyword",
            "desc":"web application security"
          }
        },
        {
          "id":4191614,
          "name":"web security",
          "data":{
            "type":"Keyword",
            "desc":"web security"
          }
        },
        {
          "id":4212954,
          "name":"windows security",
          "data":{
            "type":"Keyword",
            "desc":"windows security"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":118,
        "desc":"Sub-domain"
      }
    },
    {
      "id":289,
      "name":"Nefarious Activity",
      "children":[
        {
          "id":290,
          "name":"Cybercrime",
          "children":[
            {
              "id":2548876,
              "name":"crimeware",
              "data":{
                "type":"Keyword",
                "desc":"crimeware"
              }
            },
            {
              "id":2572757,
              "name":"cyber crime",
              "data":{
                "type":"Keyword",
                "desc":"cyber crime"
              }
            },
            {
              "id":2573651,
              "name":"cyber extortion",
              "data":{
                "type":"Keyword",
                "desc":"cyber extortion"
              }
            },
            {
              "id":2577659,
              "name":"cyber-crime",
              "data":{
                "type":"Keyword",
                "desc":"cyber-crime"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":5,
            "desc":"Cybercrime"
          }
        },
        {
          "id":349,
          "name":"Hacking",
          "children":[
            {
              "id":366,
              "name":"Hacktivism",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Hacktivism"
              }
            },
            {
              "id":367,
              "name":"Hacking Tool",
              "children":[
                {
                  "id":2433562,
                  "name":"cia hacking tool",
                  "data":{
                    "type":"Keyword",
                    "desc":"cia hacking tool"
                  }
                },
                {
                  "id":2972289,
                  "name":"hacking software",
                  "data":{
                    "type":"Keyword",
                    "desc":"hacking software"
                  }
                },
                {
                  "id":2972656,
                  "name":"hacking tools",
                  "data":{
                    "type":"Keyword",
                    "desc":"hacking tools"
                  }
                },
                {
                  "id":3709667,
                  "name":"regin",
                  "data":{
                    "type":"Keyword",
                    "desc":"regin"
                  }
                },
                {
                  "id":3925311,
                  "name":"spy tool",
                  "data":{
                    "type":"Keyword",
                    "desc":"spy tool"
                  }
                },
                {
                  "id":4212106,
                  "name":"windows hacking tool",
                  "data":{
                    "type":"Keyword",
                    "desc":"windows hacking tool"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Hacking Tool"
              }
            },
            {
              "id":476,
              "name":"Web Hacking",
              "children":[
                {
                  "id":477,
                  "name":"Social Media Hacking",
                  "children":[
                    {
                      "id":2970750,
                      "name":"hacking facebook account",
                      "data":{
                        "type":"Keyword",
                        "desc":"hacking facebook account"
                      }
                    },
                    {
                      "id":4096084,
                      "name":"twitter account hack",
                      "data":{
                        "type":"Keyword",
                        "desc":"twitter account hack"
                      }
                    },
                    {
                      "id":4238704,
                      "name":"youtube hacking tricks",
                      "data":{
                        "type":"Keyword",
                        "desc":"youtube hacking tricks"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Social Media Hacking"
                  }
                },
                {
                  "id":4194595,
                  "name":"website hack",
                  "data":{
                    "type":"Keyword",
                    "desc":"website hack"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Web Hacking"
              }
            },
            {
              "id":2193053,
              "name":"app hacking",
              "data":{
                "type":"Keyword",
                "desc":"app hacking"
              }
            },
            {
              "id":2546972,
              "name":"credit card hack",
              "data":{
                "type":"Keyword",
                "desc":"credit card hack"
              }
            },
            {
              "id":2605043,
              "name":"database hack",
              "data":{
                "type":"Keyword",
                "desc":"database hack"
              }
            },
            {
              "id":2688382,
              "name":"dnc hack",
              "data":{
                "type":"Keyword",
                "desc":"dnc hack"
              }
            },
            {
              "id":2734779,
              "name":"election hacking",
              "data":{
                "type":"Keyword",
                "desc":"election hacking"
              }
            },
            {
              "id":2740419,
              "name":"email interception hack",
              "data":{
                "type":"Keyword",
                "desc":"email interception hack"
              }
            },
            {
              "id":2944517,
              "name":"government hacking",
              "data":{
                "type":"Keyword",
                "desc":"government hacking"
              }
            },
            {
              "id":2968718,
              "name":"hacker target",
              "data":{
                "type":"Keyword",
                "desc":"hacker target"
              }
            },
            {
              "id":2969936,
              "name":"hackerspace",
              "data":{
                "type":"Keyword",
                "desc":"hackerspace"
              }
            },
            {
              "id":2972214,
              "name":"hacking service",
              "data":{
                "type":"Keyword",
                "desc":"hacking service"
              }
            },
            {
              "id":2972535,
              "name":"hacking technique",
              "data":{
                "type":"Keyword",
                "desc":"hacking technique"
              }
            },
            {
              "id":2972770,
              "name":"hacking tutorial",
              "data":{
                "type":"Keyword",
                "desc":"hacking tutorial"
              }
            },
            {
              "id":2982685,
              "name":"hardware hacking",
              "data":{
                "type":"Keyword",
                "desc":"hardware hacking"
              }
            },
            {
              "id":3082954,
              "name":"infosec hacking",
              "data":{
                "type":"Keyword",
                "desc":"infosec hacking"
              }
            },
            {
              "id":3424546,
              "name":"nsa malware staging server",
              "data":{
                "type":"Keyword",
                "desc":"nsa malware staging server"
              }
            },
            {
              "id":3904770,
              "name":"sony hack",
              "data":{
                "type":"Keyword",
                "desc":"sony hack"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":31,
            "desc":"Hacking Activities"
          }
        },
        {
          "id":378,
          "name":"Payment Card Fraud",
          "children":[
            {
              "id":521,
              "name":"Magnetic Stripe Reader",
              "children":[
                {
                  "id":3361228,
                  "name":"msr2000",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr2000"
                  }
                },
                {
                  "id":3361229,
                  "name":"msr206",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr206"
                  }
                },
                {
                  "id":3361233,
                  "name":"msr3000",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr3000"
                  }
                },
                {
                  "id":3361234,
                  "name":"msr400",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr400"
                  }
                },
                {
                  "id":3361235,
                  "name":"msr500m",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr500m"
                  }
                },
                {
                  "id":3361237,
                  "name":"msr505",
                  "data":{
                    "type":"Keyword",
                    "desc":"msr505"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":7,
                "desc":"Magnetic Stripe Reader"
              }
            },
            {
              "id":2389434,
              "name":"card breach",
              "data":{
                "type":"Keyword",
                "desc":"card breach"
              }
            },
            {
              "id":2390203,
              "name":"carder007",
              "data":{
                "type":"Keyword",
                "desc":"carder007"
              }
            },
            {
              "id":2390336,
              "name":"carding",
              "data":{
                "type":"Keyword",
                "desc":"carding"
              }
            },
            {
              "id":2546864,
              "name":"credit card breach",
              "data":{
                "type":"Keyword",
                "desc":"credit card breach"
              }
            },
            {
              "id":2547078,
              "name":"credit card skimmer",
              "data":{
                "type":"Keyword",
                "desc":"credit card skimmer"
              }
            },
            {
              "id":2902650,
              "name":"fullz",
              "data":{
                "type":"Keyword",
                "desc":"fullz"
              }
            },
            {
              "id":3524285,
              "name":"payment card breach",
              "data":{
                "type":"Keyword",
                "desc":"payment card breach"
              }
            },
            {
              "id":3850953,
              "name":"sfo",
              "data":{
                "type":"Keyword",
                "desc":"sfo"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":16,
