<DataTable>
<Query><ID>1</ID><Parent_ID></Parent_ID><Name>Cyber Security</Name><Description>Cyber Security</Description><Type>Class</Type></Query>
<Query><ID>2</ID><Parent_ID>1</Parent_ID><Name>Event</Name><Description>Event</Description><Type>Class</Type></Query>
<Query><ID>3</ID><Parent_ID>2</Parent_ID><Name>Awareness Event</Name><Description>Cyber Security Awareness Event</Description><Type>Class</Type></Query>
<Query><ID>4</ID><Parent_ID>2</Parent_ID><Name>Conference</Name><Description>Cyber Security Conference</Description><Type>Class</Type></Query>
<Query><ID>5</ID><Parent_ID>2</Parent_ID><Name>Forum</Name><Description>Forum</Description><Type>Class</Type></Query>
<Query><ID>6</ID><Parent_ID>2</Parent_ID><Name>Summit</Name><Description>Summit</Description><Type>Class</Type></Query>
<Query><ID>7</ID><Parent_ID>2</Parent_ID><Name>Symposium</Name><Description>Symposium</Description><Type>Class</Type></Query>
<Query><ID>8</ID><Parent_ID>2</Parent_ID><Name>Expo</Name><Description>Expo</Description><Type>Class</Type></Query>
<Query><ID>9</ID><Parent_ID>2</Parent_ID><Name>Training Event</Name><Description>Training Event</Description><Type>Class</Type></Query>
<Query><ID>10</ID><Parent_ID>2</Parent_ID><Name>Workshop</Name><Description>Workshop</Description><Type>Class</Type></Query>
<Query><ID>11</ID><Parent_ID>28</Parent_ID><Name>Individual</Name><Description>Individual</Description><Type>Class</Type></Query>
<Query><ID>12</ID><Parent_ID>11</Parent_ID><Name>Expert</Name><Description>Expert</Description><Type>Class</Type></Query>
<Query><ID>13</ID><Parent_ID>12</Parent_ID><Name>Consultant</Name><Description>Consultant</Description><Type>Class</Type></Query>
<Query><ID>14</ID><Parent_ID>12</Parent_ID><Name>Trainer</Name><Description>Trainer</Description><Type>Class</Type></Query>
<Query><ID>15</ID><Parent_ID>12</Parent_ID><Name>Engineer</Name><Description>Engineer</Description><Type>Class</Type></Query>
<Query><ID>16</ID><Parent_ID>11</Parent_ID><Name>Academic</Name><Description>Academic</Description><Type>Class</Type></Query>
<Query><ID>17</ID><Parent_ID>16</Parent_ID><Name>Professor</Name><Description>Professor</Description><Type>Class</Type></Query>
<Query><ID>18</ID><Parent_ID>16</Parent_ID><Name>Researcher</Name><Description>Researcher</Description><Type>Class</Type></Query>
<Query><ID>19</ID><Parent_ID>16</Parent_ID><Name>Student</Name><Description>Student</Description><Type>Class</Type></Query>
<Query><ID>20</ID><Parent_ID>11</Parent_ID><Name>Cybercriminal</Name><Description>Cybercriminal</Description><Type>Class</Type></Query>
<Query><ID>21</ID><Parent_ID>11</Parent_ID><Name>Hacker</Name><Description>Hacker</Description><Type>Class</Type></Query>
<Query><ID>22</ID><Parent_ID>21</Parent_ID><Name>Black-Hat Hacker</Name><Description>Black-Hat Hacker</Description><Type>Class</Type></Query>
<Query><ID>23</ID><Parent_ID>21</Parent_ID><Name>White-Hat Hacker</Name><Description>White-Hat Hacker</Description><Type>Class</Type></Query>
<Query><ID>24</ID><Parent_ID>21</Parent_ID><Name>Gray-Hat Hacker</Name><Description>Gray-Hat Hacker</Description><Type>Class</Type></Query>
<Query><ID>25</ID><Parent_ID>11</Parent_ID><Name>End User</Name><Description>End User</Description><Type>Class</Type></Query>
<Query><ID>26</ID><Parent_ID>11</Parent_ID><Name>Journalist</Name><Description>Journalist</Description><Type>Class</Type></Query>
<Query><ID>27</ID><Parent_ID>11</Parent_ID><Name>Activist</Name><Description>Activist</Description><Type>Class</Type></Query>
<Query><ID>28</ID><Parent_ID>1</Parent_ID><Name>Party</Name><Description>Party (Individual, Group, Organization)</Description><Type>Class</Type></Query>
<Query><ID>29</ID><Parent_ID>244</Parent_ID><Name>Governmental Body</Name><Description>Governmental Body</Description><Type>Class</Type></Query>
<Query><ID>30</ID><Parent_ID>227</Parent_ID><Name>Critical Infrastructure</Name><Description>Critical Infrastructure</Description><Type>Class</Type></Query>
<Query><ID>31</ID><Parent_ID>244</Parent_ID><Name>Research Organization</Name><Description>Research Organization</Description><Type>Class</Type></Query>
<Query><ID>32</ID><Parent_ID>244</Parent_ID><Name>Educational Institute</Name><Description>Educational Institute</Description><Type>Class</Type></Query>
<Query><ID>33</ID><Parent_ID>244</Parent_ID><Name>Business</Name><Description>Business</Description><Type>Class</Type></Query>
<Query><ID>34</ID><Parent_ID>33</Parent_ID><Name>Enterprise</Name><Description>Enterprise</Description><Type>Class</Type></Query>
<Query><ID>35</ID><Parent_ID>33</Parent_ID><Name>IT Company</Name><Description>IT Company</Description><Type>Class</Type></Query>
<Query><ID>36</ID><Parent_ID>33</Parent_ID><Name>Cyber Security Company</Name><Description>Cyber Security Company</Description><Type>Class</Type></Query>
<Query><ID>37</ID><Parent_ID>244</Parent_ID><Name>Not-for-profit Organization (NGO)</Name><Description>Not-for-profit Organization (NGO)</Description><Type>Class</Type></Query>
<Query><ID>38</ID><Parent_ID>28</Parent_ID><Name>Group</Name><Description>Group</Description><Type>Class</Type></Query>
<Query><ID>39</ID><Parent_ID>1</Parent_ID><Name>Cybersecurity Attack</Name><Description></Description><Type>Class</Type></Query>
<Query><ID>40</ID><Parent_ID>39</Parent_ID><Name>Physical Attack</Name><Description>Physical</Description><Type>Class</Type></Query>
<Query><ID>41</ID><Parent_ID>39</Parent_ID><Name>Software Attack</Name><Description>Software Attack</Description><Type>Class</Type></Query>
<Query><ID>42</ID><Parent_ID>43</Parent_ID><Name>Computer Virus</Name><Description>Computer Virus</Description><Type>Class</Type></Query>
<Query><ID>43</ID><Parent_ID>309</Parent_ID><Name>Malware Classification</Name><Description>Malware types and classification</Description><Type>Class</Type></Query>
<Query><ID>44</ID><Parent_ID>43</Parent_ID><Name>Ransomware</Name><Description>Ransomware</Description><Type>Class</Type></Query>
<Query><ID>45</ID><Parent_ID>43</Parent_ID><Name>Computer Worm</Name><Description>Computer Worm</Description><Type>Class</Type></Query>
<Query><ID>46</ID><Parent_ID>43</Parent_ID><Name>Computer Trojan</Name><Description>Computer Trojan</Description><Type>Class</Type></Query>
<Query><ID>47</ID><Parent_ID>43</Parent_ID><Name>Spyware</Name><Description>Spyware</Description><Type>Class</Type></Query>
<Query><ID>48</ID><Parent_ID>43</Parent_ID><Name>Rootkit</Name><Description>Rootkit</Description><Type>Class</Type></Query>
<Query><ID>49</ID><Parent_ID>54</Parent_ID><Name>Web-based Attack</Name><Description>Web-based Attack</Description><Type>Class</Type></Query>
<Query><ID>50</ID><Parent_ID>238</Parent_ID><Name>SQL Injection</Name><Description>SQL Injection</Description><Type>Class</Type></Query>
<Query><ID>51</ID><Parent_ID>49</Parent_ID><Name>Web Application Attack</Name><Description>Web Application Attack</Description><Type>Class</Type></Query>
<Query><ID>52</ID><Parent_ID>41</Parent_ID><Name>Exploit</Name><Description>Exploit</Description><Type>Class</Type></Query>
<Query><ID>53</ID><Parent_ID>41</Parent_ID><Name>Brute-force</Name><Description>Brute-force</Description><Type>Class</Type></Query>
<Query><ID>54</ID><Parent_ID>39</Parent_ID><Name>Network Attack</Name><Description>Network Attack</Description><Type>Class</Type></Query>
<Query><ID>55</ID><Parent_ID>54</Parent_ID><Name>APT</Name><Description>APT</Description><Type>Class</Type></Query>
<Query><ID>56</ID><Parent_ID>54</Parent_ID><Name>Man in the middle</Name><Description>Man in the middle</Description><Type>Class</Type></Query>
<Query><ID>57</ID><Parent_ID>54</Parent_ID><Name>DOS</Name><Description>A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet</Description><Type>Class</Type></Query>
<Query><ID>58</ID><Parent_ID>57</Parent_ID><Name>DDOS</Name><Description>A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.</Description><Type>Class</Type></Query>
<Query><ID>59</ID><Parent_ID>54</Parent_ID><Name>DNS-based attack</Name><Description>DNS-based network attacks</Description><Type>Class</Type></Query>
<Query><ID>60</ID><Parent_ID>59</Parent_ID><Name>Poisoning</Name><Description>Poisoning</Description><Type>Class</Type></Query>
<Query><ID>61</ID><Parent_ID>59</Parent_ID><Name>Spoofing</Name><Description>Spoofing</Description><Type>Class</Type></Query>
<Query><ID>62</ID><Parent_ID>59</Parent_ID><Name>Manipulation</Name><Description>Manipulation</Description><Type>Class</Type></Query>
<Query><ID>63</ID><Parent_ID>54</Parent_ID><Name>Botnet</Name><Description>A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.</Description><Type>Class</Type></Query>
<Query><ID>64</ID><Parent_ID>54</Parent_ID><Name>Command &amp; Control</Name><Description>Command &amp; Control</Description><Type>Class</Type></Query>
<Query><ID>66</ID><Parent_ID>64</Parent_ID><Name>Remote Command Execution</Name><Description>Remote Command Execution</Description><Type>Class</Type></Query>
<Query><ID>67</ID><Parent_ID>54</Parent_ID><Name>Port Scanning</Name><Description>Port Scanning</Description><Type>Class</Type></Query>
<Query><ID>68</ID><Parent_ID>39</Parent_ID><Name>Social Engineering</Name><Description>Social Engineering</Description><Type>Class</Type></Query>
<Query><ID>69</ID><Parent_ID>68</Parent_ID><Name>Phishing</Name><Description>Phishing</Description><Type>Class</Type></Query>
<Query><ID>70</ID><Parent_ID>69</Parent_ID><Name>Spear Phishing</Name><Description>Spear Phishing</Description><Type>Class</Type></Query>
<Query><ID>72</ID><Parent_ID>39</Parent_ID><Name>Unauthorized Access</Name><Description>Unauthorized Access</Description><Type>Class</Type></Query>
<Query><ID>73</ID><Parent_ID>39</Parent_ID><Name>Unauthorized Privilege Escalation</Name><Description>Unauthorized Privilege Escalation</Description><Type>Class</Type></Query>
<Query><ID>74</ID><Parent_ID>1</Parent_ID><Name>Cybersecurity Vulnerability</Name><Description>In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.</Description><Type>Class</Type></Query>
<Query><ID>75</ID><Parent_ID>74</Parent_ID><Name>Vulnerability Database</Name><Description>Vulnerability Database/Dataset</Description><Type>Class</Type></Query>
<Query><ID>76</ID><Parent_ID>75</Parent_ID><Name>CVE</Name><Description>Common Vulnerabilities and Exposures (CVE) is a dictionary-type list of standardized names for vulnerabilities and other information related to security exposures.</Description><Type>Class</Type></Query>
<Query><ID>77</ID><Parent_ID>75</Parent_ID><Name>CWE</Name><Description>Common Weakness Enumeration (CWE) is a list of software weaknesses.</Description><Type>Class</Type></Query>
<Query><ID>78</ID><Parent_ID>74</Parent_ID><Name>Vulnerability Classification</Name><Description>Vulnerability Classification and Types</Description><Type>Class</Type></Query>
<Query><ID>79</ID><Parent_ID>78</Parent_ID><Name>OS</Name><Description>OS</Description><Type>Class</Type></Query>
<Query><ID>80</ID><Parent_ID>78</Parent_ID><Name>Application Vulnerability</Name><Description>Application Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>81</ID><Parent_ID>326</Parent_ID><Name>Web Server</Name><Description>Web Server</Description><Type>Class</Type></Query>
<Query><ID>82</ID><Parent_ID>338</Parent_ID><Name>Threat Classification</Name><Description>Threat</Description><Type>Class</Type></Query>
<Query><ID>83</ID><Parent_ID>82</Parent_ID><Name>Criminal Threat</Name><Description>Criminal Threat</Description><Type>Class</Type></Query>
<Query><ID>84</ID><Parent_ID>82</Parent_ID><Name>Technical Threat</Name><Description>Technical Threat</Description><Type>Class</Type></Query>
<Query><ID>85</ID><Parent_ID>82</Parent_ID><Name>Business Threat</Name><Description>Business Threat</Description><Type>Class</Type></Query>
<Query><ID>86</ID><Parent_ID>82</Parent_ID><Name>Legal Threat</Name><Description>Legal Threat</Description><Type>Class</Type></Query>
<Query><ID>87</ID><Parent_ID>82</Parent_ID><Name>Other Threat</Name><Description>Other Threat</Description><Type>Class</Type></Query>
<Query><ID>88</ID><Parent_ID>1</Parent_ID><Name>Security Control</Name><Description>Methods and solutions for providing security control</Description><Type>Class</Type></Query>
<Query><ID>89</ID><Parent_ID>88</Parent_ID><Name>Firewall</Name><Description>Firewall</Description><Type>Class</Type></Query>
<Query><ID>90</ID><Parent_ID>88</Parent_ID><Name>Access Control</Name><Description>Access Control</Description><Type>Class</Type></Query>
<Query><ID>91</ID><Parent_ID>190</Parent_ID><Name>User Authentication</Name><Description>User Authentication</Description><Type>Class</Type></Query>
<Query><ID>92</ID><Parent_ID>90</Parent_ID><Name>Authorization</Name><Description>Authorization</Description><Type>Class</Type></Query>
<Query><ID>93</ID><Parent_ID>90</Parent_ID><Name>Usage Control</Name><Description>Usage Control</Description><Type>Class</Type></Query>
<Query><ID>95</ID><Parent_ID>172</Parent_ID><Name>Policy</Name><Description>Policy</Description><Type>Class</Type></Query>
<Query><ID>96</ID><Parent_ID>95</Parent_ID><Name>Data Policies</Name><Description>Data Policies</Description><Type>Class</Type></Query>
<Query><ID>97</ID><Parent_ID>96</Parent_ID><Name>Data Handle Policy</Name><Description>Data Handle Policy</Description><Type>Class</Type></Query>
<Query><ID>98</ID><Parent_ID>96</Parent_ID><Name>Data Protection Policy</Name><Description>Data Protection Policy</Description><Type>Class</Type></Query>
<Query><ID>99</ID><Parent_ID>96</Parent_ID><Name>Data Retention Policy</Name><Description>Data Retention Policy</Description><Type>Class</Type></Query>
<Query><ID>100</ID><Parent_ID>96</Parent_ID><Name>Data Sharing Agreement</Name><Description>Data Sharing Agreement</Description><Type>Class</Type></Query>
<Query><ID>101</ID><Parent_ID>95</Parent_ID><Name>Access Control Policies</Name><Description>Access Control Policies</Description><Type>Class</Type></Query>
<Query><ID>102</ID><Parent_ID>101</Parent_ID><Name>Access Control Policy</Name><Description>Access Control Policy</Description><Type>Class</Type></Query>
<Query><ID>103</ID><Parent_ID>101</Parent_ID><Name>Usage Control Policy</Name><Description>Usage Control Policy</Description><Type>Class</Type></Query>
<Query><ID>104</ID><Parent_ID>95</Parent_ID><Name>Code Integrity Policy</Name><Description>Code Integrity Policy</Description><Type>Class</Type></Query>
<Query><ID>105</ID><Parent_ID>95</Parent_ID><Name>Computer Security Policy</Name><Description>Computer Security Policy</Description><Type>Class</Type></Query>
<Query><ID>106</ID><Parent_ID>95</Parent_ID><Name>Content Security Policy</Name><Description>Content Security Policy</Description><Type>Class</Type></Query>
<Query><ID>107</ID><Parent_ID>170</Parent_ID><Name>Cyber Insurance Policy</Name><Description>Cyber Insurance Policy</Description><Type>Class</Type></Query>
<Query><ID>108</ID><Parent_ID>95</Parent_ID><Name>Cyber Security Policy</Name><Description>Cyber Security Policy</Description><Type>Class</Type></Query>
<Query><ID>109</ID><Parent_ID>95</Parent_ID><Name>Device Guard Policy</Name><Description>Device Guard Policy</Description><Type>Class</Type></Query>
<Query><ID>110</ID><Parent_ID>95</Parent_ID><Name>Vulnerability Disclosure Policy</Name><Description>Vulnerability Disclosure Policy</Description><Type>Class</Type></Query>
<Query><ID>111</ID><Parent_ID>88</Parent_ID><Name>Regulations</Name><Description>Regulations</Description><Type>Class</Type></Query>
<Query><ID>112</ID><Parent_ID>172</Parent_ID><Name>Training</Name><Description>Training</Description><Type>Class</Type></Query>
<Query><ID>113</ID><Parent_ID>88</Parent_ID><Name>Detection</Name><Description>Detection</Description><Type>Class</Type></Query>
<Query><ID>114</ID><Parent_ID>113</Parent_ID><Name>Intrusion Detection System</Name><Description>Intrusion Detection System</Description><Type>Class</Type></Query>
<Query><ID>115</ID><Parent_ID>116</Parent_ID><Name>Anti-virus</Name><Description>Anti-virus</Description><Type>Class</Type></Query>
<Query><ID>116</ID><Parent_ID>232</Parent_ID><Name>Anti-malware</Name><Description>Anti-malware</Description><Type>Class</Type></Query>
<Query><ID>117</ID><Parent_ID>196</Parent_ID><Name>Sandboxing</Name><Description>Sandboxing</Description><Type>Class</Type></Query>
<Query><ID>119</ID><Parent_ID>88</Parent_ID><Name>Cryptography</Name><Description>Cryptography</Description><Type>Class</Type></Query>
<Query><ID>120</ID><Parent_ID>388</Parent_ID><Name>Encryption</Name><Description>Encryption</Description><Type>Class</Type></Query>
<Query><ID>121</ID><Parent_ID>120</Parent_ID><Name>Symmetric</Name><Description>Symmetric</Description><Type>Class</Type></Query>
<Query><ID>122</ID><Parent_ID>270</Parent_ID><Name>DES</Name><Description>The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. </Description><Type>Class</Type></Query>
<Query><ID>123</ID><Parent_ID>270</Parent_ID><Name>Triple DES</Name><Description>Triple DES</Description><Type>Class</Type></Query>
<Query><ID>124</ID><Parent_ID>270</Parent_ID><Name>AES</Name><Description>AES</Description><Type>Class</Type></Query>
<Query><ID>125</ID><Parent_ID>270</Parent_ID><Name>Blowfish</Name><Description>Blowfish</Description><Type>Class</Type></Query>
<Query><ID>126</ID><Parent_ID>120</Parent_ID><Name>Asymmetric</Name><Description>Asymmetric</Description><Type>Class</Type></Query>
<Query><ID>127</ID><Parent_ID>126</Parent_ID><Name>Diffie-Hellman</Name><Description>Diffie-Hellman</Description><Type>Class</Type></Query>
<Query><ID>128</ID><Parent_ID>126</Parent_ID><Name>RSA</Name><Description>RSA</Description><Type>Class</Type></Query>
<Query><ID>129</ID><Parent_ID>388</Parent_ID><Name>Key</Name><Description>Key</Description><Type>Class</Type></Query>
<Query><ID>130</ID><Parent_ID>308</Parent_ID><Name>Public Key</Name><Description>Public Key</Description><Type>Class</Type></Query>
<Query><ID>131</ID><Parent_ID>308</Parent_ID><Name>Private Key</Name><Description>Private Key</Description><Type>Class</Type></Query>