            "desc":"Payment Card Fraud"
          }
        },
        {
          "id":460,
          "name":"Dark Web",
          "children":[
            {
              "id":461,
              "name":"Dark Web Market",
              "children":[
                {
                  "id":2596134,
                  "name":"dark web drug market",
                  "data":{
                    "type":"Keyword",
                    "desc":"dark web drug market"
                  }
                },
                {
                  "id":2979598,
                  "name":"hansa dark web market",
                  "data":{
                    "type":"Keyword",
                    "desc":"hansa dark web market"
                  }
                },
                {
                  "id":4111459,
                  "name":"underground market",
                  "data":{
                    "type":"Keyword",
                    "desc":"underground market"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Dark Web Market"
              }
            },
            {
              "id":2596213,
              "name":"dark web site",
              "data":{
                "type":"Keyword",
                "desc":"dark web site"
              }
            },
            {
              "id":2596506,
              "name":"darknet",
              "data":{
                "type":"Keyword",
                "desc":"darknet"
              }
            },
            {
              "id":2596689,
              "name":"darkweb",
              "data":{
                "type":"Keyword",
                "desc":"darkweb"
              }
            },
            {
              "id":4111413,
              "name":"underground forum",
              "data":{
                "type":"Keyword",
                "desc":"underground forum"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":9,
            "desc":"Dark Web"
          }
        },
        {
          "id":462,
          "name":"Malicious",
          "children":[
            {
              "id":463,
              "name":"Malicious File",
              "children":[
                {
                  "id":464,
                  "name":"Malicious Document",
                  "children":[
                    {
                      "id":3268156,
                      "name":"malicious pdf",
                      "data":{
                        "type":"Keyword",
                        "desc":"malicious pdf"
                      }
                    },
                    {
                      "id":3268727,
                      "name":"malicious word document",
                      "data":{
                        "type":"Keyword",
                        "desc":"malicious word document"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Malicious Document"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Malicious File"
              }
            },
            {
              "id":465,
              "name":"Malicious Software",
              "children":[
                {
                  "id":3267180,
                  "name":"malicious android app",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious android app"
                  }
                },
                {
                  "id":3267199,
                  "name":"malicious app",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious app"
                  }
                },
                {
                  "id":3267213,
                  "name":"malicious application",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious application"
                  }
                },
                {
                  "id":3267388,
                  "name":"malicious code",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious code"
                  }
                },
                {
                  "id":3267657,
                  "name":"malicious executable",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious executable"
                  }
                },
                {
                  "id":3268142,
                  "name":"malicious payload",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious payload"
                  }
                },
                {
                  "id":3268267,
                  "name":"malicious program",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious program"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"Malicious Software"
              }
            },
            {
              "id":466,
              "name":"Malicious Actor",
              "children":[
                {
                  "id":3267833,
                  "name":"malicious insider",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious insider"
                  }
                },
                {
                  "id":3268634,
                  "name":"malicious user",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious user"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Malicious Actor"
              }
            },
            {
              "id":467,
              "name":"Malicious URL",
              "children":[
                {
                  "id":3267585,
                  "name":"malicious domain",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious domain"
                  }
                },
                {
                  "id":3267942,
                  "name":"malicious link",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious link"
                  }
                },
                {
                  "id":3268694,
                  "name":"malicious website",
                  "data":{
                    "type":"Keyword",
                    "desc":"malicious website"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Malicious URL"
              }
            },
            {
              "id":486,
              "name":"Malicious Cyber Activity",
              "children":[
                {
                  "id":2953417,
                  "name":"grizzly steppe report",
                  "data":{
                    "type":"Keyword",
                    "desc":"grizzly steppe report"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Malicious Cyber Activity"
              }
            },
            {
              "id":3267276,
              "name":"malicious behavior",
              "data":{
                "type":"Keyword",
                "desc":"malicious behavior"
              }
            },
            {
              "id":3267484,
              "name":"malicious content",
              "data":{
                "type":"Keyword",
                "desc":"malicious content"
              }
            },
            {
              "id":3267617,
              "name":"malicious email",
              "data":{
                "type":"Keyword",
                "desc":"malicious email"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":25,
            "desc":"Malicious"
          }
        },
        {
          "id":500,
          "name":"Piracy",
          "children":[
            {
              "id":3557791,
              "name":"pirate bay",
              "data":{
                "type":"Keyword",
                "desc":"pirate bay"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":2,
            "desc":"Piracy"
          }
        },
        {
          "id":523,
          "name":"Spamming",
          "children":[
            {
              "id":3912022,
              "name":"spam campaign",
              "data":{
                "type":"Keyword",
                "desc":"spam campaign"
              }
            },
            {
              "id":3912308,
              "name":"spam email",
              "data":{
                "type":"Keyword",
                "desc":"spam email"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Spamming"
          }
        },
        {
          "id":2827180,
          "name":"fake news",
          "data":{
            "type":"Keyword",
            "desc":"fake news"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":93,
        "desc":"Any activity that is nefarious or can cause hard/damage"
      }
    },
    {
      "id":291,
      "name":"Warfare",
      "children":[
        {
          "id":287,
          "name":"Defense",
          "children":[
            {
              "id":288,
              "name":"Center",
              "children":[
                {
                  "id":488,
                  "name":"National Cyber Security Centre",
                  "children":[
                    {
                      "id":2573558,
                      "name":"cyber essentials scheme",
                      "data":{
                        "type":"Keyword",
                        "desc":"cyber essentials scheme"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"National Cyber Security Centre"
                  }
                },
                {
                  "id":2572577,
                  "name":"cyber command",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber command"
                  }
                },
                {
                  "id":2573121,
                  "name":"cyber defence centre",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber defence centre"
                  }
                },
                {
                  "id":2575691,
                  "name":"cyber security center",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber security center"
                  }
                },
                {
                  "id":2575696,
                  "name":"cyber security centre",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber security centre"
                  }
                },
                {
                  "id":3379734,
                  "name":"nato ccd coe",
                  "data":{
                    "type":"Keyword",
                    "desc":"nato ccd coe"
                  }
                },
                {
                  "id":3379781,
                  "name":"nato cooperative cyber defence centre",
                  "data":{
                    "type":"Keyword",
                    "desc":"nato cooperative cyber defence centre"
                  }
                },
                {
                  "id":3815890,
                  "name":"security center",
                  "data":{
                    "type":"Keyword",
                    "desc":"security center"
                  }
                },
                {
                  "id":3821421,
                  "name":"security operations center",
                  "data":{
                    "type":"Keyword",
                    "desc":"security operations center"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":11,
                "desc":"Cyber Security Defense Center"
              }
            },
            {
              "id":2438594,
              "name":"cis critical security controls",
              "data":{
                "type":"Keyword",
                "desc":"cis critical security controls"
              }
            },
            {
              "id":2494992,
              "name":"computer network defense",
              "data":{
                "type":"Keyword",
                "desc":"computer network defense"
              }
            },
            {