<Query><ID>132</ID><Parent_ID>119</Parent_ID><Name>Hashing</Name><Description>Hashing</Description><Type>Class</Type></Query>
<Query><ID>133</ID><Parent_ID>132</Parent_ID><Name>Algorithm</Name><Description>Algorithm</Description><Type>Class</Type></Query>
<Query><ID>134</ID><Parent_ID>133</Parent_ID><Name>BSD</Name><Description>BSD</Description><Type>Class</Type></Query>
<Query><ID>135</ID><Parent_ID>133</Parent_ID><Name>CRC-32</Name><Description>CRC-32</Description><Type>Class</Type></Query>
<Query><ID>136</ID><Parent_ID>133</Parent_ID><Name>MD5</Name><Description>MD5</Description><Type>Class</Type></Query>
<Query><ID>137</ID><Parent_ID>133</Parent_ID><Name>SHA-1</Name><Description>SHA-1</Description><Type>Class</Type></Query>
<Query><ID>138</ID><Parent_ID>133</Parent_ID><Name>SHA-256</Name><Description>SHA-256</Description><Type>Class</Type></Query>
<Query><ID>139</ID><Parent_ID>132</Parent_ID><Name>Salted Hash</Name><Description>Salted Hash</Description><Type>Class</Type></Query>
<Query><ID>140</ID><Parent_ID>132</Parent_ID><Name>Rainbow Table</Name><Description>Rainbow Table</Description><Type>Class</Type></Query>
<Query><ID>141</ID><Parent_ID>88</Parent_ID><Name>Security Protocol</Name><Description>Security Protocol</Description><Type>Class</Type></Query>
<Query><ID>142</ID><Parent_ID>141</Parent_ID><Name>HTTPS</Name><Description>HTTPS</Description><Type>Class</Type></Query>
<Query><ID>143</ID><Parent_ID>141</Parent_ID><Name>SFTP</Name><Description>SFTP</Description><Type>Class</Type></Query>
<Query><ID>144</ID><Parent_ID>141</Parent_ID><Name>SSL</Name><Description>SSL</Description><Type>Class</Type></Query>
<Query><ID>145</ID><Parent_ID>141</Parent_ID><Name>SSH</Name><Description>SSH</Description><Type>Class</Type></Query>
<Query><ID>146</ID><Parent_ID>171</Parent_ID><Name>Standard</Name><Description>Standard</Description><Type>Class</Type></Query>
<Query><ID>147</ID><Parent_ID>146</Parent_ID><Name>STIX</Name><Description>STIX</Description><Type>Class</Type></Query>
<Query><ID>148</ID><Parent_ID>146</Parent_ID><Name>TAXII</Name><Description>TAXII</Description><Type>Class</Type></Query>
<Query><ID>149</ID><Parent_ID>146</Parent_ID><Name>IODEF</Name><Description>IODEF</Description><Type>Class</Type></Query>
<Query><ID>150</ID><Parent_ID>1</Parent_ID><Name>Risk</Name><Description>Risk</Description><Type>Class</Type></Query>
<Query><ID>151</ID><Parent_ID>150</Parent_ID><Name>Risk Type</Name><Description>Risk Type</Description><Type>Class</Type></Query>
<Query><ID>152</ID><Parent_ID>151</Parent_ID><Name>Application Risk</Name><Description>Application Risk</Description><Type>Class</Type></Query>
<Query><ID>153</ID><Parent_ID>151</Parent_ID><Name>Insider Risk</Name><Description>Insider Risk</Description><Type>Class</Type></Query>
<Query><ID>154</ID><Parent_ID>151</Parent_ID><Name>Internet Risk</Name><Description>Internet Risk</Description><Type>Class</Type></Query>
<Query><ID>155</ID><Parent_ID>151</Parent_ID><Name>IoT Risk</Name><Description>IoT Risk</Description><Type>Class</Type></Query>
<Query><ID>156</ID><Parent_ID>151</Parent_ID><Name>Privacy Risk</Name><Description>Privacy Risk</Description><Type>Class</Type></Query>
<Query><ID>157</ID><Parent_ID>151</Parent_ID><Name>Technical Risk</Name><Description>Technical Risk</Description><Type>Class</Type></Query>
<Query><ID>158</ID><Parent_ID>151</Parent_ID><Name>Third-party Risk</Name><Description>Third-party Risk</Description><Type>Class</Type></Query>
<Query><ID>159</ID><Parent_ID>150</Parent_ID><Name>Score</Name><Description>Score</Description><Type>Class</Type></Query>
<Query><ID>160</ID><Parent_ID>150</Parent_ID><Name>Operation</Name><Description>Operation</Description><Type>Class</Type></Query>
<Query><ID>161</ID><Parent_ID>160</Parent_ID><Name>Aggregation</Name><Description>Aggregation</Description><Type>Class</Type></Query>
<Query><ID>162</ID><Parent_ID>160</Parent_ID><Name>Assessment</Name><Description>Assessment</Description><Type>Class</Type></Query>
<Query><ID>163</ID><Parent_ID>160</Parent_ID><Name>Identification</Name><Description>Identification</Description><Type>Class</Type></Query>
<Query><ID>164</ID><Parent_ID>160</Parent_ID><Name>Management</Name><Description>Management</Description><Type>Class</Type></Query>
<Query><ID>165</ID><Parent_ID>160</Parent_ID><Name>Mitigation</Name><Description>Mitigation</Description><Type>Class</Type></Query>
<Query><ID>166</ID><Parent_ID>160</Parent_ID><Name>Modeling</Name><Description>Modeling</Description><Type>Class</Type></Query>
<Query><ID>167</ID><Parent_ID>1</Parent_ID><Name>Sub-domain</Name><Description>Sub-domain</Description><Type>Class</Type></Query>
<Query><ID>168</ID><Parent_ID>167</Parent_ID><Name>Automotive Security</Name><Description>Automotive Security</Description><Type>Class</Type></Query>
<Query><ID>169</ID><Parent_ID>167</Parent_ID><Name>Cloud Security</Name><Description>Cloud Security</Description><Type>Class</Type></Query>
<Query><ID>170</ID><Parent_ID>172</Parent_ID><Name>Cyber Insurance</Name><Description>Cyber Insurance</Description><Type>Class</Type></Query>
<Query><ID>171</ID><Parent_ID>338</Parent_ID><Name>Cyber Threat Intelligence</Name><Description>Cyber Threat Intelligence</Description><Type>Class</Type></Query>
<Query><ID>172</ID><Parent_ID>88</Parent_ID><Name>Information Security Management (ISM)</Name><Description>Information Security Management</Description><Type>Class</Type></Query>
<Query><ID>173</ID><Parent_ID>172</Parent_ID><Name>Standard</Name><Description>Standard</Description><Type>Class</Type></Query>
<Query><ID>174</ID><Parent_ID>173</Parent_ID><Name>ISO 27000</Name><Description>ISO 27000</Description><Type>Class</Type></Query>
<Query><ID>175</ID><Parent_ID>167</Parent_ID><Name>IoT Security</Name><Description>IoT Security</Description><Type>Class</Type></Query>
<Query><ID>176</ID><Parent_ID>167</Parent_ID><Name>Mobile Security</Name><Description>Mobile Security</Description><Type>Class</Type></Query>
<Query><ID>177</ID><Parent_ID>167</Parent_ID><Name>Smart Grid Security</Name><Description>Smart Grid Security</Description><Type>Class</Type></Query>
<Query><ID>178</ID><Parent_ID>167</Parent_ID><Name>Trust</Name><Description>Trust</Description><Type>Class</Type></Query>
<Query><ID>179</ID><Parent_ID>21</Parent_ID><Name>Hacktivist</Name><Description>Hacktivist</Description><Type>Class</Type></Query>
<Query><ID>180</ID><Parent_ID>11</Parent_ID><Name>Threat Actor</Name><Description>a threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for a security incident that impacts – or has the potential to impact – an organization&#39;s security</Description><Type>Class</Type></Query>
<Query><ID>181</ID><Parent_ID>11</Parent_ID><Name>Attacker</Name><Description>An attacker is the individual or organisation performing these malicious activities.</Description><Type>Class</Type></Query>
<Query><ID>182</ID><Parent_ID>7</Parent_ID><Name>USENIX Security Symposium</Name><Description>An academic conference (one of top 4)</Description><Type>Class</Type></Query>
<Query><ID>183</ID><Parent_ID>218</Parent_ID><Name>Hardware Attacking Tool</Name><Description>Hardware tools used for conducting attacks</Description><Type>Class</Type></Query>
<Query><ID>184</ID><Parent_ID>88</Parent_ID><Name>Protection/Prevention</Name><Description>Mechanism protecting cyber assets against attacks (excluding detection)</Description><Type>Class</Type></Query>
<Query><ID>185</ID><Parent_ID>184</Parent_ID><Name>DRM</Name><Description>Digital Right Management</Description><Type>Class</Type></Query>
<Query><ID>186</ID><Parent_ID>91</Parent_ID><Name>Knowledge-based Authentication</Name><Description>User authentication based on &quot;What you know&quot;</Description><Type>Class</Type></Query>
<Query><ID>187</ID><Parent_ID>91</Parent_ID><Name>Possession-based Authentication</Name><Description>User authentication based on &quot;What you have&quot;</Description><Type>Class</Type></Query>
<Query><ID>188</ID><Parent_ID>91</Parent_ID><Name>Inherence-based Authentication</Name><Description>User authentication based on &quot;who you are&quot;</Description><Type>Class</Type></Query>
<Query><ID>189</ID><Parent_ID>188</Parent_ID><Name>Biometrics-based Authentication</Name><Description>The main type of inherence-based authentication</Description><Type>Class</Type></Query>
<Query><ID>190</ID><Parent_ID>88</Parent_ID><Name>Authentication</Name><Description>Authentication of users, hardware and software and other entities within a cyber security ecosystem</Description><Type>Class</Type></Query>
<Query><ID>191</ID><Parent_ID>190</Parent_ID><Name>Device Authentication</Name><Description>Authentication of hardware devices</Description><Type>Class</Type></Query>
<Query><ID>192</ID><Parent_ID>190</Parent_ID><Name>Software Attestation</Name><Description>Remote attestation of software</Description><Type>Class</Type></Query>
<Query><ID>193</ID><Parent_ID>186</Parent_ID><Name>Password</Name><Description>Password-based authentication and related concepts</Description><Type>Class</Type></Query>
<Query><ID>194</ID><Parent_ID>90</Parent_ID><Name>Access Control Model</Name><Description>Different models of access control</Description><Type>Class</Type></Query>
<Query><ID>195</ID><Parent_ID>194</Parent_ID><Name>Role-based Access Control (RBAC)</Name><Description>Role-based Access Control (RBAC)</Description><Type>Class</Type></Query>
<Query><ID>196</ID><Parent_ID>194</Parent_ID><Name>Mandatory Access Control (MAC)</Name><Description>Mandatory Access Control (MAC)</Description><Type>Class</Type></Query>
<Query><ID>197</ID><Parent_ID>194</Parent_ID><Name>Discretionary Access Control (DAC)</Name><Description>Discretionary Access Control (DAC)</Description><Type>Class</Type></Query>
<Query><ID>198</ID><Parent_ID>194</Parent_ID><Name>Rule-based Access Control (RuBAC)</Name><Description>Rule-based Access Control (RuBAC)</Description><Type>Class</Type></Query>
<Query><ID>199</ID><Parent_ID>194</Parent_ID><Name>Attribute-based Access Control (ABAC)</Name><Description>Attribute-based Access Control (ABAC)</Description><Type>Class</Type></Query>
<Query><ID>200</ID><Parent_ID>39</Parent_ID><Name>Side-Channel Attack</Name><Description>In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).</Description><Type>Class</Type></Query>
<Query><ID>201</ID><Parent_ID>200</Parent_ID><Name>Traffic analysis</Name><Description>Traffic analysis based side-channel attack</Description><Type>Class</Type></Query>
<Query><ID>202</ID><Parent_ID>200</Parent_ID><Name>Timing-based attack</Name><Description>Timing-based attack</Description><Type>Class</Type></Query>
<Query><ID>203</ID><Parent_ID>200</Parent_ID><Name>Power analysis</Name><Description>Power analysis based side-channel attack</Description><Type>Class</Type></Query>
<Query><ID>204</ID><Parent_ID>200</Parent_ID><Name>TEMPEST</Name><Description>Electromagnetic emanations leakage based side-channel attack</Description><Type>Class</Type></Query>
<Query><ID>205</ID><Parent_ID>204</Parent_ID><Name>Van Eck phreaking</Name><Description>https://en.wikipedia.org/wiki/Van_Eck_phreaking</Description><Type>Class</Type></Query>
<Query><ID>206</ID><Parent_ID>200</Parent_ID><Name>Acoustic attack</Name><Description>Acoustic based side-channel attack</Description><Type>Class</Type></Query>
<Query><ID>207</ID><Parent_ID>200</Parent_ID><Name>Optical attack</Name><Description>Side-channel attack basd on optical signal analysis</Description><Type>Class</Type></Query>
<Query><ID>208</ID><Parent_ID>380</Parent_ID><Name>Document</Name><Description>Documents related to cyber security</Description><Type>Class</Type></Query>
<Query><ID>209</ID><Parent_ID>208</Parent_ID><Name>Research Paper</Name><Description>Research Paper</Description><Type>Class</Type></Query>
<Query><ID>210</ID><Parent_ID>208</Parent_ID><Name>Technical Report</Name><Description>Technical Report</Description><Type>Class</Type></Query>
<Query><ID>211</ID><Parent_ID>208</Parent_ID><Name>Degree Thesis</Name><Description>Degree Thesis</Description><Type>Class</Type></Query>
<Query><ID>212</ID><Parent_ID>208</Parent_ID><Name>Software Documentation</Name><Description>User manual, developer guide, etc.</Description><Type>Class</Type></Query>
<Query><ID>213</ID><Parent_ID>208</Parent_ID><Name>Web Document</Name><Description>Websites, web pages, online videos, and any other online documents that are affiliated with an URL (excluding those belonging to other categories)</Description><Type>Class</Type></Query>
<Query><ID>214</ID><Parent_ID>208</Parent_ID><Name>Book</Name><Description>Book</Description><Type>Class</Type></Query>
<Query><ID>215</ID><Parent_ID>208</Parent_ID><Name>Standard</Name><Description>Standard</Description><Type>Class</Type></Query>
<Query><ID>216</ID><Parent_ID>176</Parent_ID><Name>Mobile Malware</Name><Description>Malware on mobile devices</Description><Type>Class</Type></Query>
<Query><ID>217</ID><Parent_ID>74</Parent_ID><Name>0-day Vulnerability</Name><Description>0-day Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>218</ID><Parent_ID>39</Parent_ID><Name>Attacking Tool</Name><Description>Tools used for conducting attacks</Description><Type>Class</Type></Query>
<Query><ID>219</ID><Parent_ID>218</Parent_ID><Name>Software Attacking Tool</Name><Description>Software tools for conducting attacks</Description><Type>Class</Type></Query>
<Query><ID>220</ID><Parent_ID>38</Parent_ID><Name>Group of People</Name><Description>Group of People</Description><Type>Class</Type></Query>
<Query><ID>221</ID><Parent_ID>38</Parent_ID><Name>Group of Organizations</Name><Description>Group of Organizations</Description><Type>Class</Type></Query>
<Query><ID>222</ID><Parent_ID>38</Parent_ID><Name>Group of People and Organizations</Name><Description>Group of People and Organizations (those with hybrid memberships)</Description><Type>Class</Type></Query>
<Query><ID>223</ID><Parent_ID>220</Parent_ID><Name>Hacking Group</Name><Description>Normally group of people</Description><Type>Class</Type></Query>
<Query><ID>224</ID><Parent_ID>223</Parent_ID><Name>Anonymous (hacking group)</Name><Description>The hacking group whose name is &quot;Anonymous&quot;</Description><Type>Class</Type></Query>
<Query><ID>225</ID><Parent_ID>380</Parent_ID><Name>Asset</Name><Description>Things to be protected</Description><Type>Class</Type></Query>
<Query><ID>226</ID><Parent_ID>225</Parent_ID><Name>Data</Name><Description>Data to be protected</Description><Type>Class</Type></Query>
<Query><ID>227</ID><Parent_ID>225</Parent_ID><Name>System</Name><Description>Systems to be protected</Description><Type>Class</Type></Query>
<Query><ID>228</ID><Parent_ID>225</Parent_ID><Name>People</Name><Description>People</Description><Type>Class</Type></Query>
<Query><ID>229</ID><Parent_ID>226</Parent_ID><Name>Account</Name><Description>Electronic accounts as a special type of data protected</Description><Type>Class</Type></Query>
<Query><ID>230</ID><Parent_ID>225</Parent_ID><Name>Money</Name><Description>Money to be protected (not necessarily as data, maybe in physical format as well)</Description><Type>Class</Type></Query>
<Query><ID>231</ID><Parent_ID>114</Parent_ID><Name>Network-based IDS</Name><Description>Network-based IDS</Description><Type>Class</Type></Query>
<Query><ID>232</ID><Parent_ID>114</Parent_ID><Name>Host-based IDS</Name><Description>Host-based IDS</Description><Type>Class</Type></Query>
<Query><ID>233</ID><Parent_ID>114</Parent_ID><Name>Hybrid IDS</Name><Description>Hybrid (network- and host-based)</Description><Type>Class</Type></Query>
<Query><ID>234</ID><Parent_ID>113</Parent_ID><Name>Vulnerability Scanner</Name><Description>Vulnerability scanner and detector</Description><Type>Class</Type></Query>
<Query><ID>235</ID><Parent_ID>305</Parent_ID><Name>Privacy Enhancing Technology (PET)</Name><Description>Privacy Enhancing Technology (PET)</Description><Type>Class</Type></Query>
<Query><ID>236</ID><Parent_ID>82</Parent_ID><Name>Insider Threat</Name><Description>Insider Threat</Description><Type>Class</Type></Query>
<Query><ID>237</ID><Parent_ID>43</Parent_ID><Name>Malicious Adware</Name><Description>Malicious Adware</Description><Type>Class</Type></Query>
<Query><ID>238</ID><Parent_ID>39</Parent_ID><Name>Database Attack</Name><Description>Attacks on databases</Description><Type>Class</Type></Query>
<Query><ID>239</ID><Parent_ID>41</Parent_ID><Name>Reverse Engineering</Name><Description>Reverse Engineering</Description><Type>Class</Type></Query>
<Query><ID>240</ID><Parent_ID>39</Parent_ID><Name>Incident</Name><Description>Attacking incidents (actual attacks as events)</Description><Type>Class</Type></Query>
<Query><ID>241</ID><Parent_ID>167</Parent_ID><Name>Software Security</Name><Description>Software Security</Description><Type>Class</Type></Query>
<Query><ID>242</ID><Parent_ID>167</Parent_ID><Name>Hardware Security</Name><Description>Hardware Security</Description><Type>Class</Type></Query>
<Query><ID>243</ID><Parent_ID>167</Parent_ID><Name>Systems Security</Name><Description>Systems Security</Description><Type>Class</Type></Query>
<Query><ID>244</ID><Parent_ID>28</Parent_ID><Name>Organization</Name><Description>Organization</Description><Type>Class</Type></Query>
<Query><ID>245</ID><Parent_ID>43</Parent_ID><Name>Bootkit</Name><Description>Bootkit</Description><Type>Class</Type></Query>
<Query><ID>246</ID><Parent_ID>167</Parent_ID><Name>Distributed Ledger</Name><Description>Distributed Ledger</Description><Type>Class</Type></Query>
<Query><ID>247</ID><Parent_ID>246</Parent_ID><Name>Blockchain</Name><Description>Blockchain</Description><Type>Class</Type></Query>
<Query><ID>248</ID><Parent_ID>246</Parent_ID><Name>Cryptocurrency</Name><Description>Cryptocurrency</Description><Type>Class</Type></Query>
<Query><ID>249</ID><Parent_ID>248</Parent_ID><Name>Bitcoin</Name><Description>Bitcoin</Description><Type>Class</Type></Query>
<Query><ID>250</ID><Parent_ID>247</Parent_ID><Name>Public Blockchain</Name><Description>Public Blockchain</Description><Type>Class</Type></Query>