              "id":2573113,
              "name":"cyber defence",
              "data":{
                "type":"Keyword",
                "desc":"cyber defence"
              }
            },
            {
              "id":2573194,
              "name":"cyber defense",
              "data":{
                "type":"Keyword",
                "desc":"cyber defense"
              }
            },
            {
              "id":2575255,
              "name":"cyber resilience",
              "data":{
                "type":"Keyword",
                "desc":"cyber resilience"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":17,
            "desc":"Cyber Security Defense"
          }
        },
        {
          "id":293,
          "name":"Espionage",
          "children":[
            {
              "id":2573477,
              "name":"cyber espionage campaign",
              "data":{
                "type":"Keyword",
                "desc":"cyber espionage campaign"
              }
            },
            {
              "id":2573520,
              "name":"cyber espionage operation",
              "data":{
                "type":"Keyword",
                "desc":"cyber espionage operation"
              }
            },
            {
              "id":2577783,
              "name":"cyber-espionage",
              "data":{
                "type":"Keyword",
                "desc":"cyber-espionage"
              }
            },
            {
              "id":2581602,
              "name":"cyberespionage",
              "data":{
                "type":"Keyword",
                "desc":"cyberespionage"
              }
            },
            {
              "id":2777395,
              "name":"espionage campaign",
              "data":{
                "type":"Keyword",
                "desc":"espionage campaign"
              }
            },
            {
              "id":4067196,
              "name":"tradecraft",
              "data":{
                "type":"Keyword",
                "desc":"tradecraft"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":7,
            "desc":"Cyber Espionage"
          }
        },
        {
          "id":491,
          "name":"Government Strategy/Framework",
          "children":[
            {
              "id":3377598,
              "name":"national cyber security strategy",
              "data":{
                "type":"Keyword",
                "desc":"national cyber security strategy"
              }
            },
            {
              "id":3378624,
              "name":"national security letter",
              "data":{
                "type":"Keyword",
                "desc":"national security letter"
              }
            },
            {
              "id":3406314,
              "name":"nist cybersecurity framework",
              "data":{
                "type":"Keyword",
                "desc":"nist cybersecurity framework"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":4,
            "desc":"Government Strategy/Framework"
          }
        },
        {
          "id":499,
          "name":"Cyber Security Culture",
          "children":[
            {
              "id":2959568,
              "name":"guy fawkes mask",
              "data":{
                "type":"Keyword",
                "desc":"guy fawkes mask"
              }
            },
            {
              "id":3359718,
              "name":"mrrobot",
              "data":{
                "type":"Keyword",
                "desc":"mrrobot"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Cyber Security Culture"
          }
        },
        {
          "id":2571862,
          "name":"cyber arm race",
          "data":{
            "type":"Keyword",
            "desc":"cyber arm race"
          }
        },
        {
          "id":2572675,
          "name":"cyber conflict",
          "data":{
            "type":"Keyword",
            "desc":"cyber conflict"
          }
        },
        {
          "id":2577321,
          "name":"cyber war",
          "data":{
            "type":"Keyword",
            "desc":"cyber war"
          }
        },
        {
          "id":2577360,
          "name":"cyber warfare",
          "data":{
            "type":"Keyword",
            "desc":"cyber warfare"
          }
        },
        {
          "id":2577442,
          "name":"cyber weapon",
          "data":{
            "type":"Keyword",
            "desc":"cyber weapon"
          }
        },
        {
          "id":2579598,
          "name":"cyberaware",
          "data":{
            "type":"Keyword",
            "desc":"cyberaware"
          }
        },
        {
          "id":2586818,
          "name":"cyberwar",
          "data":{
            "type":"Keyword",
            "desc":"cyberwar"
          }
        },
        {
          "id":2587805,
          "name":"cyberwarfare",
          "data":{
            "type":"Keyword",
            "desc":"cyberwarfare"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":40,
        "desc":"Cyberware"
      }
    },
    {
      "id":295,
      "name":"Privacy",
      "children":[
        {
          "id":297,
          "name":"Preserving",
          "children":[
            {
              "id":298,
              "name":"Data",
              "children":[
                {
                  "id":299,
                  "name":"Operation",
                  "children":[
                    {
                      "id":300,
                      "name":"Analysis",
                      "children":[
                        {
                          "id":3307395,
                          "name":"memory analysis",
                          "data":{
                            "type":"Keyword",
                            "desc":"memory analysis"
                          }
                        },
                        {
                          "id":3618592,
                          "name":"privacy-preserving data analysis",
                          "data":{
                            "type":"Keyword",
                            "desc":"privacy-preserving data analysis"
                          }
                        },
                        {
                          "id":3938018,
                          "name":"static analysis tool",
                          "data":{
                            "type":"Keyword",
                            "desc":"static analysis tool"
                          }
                        },
                        {
                          "id":4235095,
                          "name":"yara rule",
                          "data":{
                            "type":"Keyword",
                            "desc":"yara rule"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":5,
                        "desc":"Analysis"
                      }
                    },
                    {
                      "id":303,
                      "name":"Mining",
                      "children":[
                        {
                          "id":3604312,
                          "name":"preserve data mining",
                          "data":{
                            "type":"Keyword",
                            "desc":"preserve data mining"
                          }
                        },
                        {
                          "id":3617384,
                          "name":"privacy preserving data mining",
                          "data":{
                            "type":"Keyword",
                            "desc":"privacy preserving data mining"
                          }
                        },
                        {
                          "id":3618602,
                          "name":"privacy-preserving data mining",
                          "data":{
                            "type":"Keyword",
                            "desc":"privacy-preserving data mining"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":4,
                        "desc":"Mining"
                      }
                    },
                    {
                      "id":304,
                      "name":"Publishing",
                      "children":[
                        {
                          "id":3617391,
                          "name":"privacy preserving data publishing",
                          "data":{
                            "type":"Keyword",
                            "desc":"privacy preserving data publishing"
                          }
                        },
                        {
                          "id":3618619,
                          "name":"privacy-preserving data publishing",
                          "data":{
                            "type":"Keyword",
                            "desc":"privacy-preserving data publishing"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":3,
                        "desc":"Publishing"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":13,
                    "desc":"Operation"
                  }
                },
                {
                  "id":4051718,
                  "name":"tlp traffic light protocol",
                  "data":{
                    "type":"Keyword",
                    "desc":"tlp traffic light protocol"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":15,
                "desc":"Data"
              }
            },
            {
              "id":325,
              "name":"De-identification",
              "children":[
                {
                  "id":296,
                  "name":"Method",
                  "children":[
                    {
                      "id":3158528,
                      "name":"k-anonymization",
                      "data":{
                        "type":"Keyword",
                        "desc":"k-anonymization"
                      }
                    },
                    {
                      "id":3181453,
                      "name":"l-diversity",
                      "data":{
                        "type":"Keyword",
                        "desc":"l-diversity"
                      }
                    },
                    {
                      "id":3994130,
                      "name":"t-closeness",
                      "data":{
                        "type":"Keyword",
                        "desc":"t-closeness"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Privacy Preserving Method"
                  }
                },
                {
                  "id":451,
                  "name":"k-anonymity",
                  "children":[
                    {
                      "id":3158487,
                      "name":"k-anonymity privacy protection",
                      "data":{
                        "type":"Keyword",
                        "desc":"k-anonymity privacy protection"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"k-anonymity"
                  }
                },
                {
                  "id":3689712,
                  "name":"re-identification",
                  "data":{
                    "type":"Keyword",
                    "desc":"re-identification"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"De-identification is the process used to prevent someone's personal identity from being revealed."
              }
            },
            {
              "id":459,
              "name":"Multi-party Computation (MPC)",
              "children":[
                {
                  "id":3365230,
                  "name":"multiparty unconditionally secure protocol",
                  "data":{
                    "type":"Keyword",
                    "desc":"multiparty unconditionally secure protocol"
                  }
                },
                {
                  "id":3811315,
                  "name":"secure computing",
                  "data":{
                    "type":"Keyword",
                    "desc":"secure computing"
                  }
                },
                {
                  "id":3812341,
                  "name":"secure multi-party computation",
                  "data":{
                    "type":"Keyword",
                    "desc":"secure multi-party computation"
                  }
                },
                {
                  "id":3812375,
                  "name":"secure multiparty computation",
                  "data":{
                    "type":"Keyword",
                    "desc":"secure multiparty computation"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"MPC is a sub-field of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private"
              }
            },
            {
              "id":495,
              "name":"Homomorphic Encryption",
              "children":[
                {
                  "id":3015248,
                  "name":"homomorphic encryption scheme",
                  "data":{
                    "type":"Keyword",
                    "desc":"homomorphic encryption scheme"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext. Homomorphic encryption can be used for privacy-preserving outsourced storage and computation."
              }
            },
            {
              "id":3617241,
              "name":"privacy preservation",
              "data":{
                "type":"Keyword",
                "desc":"privacy preservation"
              }
            },
            {
              "id":3618527,
              "name":"privacy-preserving",
              "data":{
                "type":"Keyword",
                "desc":"privacy-preserving"
              }
            },
            {
              "id":3938965,
              "name":"statistical disclosure control",
              "data":{
                "type":"Keyword",
                "desc":"statistical disclosure control"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":34,
            "desc":"Privacy Preserving"
          }
        },
        {
          "id":305,
          "name":"Enhancing",
          "children":[
            {
              "id":235,
              "name":"Privacy Enhancing Technology (PET)",
              "children":[
                {
                  "id":441,
                  "name":"Anonymization",
                  "children":[
                    {
                      "id":2179269,
                      "name":"anonymization algorithm",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymization algorithm"
                      }
                    },
                    {
                      "id":2179450,
                      "name":"anonymization technique",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymization technique"
                      }
                    },
                    {
                      "id":2179709,
                      "name":"anonymized data",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymized data"
                      }
                    },
                    {
                      "id":2179804,
                      "name":"anonymizing",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymizing"
                      }
                    },
                    {
                      "id":2598438,
                      "name":"data anonymization",
                      "data":{
                        "type":"Keyword",
                        "desc":"data anonymization"
                      }
                    },
                    {
                      "id":2612231,
                      "name":"de-anonymization",
                      "data":{
                        "type":"Keyword",
                        "desc":"de-anonymization"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Anonymization"
                  }
                },
                {
                  "id":448,
                  "name":"Differential Privacy",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Differential Privacy"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Privacy Enhancing Technology (PET)"
              }
            },
            {
              "id":453,
              "name":"Online Privacy Protection",
              "children":[
                {
                  "id":452,
                  "name":"Anonymous Browsing",
                  "children":[
                    {
                      "id":2180684,
                      "name":"anonymous email",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymous email"
                      }
                    },
                    {
                      "id":2180698,
                      "name":"anonymous email address",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymous email address"
                      }
                    },
                    {
                      "id":2182528,
                      "name":"anonymous proxy",
                      "data":{
                        "type":"Keyword",
                        "desc":"anonymous proxy"
                      }
                    },
                    {
                      "id":4059954,
                      "name":"tor node",
                      "data":{
                        "type":"Keyword",
                        "desc":"tor node"
                      }
                    },
                    {
                      "id":4059962,
                      "name":"tor node operator",
                      "data":{
                        "type":"Keyword",
                        "desc":"tor node operator"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":6,
                    "desc":"Anonymous Browsing"
                  }
                },
                {
                  "id":3464907,
                  "name":"online safety",
                  "data":{
                    "type":"Keyword",
                    "desc":"online safety"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"Online Privacy Protection"
              }
            },
            {
              "id":3616252,
              "name":"privacy enhancing technologies",
              "data":{
                "type":"Keyword",
                "desc":"privacy enhancing technologies"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":19,
            "desc":"Privacy Enhancing"
          }
        },
        {
          "id":444,
          "name":"Data Privacy",
          "children":[
            {
              "id":556,
              "name":"Attributes Categorization",
              "children":[
                {
                  "id":557,
                  "name":"Sensitive Attribute",
                  "children":[
                    {
                      "id":3836570,
                      "name":"sensitive attribute disclosure",
                      "data":{
                        "type":"Keyword",
                        "desc":"sensitive attribute disclosure"
                      }
                    },
                    {
                      "id":3836623,
                      "name":"sensitive attribute value",
                      "data":{
                        "type":"Keyword",
                        "desc":"sensitive attribute value"
                      }
                    },
                    {
                      "id":3837142,
                      "name":"sensitive value",
                      "data":{
                        "type":"Keyword",
                        "desc":"sensitive value"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":4,
                    "desc":"Sensitive attributes encode properties with which individuals are not willing to be linked with. As such, they might be of interest to an attacker and, if disclosed, could cause harm to data subjects. They will be kept unmodified but may be subject to further constraints, such as t-closeness or l-diversity. Typical examples are diagnoses."
                  }
                },
                {
                  "id":558,
                  "name":"Quasi-Identifying Attribute",
                  "children":[
                    {
                      "id":3671292,
                      "name":"quasi-identifier",
                      "data":{
                        "type":"Keyword",
                        "desc":"quasi-identifier"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Quasi-identifying attributes can in combination be used for re-identification attacks. They will be transformed. Typical examples are gender, date of birth and ZIP codes."
                  }
                },
                {
                  "id":561,
                  "name":"Identifying Attribute",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Identifying attributes are associated with a high risk of re-identification. They will be removed from the dataset. Typical examples are names or Social Security Numbers."
                  }
                },
                {
                  "id":562,
                  "name":"Insensitive Attribute",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Insensitive attributes are not associated with privacy risks. They will be kept unmodified."