<Query><ID>251</ID><Parent_ID>247</Parent_ID><Name>Permissioned (Consortium) Blockchain</Name><Description>Permissioned (Consortium) Blockchain</Description><Type>Class</Type></Query>
<Query><ID>252</ID><Parent_ID>247</Parent_ID><Name>Private Blockchain</Name><Description>Private Blockchain</Description><Type>Class</Type></Query>
<Query><ID>253</ID><Parent_ID>250</Parent_ID><Name>Ethereum</Name><Description>Ethereum</Description><Type>Class</Type></Query>
<Query><ID>254</ID><Parent_ID>246</Parent_ID><Name>Smart Contract</Name><Description>Smart Contract</Description><Type>Class</Type></Query>
<Query><ID>255</ID><Parent_ID>82</Parent_ID><Name>Advanced Persistent Threat (APT)</Name><Description>Advanced Persistent Threat (APT)</Description><Type>Class</Type></Query>
<Query><ID>256</ID><Parent_ID>183</Parent_ID><Name>Card Skimmer</Name><Description>Card Skimmer</Description><Type>Class</Type></Query>
<Query><ID>257</ID><Parent_ID>39</Parent_ID><Name>General Term</Name><Description>General Term</Description><Type>Class</Type></Query>
<Query><ID>258</ID><Parent_ID>88</Parent_ID><Name>Digital Forensics</Name><Description>Digital Forensics</Description><Type>Class</Type></Query>
<Query><ID>259</ID><Parent_ID>258</Parent_ID><Name>Network Forensics</Name><Description>Network Forensics</Description><Type>Class</Type></Query>
<Query><ID>260</ID><Parent_ID>258</Parent_ID><Name>Computer Forensics</Name><Description>Computer Forensics</Description><Type>Class</Type></Query>
<Query><ID>261</ID><Parent_ID>258</Parent_ID><Name>Live Forensics</Name><Description>Live Forensics</Description><Type>Class</Type></Query>
<Query><ID>262</ID><Parent_ID>258</Parent_ID><Name>Memory Forensics</Name><Description>Memory Forensics</Description><Type>Class</Type></Query>
<Query><ID>263</ID><Parent_ID>258</Parent_ID><Name>Malware Forensics</Name><Description>Malware Forensics</Description><Type>Class</Type></Query>
<Query><ID>264</ID><Parent_ID>258</Parent_ID><Name>Email Forensics</Name><Description>Email Forensics</Description><Type>Class</Type></Query>
<Query><ID>265</ID><Parent_ID>258</Parent_ID><Name>Database Forensics</Name><Description>Database Forensics</Description><Type>Class</Type></Query>
<Query><ID>266</ID><Parent_ID>258</Parent_ID><Name>Multimedia Forensics</Name><Description>Multimedia Forensics</Description><Type>Class</Type></Query>
<Query><ID>267</ID><Parent_ID>172</Parent_ID><Name>Auditing</Name><Description>Auditing</Description><Type>Class</Type></Query>
<Query><ID>268</ID><Parent_ID>11</Parent_ID><Name>Online ID</Name><Description>Online IDs including usernames on different online services such as OSNs</Description><Type>Class</Type></Query>
<Query><ID>269</ID><Parent_ID>497</Parent_ID><Name>Full Disk Encryption</Name><Description>Full Disk Encryption</Description><Type>Class</Type></Query>
<Query><ID>270</ID><Parent_ID>121</Parent_ID><Name>Block Cipher</Name><Description>Block Cipher</Description><Type>Class</Type></Query>
<Query><ID>271</ID><Parent_ID>121</Parent_ID><Name>Stream Cipher</Name><Description>Stream Cipher</Description><Type>Class</Type></Query>
<Query><ID>272</ID><Parent_ID>271</Parent_ID><Name>RC4</Name><Description>RC4</Description><Type>Class</Type></Query>
<Query><ID>273</ID><Parent_ID>271</Parent_ID><Name>ChaCha</Name><Description>ChaCha</Description><Type>Class</Type></Query>
<Query><ID>274</ID><Parent_ID>271</Parent_ID><Name>Salsa20</Name><Description>Salsa20</Description><Type>Class</Type></Query>
<Query><ID>275</ID><Parent_ID>111</Parent_ID><Name>Data Protection Law</Name><Description>Data Protection Law</Description><Type>Class</Type></Query>
<Query><ID>276</ID><Parent_ID>111</Parent_ID><Name>Cyber Crime Law</Name><Description>Cyber Crime Law</Description><Type>Class</Type></Query>
<Query><ID>277</ID><Parent_ID>275</Parent_ID><Name>EU GDPR</Name><Description>The General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area.</Description><Type>Class</Type></Query>
<Query><ID>278</ID><Parent_ID>275</Parent_ID><Name>UK DPA 2018</Name><Description>UK DPA (Data Protection Act) 2018</Description><Type>Class</Type></Query>
<Query><ID>279</ID><Parent_ID>276</Parent_ID><Name>UK Computer Misuse Act 1990</Name><Description>UK Computer Misuse Act 1990</Description><Type>Class</Type></Query>
<Query><ID>280</ID><Parent_ID>167</Parent_ID><Name>Usable Security</Name><Description>Usable Security</Description><Type>Class</Type></Query>
<Query><ID>281</ID><Parent_ID>178</Parent_ID><Name>Centralized Trust</Name><Description>Centralized Trust</Description><Type>Class</Type></Query>
<Query><ID>282</ID><Parent_ID>178</Parent_ID><Name>Distributed Trust</Name><Description>Distributed Trust</Description><Type>Class</Type></Query>
<Query><ID>283</ID><Parent_ID>178</Parent_ID><Name>Trust Computing</Name><Description>Trust Computing</Description><Type>Class</Type></Query>
<Query><ID>284</ID><Parent_ID>283</Parent_ID><Name>Trusted Platform Module (TPM)</Name><Description>Trusted Platform Module (TPM)</Description><Type>Class</Type></Query>
<Query><ID>285</ID><Parent_ID>283</Parent_ID><Name>Trusted Execution Environment (TEE)</Name><Description>Trusted Execution Environment (TEE)</Description><Type>Class</Type></Query>
<Query><ID>286</ID><Parent_ID>285</Parent_ID><Name>TrustZone</Name><Description>TrustZone</Description><Type>Class</Type></Query>
<Query><ID>287</ID><Parent_ID>291</Parent_ID><Name>Defense</Name><Description>Cyber Security Defense</Description><Type>Class</Type></Query>
<Query><ID>288</ID><Parent_ID>287</Parent_ID><Name>Center</Name><Description>Cyber Security Defense Center</Description><Type>Class</Type></Query>
<Query><ID>289</ID><Parent_ID>1</Parent_ID><Name>Nefarious Activity</Name><Description>Any activity that is nefarious or can cause hard/damage</Description><Type>Class</Type></Query>
<Query><ID>290</ID><Parent_ID>289</Parent_ID><Name>Cybercrime</Name><Description>Cybercrime</Description><Type>Class</Type></Query>
<Query><ID>291</ID><Parent_ID>1</Parent_ID><Name>Warfare</Name><Description>Cyberware</Description><Type>Class</Type></Query>
<Query><ID>293</ID><Parent_ID>291</Parent_ID><Name>Espionage</Name><Description>Cyber Espionage</Description><Type>Class</Type></Query>
<Query><ID>294</ID><Parent_ID>171</Parent_ID><Name>CTI Sharing</Name><Description>CTI Sharing</Description><Type>Class</Type></Query>
<Query><ID>295</ID><Parent_ID>1</Parent_ID><Name>Privacy</Name><Description>Privacy</Description><Type>Class</Type></Query>
<Query><ID>296</ID><Parent_ID>325</Parent_ID><Name>Method</Name><Description>Privacy Preserving Method</Description><Type>Class</Type></Query>
<Query><ID>297</ID><Parent_ID>295</Parent_ID><Name>Preserving</Name><Description>Privacy Preserving</Description><Type>Class</Type></Query>
<Query><ID>298</ID><Parent_ID>297</Parent_ID><Name>Data</Name><Description>Data</Description><Type>Class</Type></Query>
<Query><ID>299</ID><Parent_ID>298</Parent_ID><Name>Operation</Name><Description>Operation</Description><Type>Class</Type></Query>
<Query><ID>300</ID><Parent_ID>299</Parent_ID><Name>Analysis</Name><Description>Analysis</Description><Type>Class</Type></Query>
<Query><ID>303</ID><Parent_ID>299</Parent_ID><Name>Mining</Name><Description>Mining</Description><Type>Class</Type></Query>
<Query><ID>304</ID><Parent_ID>299</Parent_ID><Name>Publishing</Name><Description>Publishing</Description><Type>Class</Type></Query>
<Query><ID>305</ID><Parent_ID>295</Parent_ID><Name>Enhancing</Name><Description>Privacy Enhancing</Description><Type>Class</Type></Query>
<Query><ID>307</ID><Parent_ID>129</Parent_ID><Name>Generation</Name><Description>Key Generation</Description><Type>Class</Type></Query>
<Query><ID>308</ID><Parent_ID>129</Parent_ID><Name>Key Pair</Name><Description>Key Pair</Description><Type>Class</Type></Query>
<Query><ID>309</ID><Parent_ID>41</Parent_ID><Name>Malware</Name><Description>Malware</Description><Type>Class</Type></Query>
<Query><ID>310</ID><Parent_ID>309</Parent_ID><Name>Malware Analysis</Name><Description>Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor.</Description><Type>Class</Type></Query>
<Query><ID>312</ID><Parent_ID>43</Parent_ID><Name>Keylogger</Name><Description>A keystroke logger, or keylogger, records every keystroke entry made on a computer, often without the permission or knowledge of the user</Description><Type>Class</Type></Query>
<Query><ID>313</ID><Parent_ID>309</Parent_ID><Name>Malware Security</Name><Description>Malware Security</Description><Type>Class</Type></Query>
<Query><ID>314</ID><Parent_ID>309</Parent_ID><Name>Malware Binary</Name><Description>Malware Binary</Description><Type>Class</Type></Query>
<Query><ID>315</ID><Parent_ID>313</Parent_ID><Name>Protection</Name><Description>Protection</Description><Type>Class</Type></Query>
<Query><ID>317</ID><Parent_ID>184</Parent_ID><Name>ASLR</Name><Description>Address Space Layout Randomization</Description><Type>Class</Type></Query>
<Query><ID>318</ID><Parent_ID>12</Parent_ID><Name>Professional</Name><Description>Professional</Description><Type>Class</Type></Query>
<Query><ID>319</ID><Parent_ID>41</Parent_ID><Name>Buffer Overflow</Name><Description>Buffer Overflow</Description><Type>Class</Type></Query>
<Query><ID>320</ID><Parent_ID>113</Parent_ID><Name>Bug Bounty</Name><Description>Bug Bounty</Description><Type>Class</Type></Query>
<Query><ID>321</ID><Parent_ID>322</Parent_ID><Name>Vulnerability Disclosure</Name><Description>Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware.</Description><Type>Class</Type></Query>
<Query><ID>322</ID><Parent_ID>74</Parent_ID><Name>Vulnerability Operation</Name><Description>Vulnerability Operations</Description><Type>Class</Type></Query>
<Query><ID>323</ID><Parent_ID>322</Parent_ID><Name>Vulnerability Assessment</Name><Description>Vulnerability Assessment</Description><Type>Class</Type></Query>
<Query><ID>324</ID><Parent_ID>323</Parent_ID><Name>CVSS</Name><Description>The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities.</Description><Type>Class</Type></Query>
<Query><ID>325</ID><Parent_ID>297</Parent_ID><Name>De-identification</Name><Description>De-identification is the process used to prevent someone&#39;s personal identity from being revealed.</Description><Type>Class</Type></Query>
<Query><ID>326</ID><Parent_ID>78</Parent_ID><Name>Web Vulnerability</Name><Description>Web Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>327</ID><Parent_ID>78</Parent_ID><Name>RCE Vulnerability</Name><Description>Remote code execution is the ability an attacker has to access someone else&#39;s computing device and make changes, no matter where the device is geographically located.</Description><Type>Class</Type></Query>
<Query><ID>328</ID><Parent_ID>79</Parent_ID><Name>Privilege Escalation Vulnerability</Name><Description>Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources.</Description><Type>Class</Type></Query>
<Query><ID>329</ID><Parent_ID>78</Parent_ID><Name>Injection Vulnerability</Name><Description>Injection attacks refer to a broad class of attack vectors. In an injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command.</Description><Type>Class</Type></Query>
<Query><ID>330</ID><Parent_ID>210</Parent_ID><Name>Threat Report</Name><Description>Threat Report</Description><Type>Class</Type></Query>
<Query><ID>331</ID><Parent_ID>176</Parent_ID><Name>Phone Hacking</Name><Description>Phone Hacking</Description><Type>Class</Type></Query>
<Query><ID>332</ID><Parent_ID>320</Parent_ID><Name>Bug Bounty Program</Name><Description>Bug Bounty Program</Description><Type>Class</Type></Query>
<Query><ID>333</ID><Parent_ID>332</Parent_ID><Name>iOS Bug Bounty</Name><Description>iOS Bug Bounty</Description><Type>Class</Type></Query>
<Query><ID>335</ID><Parent_ID>171</Parent_ID><Name>CTI Platform</Name><Description>CTI Platform</Description><Type>Class</Type></Query>
<Query><ID>336</ID><Parent_ID>380</Parent_ID><Name>Bookmark</Name><Description>Web-pages, Bloggers, Social Media, ...</Description><Type>Class</Type></Query>
<Query><ID>337</ID><Parent_ID>336</Parent_ID><Name>Blog</Name><Description>Cyber Security related blog.</Description><Type>Class</Type></Query>
<Query><ID>338</ID><Parent_ID>1</Parent_ID><Name>Cybersecurity Threat</Name><Description></Description><Type>Class</Type></Query>
<Query><ID>339</ID><Parent_ID>338</Parent_ID><Name>Operation</Name><Description>Operation</Description><Type>Class</Type></Query>
<Query><ID>340</ID><Parent_ID>339</Parent_ID><Name>Modeling</Name><Description>Modeling</Description><Type>Class</Type></Query>
<Query><ID>341</ID><Parent_ID>113</Parent_ID><Name>Monitoring Tool</Name><Description>Monitoring Tool</Description><Type>Class</Type></Query>
<Query><ID>342</ID><Parent_ID>240</Parent_ID><Name>Response</Name><Description>Response</Description><Type>Class</Type></Query>
<Query><ID>343</ID><Parent_ID>342</Parent_ID><Name>Team</Name><Description>Team</Description><Type>Class</Type></Query>
<Query><ID>344</ID><Parent_ID>343</Parent_ID><Name>CERT</Name><Description>Computer Emergency Readiness Team</Description><Type>Class</Type></Query>
<Query><ID>345</ID><Parent_ID>130</Parent_ID><Name>PKI</Name><Description>PKI</Description><Type>Class</Type></Query>
<Query><ID>346</ID><Parent_ID>240</Parent_ID><Name>Operation</Name><Description>Operation</Description><Type>Class</Type></Query>
<Query><ID>347</ID><Parent_ID>346</Parent_ID><Name>Incident Reporting</Name><Description>Incident Reporting</Description><Type>Class</Type></Query>
<Query><ID>348</ID><Parent_ID>347</Parent_ID><Name>Incident Data</Name><Description>Incident Data</Description><Type>Class</Type></Query>
<Query><ID>349</ID><Parent_ID>289</Parent_ID><Name>Hacking</Name><Description>Hacking Activities</Description><Type>Class</Type></Query>
<Query><ID>350</ID><Parent_ID>2</Parent_ID><Name>Hackers Event</Name><Description>Hackers Event</Description><Type>Class</Type></Query>
<Query><ID>351</ID><Parent_ID>21</Parent_ID><Name>By Nationality</Name><Description>By Nationality</Description><Type>Class</Type></Query>
<Query><ID>352</ID><Parent_ID>21</Parent_ID><Name>By Target</Name><Description>By Target</Description><Type>Class</Type></Query>
<Query><ID>353</ID><Parent_ID>372</Parent_ID><Name>Qualification (Industry)</Name><Description>Qualification (Industry)</Description><Type>Class</Type></Query>
<Query><ID>356</ID><Parent_ID>6</Parent_ID><Name>Security Analyst Summit</Name><Description>Security Analyst Summit</Description><Type>Class</Type></Query>
<Query><ID>357</ID><Parent_ID>4</Parent_ID><Name>Enigma Conference</Name><Description>Enigma Conference</Description><Type>Class</Type></Query>
<Query><ID>358</ID><Parent_ID>4</Parent_ID><Name>Hack In The Box Security Conference</Name><Description>https://conference.hitb.org/</Description><Type>Class</Type></Query>
<Query><ID>359</ID><Parent_ID>4</Parent_ID><Name>Security BSides</Name><Description>Security BSides</Description><Type>Class</Type></Query>
<Query><ID>360</ID><Parent_ID>172</Parent_ID><Name>General Terms</Name><Description>General Terms</Description><Type>Class</Type></Query>
<Query><ID>361</ID><Parent_ID>360</Parent_ID><Name>Business Continuity</Name><Description>Business Continuity</Description><Type>Class</Type></Query>
<Query><ID>362</ID><Parent_ID>70</Parent_ID><Name>Email Account Compromise (EAC)</Name><Description>Email Account Compromise (EAC)</Description><Type>Class</Type></Query>
<Query><ID>363</ID><Parent_ID>362</Parent_ID><Name>Business Email Compromise (BEC)</Name><Description>BEC is the impersonation of executives or business contacts to obtain the transfer of funds or sensitive information</Description><Type>Class</Type></Query>
<Query><ID>364</ID><Parent_ID>88</Parent_ID><Name>Systems and Tools</Name><Description>Systems and Tools</Description><Type>Class</Type></Query>
<Query><ID>365</ID><Parent_ID>364</Parent_ID><Name>Testing</Name><Description>Testing</Description><Type>Class</Type></Query>
<Query><ID>366</ID><Parent_ID>349</Parent_ID><Name>Hacktivism</Name><Description>Hacktivism</Description><Type>Class</Type></Query>
<Query><ID>367</ID><Parent_ID>349</Parent_ID><Name>Hacking Tool</Name><Description>Hacking Tool</Description><Type>Class</Type></Query>
<Query><ID>368</ID><Parent_ID>350</Parent_ID><Name>DefCamp</Name><Description>DefCamp is the most important annual conference on Hacking &amp; Information Security in Central Eastern Europe</Description><Type>Class</Type></Query>
<Query><ID>369</ID><Parent_ID>353</Parent_ID><Name>Certified Ethical Hacker (CEH)</Name><Description>Certified Ethical Hacker (CEH)</Description><Type>Class</Type></Query>
<Query><ID>370</ID><Parent_ID>4</Parent_ID><Name>CanSecWest</Name><Description>CanSecWest, the world&#39;s most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking.</Description><Type>Class</Type></Query>
<Query><ID>371</ID><Parent_ID>78</Parent_ID><Name>Code Execution Vulnerability</Name><Description>Code Execution Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>372</ID><Parent_ID>380</Parent_ID><Name>Accreditation</Name><Description>Education and Qualification</Description><Type>Class</Type></Query>
<Query><ID>373</ID><Parent_ID>2</Parent_ID><Name>Challenge</Name><Description>Cybersecurity Challenge</Description><Type>Class</Type></Query>
<Query><ID>374</ID><Parent_ID>373</Parent_ID><Name>CTF</Name><Description>Capture The Flag</Description><Type>Class</Type></Query>
<Query><ID>375</ID><Parent_ID>132</Parent_ID><Name>Hash</Name><Description>Hash</Description><Type>Class</Type></Query>
<Query><ID>376</ID><Parent_ID>230</Parent_ID><Name>Payment Card</Name><Description>Payment Card</Description><Type>Class</Type></Query>
<Query><ID>377</ID><Parent_ID>376</Parent_ID><Name>The Payment Card Industry Data Security Standard</Name><Description>The Payment Card Industry Data Security Standard</Description><Type>Class</Type></Query>
<Query><ID>378</ID><Parent_ID>289</Parent_ID><Name>Payment Card Fraud</Name><Description>Payment Card Fraud</Description><Type>Class</Type></Query>
<Query><ID>379</ID><Parent_ID>336</Parent_ID><Name>News</Name><Description>News</Description><Type>Class</Type></Query>
<Query><ID>380</ID><Parent_ID>1</Parent_ID><Name>General</Name><Description>General</Description><Type>Class</Type></Query>
<Query><ID>381</ID><Parent_ID>380</Parent_ID><Name>Fundamental Concepts</Name><Description>The CIA Triad</Description><Type>Class</Type></Query>
<Query><ID>382</ID><Parent_ID>381</Parent_ID><Name>Confidentiality</Name><Description>Confidentiality</Description><Type>Class</Type></Query>
<Query><ID>383</ID><Parent_ID>381</Parent_ID><Name>Integrity</Name><Description>Integrity</Description><Type>Class</Type></Query>
<Query><ID>384</ID><Parent_ID>381</Parent_ID><Name>Availability</Name><Description>Availability</Description><Type>Class</Type></Query>
<Query><ID>385</ID><Parent_ID>336</Parent_ID><Name>Misc</Name><Description>Misc</Description><Type>Class</Type></Query>
<Query><ID>386</ID><Parent_ID>7</Parent_ID><Name>Real World Crypto Symposium</Name><Description>Real World Crypto Symposium</Description><Type>Class</Type></Query>
<Query><ID>387</ID><Parent_ID>372</Parent_ID><Name>Education (Academic)</Name><Description>Education (Academic)</Description><Type>Class</Type></Query>
<Query><ID>388</ID><Parent_ID>119</Parent_ID><Name>Crypto System</Name><Description>A cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality. Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption</Description><Type>Class</Type></Query>
<Query><ID>389</ID><Parent_ID>388</Parent_ID><Name>Decryption</Name><Description>Decryption is generally the reverse process of encryption. It is the process of decoding the data which has been encrypted into a secret format. An authorized user can only decrypt data because decryption requires a secret key or password.</Description><Type>Class</Type></Query>
<Query><ID>390</ID><Parent_ID>44</Parent_ID><Name>Ransomware Variant</Name><Description>Ransomware Variants</Description><Type>Class</Type></Query>
<Query><ID>391</ID><Parent_ID>390</Parent_ID><Name>Bad Rabbit</Name><Description>Bad Rabbit</Description><Type>Class</Type></Query>
<Query><ID>392</ID><Parent_ID>390</Parent_ID><Name>Cerber</Name><Description>Cerber</Description><Type>Class</Type></Query>
<Query><ID>393</ID><Parent_ID>390</Parent_ID><Name>Locky</Name><Description>Locky</Description><Type>Class</Type></Query>
<Query><ID>394</ID><Parent_ID>390</Parent_ID><Name>Petya</Name><Description>Petya</Description><Type>Class</Type></Query>
<Query><ID>395</ID><Parent_ID>390</Parent_ID><Name>Wannacry</Name><Description>Wannacry</Description><Type>Class</Type></Query>
<Query><ID>396</ID><Parent_ID>390</Parent_ID><Name>CryptoWall</Name><Description>CryptoWall</Description><Type>Class</Type></Query>
<Query><ID>397</ID><Parent_ID>390</Parent_ID><Name>CryptoLocker</Name><Description>CryptoLocker</Description><Type>Class</Type></Query>
<Query><ID>398</ID><Parent_ID>54</Parent_ID><Name>Replay Attack</Name><Description>A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.</Description><Type>Class</Type></Query>
<Query><ID>399</ID><Parent_ID>4</Parent_ID><Name>RSA Conference</Name><Description>RSA Conference</Description><Type>Class</Type></Query>
<Query><ID>400</ID><Parent_ID>550</Parent_ID><Name>Direct Memory Access (DMA)</Name><Description>A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence of high-speed expansion ports that permit direct memory access (DMA).</Description><Type>Class</Type></Query>
<Query><ID>401</ID><Parent_ID>223</Parent_ID><Name>APT1</Name><Description>APT1</Description><Type>Class</Type></Query>
<Query><ID>403</ID><Parent_ID>398</Parent_ID><Name>KRACK</Name><Description>KRACK (Key Re-installation Attack) is a severe replay attack (a type of exploitable flaw) on the Wi-Fi Protected Access protocol that secures Wi-Fi connections.</Description><Type>Class</Type></Query>
<Query><ID>404</ID><Parent_ID>130</Parent_ID><Name>Public Key Infrastructure (PKI)</Name><Description>A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.</Description><Type>Class</Type></Query>
<Query><ID>405</ID><Parent_ID>119</Parent_ID><Name>Digital Signature</Name><Description>Digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer.</Description><Type>Class</Type></Query>
<Query><ID>406</ID><Parent_ID>7</Parent_ID><Name>The Network and Distributed System Security Symposium (NDSS)</Name><Description>NDSS fosters information exchange among researchers and practitioners of network and distributed system security</Description><Type>Class</Type></Query>
<Query><ID>407</ID><Parent_ID>4</Parent_ID><Name>REcon</Name><Description>REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques.</Description><Type>Class</Type></Query>
<Query><ID>408</ID><Parent_ID>364</Parent_ID><Name>Security Privileges Control</Name><Description>Security Privileges Control</Description><Type>Class</Type></Query>
<Query><ID>409</ID><Parent_ID>78</Parent_ID><Name>Security Bug</Name><Description>Security Bug</Description><Type>Class</Type></Query>
<Query><ID>410</ID><Parent_ID>413</Parent_ID><Name>Linux Kernel Bug</Name><Description>Linux Kernel Bug</Description><Type>Class</Type></Query>
<Query><ID>412</ID><Parent_ID>409</Parent_ID><Name>OS Bug</Name><Description>OS Bug</Description><Type>Class</Type></Query>
<Query><ID>413</ID><Parent_ID>412</Parent_ID><Name>Kernel Bug</Name><Description>Kernel Bug</Description><Type>Class</Type></Query>
<Query><ID>414</ID><Parent_ID>412</Parent_ID><Name>Privilege Escalation Bug</Name><Description>Privilege Escalation Bug</Description><Type>Class</Type></Query>
<Query><ID>415</ID><Parent_ID>413</Parent_ID><Name>Windows Kernel Bug</Name><Description>Windows Kernel Bug</Description><Type>Class</Type></Query>
<Query><ID>416</ID><Parent_ID>412</Parent_ID><Name>Memory Bug</Name><Description>Memory Bug</Description><Type>Class</Type></Query>
<Query><ID>417</ID><Parent_ID>4</Parent_ID><Name>Annual Computer Security Applications Conference</Name><Description>ACSAC</Description><Type>Class</Type></Query>
<Query><ID>419</ID><Parent_ID>4</Parent_ID><Name>National Computer Security Conference</Name><Description>National Computer Security Conference</Description><Type>Class</Type></Query>
<Query><ID>420</ID><Parent_ID>4</Parent_ID><Name>Virus Bulletin International Conference</Name><Description>VB2019</Description><Type>Class</Type></Query>
<Query><ID>421</ID><Parent_ID>7</Parent_ID><Name>IEEE Computer Security Foundations Symposium</Name><Description>CSF</Description><Type>Class</Type></Query>
<Query><ID>422</ID><Parent_ID>208</Parent_ID><Name>White Paper</Name><Description>White Paper</Description><Type>Class</Type></Query>
<Query><ID>423</ID><Parent_ID>172</Parent_ID><Name>Framework</Name><Description>Framework</Description><Type>Class</Type></Query>
<Query><ID>424</ID><Parent_ID>364</Parent_ID><Name>Patch</Name><Description>Patch</Description><Type>Class</Type></Query>
<Query><ID>425</ID><Parent_ID>167</Parent_ID><Name>Physical Security</Name><Description>Physical Security</Description><Type>Class</Type></Query>
<Query><ID>427</ID><Parent_ID>4</Parent_ID><Name>O’Reilly Security Conference</Name><Description>O’Reilly Security Conference</Description><Type>Class</Type></Query>
<Query><ID>428</ID><Parent_ID>167</Parent_ID><Name>Network Security</Name><Description>Network Security</Description><Type>Class</Type></Query>
<Query><ID>429</ID><Parent_ID>167</Parent_ID><Name>Cybersecurity Industry</Name><Description>Cybersecurity Industry</Description><Type>Class</Type></Query>
<Query><ID>430</ID><Parent_ID>525</Parent_ID><Name>Secure Network</Name><Description>Secure Network</Description><Type>Class</Type></Query>
<Query><ID>431</ID><Parent_ID>119</Parent_ID><Name>Certificate</Name><Description>Certificate</Description><Type>Class</Type></Query>
<Query><ID>432</ID><Parent_ID>7</Parent_ID><Name>Systems Security Symposium</Name><Description>Systems Security Symposium</Description><Type>Class</Type></Query>
<Query><ID>433</ID><Parent_ID>372</Parent_ID><Name>Awards</Name><Description>Awards</Description><Type>Class</Type></Query>
<Query><ID>434</ID><Parent_ID>210</Parent_ID><Name>Security Bulletin</Name><Description>Security Bulletin</Description><Type>Class</Type></Query>
<Query><ID>436</ID><Parent_ID>36</Parent_ID><Name>cisco talos</Name><Description>cisco talos</Description><Type>Class</Type></Query>
<Query><ID>438</ID><Parent_ID>218</Parent_ID><Name>Crack Tool</Name><Description>Crack Tool</Description><Type>Class</Type></Query>
<Query><ID>439</ID><Parent_ID>78</Parent_ID><Name>Cross Site</Name><Description>Cross Site</Description><Type>Class</Type></Query>
<Query><ID>441</ID><Parent_ID>235</Parent_ID><Name>Anonymization</Name><Description>Anonymization</Description><Type>Class</Type></Query>
<Query><ID>442</ID><Parent_ID>347</Parent_ID><Name>Data Breach Report</Name><Description>Data Breach Report</Description><Type>Class</Type></Query>
<Query><ID>443</ID><Parent_ID>4</Parent_ID><Name>cycon</Name><Description>The annual International Conference on Cyber Conflict</Description><Type>Class</Type></Query>
<Query><ID>444</ID><Parent_ID>295</Parent_ID><Name>Data Privacy</Name><Description>Data Privacy</Description><Type>Class</Type></Query>
<Query><ID>445</ID><Parent_ID>454</Parent_ID><Name>Data Leakage</Name><Description>Data Leakage</Description><Type>Class</Type></Query>
<Query><ID>447</ID><Parent_ID>454</Parent_ID><Name>Data Breach</Name><Description>Data Breach</Description><Type>Class</Type></Query>
<Query><ID>448</ID><Parent_ID>235</Parent_ID><Name>Differential Privacy</Name><Description>Differential Privacy</Description><Type>Class</Type></Query>
<Query><ID>449</ID><Parent_ID>364</Parent_ID><Name>Web Technique</Name><Description>Web Technique</Description><Type>Class</Type></Query>
<Query><ID>450</ID><Parent_ID>449</Parent_ID><Name>Human Test</Name><Description>Human Test</Description><Type>Class</Type></Query>
<Query><ID>451</ID><Parent_ID>325</Parent_ID><Name>k-anonymity</Name><Description>k-anonymity</Description><Type>Class</Type></Query>
<Query><ID>452</ID><Parent_ID>453</Parent_ID><Name>Anonymous Browsing</Name><Description>Anonymous Browsing</Description><Type>Class</Type></Query>
<Query><ID>453</ID><Parent_ID>305</Parent_ID><Name>Online Privacy Protection</Name><Description>Online Privacy Protection</Description><Type>Class</Type></Query>
<Query><ID>454</ID><Parent_ID>455</Parent_ID><Name>Publicly Exposed Data</Name><Description>Publicly Exposed Data</Description><Type>Class</Type></Query>
<Query><ID>455</ID><Parent_ID>240</Parent_ID><Name>Data Incident</Name><Description>Data Incident</Description><Type>Class</Type></Query>
<Query><ID>456</ID><Parent_ID>455</Parent_ID><Name>Data Theft</Name><Description>Data Theft</Description><Type>Class</Type></Query>
<Query><ID>457</ID><Parent_ID>456</Parent_ID><Name>Data Exfiltration</Name><Description>Data Exfiltration</Description><Type>Class</Type></Query>
<Query><ID>458</ID><Parent_ID>184</Parent_ID><Name>Data Loss Prevention</Name><Description>Data Loss Prevention</Description><Type>Class</Type></Query>
<Query><ID>459</ID><Parent_ID>297</Parent_ID><Name>Multi-party Computation (MPC)</Name><Description>MPC is a sub-field of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private</Description><Type>Class</Type></Query>
<Query><ID>460</ID><Parent_ID>289</Parent_ID><Name>Dark Web</Name><Description>Dark Web</Description><Type>Class</Type></Query>
<Query><ID>461</ID><Parent_ID>460</Parent_ID><Name>Dark Web Market</Name><Description>Dark Web Market</Description><Type>Class</Type></Query>
<Query><ID>462</ID><Parent_ID>289</Parent_ID><Name>Malicious</Name><Description>Malicious</Description><Type>Class</Type></Query>
<Query><ID>463</ID><Parent_ID>462</Parent_ID><Name>Malicious File</Name><Description>Malicious File</Description><Type>Class</Type></Query>
<Query><ID>464</ID><Parent_ID>463</Parent_ID><Name>Malicious Document</Name><Description>Malicious Document</Description><Type>Class</Type></Query>
<Query><ID>465</ID><Parent_ID>462</Parent_ID><Name>Malicious Software</Name><Description>Malicious Software</Description><Type>Class</Type></Query>
<Query><ID>466</ID><Parent_ID>462</Parent_ID><Name>Malicious Actor</Name><Description>Malicious Actor</Description><Type>Class</Type></Query>
<Query><ID>467</ID><Parent_ID>462</Parent_ID><Name>Malicious URL</Name><Description>Malicious URL</Description><Type>Class</Type></Query>
<Query><ID>468</ID><Parent_ID>364</Parent_ID><Name>Operating System Level</Name><Description>Operating System Level</Description><Type>Class</Type></Query>
<Query><ID>469</ID><Parent_ID>468</Parent_ID><Name>Secure Boot</Name><Description>Secure Boot</Description><Type>Class</Type></Query>
<Query><ID>470</ID><Parent_ID>380</Parent_ID><Name>Secure</Name><Description>Secure</Description><Type>Class</Type></Query>
<Query><ID>471</ID><Parent_ID>4</Parent_ID><Name>DEF CON</Name><Description>DEF CON is one of the world&#39;s largest and most notable hacker conventions, held annually in Las Vegas, Nevada</Description><Type>Class</Type></Query>
<Query><ID>472</ID><Parent_ID>80</Parent_ID><Name>Type Confusion Vulnerability</Name><Description>Type Confusion Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>474</ID><Parent_ID>244</Parent_ID><Name>Agency</Name><Description>Agency</Description><Type>Class</Type></Query>
<Query><ID>475</ID><Parent_ID>43</Parent_ID><Name>By Operating System</Name><Description>By Operating System</Description><Type>Class</Type></Query>
<Query><ID>476</ID><Parent_ID>349</Parent_ID><Name>Web Hacking</Name><Description>Web Hacking</Description><Type>Class</Type></Query>
<Query><ID>477</ID><Parent_ID>476</Parent_ID><Name>Social Media Hacking</Name><Description>Social Media Hacking</Description><Type>Class</Type></Query>
<Query><ID>478</ID><Parent_ID>6</Parent_ID><Name>DFIR Summit</Name><Description>SANS Digital Forensics &amp; Incident Response (DFIR) Summit</Description><Type>Class</Type></Query>
<Query><ID>479</ID><Parent_ID>46</Parent_ID><Name>Banking Trojan</Name><Description>Banking Trojan</Description><Type>Class</Type></Query>
<Query><ID>480</ID><Parent_ID>90</Parent_ID><Name>Standard</Name><Description>Access Control Standard</Description><Type>Class</Type></Query>
<Query><ID>481</ID><Parent_ID>468</Parent_ID><Name>Windows</Name><Description>Windows</Description><Type>Class</Type></Query>
<Query><ID>482</ID><Parent_ID>43</Parent_ID><Name>Espionage</Name><Description>Espionage</Description><Type>Class</Type></Query>
<Query><ID>483</ID><Parent_ID>309</Parent_ID><Name>Malware Propagation</Name><Description>Malware Propagation</Description><Type>Class</Type></Query>
<Query><ID>484</ID><Parent_ID>483</Parent_ID><Name>Malvertising</Name><Description>Malicious Advertising</Description><Type>Class</Type></Query>
<Query><ID>485</ID><Parent_ID>43</Parent_ID><Name>Polymorphic Malware</Name><Description>Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection</Description><Type>Class</Type></Query>
<Query><ID>486</ID><Parent_ID>462</Parent_ID><Name>Malicious Cyber Activity</Name><Description>Malicious Cyber Activity</Description><Type>Class</Type></Query>
<Query><ID>487</ID><Parent_ID>114</Parent_ID><Name>Anomaly Detection</Name><Description>Anomaly Detection</Description><Type>Class</Type></Query>
<Query><ID>488</ID><Parent_ID>288</Parent_ID><Name>National Cyber Security Centre</Name><Description>National Cyber Security Centre</Description><Type>Class</Type></Query>
<Query><ID>489</ID><Parent_ID>146</Parent_ID><Name>Cyber Observable eXpression (CybOX)</Name><Description>Cyber Observable eXpression (CybOX)</Description><Type>Class</Type></Query>
<Query><ID>490</ID><Parent_ID>380</Parent_ID><Name>Cyber Operation</Name><Description>Cyber Operation</Description><Type>Class</Type></Query>
<Query><ID>491</ID><Parent_ID>291</Parent_ID><Name>Government Strategy/Framework</Name><Description>Government Strategy/Framework</Description><Type>Class</Type></Query>
<Query><ID>492</ID><Parent_ID>442</Parent_ID><Name>Verizon DBIR</Name><Description>The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides analysis of information security incidents, with a specific focus on data breaches.</Description><Type>Class</Type></Query>
<Query><ID>493</ID><Parent_ID>21</Parent_ID><Name>Lauri Love</Name><Description>Lauri Love</Description><Type>Class</Type></Query>
<Query><ID>494</ID><Parent_ID>2</Parent_ID><Name>Campaign</Name><Description>Campaign</Description><Type>Class</Type></Query>
<Query><ID>495</ID><Parent_ID>297</Parent_ID><Name>Homomorphic Encryption</Name><Description>Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext. Homomorphic encryption can be used for privacy-preserving outsourced storage and computation.</Description><Type>Class</Type></Query>
<Query><ID>496</ID><Parent_ID>120</Parent_ID><Name>Disk Encryption</Name><Description>Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume.</Description><Type>Class</Type></Query>
<Query><ID>497</ID><Parent_ID>496</Parent_ID><Name>Disk Encryption Software</Name><Description>Disk Encryption Software</Description><Type>Class</Type></Query>
<Query><ID>498</ID><Parent_ID>120</Parent_ID><Name>Encryption Backdoor</Name><Description>An encryption backdoor is a deliberate weakness in encryption intended to let governments have easy access to encrypted data</Description><Type>Class</Type></Query>
<Query><ID>499</ID><Parent_ID>291</Parent_ID><Name>Cyber Security Culture</Name><Description>Cyber Security Culture</Description><Type>Class</Type></Query>
<Query><ID>500</ID><Parent_ID>289</Parent_ID><Name>Piracy</Name><Description>Piracy</Description><Type>Class</Type></Query>
<Query><ID>501</ID><Parent_ID>449</Parent_ID><Name>Secure Communication</Name><Description>Secure Communication</Description><Type>Class</Type></Query>
<Query><ID>502</ID><Parent_ID>501</Parent_ID><Name>Anonymous Communication</Name><Description>Anonymous Communication</Description><Type>Class</Type></Query>
<Query><ID>503</ID><Parent_ID>502</Parent_ID><Name>Tor (anonymity network)</Name><Description>Tor is free and open-source software for enabling anonymous communication.</Description><Type>Class</Type></Query>