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"The specifics of the disclosure risks from which a dataset is to be protected can be specified by categorizing the attributes of the input dataset into different types"
              }
            },
            {
              "id":3540175,
              "name":"personal data protection",
              "data":{
                "type":"Keyword",
                "desc":"personal data protection"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":11,
            "desc":"Data Privacy"
          }
        },
        {
          "id":3615863,
          "name":"privacy constraint",
          "data":{
            "type":"Keyword",
            "desc":"privacy constraint"
          }
        },
        {
          "id":3616949,
          "name":"privacy model",
          "data":{
            "type":"Keyword",
            "desc":"privacy model"
          }
        },
        {
          "id":3617652,
          "name":"privacy requirement",
          "data":{
            "type":"Keyword",
            "desc":"privacy requirement"
          }
        },
        {
          "id":3617884,
          "name":"privacy setting",
          "data":{
            "type":"Keyword",
            "desc":"privacy setting"
          }
        },
        {
          "id":3618266,
          "name":"privacy-aware access control",
          "data":{
            "type":"Keyword",
            "desc":"privacy-aware access control"
          }
        },
        {
          "id":3620261,
          "name":"private proxy",
          "data":{
            "type":"Keyword",
            "desc":"private proxy"
          }
        },
        {
          "id":3939847,
          "name":"stay anonymous",
          "data":{
            "type":"Keyword",
            "desc":"stay anonymous"
          }
        },
        {
          "id":4138224,
          "name":"user privacy",
          "data":{
            "type":"Keyword",
            "desc":"user privacy"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":73,
        "desc":"Privacy"
      }
    },
    {
      "id":338,
      "name":"Cybersecurity Threat",
      "children":[
        {
          "id":82,
          "name":"Threat Classification",
          "children":[
            {
              "id":83,
              "name":"Criminal Threat",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Criminal Threat"
              }
            },
            {
              "id":84,
              "name":"Technical Threat",
              "children":[
                {
                  "id":4177649,
                  "name":"vulnerability report",
                  "data":{
                    "type":"Keyword",
                    "desc":"vulnerability report"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Technical Threat"
              }
            },
            {
              "id":85,
              "name":"Business Threat",
              "children":[
                {
                  "id":2856108,
                  "name":"financial cyber threat",
                  "data":{
                    "type":"Keyword",
                    "desc":"financial cyber threat"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Business Threat"
              }
            },
            {
              "id":86,
              "name":"Legal Threat",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Legal Threat"
              }
            },
            {
              "id":87,
              "name":"Other Threat",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Other Threat"
              }
            },
            {
              "id":236,
              "name":"Insider Threat",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Insider Threat"
              }
            },
            {
              "id":255,
              "name":"Advanced Persistent Threat (APT)",
              "children":[
                {
                  "id":2132924,
                  "name":"advanced persistent threat",
                  "data":{
                    "type":"Keyword",
                    "desc":"advanced persistent threat"
                  }
                },
                {
                  "id":2256495,
                  "name":"badbios",
                  "data":{
                    "type":"Keyword",
                    "desc":"badbios"
                  }
                },
                {
                  "id":2389088,
                  "name":"carbanak",
                  "data":{
                    "type":"Keyword",
                    "desc":"carbanak"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Advanced Persistent Threat (APT)"
              }
            },
            {
              "id":2577006,
              "name":"cyber threat indicator",
              "data":{
                "type":"Keyword",
                "desc":"cyber threat indicator"
              }
            },
            {
              "id":2577103,
              "name":"cyber threat landscape",
              "data":{
                "type":"Keyword",
                "desc":"cyber threat landscape"
              }
            },
            {
              "id":2577222,
              "name":"cyber threats",
              "data":{
                "type":"Keyword",
                "desc":"cyber threats"
              }
            },
            {
              "id":2578567,
              "name":"cyber-threat",
              "data":{
                "type":"Keyword",
                "desc":"cyber-threat"
              }
            },
            {
              "id":2585900,
              "name":"cybersecurity threat",
              "data":{
                "type":"Keyword",
                "desc":"cybersecurity threat"
              }
            },
            {
              "id":2586670,
              "name":"cyberthreat",
              "data":{
                "type":"Keyword",
                "desc":"cyberthreat"
              }
            },
            {
              "id":3093424,
              "name":"insider threat",
              "data":{
                "type":"Keyword",
                "desc":"insider threat"
              }
            },
            {
              "id":3113210,
              "name":"internet security threat",
              "data":{
                "type":"Keyword",
                "desc":"internet security threat"
              }
            },
            {
              "id":3684464,
              "name":"ransomware threat",
              "data":{
                "type":"Keyword",
                "desc":"ransomware threat"
              }
            },
            {
              "id":3957266,
              "name":"structured threat",
              "data":{
                "type":"Keyword",
                "desc":"structured threat"
              }
            },
            {
              "id":4120290,
              "name":"unknown threat",
              "data":{
                "type":"Keyword",
                "desc":"unknown threat"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":24,
            "desc":"Threat"
          }
        },
        {
          "id":171,
          "name":"Cyber Threat Intelligence",
          "children":[
            {
              "id":146,
              "name":"Standard",
              "children":[
                {
                  "id":147,
                  "name":"STIX",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"STIX"
                  }
                },
                {
                  "id":148,
                  "name":"TAXII",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"TAXII"
                  }
                },
                {
                  "id":149,
                  "name":"IODEF",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"IODEF"
                  }
                },
                {
                  "id":489,
                  "name":"Cyber Observable eXpression (CybOX)",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Cyber Observable eXpression (CybOX)"
                  }
                },
                {
                  "id":2576354,
                  "name":"cyber security standard",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber security standard"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Standard"
              }
            },
            {
              "id":294,
              "name":"CTI Sharing",
              "children":[
                {
                  "id":2574467,
                  "name":"cyber intelligence share",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber intelligence share"
                  }
                },
                {
                  "id":2714615,
                  "name":"dynamic threat intelligence",
                  "data":{
                    "type":"Keyword",
                    "desc":"dynamic threat intelligence"
                  }
                },
                {
                  "id":4038703,
                  "name":"threat intelligence exchange",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence exchange"
                  }
                },
                {
                  "id":4038932,
                  "name":"threat intelligence sharing",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence sharing"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"CTI Sharing"
              }
            },
            {
              "id":335,
              "name":"CTI Platform",
              "children":[
                {
                  "id":2860411,
                  "name":"fireeye dynamic threat intelligence",
                  "data":{
                    "type":"Keyword",
                    "desc":"fireeye dynamic threat intelligence"
                  }
                },
                {
                  "id":3335709,
                  "name":"misp",
                  "data":{
                    "type":"Keyword",
                    "desc":"misp"
                  }
                },
                {
                  "id":4038680,
                  "name":"threat intelligence data",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence data"
                  }
                },
                {
                  "id":4038714,
                  "name":"threat intelligence feed",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence feed"
                  }
                },
                {