<Query><ID>504</ID><Parent_ID>190</Parent_ID><Name>Multi-Factor Authentication</Name><Description>Multi-Factor Authentication</Description><Type>Class</Type></Query>
<Query><ID>505</ID><Parent_ID>504</Parent_ID><Name>Two-Factor Authentication</Name><Description>Two-Factor Authentication</Description><Type>Class</Type></Query>
<Query><ID>506</ID><Parent_ID>501</Parent_ID><Name>VPN</Name><Description>Virtual Private Network (VPN)</Description><Type>Class</Type></Query>
<Query><ID>507</ID><Parent_ID>178</Parent_ID><Name>Operation</Name><Description>Operation</Description><Type>Class</Type></Query>
<Query><ID>508</ID><Parent_ID>507</Parent_ID><Name>Trust Management</Name><Description>Trust Management</Description><Type>Class</Type></Query>
<Query><ID>509</ID><Parent_ID>479</Parent_ID><Name>Zeus</Name><Description>Zeus</Description><Type>Class</Type></Query>
<Query><ID>510</ID><Parent_ID>509</Parent_ID><Name>Gameover Zeus</Name><Description>Gameover Zeus</Description><Type>Class</Type></Query>
<Query><ID>511</ID><Parent_ID>119</Parent_ID><Name>cryptanalysis</Name><Description>cryptanalysis</Description><Type>Class</Type></Query>
<Query><ID>512</ID><Parent_ID>120</Parent_ID><Name>encryption scheme</Name><Description>encryption scheme</Description><Type>Class</Type></Query>
<Query><ID>513</ID><Parent_ID>41</Parent_ID><Name>drive-by download attack</Name><Description>drive-by download attack</Description><Type>Class</Type></Query>
<Query><ID>514</ID><Parent_ID>51</Parent_ID><Name>Injection</Name><Description>Injection</Description><Type>Class</Type></Query>
<Query><ID>515</ID><Parent_ID>111</Parent_ID><Name>Digital Rights</Name><Description>Digital Rights</Description><Type>Class</Type></Query>
<Query><ID>516</ID><Parent_ID>519</Parent_ID><Name>Penetration Testing Tools</Name><Description>Penetration Testing Tools</Description><Type>Class</Type></Query>
<Query><ID>517</ID><Parent_ID>480</Parent_ID><Name>LDAP</Name><Description>Lightweight Directory Access Protocol</Description><Type>Class</Type></Query>
<Query><ID>518</ID><Parent_ID>219</Parent_ID><Name>SQL Injection Tool</Name><Description>SQL Injection Tool</Description><Type>Class</Type></Query>
<Query><ID>519</ID><Parent_ID>365</Parent_ID><Name>Penetration Test</Name><Description>A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.</Description><Type>Class</Type></Query>
<Query><ID>520</ID><Parent_ID>39</Parent_ID><Name>Negative Effects</Name><Description>Negative Effects Of A Cyber Breach/Attack</Description><Type>Class</Type></Query>
<Query><ID>521</ID><Parent_ID>378</Parent_ID><Name>Magnetic Stripe Reader</Name><Description>Magnetic Stripe Reader</Description><Type>Class</Type></Query>
<Query><ID>522</ID><Parent_ID>319</Parent_ID><Name>Heap Buffer Overflow</Name><Description>a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer&#39;s boundary and overwrites adjacent memory locations.</Description><Type>Class</Type></Query>
<Query><ID>523</ID><Parent_ID>289</Parent_ID><Name>Spamming</Name><Description>Spamming</Description><Type>Class</Type></Query>
<Query><ID>524</ID><Parent_ID>239</Parent_ID><Name>Reverse Engineering Tool</Name><Description>Reverse Engineering Tools</Description><Type>Class</Type></Query>
<Query><ID>525</ID><Parent_ID>364</Parent_ID><Name>Network Tool</Name><Description>Network Tool (Securing &amp; Monitoring)</Description><Type>Class</Type></Query>
<Query><ID>526</ID><Parent_ID>525</Parent_ID><Name>Network Monitoring</Name><Description>Network Monitoring</Description><Type>Class</Type></Query>
<Query><ID>527</ID><Parent_ID>3</Parent_ID><Name>Red Team</Name><Description>A red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.</Description><Type>Class</Type></Query>
<Query><ID>528</ID><Parent_ID>223</Parent_ID><Name>Hacking Team</Name><Description>Hacking Team</Description><Type>Class</Type></Query>
<Query><ID>529</ID><Parent_ID>525</Parent_ID><Name>Remote Access Tool (RAT)</Name><Description>Remote Access Tool (RAT)</Description><Type>Class</Type></Query>
<Query><ID>530</ID><Parent_ID>113</Parent_ID><Name>Project</Name><Description>Project</Description><Type>Class</Type></Query>
<Query><ID>531</ID><Parent_ID>530</Parent_ID><Name>Project Zero</Name><Description>Google Project Zero</Description><Type>Class</Type></Query>
<Query><ID>532</ID><Parent_ID>37</Parent_ID><Name>WikiLeaks</Name><Description>WikiLeaks</Description><Type>Class</Type></Query>
<Query><ID>533</ID><Parent_ID>141</Parent_ID><Name>WiFi</Name><Description>WiFi</Description><Type>Class</Type></Query>
<Query><ID>534</ID><Parent_ID>409</Parent_ID><Name>Flaw</Name><Description>Flaw</Description><Type>Class</Type></Query>
<Query><ID>535</ID><Parent_ID>88</Parent_ID><Name>Anti-Fraud</Name><Description>Anti-Fraud</Description><Type>Class</Type></Query>
<Query><ID>536</ID><Parent_ID>365</Parent_ID><Name>Testing Programs</Name><Description>Testing Programs</Description><Type>Class</Type></Query>
<Query><ID>537</ID><Parent_ID>536</Parent_ID><Name>Fuzzing</Name><Description>Fuzzing</Description><Type>Class</Type></Query>
<Query><ID>538</ID><Parent_ID>75</Parent_ID><Name>GHDB</Name><Description>Google Hacking Database (GHDB)</Description><Type>Class</Type></Query>
<Query><ID>539</ID><Parent_ID>78</Parent_ID><Name>Authentication Vulnerability</Name><Description>Authentication Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>540</ID><Parent_ID>156</Parent_ID><Name>Surveillance</Name><Description>Surveillance</Description><Type>Class</Type></Query>
<Query><ID>541</ID><Parent_ID>336</Parent_ID><Name>Hacking</Name><Description>Hacking</Description><Type>Class</Type></Query>
<Query><ID>542</ID><Parent_ID>336</Parent_ID><Name>Online Tools</Name><Description>Online Tools</Description><Type>Class</Type></Query>
<Query><ID>543</ID><Parent_ID>530</Parent_ID><Name>Metasploit Project</Name><Description>The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.</Description><Type>Class</Type></Query>
<Query><ID>544</ID><Parent_ID>120</Parent_ID><Name>Email Encryption</Name><Description>Email Encryption</Description><Type>Class</Type></Query>
<Query><ID>545</ID><Parent_ID>46</Parent_ID><Name>Remote Access Trojan (RAT)</Name><Description>Remote Access Trojan (RAT)</Description><Type>Class</Type></Query>
<Query><ID>547</ID><Parent_ID>225</Parent_ID><Name>Software</Name><Description>OS, Program, Application, Service,...</Description><Type>Class</Type></Query>
<Query><ID>548</ID><Parent_ID>547</Parent_ID><Name>OS</Name><Description>OS</Description><Type>Class</Type></Query>
<Query><ID>549</ID><Parent_ID>364</Parent_ID><Name>Security-Focused Operating System</Name><Description>Security-Focused Operating System</Description><Type>Class</Type></Query>
<Query><ID>550</ID><Parent_ID>200</Parent_ID><Name>Memory Attack</Name><Description>Memory Attack</Description><Type>Class</Type></Query>
<Query><ID>551</ID><Parent_ID>550</Parent_ID><Name>In-Memory Key Recovery</Name><Description>The recovery method uses a linear scan of memory to generate trial keys from all possible memory positions to decrypt the container.</Description><Type>Class</Type></Query>
<Query><ID>552</ID><Parent_ID>524</Parent_ID><Name>Disassembler</Name><Description>A disassembler is a computer program that translates machine language into assembly language—the inverse operation to that of an assembler. A disassembler differs from a decompiler, which targets a high-level language rather than an assembly language.</Description><Type>Class</Type></Query>
<Query><ID>553</ID><Parent_ID>550</Parent_ID><Name>Memory Corruption</Name><Description>Memory corruption occurs in a computer program when the contents of a memory location are modified due to programmatic behavior that exceeds the intention of the original programmer or program/language constructs; this is termed violating memory safety.</Description><Type>Class</Type></Query>
<Query><ID>554</ID><Parent_ID>219</Parent_ID><Name>PowerShell</Name><Description>PowerShell is a task-based command-line shell and scripting language built on .NET.</Description><Type>Class</Type></Query>
<Query><ID>555</ID><Parent_ID>480</Parent_ID><Name>XACML</Name><Description>eXtensible Access Control Markup Language</Description><Type>Class</Type></Query>
<Query><ID>556</ID><Parent_ID>444</Parent_ID><Name>Attributes Categorization</Name><Description>The specifics of the disclosure risks from which a dataset is to be protected can be specified by categorizing the attributes of the input dataset into different types</Description><Type>Class</Type></Query>
<Query><ID>557</ID><Parent_ID>556</Parent_ID><Name>Sensitive Attribute</Name><Description>Sensitive attributes encode properties with which individuals are not willing to be linked with. As such, they might be of interest to an attacker and, if disclosed, could cause harm to data subjects. They will be kept unmodified but may be subject to further constraints, such as t-closeness or l-diversity. Typical examples are diagnoses.</Description><Type>Class</Type></Query>
<Query><ID>558</ID><Parent_ID>556</Parent_ID><Name>Quasi-Identifying Attribute</Name><Description>Quasi-identifying attributes can in combination be used for re-identification attacks. They will be transformed. Typical examples are gender, date of birth and ZIP codes.</Description><Type>Class</Type></Query>
<Query><ID>559</ID><Parent_ID>560</Parent_ID><Name>Packet Capture</Name><Description>Packet capture is a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network.</Description><Type>Class</Type></Query>
<Query><ID>560</ID><Parent_ID>526</Parent_ID><Name>Packet Analyzer</Name><Description>Packet Analyzer</Description><Type>Class</Type></Query>
<Query><ID>561</ID><Parent_ID>556</Parent_ID><Name>Identifying Attribute</Name><Description>Identifying attributes are associated with a high risk of re-identification. They will be removed from the dataset. Typical examples are names or Social Security Numbers.</Description><Type>Class</Type></Query>
<Query><ID>562</ID><Parent_ID>556</Parent_ID><Name>Insensitive Attribute</Name><Description>Insensitive attributes are not associated with privacy risks. They will be kept unmodified.</Description><Type>Class</Type></Query>
<Query><ID>563</ID><Parent_ID>364</Parent_ID><Name>SCADA</Name><Description>Supervisory Control and Data Acquisition</Description><Type>Class</Type></Query>
<Query><ID>564</ID><Parent_ID>223</Parent_ID><Name>APT28</Name><Description>Fancy Bear (also known as APT28 (by Mandiant), Pawn Storm, Sofacy Group (by Kaspersky), Sednit, Tsar Team (by FireEye) and STRONTIUM (by Microsoft)</Description><Type>Class</Type></Query>
<Query><ID>565</ID><Parent_ID>223</Parent_ID><Name>The Shadow Brokers</Name><Description>The Shadow Brokers is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools from the National Security Agency, including several zero-day exploits.</Description><Type>Class</Type></Query>
<Query><ID>566</ID><Parent_ID>530</Parent_ID><Name>ZDI</Name><Description>Zero Day Initiative</Description><Type>Class</Type></Query>
<Query><ID>567</ID><Parent_ID>364</Parent_ID><Name>Online Tool</Name><Description>Online Tool</Description><Type>Class</Type></Query>
<Query><ID>568</ID><Parent_ID>79</Parent_ID><Name>Kernel Exploitation</Name><Description>Kernel Exploitation</Description><Type>Class</Type></Query>
<Query><ID>569</ID><Parent_ID>79</Parent_ID><Name>Memory Vulnerability</Name><Description>Memory Vulnerability</Description><Type>Class</Type></Query>
<Query><ID>570</ID><Parent_ID>569</Parent_ID><Name>Use-After-Free Vulnerability</Name><Description>Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.</Description><Type>Class</Type></Query>
<Query><ID>571</ID><Parent_ID>567</Parent_ID><Name>Shodan</Name><Description>Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.</Description><Type>Class</Type></Query>
<Query><ID>572</ID><Parent_ID>364</Parent_ID><Name>Secure Code</Name><Description>Secure Code</Description><Type>Class</Type></Query>
<Query><ID>573</ID><Parent_ID>141</Parent_ID><Name>IPSec</Name><Description>The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets.</Description><Type>Class</Type></Query>
<Query><ID>574</ID><Parent_ID>480</Parent_ID><Name>SAML</Name><Description>Security Assertion Markup Language</Description><Type>Class</Type></Query>
<Query><ID>575</ID><Parent_ID>447</Parent_ID><Name>Data Breach Cases</Name><Description>Data Breach Cases</Description><Type>Class</Type></Query>
<Query><ID>576</ID><Parent_ID>226</Parent_ID><Name>Personal Data</Name><Description>Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data</Description><Type>Class</Type></Query>
<Query><ID>577</ID><Parent_ID>275</Parent_ID><Name>Privacy Shield</Name><Description>The EU-U.S. and Swiss-U.S. Privacy Shield Frameworks were designed by the U.S. Department of Commerce and the European Commission and Swiss Administration to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce.</Description><Type>Class</Type></Query>
<Query><ID>578</ID><Parent_ID>275</Parent_ID><Name>Safe Harbor</Name><Description>The International Safe Harbor Privacy Principles or Safe Harbour Privacy Principles were principles developed between 1998 and 2000 in order to prevent private organizations within the European Union or United States which store customer data from accidentally disclosing or losing personal information.</Description><Type>Class</Type></Query>
<Query><ID>579</ID><Parent_ID>275</Parent_ID><Name>CISPA</Name><Description>Cyber Intelligence Sharing and Protection Act</Description><Type>Class</Type></Query>
<Query><ID>580</ID><Parent_ID>275</Parent_ID><Name>FISMA</Name><Description>The Federal Information Security Management Act of 2002 is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002.</Description><Type>Class</Type></Query>
<Query><ID>581</ID><Parent_ID>275</Parent_ID><Name>Net Neutrality Rule</Name><Description>In the United States, net neutrality, the principle that Internet service providers (ISPs) treat all data on the Internet the same, and not discriminate, has been an issue of contention between network users and access providers since the 1990s.</Description><Type>Class</Type></Query>
<Query><ID>2060575</ID><Parent_ID>217</Parent_ID><Name>0-day exploit</Name><Description>0-day exploit</Description><Type>Keyword</Type></Query>
<Query><ID>2065599</ID><Parent_ID>217</Parent_ID><Name>0day</Name><Description>0day</Description><Type>Keyword</Type></Query>
<Query><ID>2065739</ID><Parent_ID>217</Parent_ID><Name>0day exploit</Name><Description>0day exploit</Description><Type>Keyword</Type></Query>
<Query><ID>2067544</ID><Parent_ID>268</Parent_ID><Name>0x6d6172696f</Name><Description>Relevant Twitter account (already deactivated): https://twitter.com/kkotowicz/status/998129570355339264</Description><Type>Keyword</Type></Query>
<Query><ID>2067856</ID><Parent_ID>268</Parent_ID><Name>0xabad1dea</Name><Description>Twitter account: https://twitter.com/0xabad1dea</Description><Type>Keyword</Type></Query>
<Query><ID>2067941</ID><Parent_ID>268</Parent_ID><Name>0xamit</Name><Description>Hacker&#39;s Twitter account: https://twitter.com/0xAmit</Description><Type>Keyword</Type></Query>
<Query><ID>2068029</ID><Parent_ID>268</Parent_ID><Name>0xcharlie</Name><Description>https://twitter.com/0xcharlie</Description><Type>Keyword</Type></Query>
<Query><ID>2068175</ID><Parent_ID>268</Parent_ID><Name>0xdade</Name><Description>Hacker&#39;s Twitter account: https://twitter.com/0xdade</Description><Type>Keyword</Type></Query>
<Query><ID>2068212</ID><Parent_ID>268</Parent_ID><Name>0xdeadbabe</Name><Description>A VM santity check code: https://en.wikipedia.org/wiki/Hexspeak</Description><Type>Keyword</Type></Query>
<Query><ID>2068577</ID><Parent_ID>268</Parent_ID><Name>0xmchow</Name><Description>Hacker&#39;s Twitter account: https://twitter.com/0xmchow</Description><Type>Keyword</Type></Query>
<Query><ID>2071454</ID><Parent_ID>182</Parent_ID><Name>11th usenix security symposium</Name><Description>11th usenix security symposium</Description><Type>Keyword</Type></Query>
<Query><ID>2072448</ID><Parent_ID>182</Parent_ID><Name>13th usenix security symposium</Name><Description>13th usenix security symposium</Description><Type>Keyword</Type></Query>
<Query><ID>2073400</ID><Parent_ID>182</Parent_ID><Name>15th usenix security symposium</Name><Description>15th usenix security symposium</Description><Type>Keyword</Type></Query>
<Query><ID>2075727</ID><Parent_ID>268</Parent_ID><Name>1o57</Name><Description>Hacker&#39;s Twitter account: https://twitter.com/1o57</Description><Type>Keyword</Type></Query>
<Query><ID>2080781</ID><Parent_ID>505</Parent_ID><Name>2fa</Name><Description>2 factors authencation?</Description><Type>Keyword</Type></Query>
<Query><ID>2081954</ID><Parent_ID>183</Parent_ID><Name>2xcrm41</Name><Description>Magnetic Stripe Credit Card Reader sub model name</Description><Type>Keyword</Type></Query>
<Query><ID>2083406</ID><Parent_ID>4</Parent_ID><Name>33c3</Name><Description>Chaos Communication Congress: https://en.wikipedia.org/wiki/Chaos_Communication_Congress</Description><Type>Keyword</Type></Query>
<Query><ID>2086763</ID><Parent_ID>4</Parent_ID><Name>44con</Name><Description>Cyber security event: https://44con.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2098242</ID><Parent_ID>21</Parent_ID><Name>aaron swartz</Name><Description>Hacktivist: https://en.wikipedia.org/wiki/Aaron_Swartz</Description><Type>Keyword</Type></Query>
<Query><ID>2104743</ID><Parent_ID>90</Parent_ID><Name>access control decision</Name><Description>access control decision</Description><Type>Keyword</Type></Query>
<Query><ID>2104806</ID><Parent_ID>194</Parent_ID><Name>access control list</Name><Description>access control list</Description><Type>Keyword</Type></Query>
<Query><ID>2104836</ID><Parent_ID>90</Parent_ID><Name>access control mechanism</Name><Description>access control mechanism</Description><Type>Keyword</Type></Query>