                  "id":4038818,
                  "name":"threat intelligence platform",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence platform"
                  }
                },
                {
                  "id":4038897,
                  "name":"threat intelligence service",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence service"
                  }
                },
                {
                  "id":4038919,
                  "name":"threat intelligence share platform",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence share platform"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":8,
                "desc":"CTI Platform"
              }
            },
            {
              "id":2114978,
              "name":"actionable threat intelligence",
              "data":{
                "type":"Keyword",
                "desc":"actionable threat intelligence"
              }
            },
            {
              "id":2471047,
              "name":"collective intelligence framework",
              "data":{
                "type":"Keyword",
                "desc":"collective intelligence framework"
              }
            },
            {
              "id":2559874,
              "name":"cti",
              "data":{
                "type":"Keyword",
                "desc":"cti"
              }
            },
            {
              "id":2574418,
              "name":"cyber intelligence",
              "data":{
                "type":"Keyword",
                "desc":"cyber intelligence"
              }
            },
            {
              "id":3171379,
              "name":"kill chain",
              "data":{
                "type":"Keyword",
                "desc":"kill chain"
              }
            },
            {
              "id":3485761,
              "name":"osint",
              "data":{
                "type":"Keyword",
                "desc":"osint"
              }
            },
            {
              "id":4041048,
              "name":"threatintelligence",
              "data":{
                "type":"Keyword",
                "desc":"threatintelligence"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":27,
            "desc":"Cyber Threat Intelligence"
          }
        },
        {
          "id":339,
          "name":"Operation",
          "children":[
            {
              "id":340,
              "name":"Modeling",
              "children":[
                {
                  "id":4037584,
                  "name":"threat actor target",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat actor target"
                  }
                },
                {
                  "id":4037636,
                  "name":"threat agent",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat agent"
                  }
                },
                {
                  "id":4038467,
                  "name":"threat indicator",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat indicator"
                  }
                },
                {
                  "id":4039230,
                  "name":"threat model",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat model"
                  }
                },
                {
                  "id":4039279,
                  "name":"threat modeling",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat modeling"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":6,
                "desc":"Modeling"
              }
            },
            {
              "id":3042187,
              "name":"identify threat",
              "data":{
                "type":"Keyword",
                "desc":"identify threat"
              }
            },
            {
              "id":4037692,
              "name":"threat analysis",
              "data":{
                "type":"Keyword",
                "desc":"threat analysis"
              }
            },
            {
              "id":4038070,
              "name":"threat detection",
              "data":{
                "type":"Keyword",
                "desc":"threat detection"
              }
            },
            {
              "id":4038386,
              "name":"threat hunting",
              "data":{
                "type":"Keyword",
                "desc":"threat hunting"
              }
            },
            {
              "id":4039213,
              "name":"threat mitigation",
              "data":{
                "type":"Keyword",
                "desc":"threat mitigation"
              }
            },
            {
              "id":4039507,
              "name":"threat protection",
              "data":{
                "type":"Keyword",
                "desc":"threat protection"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":13,
            "desc":"Operation"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":65,
        "desc":"Cybersecurity Threat"
      }
    },
    {
      "id":380,
      "name":"General",
      "children":[
        {
          "id":208,
          "name":"Document",
          "children":[
            {
              "id":209,
              "name":"Research Paper",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Research Paper"
              }
            },
            {
              "id":210,
              "name":"Technical Report",
              "children":[
                {
                  "id":330,
                  "name":"Threat Report",
                  "children":[
                    {
                      "id":2133311,
                      "name":"advanced threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"advanced threat report"
                      }
                    },
                    {
                      "id":2761489,
                      "name":"enisa threat landscape report",
                      "data":{
                        "type":"Keyword",
                        "desc":"enisa threat landscape report"
                      }
                    },
                    {
                      "id":2860324,
                      "name":"fireeye advanced threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"fireeye advanced threat report"
                      }
                    },
                    {
                      "id":2933126,
                      "name":"global internet security threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"global internet security threat report"
                      }
                    },
                    {
                      "id":3113212,
                      "name":"internet security threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"internet security threat report"
                      }
                    },
                    {
                      "id":3709889,
                      "name":"regional advanced threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"regional advanced threat report"
                      }
                    },
                    {
                      "id":3824536,
                      "name":"security threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"security threat report"
                      }
                    },
                    {
                      "id":3986234,
                      "name":"symantec internet security threat report",
                      "data":{
                        "type":"Keyword",
                        "desc":"symantec internet security threat report"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":9,
                    "desc":"Threat Report"
                  }
                },
                {
                  "id":434,
                  "name":"Security Bulletin",
                  "children":[
                    {
                      "id":3324340,
                      "name":"microsoft security bulletin",
                      "data":{
                        "type":"Keyword",
                        "desc":"microsoft security bulletin"
                      }
                    },
                    {
                      "id":4166697,
                      "name":"virus bulletin",
                      "data":{
                        "type":"Keyword",
                        "desc":"virus bulletin"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":3,
                    "desc":"Security Bulletin"
                  }
                },
                {
                  "id":2478135,
                  "name":"common attack pattern enumeration",
                  "data":{
                    "type":"Keyword",
                    "desc":"common attack pattern enumeration"
                  }
                },
                {
                  "id":2585392,
                  "name":"cybersecurity report",
                  "data":{
                    "type":"Keyword",
                    "desc":"cybersecurity report"
                  }
                },
                {
                  "id":3324368,
                  "name":"microsoft security intelligence report",
                  "data":{
                    "type":"Keyword",
                    "desc":"microsoft security intelligence report"
                  }
                },
                {
                  "id":3822762,
                  "name":"security report",
                  "data":{
                    "type":"Keyword",
                    "desc":"security report"
                  }
                },
                {
                  "id":3824310,
                  "name":"security technical report",
                  "data":{
                    "type":"Keyword",
                    "desc":"security technical report"
                  }
                },
                {
                  "id":4038880,
                  "name":"threat intelligence report",
                  "data":{
                    "type":"Keyword",
                    "desc":"threat intelligence report"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":19,
                "desc":"Technical Report"
              }
            },
            {
              "id":211,
              "name":"Degree Thesis",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Degree Thesis"
              }
            },
            {
              "id":212,
              "name":"Software Documentation",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"User manual, developer guide, etc."
              }
            },
            {
              "id":213,
              "name":"Web Document",
              "children":[
                {
                  "id":2291261,
                  "name":"black hat arsenal",
                  "data":{
                    "type":"Keyword",
                    "desc":"black hat arsenal"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Websites, web pages, online videos, and any other online documents that are affiliated with an URL (excluding those belonging to other categories)"
              }
            },
            {
              "id":214,
              "name":"Book",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Book"
              }
            },
            {
              "id":215,
              "name":"Standard",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Standard"
              }
            },
            {
              "id":422,
              "name":"White Paper",
              "children":[
                {
                  "id":3825228,
                  "name":"security white paper",
                  "data":{
                    "type":"Keyword",
                    "desc":"security white paper"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"White Paper"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":29,
            "desc":"Documents related to cyber security"
          }
        },
        {
          "id":225,
          "name":"Asset",
          "children":[
            {
              "id":226,
              "name":"Data",
              "children":[
                {
                  "id":229,
                  "name":"Account",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Electronic accounts as a special type of data protected"
                  }
                },
                {
                  "id":576,
                  "name":"Personal Data",
                  "children":[],
                  "data":{
                    "type":"Class",
                    "size":1,
                    "desc":"Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data"
                  }
                },
                {
                  "id":2575806,
                  "name":"cyber security data",
                  "data":{
                    "type":"Keyword",
                    "desc":"cyber security data"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Data to be protected"
              }
            },
            {
              "id":227,
              "name":"System",
              "children":[
                {
                  "id":30,
                  "name":"Critical Infrastructure",
                  "children":[
                    {
                      "id":2550839,
                      "name":"critical infrastructure cybersecurity",
                      "data":{
                        "type":"Keyword",
                        "desc":"critical infrastructure cybersecurity"
                      }
                    },
                    {
                      "id":2550911,
                      "name":"critical infrastructure protection",
                      "data":{
                        "type":"Keyword",
                        "desc":"critical infrastructure protection"
                      }
                    },
                    {
                      "id":2550959,
                      "name":"critical infrastructure sector",
                      "data":{
                        "type":"Keyword",
                        "desc":"critical infrastructure sector"
                      }
                    },
                    {
                      "id":2550967,
                      "name":"critical infrastructure security",
                      "data":{
                        "type":"Keyword",
                        "desc":"critical infrastructure security"
                      }
                    },
                    {
                      "id":3085627,
                      "name":"infrastructure protection",
                      "data":{
                        "type":"Keyword",
                        "desc":"infrastructure protection"
                      }
                    },
                    {
                      "id":3377479,
                      "name":"national critical infrastructure",
                      "data":{
                        "type":"Keyword",
                        "desc":"national critical infrastructure"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":7,
                    "desc":"Critical Infrastructure"
                  }
                },
                {
                  "id":2742425,
                  "name":"email security",
                  "data":{
                    "type":"Keyword",
                    "desc":"email security"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":9,
                "desc":"Systems to be protected"
              }
            },
            {
              "id":228,
              "name":"People",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"People"
              }
            },
            {
              "id":230,
              "name":"Money",
              "children":[
                {
                  "id":376,
                  "name":"Payment Card",
                  "children":[
                    {
                      "id":377,
                      "name":"The Payment Card Industry Data Security Standard",
                      "children":[
                        {
                          "id":3525663,
                          "name":"pci dss",
                          "data":{
                            "type":"Keyword",
                            "desc":"pci dss"
                          }
                        }
                      ],
                      "data":{
                        "type":"Class",
                        "size":2,
                        "desc":"The Payment Card Industry Data Security Standard"
                      }
                    },
                    {
                      "id":2398398,
                      "name":"ccv",
                      "data":{
                        "type":"Keyword",
                        "desc":"ccv"
                      }
                    },
                    {
                      "id":2546901,
                      "name":"credit card cvv",
                      "data":{
                        "type":"Keyword",
                        "desc":"credit card cvv"
                      }
                    },
                    {
                      "id":2546905,
                      "name":"credit card data",
                      "data":{
                        "type":"Keyword",
                        "desc":"credit card data"
                      }
                    },
                    {
                      "id":2571272,
                      "name":"cvv",
                      "data":{
                        "type":"Keyword",
                        "desc":"cvv"
                      }
                    },
                    {
                      "id":2571395,
                      "name":"cvv2",
                      "data":{
                        "type":"Keyword",
                        "desc":"cvv2"
                      }
                    },
                    {
                      "id":3524291,
                      "name":"payment card data",
                      "data":{
                        "type":"Keyword",
                        "desc":"payment card data"
                      }
                    },
                    {
                      "id":3556495,
                      "name":"pin code",
                      "data":{
                        "type":"Keyword",
                        "desc":"pin code"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":10,
                    "desc":"Payment Card"
                  }
                },
                {
                  "id":2429245,
                  "name":"chip pos ingenico",
                  "data":{
                    "type":"Keyword",
                    "desc":"chip pos ingenico"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":12,
                "desc":"Money to be protected (not necessarily as data, maybe in physical format as well)"
              }
            },
            {
              "id":547,
              "name":"Software",
              "children":[
                {
                  "id":548,
                  "name":"OS",
                  "children":[
                    {
                      "id":3289423,
                      "name":"master boot record",
                      "data":{
                        "type":"Keyword",
                        "desc":"master boot record"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"OS"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"OS, Program, Application, Service,..."
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":30,
            "desc":"Things to be protected"
          }
        },
        {
          "id":336,
          "name":"Bookmark",
          "children":[
            {
              "id":337,
              "name":"Blog",
              "children":[
                {
                  "id":3815387,
                  "name":"security blog",
                  "data":{
                    "type":"Keyword",
                    "desc":"security blog"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Cyber Security related blog."
              }
            },
            {
              "id":379,
              "name":"News",
              "children":[
                {
                  "id":2595995,
                  "name":"dark read",
                  "data":{
                    "type":"Keyword",
                    "desc":"dark read"
                  }
                },
                {
                  "id":2996895,
                  "name":"help net security",
                  "data":{
                    "type":"Keyword",
                    "desc":"help net security"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"News"
              }
            },
            {
              "id":385,
              "name":"Misc",
              "children":[
                {
                  "id":2557888,
                  "name":"cryptology eprint archive",
                  "data":{
                    "type":"Keyword",
                    "desc":"cryptology eprint archive"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Misc"
              }
            },
            {
              "id":541,
              "name":"Hacking",
              "children":[
                {
                  "id":2965018,
                  "name":"hackaday",
                  "data":{
                    "type":"Keyword",
                    "desc":"hackaday"
                  }
                },
                {
                  "id":3438963,
                  "name":"offensive community",
                  "data":{
                    "type":"Keyword",
                    "desc":"offensive community"
                  }
                },
                {
                  "id":3550918,
                  "name":"phrack",
                  "data":{
                    "type":"Keyword",
                    "desc":"phrack"
                  }
                },
                {
                  "id":4111441,
                  "name":"underground hacking forum",
                  "data":{
                    "type":"Keyword",
                    "desc":"underground hacking forum"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":5,
                "desc":"Hacking"
              }
            },
            {
              "id":542,
              "name":"Online Tools",
              "children":[
                {
                  "id":4167253,
                  "name":"virustotal",
                  "data":{
                    "type":"Keyword",
                    "desc":"virustotal"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Online Tools"
              }
            },
            {
              "id":3813527,
              "name":"securelist",
              "data":{
                "type":"Keyword",
                "desc":"securelist"
              }
            },
            {
              "id":3940082,
              "name":"stay safe online",
              "data":{
                "type":"Keyword",
                "desc":"stay safe online"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":17,
            "desc":"Web-pages, Bloggers, Social Media, ..."