<Query><ID>2104940</ID><Parent_ID>90</Parent_ID><Name>access control scheme</Name><Description>access control scheme</Description><Type>Keyword</Type></Query>
<Query><ID>2104957</ID><Parent_ID>90</Parent_ID><Name>access control system</Name><Description>access control system</Description><Type>Keyword</Type></Query>
<Query><ID>2105424</ID><Parent_ID>90</Parent_ID><Name>access management</Name><Description>access management</Description><Type>Keyword</Type></Query>
<Query><ID>2105847</ID><Parent_ID>90</Parent_ID><Name>access request</Name><Description>access request</Description><Type>Keyword</Type></Query>
<Query><ID>2106139</ID><Parent_ID>90</Parent_ID><Name>access token</Name><Description>access token</Description><Type>Keyword</Type></Query>
<Query><ID>2106310</ID><Parent_ID>90</Parent_ID><Name>access-control</Name><Description>access-control</Description><Type>Keyword</Type></Query>
<Query><ID>2107502</ID><Parent_ID>520</Parent_ID><Name>account compromise</Name><Description>account compromise</Description><Type>Keyword</Type></Query>
<Query><ID>2107815</ID><Parent_ID>39</Parent_ID><Name>account hack</Name><Description>account hack</Description><Type>Keyword</Type></Query>
<Query><ID>2114978</ID><Parent_ID>171</Parent_ID><Name>actionable threat intelligence</Name><Description>actionable threat intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>2115170</ID><Parent_ID>185</Parent_ID><Name>activation code</Name><Description>Security control (DRM)</Description><Type>Keyword</Type></Query>
<Query><ID>2120270</ID><Parent_ID>234</Parent_ID><Name>acunetix web vulnerability scanner</Name><Description>acunetix web vulnerability scanner</Description><Type>Keyword</Type></Query>
<Query><ID>2128008</ID><Parent_ID>195</Parent_ID><Name>admin account</Name><Description>A way to have access control</Description><Type>Keyword</Type></Query>
<Query><ID>2128237</ID><Parent_ID>193</Parent_ID><Name>admin password</Name><Description>admin password</Description><Type>Keyword</Type></Query>
<Query><ID>2128322</ID><Parent_ID>195</Parent_ID><Name>admin rights</Name><Description>admin rights</Description><Type>Keyword</Type></Query>
<Query><ID>2132359</ID><Parent_ID>124</Parent_ID><Name>advanced encryption standard</Name><Description>advanced encryption standard</Description><Type>Keyword</Type></Query>
<Query><ID>2132648</ID><Parent_ID>141</Parent_ID><Name>advanced message queuing protocol</Name><Description>advanced message queuing protocol</Description><Type>Keyword</Type></Query>
<Query><ID>2132924</ID><Parent_ID>255</Parent_ID><Name>advanced persistent threat</Name><Description>advanced persistent threat</Description><Type>Keyword</Type></Query>
<Query><ID>2133275</ID><Parent_ID>180</Parent_ID><Name>advanced threat actor</Name><Description>Theat actor behind APT</Description><Type>Keyword</Type></Query>
<Query><ID>2133304</ID><Parent_ID>184</Parent_ID><Name>advanced threat protection</Name><Description>A common commercial word used for security tools (against APT etc.)</Description><Type>Keyword</Type></Query>
<Query><ID>2133311</ID><Parent_ID>330</Parent_ID><Name>advanced threat report</Name><Description>A common commercial word used for reports about APTs etc.</Description><Type>Keyword</Type></Query>
<Query><ID>2145296</ID><Parent_ID>184</Parent_ID><Name>air-gapped</Name><Description>Should be changed to air-gapping</Description><Type>Keyword</Type></Query>
<Query><ID>2147231</ID><Parent_ID>36</Parent_ID><Name>akamai</Name><Description>Cloud security provider: https://en.wikipedia.org/wiki/Akamai_Technologies</Description><Type>Keyword</Type></Query>
<Query><ID>2171466</ID><Parent_ID>78</Parent_ID><Name>ancient font driver code</Name><Description>ancient font driver code</Description><Type>Keyword</Type></Query>
<Query><ID>2172616</ID><Parent_ID>216</Parent_ID><Name>android banking malware</Name><Description>android banking malware</Description><Type>Keyword</Type></Query>
<Query><ID>2172630</ID><Parent_ID>216</Parent_ID><Name>android banking trojan</Name><Description>android banking trojan</Description><Type>Keyword</Type></Query>
<Query><ID>2173053</ID><Parent_ID>331</Parent_ID><Name>android hacking</Name><Description>android hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2173260</ID><Parent_ID>176</Parent_ID><Name>android malware analysis</Name><Description>android malware analysis</Description><Type>Keyword</Type></Query>
<Query><ID>2173295</ID><Parent_ID>176</Parent_ID><Name>android malware detection</Name><Description>android malware detection</Description><Type>Keyword</Type></Query>
<Query><ID>2173719</ID><Parent_ID>216</Parent_ID><Name>android ransomware</Name><Description>android ransomware</Description><Type>Keyword</Type></Query>
<Query><ID>2173775</ID><Parent_ID>176</Parent_ID><Name>android rat</Name><Description>Android RAT</Description><Type>Keyword</Type></Query>
<Query><ID>2173881</ID><Parent_ID>176</Parent_ID><Name>android security</Name><Description>android security</Description><Type>Keyword</Type></Query>
<Query><ID>2174150</ID><Parent_ID>216</Parent_ID><Name>android trojan</Name><Description>android trojan</Description><Type>Keyword</Type></Query>
<Query><ID>2175091</ID><Parent_ID>219</Parent_ID><Name>angler exploit kit</Name><Description>angler exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>2177466</ID><Parent_ID>4</Parent_ID><Name>annual computer security application conference</Name><Description>annual computer security application conference</Description><Type>Keyword</Type></Query>
<Query><ID>2177692</ID><Parent_ID>4</Parent_ID><Name>annual international cryptology conference</Name><Description>annual international cryptology conference</Description><Type>Keyword</Type></Query>
<Query><ID>2178061</ID><Parent_ID>36</Parent_ID><Name>anomali</Name><Description>Cyber security company: https://www.anomali.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2178234</ID><Parent_ID>487</Parent_ID><Name>anomaly detection approach</Name><Description>anomaly detection approach</Description><Type>Keyword</Type></Query>
<Query><ID>2178254</ID><Parent_ID>487</Parent_ID><Name>anomaly detection method</Name><Description>anomaly detection method</Description><Type>Keyword</Type></Query>
<Query><ID>2178276</ID><Parent_ID>487</Parent_ID><Name>anomaly detection system</Name><Description>anomaly detection system</Description><Type>Keyword</Type></Query>
<Query><ID>2178655</ID><Parent_ID>223</Parent_ID><Name>anonghost</Name><Description>Hacker group: https://www.adl.org/resources/profiles/anonghost-team</Description><Type>Keyword</Type></Query>
<Query><ID>2178925</ID><Parent_ID>224</Parent_ID><Name>anons</Name><Description>A short name of Anonymous Group</Description><Type>Keyword</Type></Query>
<Query><ID>2179269</ID><Parent_ID>441</Parent_ID><Name>anonymization algorithm</Name><Description>Privacy protection measure</Description><Type>Keyword</Type></Query>
<Query><ID>2179450</ID><Parent_ID>441</Parent_ID><Name>anonymization technique</Name><Description>anonymization technique</Description><Type>Keyword</Type></Query>
<Query><ID>2179709</ID><Parent_ID>441</Parent_ID><Name>anonymized data</Name><Description>anonymized data</Description><Type>Keyword</Type></Query>
<Query><ID>2179804</ID><Parent_ID>441</Parent_ID><Name>anonymizing</Name><Description>Better use &quot;anonymization&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>2180684</ID><Parent_ID>452</Parent_ID><Name>anonymous email</Name><Description>anonymous email</Description><Type>Keyword</Type></Query>
<Query><ID>2180698</ID><Parent_ID>452</Parent_ID><Name>anonymous email address</Name><Description>anonymous email address</Description><Type>Keyword</Type></Query>
<Query><ID>2181222</ID><Parent_ID>39</Parent_ID><Name>anonymous hack</Name><Description>Hacker group: https://en.wikipedia.org/wiki/Anonymous_(group)</Description><Type>Keyword</Type></Query>
<Query><ID>2181435</ID><Parent_ID>21</Parent_ID><Name>anonymous hacker jeremy hammond</Name><Description>person name</Description><Type>Keyword</Type></Query>
<Query><ID>2182528</ID><Parent_ID>452</Parent_ID><Name>anonymous proxy</Name><Description>anonymous proxy</Description><Type>Keyword</Type></Query>
<Query><ID>2185388</ID><Parent_ID>115</Parent_ID><Name>anti virus</Name><Description>anti virus</Description><Type>Keyword</Type></Query>
<Query><ID>2185971</ID><Parent_ID>43</Parent_ID><Name>anti-debugging</Name><Description>anti-debugging</Description><Type>Keyword</Type></Query>
<Query><ID>2187534</ID><Parent_ID>43</Parent_ID><Name>anti-vm</Name><Description>anti-vm</Description><Type>Keyword</Type></Query>
<Query><ID>2188294</ID><Parent_ID>240</Parent_ID><Name>antisec</Name><Description>antisec</Description><Type>Keyword</Type></Query>
<Query><ID>2188525</ID><Parent_ID>115</Parent_ID><Name>antivirus</Name><Description>antivirus</Description><Type>Keyword</Type></Query>
<Query><ID>2188860</ID><Parent_ID>115</Parent_ID><Name>antivirus program</Name><Description>antivirus program</Description><Type>Keyword</Type></Query>
<Query><ID>2188913</ID><Parent_ID>115</Parent_ID><Name>antivirus software</Name><Description>program</Description><Type>Keyword</Type></Query>
<Query><ID>2190017</ID><Parent_ID>81</Parent_ID><Name>apache strut flaw</Name><Description>apache strut flaw</Description><Type>Keyword</Type></Query>
<Query><ID>2190049</ID><Parent_ID>81</Parent_ID><Name>apache strut vulnerability</Name><Description>apache strut vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2193053</ID><Parent_ID>349</Parent_ID><Name>app hacking</Name><Description>app hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2193485</ID><Parent_ID>176</Parent_ID><Name>app security</Name><Description>app security</Description><Type>Keyword</Type></Query>
<Query><ID>2196787</ID><Parent_ID>41</Parent_ID><Name>application attack</Name><Description>application attack</Description><Type>Keyword</Type></Query>
<Query><ID>2197190</ID><Parent_ID>89</Parent_ID><Name>application firewall</Name><Description>application firewall</Description><Type>Keyword</Type></Query>
<Query><ID>2197814</ID><Parent_ID>241</Parent_ID><Name>application security</Name><Description>application security</Description><Type>Keyword</Type></Query>
<Query><ID>2197898</ID><Parent_ID>241</Parent_ID><Name>application security test</Name><Description>application security test</Description><Type>Keyword</Type></Query>
<Query><ID>2198223</ID><Parent_ID>89</Parent_ID><Name>application whitelisting</Name><Description>application whitelisting</Description><Type>Keyword</Type></Query>
<Query><ID>2202139</ID><Parent_ID>4</Parent_ID><Name>appsec</Name><Description>Application security</Description><Type>Keyword</Type></Query>
<Query><ID>2202911</ID><Parent_ID>180</Parent_ID><Name>apt actor</Name><Description>apt actor</Description><Type>Keyword</Type></Query>
<Query><ID>2202962</ID><Parent_ID>39</Parent_ID><Name>apt attack</Name><Description>apt attack</Description><Type>Keyword</Type></Query>
<Query><ID>2203428</ID><Parent_ID>43</Parent_ID><Name>apt malware</Name><Description>apt malware</Description><Type>Keyword</Type></Query>
<Query><ID>2205239</ID><Parent_ID>41</Parent_ID><Name>arbitrary code execution</Name><Description>arbitrary code execution</Description><Type>Keyword</Type></Query>
<Query><ID>2207027</ID><Parent_ID>36</Parent_ID><Name>ardamax</Name><Description>Keylogger: https://www.ardamax.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2213824</ID><Parent_ID>240</Parent_ID><Name>ashley madison hack</Name><Description>Security incident</Description><Type>Keyword</Type></Query>
<Query><ID>2215397</ID><Parent_ID>27</Parent_ID><Name>assange</Name><Description>Julian Assange, Wikileaks</Description><Type>Keyword</Type></Query>
<Query><ID>2222300</ID><Parent_ID>43</Parent_ID><Name>atm malware</Name><Description>atm malware</Description><Type>Keyword</Type></Query>
<Query><ID>2222345</ID><Parent_ID>186</Parent_ID><Name>atm pin</Name><Description>atm pin</Description><Type>Keyword</Type></Query>
<Query><ID>2222391</ID><Parent_ID>256</Parent_ID><Name>atm skimmer</Name><Description>atm skimmer</Description><Type>Keyword</Type></Query>
<Query><ID>2222393</ID><Parent_ID>256</Parent_ID><Name>atm skimmer diebold</Name><Description>atm skimmer diebold</Description><Type>Keyword</Type></Query>
<Query><ID>2222394</ID><Parent_ID>256</Parent_ID><Name>atm skimmer diebold opteva</Name><Description>atm skimmer diebold opteva</Description><Type>Keyword</Type></Query>
<Query><ID>2222398</ID><Parent_ID>256</Parent_ID><Name>atm skimmer ncr</Name><Description>atm skimmer ncr</Description><Type>Keyword</Type></Query>
<Query><ID>2222409</ID><Parent_ID>256</Parent_ID><Name>atm skimmer wincor</Name><Description>atm skimmer wincor</Description><Type>Keyword</Type></Query>
<Query><ID>2222410</ID><Parent_ID>256</Parent_ID><Name>atm skimmer wincor nixdorf</Name><Description>atm skimmer wincor nixdorf</Description><Type>Keyword</Type></Query>
<Query><ID>2224630</ID><Parent_ID>257</Parent_ID><Name>attack graph</Name><Description>attack graph</Description><Type>Keyword</Type></Query>
<Query><ID>2224670</ID><Parent_ID>257</Parent_ID><Name>attack graph generation</Name><Description>attack graph generation</Description><Type>Keyword</Type></Query>
<Query><ID>2225513</ID><Parent_ID>257</Parent_ID><Name>attack model</Name><Description>attack model</Description><Type>Keyword</Type></Query>
<Query><ID>2225757</ID><Parent_ID>257</Parent_ID><Name>attack path</Name><Description>attack path</Description><Type>Keyword</Type></Query>
<Query><ID>2225769</ID><Parent_ID>257</Parent_ID><Name>attack pattern</Name><Description>attack pattern</Description><Type>Keyword</Type></Query>
<Query><ID>2226228</ID><Parent_ID>257</Parent_ID><Name>attack scenario</Name><Description>attack scenario</Description><Type>Keyword</Type></Query>
<Query><ID>2226585</ID><Parent_ID>257</Parent_ID><Name>attack surface</Name><Description>attack surface</Description><Type>Keyword</Type></Query>
<Query><ID>2226967</ID><Parent_ID>257</Parent_ID><Name>attack tree</Name><Description>attack tree</Description><Type>Keyword</Type></Query>
<Query><ID>2227112</ID><Parent_ID>257</Parent_ID><Name>attack vector</Name><Description>attack vector</Description><Type>Keyword</Type></Query>
<Query><ID>2228322</ID><Parent_ID>223</Parent_ID><Name>attackers</Name><Description>attackers</Description><Type>Keyword</Type></Query>
<Query><ID>2232180</ID><Parent_ID>267</Parent_ID><Name>audit log</Name><Description>audit log</Description><Type>Keyword</Type></Query>
<Query><ID>2237179</ID><Parent_ID>74</Parent_ID><Name>authentication bypass vulnerability</Name><Description>authentication bypass vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2237229</ID><Parent_ID>91</Parent_ID><Name>authentication credentials</Name><Description>authentication credentials</Description><Type>Keyword</Type></Query>
<Query><ID>2237465</ID><Parent_ID>141</Parent_ID><Name>authentication protocol</Name><Description>authentication protocol</Description><Type>Keyword</Type></Query>
<Query><ID>2240689</ID><Parent_ID>310</Parent_ID><Name>automate dynamic malware analysis</Name><Description>automate dynamic malware analysis</Description><Type>Keyword</Type></Query>
<Query><ID>2241511</ID><Parent_ID>310</Parent_ID><Name>automated malware analysis</Name><Description>automated malware analysis</Description><Type>Keyword</Type></Query>
<Query><ID>2241721</ID><Parent_ID>178</Parent_ID><Name>automated trust negotiation</Name><Description>automated trust negotiation</Description><Type>Keyword</Type></Query>
<Query><ID>2243954</ID><Parent_ID>243</Parent_ID><Name>autorun</Name><Description>General term, but connection with malwsare is strong enough to be relevant.</Description><Type>Keyword</Type></Query>
<Query><ID>2244604</ID><Parent_ID>36</Parent_ID><Name>avast</Name><Description>Avast antivirus</Description><Type>Keyword</Type></Query>
<Query><ID>2246058</ID><Parent_ID>36</Parent_ID><Name>avira</Name><Description>Avira antivirus</Description><Type>Keyword</Type></Query>
<Query><ID>2253816</ID><Parent_ID>257</Parent_ID><Name>backdoors</Name><Description>backdoors</Description><Type>Keyword</Type></Query>
<Query><ID>2254018</ID><Parent_ID>257</Parent_ID><Name>background knowledge attack</Name><Description>background knowledge attack</Description><Type>Keyword</Type></Query>
<Query><ID>2256495</ID><Parent_ID>255</Parent_ID><Name>badbios</Name><Description>APT: https://en.wikipedia.org/wiki/BadBIOS</Description><Type>Keyword</Type></Query>
<Query><ID>2257156</ID><Parent_ID>391</Parent_ID><Name>badrabbit</Name><Description>Bad Rabbit: https://en.wikipedia.org/wiki/Ransomware#Bad_Rabbit</Description><Type>Keyword</Type></Query>
<Query><ID>2262019</ID><Parent_ID>43</Parent_ID><Name>banking malware</Name><Description>banking malware</Description><Type>Keyword</Type></Query>
<Query><ID>2263919</ID><Parent_ID>26</Parent_ID><Name>barrett brown</Name><Description>https://en.wikipedia.org/wiki/Barrett_Brown</Description><Type>Keyword</Type></Query>
<Query><ID>2280747</ID><Parent_ID>4</Parent_ID><Name>bhasia</Name><Description>Black Hat Asia (note that this can have other meanings)</Description><Type>Keyword</Type></Query>
<Query><ID>2280925</ID><Parent_ID>4</Parent_ID><Name>bheu</Name><Description>Security event: https://twitter.com/hashtag/BHEU?src=hash&amp;lang=en-gb</Description><Type>Keyword</Type></Query>
<Query><ID>2281164</ID><Parent_ID>4</Parent_ID><Name>bhusa</Name><Description>Blackhat US</Description><Type>Keyword</Type></Query>
<Query><ID>2289256</ID><Parent_ID>36</Parent_ID><Name>bitdefender</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Bitdefender</Description><Type>Keyword</Type></Query>
<Query><ID>2289428</ID><Parent_ID>269</Parent_ID><Name>bitlocker</Name><Description>bitlocker</Description><Type>Keyword</Type></Query>
<Query><ID>2291261</ID><Parent_ID>213</Parent_ID><Name>black hat arsenal</Name><Description>Name of a team: Black Hat Arsenal team</Description><Type>Keyword</Type></Query>