          }
        },
        {
          "id":372,
          "name":"Accreditation",
          "children":[
            {
              "id":353,
              "name":"Qualification (Industry)",
              "children":[
                {
                  "id":369,
                  "name":"Certified Ethical Hacker (CEH)",
                  "children":[
                    {
                      "id":2406619,
                      "name":"certified ethical hacker",
                      "data":{
                        "type":"Keyword",
                        "desc":"certified ethical hacker"
                      }
                    }
                  ],
                  "data":{
                    "type":"Class",
                    "size":2,
                    "desc":"Certified Ethical Hacker (CEH)"
                  }
                },
                {
                  "id":3485563,
                  "name":"oscp",
                  "data":{
                    "type":"Keyword",
                    "desc":"oscp"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":4,
                "desc":"Qualification (Industry)"
              }
            },
            {
              "id":387,
              "name":"Education (Academic)",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Education (Academic)"
              }
            },
            {
              "id":433,
              "name":"Awards",
              "children":[
                {
                  "id":3665713,
                  "name":"pwnie",
                  "data":{
                    "type":"Keyword",
                    "desc":"pwnie"
                  }
                },
                {
                  "id":3815395,
                  "name":"security blogger award",
                  "data":{
                    "type":"Keyword",
                    "desc":"security blogger award"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":3,
                "desc":"Awards"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":9,
            "desc":"Education and Qualification"
          }
        },
        {
          "id":381,
          "name":"Fundamental Concepts",
          "children":[
            {
              "id":382,
              "name":"Confidentiality",
              "children":[],
              "data":{
                "type":"Class",
                "size":1,
                "desc":"Confidentiality"
              }
            },
            {
              "id":383,
              "name":"Integrity",
              "children":[
                {
                  "id":2600701,
                  "name":"data integrity",
                  "data":{
                    "type":"Keyword",
                    "desc":"data integrity"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Integrity"
              }
            },
            {
              "id":384,
              "name":"Availability",
              "children":[
                {
                  "id":4129926,
                  "name":"uptime",
                  "data":{
                    "type":"Keyword",
                    "desc":"uptime"
                  }
                }
              ],
              "data":{
                "type":"Class",
                "size":2,
                "desc":"Availability"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":6,
            "desc":"The CIA Triad"
          }
        },
        {
          "id":470,
          "name":"Secure",
          "children":[
            {
              "id":3812264,
              "name":"secure messaging app",
              "data":{
                "type":"Keyword",
                "desc":"secure messaging app"
              }
            },
            {
              "id":3812680,
              "name":"secure protocol",
              "data":{
                "type":"Keyword",
                "desc":"secure protocol"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Secure"
          }
        },
        {
          "id":490,
          "name":"Cyber Operation",
          "children":[
            {
              "id":2572428,
              "name":"cyber capability",
              "data":{
                "type":"Keyword",
                "desc":"cyber capability"
              }
            },
            {
              "id":3821407,
              "name":"security operation team",
              "data":{
                "type":"Keyword",
                "desc":"security operation team"
              }
            }
          ],
          "data":{
            "type":"Class",
            "size":3,
            "desc":"Cyber Operation"
          }
        },
        {
          "id":3814376,
          "name":"security alert",
          "data":{
            "type":"Keyword",
            "desc":"security alert"
          }
        },
        {
          "id":3814470,
          "name":"security analysis",
          "data":{
            "type":"Keyword",
            "desc":"security analysis"
          }
        },
        {
          "id":3814534,
          "name":"security analytic",
          "data":{
            "type":"Keyword",
            "desc":"security analytic"
          }
        },
        {
          "id":3814735,
          "name":"security architecture",
          "data":{
            "type":"Keyword",
            "desc":"security architecture"
          }
        },
        {
          "id":3815009,
          "name":"security automation",
          "data":{
            "type":"Keyword",
            "desc":"security automation"
          }
        },
        {
          "id":3815816,
          "name":"security capability",
          "data":{
            "type":"Keyword",
            "desc":"security capability"
          }
        },
        {
          "id":3817751,
          "name":"security engineering",
          "data":{
            "type":"Keyword",
            "desc":"security engineering"
          }
        },
        {
          "id":3817858,
          "name":"security evaluation",
          "data":{
            "type":"Keyword",
            "desc":"security evaluation"
          }
        },
        {
          "id":3818645,
          "name":"security game",
          "data":{
            "type":"Keyword",
            "desc":"security game"
          }
        },
        {
          "id":3818672,
          "name":"security gap",
          "data":{
            "type":"Keyword",
            "desc":"security gap"
          }
        },
        {
          "id":3818805,
          "name":"security guide",
          "data":{
            "type":"Keyword",
            "desc":"security guide"
          }
        },
        {
          "id":3820144,
          "name":"security landscape",
          "data":{
            "type":"Keyword",
            "desc":"security landscape"
          }
        },
        {
          "id":3820705,
          "name":"security mechanism",
          "data":{
            "type":"Keyword",
            "desc":"security mechanism"
          }
        },
        {
          "id":3820768,
          "name":"security metric",
          "data":{
            "type":"Keyword",
            "desc":"security metric"
          }
        },
        {
          "id":3820960,
          "name":"security monitoring",
          "data":{
            "type":"Keyword",
            "desc":"security monitoring"
          }
        },
        {
          "id":3821551,
          "name":"security parameter",
          "data":{
            "type":"Keyword",
            "desc":"security parameter"
          }
        },
        {
          "id":3821799,
          "name":"security podcast",
          "data":{
            "type":"Keyword",
            "desc":"security podcast"
          }
        },
        {
          "id":3821961,
          "name":"security posture",
          "data":{
            "type":"Keyword",
            "desc":"security posture"
          }
        },
        {
          "id":3822030,
          "name":"security prediction",
          "data":{
            "type":"Keyword",
            "desc":"security prediction"
          }
        },
        {
          "id":3822443,
          "name":"security property",
          "data":{
            "type":"Keyword",
            "desc":"security property"
          }
        },
        {
          "id":3823342,
          "name":"security scanner",
          "data":{
            "type":"Keyword",
            "desc":"security scanner"
          }
        },
        {
          "id":3823537,
          "name":"security setting",
          "data":{
            "type":"Keyword",
            "desc":"security setting"
          }
        },
        {
          "id":3823595,
          "name":"security skill",
          "data":{
            "type":"Keyword",
            "desc":"security skill"
          }
        },
        {
          "id":3823701,
          "name":"security solution",
          "data":{
            "type":"Keyword",
            "desc":"security solution"
          }
        },
        {
          "id":3824021,
          "name":"security suite",
          "data":{
            "type":"Keyword",
            "desc":"security suite"
          }
        },
        {
          "id":3824325,
          "name":"security technology",
          "data":{
            "type":"Keyword",
            "desc":"security technology"
          }
        }
      ],
      "data":{
        "type":"Class",
        "size":124,
        "desc":"General"
      }
    },
    {
      "id":2495765,
      "name":"computer system security",
      "data":{
        "type":"Keyword",
        "desc":"computer system security"
      }
    },
    {
      "id":2573355,
      "name":"cyber domain",
      "data":{
        "type":"Keyword",
        "desc":"cyber domain"
      }
    },
    {
      "id":2576601,
      "name":"cyber space",
      "data":{
        "type":"Keyword",
        "desc":"cyber space"
      }
    },
    {
      "id":2582554,
      "name":"cybersec",
      "data":{
        "type":"Keyword",
        "desc":"cybersec"
      }
    },
    {
      "id":2583025,
      "name":"cybersecurity",
      "data":{
        "type":"Keyword",
        "desc":"cybersecurity"
      }
    },
    {
      "id":3081935,
      "name":"infosec",
      "data":{
        "type":"Keyword",
        "desc":"infosec"
      }
    },
    {
      "id":3084872,
      "name":"infosecurity",
      "data":{
        "type":"Keyword",
        "desc":"infosecurity"
      }
    },
    {
      "id":3817483,
      "name":"security domain",
      "data":{
        "type":"Keyword",
        "desc":"security domain"
      }
    }
  ],
  "data":{
    "type":"Class",
    "size":1947,
    "desc":"Cyber Security"
  }
}