<Query><ID>2291323</ID><Parent_ID>4</Parent_ID><Name>black hat europe</Name><Description>A conference</Description><Type>Keyword</Type></Query>
<Query><ID>2291472</ID><Parent_ID>4</Parent_ID><Name>black hat usa</Name><Description>black hat usa</Description><Type>Keyword</Type></Query>
<Query><ID>2292432</ID><Parent_ID>43</Parent_ID><Name>blackenergy</Name><Description>Malware: https://en.wikipedia.org/wiki/BlackEnergy</Description><Type>Keyword</Type></Query>
<Query><ID>2292540</ID><Parent_ID>36</Parent_ID><Name>blackhat</Name><Description>blackhat</Description><Type>Keyword</Type></Query>
<Query><ID>2293037</ID><Parent_ID>4</Parent_ID><Name>blackhat usa</Name><Description>blackhat usa</Description><Type>Keyword</Type></Query>
<Query><ID>2293238</ID><Parent_ID>4</Parent_ID><Name>blackhatusa</Name><Description>blackhatusa</Description><Type>Keyword</Type></Query>
<Query><ID>2293292</ID><Parent_ID>184</Parent_ID><Name>blackhole</Name><Description>Security mechanism: https://en.wikipedia.org/wiki/Black_hole_(networking)</Description><Type>Keyword</Type></Query>
<Query><ID>2293308</ID><Parent_ID>219</Parent_ID><Name>blackhole exploit kit</Name><Description>blackhole exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>2295678</ID><Parent_ID>50</Parent_ID><Name>blind sql injection</Name><Description>blind sql injection</Description><Type>Keyword</Type></Query>
<Query><ID>2299839</ID><Parent_ID>11</Parent_ID><Name>bluehat</Name><Description>https://en.wikipedia.org/wiki/BlueHat</Description><Type>Keyword</Type></Query>
<Query><ID>2303678</ID><Parent_ID>18</Parent_ID><Name>boneh</Name><Description>Cyber security researcher Dan Boneh: https://crypto.stanford.edu/~dabo/</Description><Type>Keyword</Type></Query>
<Query><ID>2308535</ID><Parent_ID>184</Parent_ID><Name>botnet takedown</Name><Description>botnet takedown</Description><Type>Keyword</Type></Query>
<Query><ID>2314437</ID><Parent_ID>111</Parent_ID><Name>breach notification</Name><Description>breach notification</Description><Type>Keyword</Type></Query>
<Query><ID>2314448</ID><Parent_ID>111</Parent_ID><Name>breach notification law</Name><Description>breach notification law</Description><Type>Keyword</Type></Query>
<Query><ID>2314464</ID><Parent_ID>111</Parent_ID><Name>breach notification requirement</Name><Description>breach notification requirement</Description><Type>Keyword</Type></Query>
<Query><ID>2314616</ID><Parent_ID>442</Parent_ID><Name>breach report</Name><Description>breach report</Description><Type>Keyword</Type></Query>
<Query><ID>2314649</ID><Parent_ID>342</Parent_ID><Name>breach response</Name><Description>breach response</Description><Type>Keyword</Type></Query>
<Query><ID>2314666</ID><Parent_ID>342</Parent_ID><Name>breach response plan</Name><Description>breach response plan</Description><Type>Keyword</Type></Query>
<Query><ID>2317046</ID><Parent_ID>26</Parent_ID><Name>brian krebs</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>2323110</ID><Parent_ID>167</Parent_ID><Name>browser security</Name><Description>browser security</Description><Type>Keyword</Type></Query>
<Query><ID>2323536</ID><Parent_ID>318</Parent_ID><Name>bruce schneier</Name><Description>Person, A figure in cyber security</Description><Type>Keyword</Type></Query>
<Query><ID>2323589</ID><Parent_ID>9</Parent_ID><Name>brucon</Name><Description>Security event: https://www.brucon.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2324074</ID><Parent_ID>53</Parent_ID><Name>brute force attack</Name><Description>brute force attack</Description><Type>Keyword</Type></Query>
<Query><ID>2324202</ID><Parent_ID>53</Parent_ID><Name>brute-force attack</Name><Description>brute-force attack</Description><Type>Keyword</Type></Query>
<Query><ID>2324291</ID><Parent_ID>53</Parent_ID><Name>bruteforce</Name><Description>Brute-force attack</Description><Type>Keyword</Type></Query>
<Query><ID>2324927</ID><Parent_ID>359</Parent_ID><Name>bsideslv</Name><Description>https://www.bsideslv.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2325175</ID><Parent_ID>359</Parent_ID><Name>bsidessf</Name><Description>https://bsidessf.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2325595</ID><Parent_ID>248</Parent_ID><Name>btc-e</Name><Description>https://en.wikipedia.org/wiki/BTC-e</Description><Type>Keyword</Type></Query>
<Query><ID>2326864</ID><Parent_ID>268</Parent_ID><Name>buffaloseller888</Name><Description>Cyber criminal email account</Description><Type>Keyword</Type></Query>
<Query><ID>2326940</ID><Parent_ID>319</Parent_ID><Name>buffer overflow attack</Name><Description>buffer overflow attack</Description><Type>Keyword</Type></Query>
<Query><ID>2327005</ID><Parent_ID>319</Parent_ID><Name>buffer overflow vulnerability</Name><Description>buffer overflow vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2327248</ID><Parent_ID>320</Parent_ID><Name>bug bounty hunter</Name><Description>bug bounty hunter</Description><Type>Keyword</Type></Query>
<Query><ID>2327290</ID><Parent_ID>320</Parent_ID><Name>bug bounty program</Name><Description>General term, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>2327601</ID><Parent_ID>320</Parent_ID><Name>bug hunter</Name><Description>General term, connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>2327614</ID><Parent_ID>320</Parent_ID><Name>bug hunting</Name><Description>bug hunting</Description><Type>Keyword</Type></Query>
<Query><ID>2327987</ID><Parent_ID>320</Parent_ID><Name>bugbounty</Name><Description>General term, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>2332604</ID><Parent_ID>365</Parent_ID><Name>burp suite</Name><Description>Security software: https://en.wikipedia.org/wiki/Burp_Suite</Description><Type>Keyword</Type></Query>
<Query><ID>2332625</ID><Parent_ID>365</Parent_ID><Name>burp suite pro</Name><Description>Cyber security tool: https://portswigger.net/burp</Description><Type>Keyword</Type></Query>
<Query><ID>2333500</ID><Parent_ID>361</Parent_ID><Name>business continuity management</Name><Description>Part of ISM</Description><Type>Keyword</Type></Query>
<Query><ID>2333502</ID><Parent_ID>361</Parent_ID><Name>business continuity plan</Name><Description>Part of ISM</Description><Type>Keyword</Type></Query>
<Query><ID>2333691</ID><Parent_ID>363</Parent_ID><Name>business email compromise campaign</Name><Description>business email compromise campaign</Description><Type>Keyword</Type></Query>
<Query><ID>2369159</ID><Parent_ID>184</Parent_ID><Name>bypass application whitelisting</Name><Description>bypass application whitelisting</Description><Type>Keyword</Type></Query>
<Query><ID>2370042</ID><Parent_ID>81</Parent_ID><Name>bypass vulnerability</Name><Description>bypass vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2386060</ID><Parent_ID>75</Parent_ID><Name>capec</Name><Description>https://capec.mitre.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2387493</ID><Parent_ID>450</Parent_ID><Name>captcha</Name><Description>captcha</Description><Type>Keyword</Type></Query>
<Query><ID>2388535</ID><Parent_ID>168</Parent_ID><Name>car hacking</Name><Description>car hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2389088</ID><Parent_ID>255</Parent_ID><Name>carbanak</Name><Description>APT: https://en.wikipedia.org/wiki/Carbanak</Description><Type>Keyword</Type></Query>
<Query><ID>2389152</ID><Parent_ID>46</Parent_ID><Name>carberp</Name><Description>Malware: https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/carberp</Description><Type>Keyword</Type></Query>
<Query><ID>2389434</ID><Parent_ID>378</Parent_ID><Name>card breach</Name><Description>card breach</Description><Type>Keyword</Type></Query>
<Query><ID>2390203</ID><Parent_ID>378</Parent_ID><Name>carder007</Name><Description>Cyber criminal website - https://carder007.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2390336</ID><Parent_ID>378</Parent_ID><Name>carding</Name><Description>Crime: https://en.wikipedia.org/wiki/Carding_(fraud)</Description><Type>Keyword</Type></Query>
<Query><ID>2398056</ID><Parent_ID>364</Parent_ID><Name>ccleaner</Name><Description>security tool: https://en.wikipedia.org/wiki/Ccleaner</Description><Type>Keyword</Type></Query>
<Query><ID>2398178</ID><Parent_ID>248</Parent_ID><Name>ccn</Name><Description>Cryptocurrency news portal: https://www.ccn.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2398398</ID><Parent_ID>376</Parent_ID><Name>ccv</Name><Description>Card Code Verification</Description><Type>Keyword</Type></Query>
<Query><ID>2400881</ID><Parent_ID>35</Parent_ID><Name>cellebrite</Name><Description>Cellebrite Mobile Synchronization is an Israeli company that manufactures data extraction, transfer and analysis devices for cellular phones and mobile devices. The company is a subsidiary of Japan&#39;s Sun Corporation.</Description><Type>Keyword</Type></Query>
<Query><ID>2404984</ID><Parent_ID>392</Parent_ID><Name>cerber ransomware</Name><Description>cerber ransomware</Description><Type>Keyword</Type></Query>
<Query><ID>2406000</ID><Parent_ID>431</Parent_ID><Name>certificate authority</Name><Description>certificate authority</Description><Type>Keyword</Type></Query>
<Query><ID>2406212</ID><Parent_ID>431</Parent_ID><Name>certificate revocation list</Name><Description>certificate revocation list</Description><Type>Keyword</Type></Query>
<Query><ID>2406264</ID><Parent_ID>431</Parent_ID><Name>certificate transparency</Name><Description>certificate transparency</Description><Type>Keyword</Type></Query>
<Query><ID>2406619</ID><Parent_ID>369</Parent_ID><Name>certified ethical hacker</Name><Description>CEH</Description><Type>Keyword</Type></Query>
<Query><ID>2407284</ID><Parent_ID>276</Parent_ID><Name>cfaa</Name><Description>Computer Fraud and Abuse Act</Description><Type>Keyword</Type></Query>
<Query><ID>2408052</ID><Parent_ID>257</Parent_ID><Name>chain attack</Name><Description>chain attack</Description><Type>Keyword</Type></Query>
<Query><ID>2411608</ID><Parent_ID>223</Parent_ID><Name>chaos computer club</Name><Description>The Chaos Computer Club is Europe&#39;s largest association of hackers with 7700 registered members.</Description><Type>Keyword</Type></Query>
<Query><ID>2414762</ID><Parent_ID>18</Parent_ID><Name>chaum</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>2423239</ID><Parent_ID>27</Parent_ID><Name>chelsea manning</Name><Description>A person loosely related to cyber security: https://en.wikipedia.org/wiki/Chelsea_Manning</Description><Type>Keyword</Type></Query>
<Query><ID>2424867</ID><Parent_ID>12</Parent_ID><Name>chief privacy officer</Name><Description>chief privacy officer</Description><Type>Keyword</Type></Query>
<Query><ID>2424941</ID><Parent_ID>12</Parent_ID><Name>chief security officer</Name><Description>chief security officer</Description><Type>Keyword</Type></Query>
<Query><ID>2427682</ID><Parent_ID>401</Parent_ID><Name>chinese apt</Name><Description>chinese apt</Description><Type>Keyword</Type></Query>
<Query><ID>2429245</ID><Parent_ID>230</Parent_ID><Name>chip pos ingenico</Name><Description>PoS product</Description><Type>Keyword</Type></Query>
<Query><ID>2433029</ID><Parent_ID>12</Parent_ID><Name>chuvakin</Name><Description>Cyber security expert: https://en.wikipedia.org/wiki/Anton_Chuvakin</Description><Type>Keyword</Type></Query>
<Query><ID>2433562</ID><Parent_ID>367</Parent_ID><Name>cia hacking tool</Name><Description>cia hacking tool</Description><Type>Keyword</Type></Query>
<Query><ID>2437360</ID><Parent_ID>120</Parent_ID><Name>ciphertext</Name><Description>ciphertext</Description><Type>Keyword</Type></Query>
<Query><ID>2438594</ID><Parent_ID>287</Parent_ID><Name>cis critical security controls</Name><Description>The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today&#39;s most pervasive and dangerous attacks.</Description><Type>Keyword</Type></Query>
<Query><ID>2438623</ID><Parent_ID>12</Parent_ID><Name>cisa</Name><Description>Certified Information Systems Auditor</Description><Type>Keyword</Type></Query>
<Query><ID>2438708</ID><Parent_ID>436</Parent_ID><Name>cisco asa</Name><Description>Cisco ASA. (Cisco Adaptive Security Appliance) A family of network security devices from Cisco that provide firewall, intrusion prevention (IPS) and virtual private network (VPN) capabilities.</Description><Type>Keyword</Type></Query>
<Query><ID>2439479</ID><Parent_ID>12</Parent_ID><Name>ciso</Name><Description>A chief information security officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.</Description><Type>Keyword</Type></Query>
<Query><ID>2439744</ID><Parent_ID>579</Parent_ID><Name>cispa</Name><Description>Cyber Intelligence Sharing and Protection Act: https://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act</Description><Type>Keyword</Type></Query>
<Query><ID>2439847</ID><Parent_ID>12</Parent_ID><Name>cissp</Name><Description>Certified Information Systems Security Professional: https://www.isc2.org/Certifications/CISSP</Description><Type>Keyword</Type></Query>
<Query><ID>2440423</ID><Parent_ID>31</Parent_ID><Name>citizen lab</Name><Description>Security related body: https://en.wikipedia.org/wiki/Citizen_Lab</Description><Type>Keyword</Type></Query>
<Query><ID>2447044</ID><Parent_ID>120</Parent_ID><Name>cleartext</Name><Description>In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. Cleartext usually refers to data that is transmitted or stored unencrypted.</Description><Type>Keyword</Type></Query>
<Query><ID>2452902</ID><Parent_ID>169</Parent_ID><Name>cloud access security broker</Name><Description>https://en.wikipedia.org/wiki/Cloud_access_security_broker</Description><Type>Keyword</Type></Query>
<Query><ID>2453542</ID><Parent_ID>169</Parent_ID><Name>cloud computing security</Name><Description>cloud computing security</Description><Type>Keyword</Type></Query>
<Query><ID>2453565</ID><Parent_ID>10</Parent_ID><Name>cloud computing security workshop</Name><Description>cloud computing security workshop</Description><Type>Keyword</Type></Query>
<Query><ID>2455153</ID><Parent_ID>37</Parent_ID><Name>cloud security alliance</Name><Description>NGO: https://en.wikipedia.org/wiki/Cloud_Security_Alliance</Description><Type>Keyword</Type></Query>
<Query><ID>2456676</ID><Parent_ID>36</Parent_ID><Name>cloudflare</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Cloudflare</Description><Type>Keyword</Type></Query>
<Query><ID>2460109</ID><Parent_ID>364</Parent_ID><Name>cobalt strike</Name><Description>Cyber security software: https://www.cobaltstrike.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2465304</ID><Parent_ID>371</Parent_ID><Name>code execution exploit</Name><Description>code execution exploit</Description><Type>Keyword</Type></Query>
<Query><ID>2465309</ID><Parent_ID>371</Parent_ID><Name>code execution flaw</Name><Description>code execution flaw</Description><Type>Keyword</Type></Query>
<Query><ID>2465336</ID><Parent_ID>371</Parent_ID><Name>code execution vuln</Name><Description>vulnerability?</Description><Type>Keyword</Type></Query>
<Query><ID>2465591</ID><Parent_ID>329</Parent_ID><Name>code injection</Name><Description>code injection</Description><Type>Keyword</Type></Query>
<Query><ID>2465615</ID><Parent_ID>329</Parent_ID><Name>code injection technique</Name><Description>code injection technique</Description><Type>Keyword</Type></Query>
<Query><ID>2466230</ID><Parent_ID>405</Parent_ID><Name>code signing</Name><Description>code signing</Description><Type>Keyword</Type></Query>
<Query><ID>2469425</ID><Parent_ID>114</Parent_ID><Name>collaborative intrusion detection</Name><Description>collaborative intrusion detection</Description><Type>Keyword</Type></Query>
<Query><ID>2471047</ID><Parent_ID>171</Parent_ID><Name>collective intelligence framework</Name><Description>Common term used for intelligence collection</Description><Type>Keyword</Type></Query>
<Query><ID>2475407</ID><Parent_ID>329</Parent_ID><Name>command injection</Name><Description>command injection</Description><Type>Keyword</Type></Query>
<Query><ID>2475425</ID><Parent_ID>329</Parent_ID><Name>command injection vulnerability</Name><Description>command injection vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2478135</ID><Parent_ID>210</Parent_ID><Name>common attack pattern enumeration</Name><Description>common attack pattern enumeration</Description><Type>Keyword</Type></Query>
<Query><ID>2479614</ID><Parent_ID>77</Parent_ID><Name>common weakness enumeration</Name><Description>common weakness enumeration</Description><Type>Keyword</Type></Query>
<Query><ID>2480958</ID><Parent_ID>167</Parent_ID><Name>communications security</Name><Description>communications security</Description><Type>Keyword</Type></Query>
<Query><ID>2482558</ID><Parent_ID>36</Parent_ID><Name>comodo</Name><Description>Security tool: https://en.wikipedia.org/wiki/Comodo_Internet_Security</Description><Type>Keyword</Type></Query>
<Query><ID>2482603</ID><Parent_ID>115</Parent_ID><Name>comodo internet security</Name><Description>comodo internet security</Description><Type>Keyword</Type></Query>
<Query><ID>2490633</ID><Parent_ID>130</Parent_ID><Name>composite degree residuosity class</Name><Description>composite degree residuosity class</Description><Type>Keyword</Type></Query>
<Query><ID>2494564</ID><Parent_ID>343</Parent_ID><Name>computer emergency response team</Name><Description>computer emergency response team</Description><Type>Keyword</Type></Query>
<Query><ID>2494992</ID><Parent_ID>287</Parent_ID><Name>computer network defense</Name><Description>computer network defense</Description><Type>Keyword</Type></Query>
<Query><ID>2495121</ID><Parent_ID>409</Parent_ID><Name>computer program security flaw</Name><Description>computer program security flaw</Description><Type>Keyword</Type></Query>
<Query><ID>2495379</ID><Parent_ID>364</Parent_ID><Name>computer security application</Name><Description>computer security application</Description><Type>Keyword</Type></Query>
<Query><ID>2495381</ID><Parent_ID>417</Parent_ID><Name>computer security application conference</Name><Description>computer security application conference</Description><Type>Keyword</Type></Query>
<Query><ID>2495401</ID><Parent_ID>4</Parent_ID><Name>computer security conference</Name><Description>Existing subclass</Description><Type>Keyword</Type></Query>
<Query><ID>2495450</ID><Parent_ID>10</Parent_ID><Name>computer security foundations workshop</Name><Description>computer security foundations workshop</Description><Type>Keyword</Type></Query>
<Query><ID>2495460</ID><Parent_ID>240</Parent_ID><Name>computer security incident</Name><Description>computer security incident</Description><Type>Keyword</Type></Query>
<Query><ID>2495465</ID><Parent_ID>346</Parent_ID><Name>computer security incident handling</Name><Description>computer security incident handling</Description><Type>Keyword</Type></Query>
<Query><ID>2495471</ID><Parent_ID>343</Parent_ID><Name>computer security incident response team</Name><Description>computer security incident response team</Description><Type>Keyword</Type></Query>
<Query><ID>2495765</ID><Parent_ID>1</Parent_ID><Name>computer system security</Name><Description>computer system security</Description><Type>Keyword</Type></Query>
<Query><ID>2501314</ID><Parent_ID>45</Parent_ID><Name>conficker</Name><Description>Malware: https://en.wikipedia.org/wiki/Conficker</Description><Type>Keyword</Type></Query>
<Query><ID>2519427</ID><Parent_ID>481</Parent_ID><Name>control flow guard</Name><Description>control flow guard</Description><Type>Keyword</Type></Query>
<Query><ID>2539004</ID><Parent_ID>200</Parent_ID><Name>covert channel</Name><Description>In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.</Description><Type>Keyword</Type></Query>
<Query><ID>2546864</ID><Parent_ID>378</Parent_ID><Name>credit card breach</Name><Description>credit card breach</Description><Type>Keyword</Type></Query>
<Query><ID>2546901</ID><Parent_ID>376</Parent_ID><Name>credit card cvv</Name><Description>Better change to &quot;CVV&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>2546905</ID><Parent_ID>376</Parent_ID><Name>credit card data</Name><Description>&quot;Data&quot; being vague</Description><Type>Keyword</Type></Query>
<Query><ID>2546972</ID><Parent_ID>349</Parent_ID><Name>credit card hack</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>2546974</ID><Parent_ID>352</Parent_ID><Name>credit card hacker</Name><Description>credit card hacker</Description><Type>Keyword</Type></Query>
<Query><ID>2547078</ID><Parent_ID>378</Parent_ID><Name>credit card skimmer</Name><Description>credit card skimmer</Description><Type>Keyword</Type></Query>
<Query><ID>2547278</ID><Parent_ID>535</Parent_ID><Name>credit monitoring service</Name><Description>Related to anti-fraud</Description><Type>Keyword</Type></Query>
<Query><ID>2548876</ID><Parent_ID>290</Parent_ID><Name>crimeware</Name><Description>crimeware</Description><Type>Keyword</Type></Query>
<Query><ID>2550839</ID><Parent_ID>30</Parent_ID><Name>critical infrastructure cybersecurity</Name><Description>critical infrastructure cybersecurity</Description><Type>Keyword</Type></Query>
<Query><ID>2550911</ID><Parent_ID>30</Parent_ID><Name>critical infrastructure protection</Name><Description>critical infrastructure protection</Description><Type>Keyword</Type></Query>
<Query><ID>2550959</ID><Parent_ID>30</Parent_ID><Name>critical infrastructure sector</Name><Description>critical infrastructure sector</Description><Type>Keyword</Type></Query>
<Query><ID>2550967</ID><Parent_ID>30</Parent_ID><Name>critical infrastructure security</Name><Description>critical infrastructure security</Description><Type>Keyword</Type></Query>
<Query><ID>2551250</ID><Parent_ID>424</Parent_ID><Name>critical patch update</Name><Description>critical patch update</Description><Type>Keyword</Type></Query>
<Query><ID>2551353</ID><Parent_ID>371</Parent_ID><Name>critical remote code execution</Name><Description>critical Remote Code Execution&#160;vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2551987</ID><Parent_ID>329</Parent_ID><Name>crlf</Name><Description>Attack: https://www.owasp.org/index.php/CRLF_Injection</Description><Type>Keyword</Type></Query>
<Query><ID>2552632</ID><Parent_ID>439</Parent_ID><Name>cross site request forgery</Name><Description>cross site request forgery</Description><Type>Keyword</Type></Query>
<Query><ID>2552636</ID><Parent_ID>439</Parent_ID><Name>cross site script</Name><Description>cross site script</Description><Type>Keyword</Type></Query>
<Query><ID>2552637</ID><Parent_ID>439</Parent_ID><Name>cross site script attack</Name><Description>cross site script attack</Description><Type>Keyword</Type></Query>
<Query><ID>2552651</ID><Parent_ID>81</Parent_ID><Name>cross site script vulnerability</Name><Description>cross site script vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2552656</ID><Parent_ID>439</Parent_ID><Name>cross site scripting</Name><Description>cross site scripting</Description><Type>Keyword</Type></Query>
<Query><ID>2553289</ID><Parent_ID>439</Parent_ID><Name>cross-site request forgery</Name><Description>cross-site request forgery</Description><Type>Keyword</Type></Query>
<Query><ID>2553298</ID><Parent_ID>439</Parent_ID><Name>cross-site scripting</Name><Description>cross-site scripting</Description><Type>Keyword</Type></Query>
<Query><ID>2554088</ID><Parent_ID>36</Parent_ID><Name>crowdstrike</Name><Description>https://en.wikipedia.org/wiki/CrowdStrike</Description><Type>Keyword</Type></Query>
<Query><ID>2555276</ID><Parent_ID>43</Parent_ID><Name>crypter</Name><Description>https://www.trendmicro.com/vinfo/us/security/definition/crypter</Description><Type>Keyword</Type></Query>
<Query><ID>2555548</ID><Parent_ID>119</Parent_ID><Name>crypto backdoor</Name><Description>crypto backdoor</Description><Type>Keyword</Type></Query>
<Query><ID>2556073</ID><Parent_ID>129</Parent_ID><Name>crypto key</Name><Description>crypto key</Description><Type>Keyword</Type></Query>
<Query><ID>2556972</ID><Parent_ID>248</Parent_ID><Name>cryptocurrency miner</Name><Description>cryptocurrency miner</Description><Type>Keyword</Type></Query>
<Query><ID>2557135</ID><Parent_ID>119</Parent_ID><Name>cryptographic algorithm</Name><Description>cryptographic algorithm</Description><Type>Keyword</Type></Query>
<Query><ID>2557254</ID><Parent_ID>375</Parent_ID><Name>cryptographic hash</Name><Description>cryptographic hash</Description><Type>Keyword</Type></Query>
<Query><ID>2557261</ID><Parent_ID>133</Parent_ID><Name>cryptographic hash function</Name><Description>cryptographic hash function</Description><Type>Keyword</Type></Query>
<Query><ID>2557283</ID><Parent_ID>129</Parent_ID><Name>cryptographic key</Name><Description>cryptographic key</Description><Type>Keyword</Type></Query>
<Query><ID>2557372</ID><Parent_ID>119</Parent_ID><Name>cryptographic protocol</Name><Description>cryptographic protocol</Description><Type>Keyword</Type></Query>
<Query><ID>2557447</ID><Parent_ID>119</Parent_ID><Name>cryptographic technique</Name><Description>cryptographic technique</Description><Type>Keyword</Type></Query>
<Query><ID>2557884</ID><Parent_ID>119</Parent_ID><Name>cryptology</Name><Description>cryptology</Description><Type>Keyword</Type></Query>
<Query><ID>2557888</ID><Parent_ID>385</Parent_ID><Name>cryptology eprint archive</Name><Description>https://eprint.iacr.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2558658</ID><Parent_ID>343</Parent_ID><Name>csirt</Name><Description>Computer Security Incident Response Team</Description><Type>Keyword</Type></Query>
<Query><ID>2559172</ID><Parent_ID>439</Parent_ID><Name>csrf</Name><Description>Cross-site request forgery</Description><Type>Keyword</Type></Query>
<Query><ID>2559874</ID><Parent_ID>171</Parent_ID><Name>cti</Name><Description>Cyber threat intelligence (it can have many other meanings)</Description><Type>Keyword</Type></Query>
<Query><ID>2561023</ID><Parent_ID>310</Parent_ID><Name>cuckoo sandbox</Name><Description>Cuckoo is a British sitcom that began airing on BBC Three on 25 September 2012</Description><Type>Keyword</Type></Query>
<Query><ID>2562607</ID><Parent_ID>36</Parent_ID><Name>curity</Name><Description>Cyber security company: https://curity.io/</Description><Type>Keyword</Type></Query>
<Query><ID>2571272</ID><Parent_ID>376</Parent_ID><Name>cvv</Name><Description>VV is an anti-fraud security feature to help verify that you are in possession of your credit card.</Description><Type>Keyword</Type></Query>
<Query><ID>2571395</ID><Parent_ID>376</Parent_ID><Name>cvv2</Name><Description>Card Verification Value, CVV or CVV2, is an authentication system established by credit card companies to further efforts toward reducing fraud for internet transactions.</Description><Type>Keyword</Type></Query>
<Query><ID>2571738</ID><Parent_ID>2</Parent_ID><Name>cyber activity</Name><Description>cyber activity</Description><Type>Keyword</Type></Query>
<Query><ID>2571862</ID><Parent_ID>291</Parent_ID><Name>cyber arm race</Name><Description>cyber arm race</Description><Type>Keyword</Type></Query>
<Query><ID>2571874</ID><Parent_ID>60</Parent_ID><Name>cyber army</Name><Description>cyber army</Description><Type>Keyword</Type></Query>
<Query><ID>2572179</ID><Parent_ID>39</Parent_ID><Name>cyber attack target</Name><Description>cyber attack target</Description><Type>Keyword</Type></Query>
<Query><ID>2572227</ID><Parent_ID>181</Parent_ID><Name>cyber attacker</Name><Description>cyber attacker</Description><Type>Keyword</Type></Query>
<Query><ID>2572348</ID><Parent_ID>240</Parent_ID><Name>cyber breach</Name><Description>cyber breach</Description><Type>Keyword</Type></Query>
<Query><ID>2572428</ID><Parent_ID>490</Parent_ID><Name>cyber capability</Name><Description>cyber capability</Description><Type>Keyword</Type></Query>
<Query><ID>2572577</ID><Parent_ID>288</Parent_ID><Name>cyber command</Name><Description>cyber command</Description><Type>Keyword</Type></Query>
<Query><ID>2572675</ID><Parent_ID>291</Parent_ID><Name>cyber conflict</Name><Description>cyber conflict</Description><Type>Keyword</Type></Query>
<Query><ID>2572757</ID><Parent_ID>290</Parent_ID><Name>cyber crime</Name><Description>cyber crime</Description><Type>Keyword</Type></Query>
<Query><ID>2572901</ID><Parent_ID>20</Parent_ID><Name>cyber criminal</Name><Description>cyber criminal</Description><Type>Keyword</Type></Query>
<Query><ID>2573113</ID><Parent_ID>287</Parent_ID><Name>cyber defence</Name><Description>cyber defence</Description><Type>Keyword</Type></Query>
<Query><ID>2573121</ID><Parent_ID>288</Parent_ID><Name>cyber defence centre</Name><Description>cyber defence centre</Description><Type>Keyword</Type></Query>
<Query><ID>2573194</ID><Parent_ID>287</Parent_ID><Name>cyber defense</Name><Description>cyber defense</Description><Type>Keyword</Type></Query>
<Query><ID>2573355</ID><Parent_ID>1</Parent_ID><Name>cyber domain</Name><Description>cyber domain</Description><Type>Keyword</Type></Query>
<Query><ID>2573477</ID><Parent_ID>293</Parent_ID><Name>cyber espionage campaign</Name><Description>cyber espionage campaign</Description><Type>Keyword</Type></Query>
<Query><ID>2573520</ID><Parent_ID>293</Parent_ID><Name>cyber espionage operation</Name><Description>cyber espionage operation</Description><Type>Keyword</Type></Query>
<Query><ID>2573558</ID><Parent_ID>488</Parent_ID><Name>cyber essentials scheme</Name><Description>cyber essentials scheme</Description><Type>Keyword</Type></Query>
<Query><ID>2573578</ID><Parent_ID>2</Parent_ID><Name>cyber event</Name><Description>cyber event</Description><Type>Keyword</Type></Query>
<Query><ID>2573651</ID><Parent_ID>290</Parent_ID><Name>cyber extortion</Name><Description>cyber extortion</Description><Type>Keyword</Type></Query>
<Query><ID>2574005</ID><Parent_ID>240</Parent_ID><Name>cyber incident</Name><Description>cyber incident</Description><Type>Keyword</Type></Query>
<Query><ID>2574062</ID><Parent_ID>342</Parent_ID><Name>cyber incident response plan</Name><Description>cyber incident response plan</Description><Type>Keyword</Type></Query>
<Query><ID>2574224</ID><Parent_ID>170</Parent_ID><Name>cyber insurance market</Name><Description>cyber insurance market</Description><Type>Keyword</Type></Query>
<Query><ID>2574418</ID><Parent_ID>171</Parent_ID><Name>cyber intelligence</Name><Description>cyber intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>2574467</ID><Parent_ID>294</Parent_ID><Name>cyber intelligence share</Name><Description>Change to &quot;cyber intelligence sharing&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>2574592</ID><Parent_ID>257</Parent_ID><Name>cyber kill chain</Name><Description>cyber kill chain</Description><Type>Keyword</Type></Query>
<Query><ID>2574627</ID><Parent_ID>111</Parent_ID><Name>cyber law</Name><Description>cyber law</Description><Type>Keyword</Type></Query>
<Query><ID>2574673</ID><Parent_ID>170</Parent_ID><Name>cyber liability insurance</Name><Description>cyber liability insurance</Description><Type>Keyword</Type></Query>
<Query><ID>2574994</ID><Parent_ID>257</Parent_ID><Name>cyber pearl harbor</Name><Description>cyber pearl harbor</Description><Type>Keyword</Type></Query>
<Query><ID>2575045</ID><Parent_ID>95</Parent_ID><Name>cyber policy</Name><Description>cyber policy</Description><Type>Keyword</Type></Query>
<Query><ID>2575255</ID><Parent_ID>287</Parent_ID><Name>cyber resilience</Name><Description>cyber resilience</Description><Type>Keyword</Type></Query>
<Query><ID>2575316</ID><Parent_ID>150</Parent_ID><Name>cyber risk</Name><Description>cyber risk</Description><Type>Keyword</Type></Query>
<Query><ID>2575327</ID><Parent_ID>162</Parent_ID><Name>cyber risk assessment</Name><Description>cyber risk assessment</Description><Type>Keyword</Type></Query>
<Query><ID>2575385</ID><Parent_ID>170</Parent_ID><Name>cyber risk insurance</Name><Description>cyber risk insurance</Description><Type>Keyword</Type></Query>
<Query><ID>2575404</ID><Parent_ID>164</Parent_ID><Name>cyber risk management</Name><Description>cyber risk management</Description><Type>Keyword</Type></Query>
<Query><ID>2575595</ID><Parent_ID>37</Parent_ID><Name>cyber security alliance</Name><Description>cyber security alliance</Description><Type>Keyword</Type></Query>
<Query><ID>2575656</ID><Parent_ID>447</Parent_ID><Name>cyber security breach</Name><Description>cyber security breach</Description><Type>Keyword</Type></Query>
<Query><ID>2575691</ID><Parent_ID>288</Parent_ID><Name>cyber security center</Name><Description>cyber security center</Description><Type>Keyword</Type></Query>
<Query><ID>2575696</ID><Parent_ID>288</Parent_ID><Name>cyber security centre</Name><Description>cyber security centre</Description><Type>Keyword</Type></Query>
<Query><ID>2575716</ID><Parent_ID>373</Parent_ID><Name>cyber security challenge</Name><Description>cyber security challenge</Description><Type>Keyword</Type></Query>
<Query><ID>2575806</ID><Parent_ID>226</Parent_ID><Name>cyber security data</Name><Description>cyber security data</Description><Type>Keyword</Type></Query>
<Query><ID>2576208</ID><Parent_ID>172</Parent_ID><Name>cyber security practice</Name><Description>cyber security practice</Description><Type>Keyword</Type></Query>
<Query><ID>2576225</ID><Parent_ID>364</Parent_ID><Name>cyber security program</Name><Description>cyber security program</Description><Type>Keyword</Type></Query>
<Query><ID>2576333</ID><Parent_ID>364</Parent_ID><Name>cyber security solution</Name><Description>cyber security solution</Description><Type>Keyword</Type></Query>
<Query><ID>2576354</ID><Parent_ID>146</Parent_ID><Name>cyber security standard</Name><Description>cyber security standard</Description><Type>Keyword</Type></Query>
<Query><ID>2576455</ID><Parent_ID>9</Parent_ID><Name>cyber security training</Name><Description>cyber security training</Description><Type>Keyword</Type></Query>
<Query><ID>2576467</ID><Parent_ID>172</Parent_ID><Name>cyber security unit</Name><Description>cyber security unit</Description><Type>Keyword</Type></Query>
<Query><ID>2576550</ID><Parent_ID>3</Parent_ID><Name>cyber situational awareness</Name><Description>cyber situational awareness</Description><Type>Keyword</Type></Query>
<Query><ID>2576601</ID><Parent_ID>1</Parent_ID><Name>cyber space</Name><Description>cyber space</Description><Type>Keyword</Type></Query>
<Query><ID>2576911</ID><Parent_ID>180</Parent_ID><Name>cyber threat actor</Name><Description>cyber threat actor</Description><Type>Keyword</Type></Query>
<Query><ID>2577006</ID><Parent_ID>82</Parent_ID><Name>cyber threat indicator</Name><Description>cyber threat indicator</Description><Type>Keyword</Type></Query>
<Query><ID>2577103</ID><Parent_ID>82</Parent_ID><Name>cyber threat landscape</Name><Description>cyber threat landscape</Description><Type>Keyword</Type></Query>
<Query><ID>2577222</ID><Parent_ID>82</Parent_ID><Name>cyber threats</Name><Description>cyber threats</Description><Type>Keyword</Type></Query>
<Query><ID>2577321</ID><Parent_ID>291</Parent_ID><Name>cyber war</Name><Description>cyber war</Description><Type>Keyword</Type></Query>
<Query><ID>2577360</ID><Parent_ID>291</Parent_ID><Name>cyber warfare</Name><Description>cyber warfare</Description><Type>Keyword</Type></Query>
<Query><ID>2577415</ID><Parent_ID>11</Parent_ID><Name>cyber warrior</Name><Description>cyber warrior</Description><Type>Keyword</Type></Query>
<Query><ID>2577442</ID><Parent_ID>291</Parent_ID><Name>cyber weapon</Name><Description>cyber weapon</Description><Type>Keyword</Type></Query>
<Query><ID>2577659</ID><Parent_ID>290</Parent_ID><Name>cyber-crime</Name><Description>cyber-crime</Description><Type>Keyword</Type></Query>
<Query><ID>2577783</ID><Parent_ID>293</Parent_ID><Name>cyber-espionage</Name><Description>cyber-espionage</Description><Type>Keyword</Type></Query>
<Query><ID>2577910</ID><Parent_ID>170</Parent_ID><Name>cyber-insurance</Name><Description>cyber-insurance</Description><Type>Keyword</Type></Query>
<Query><ID>2578020</ID><Parent_ID>170</Parent_ID><Name>cyber-insurer</Name><Description>cyber-insurer</Description><Type>Keyword</Type></Query>
<Query><ID>2578248</ID><Parent_ID>150</Parent_ID><Name>cyber-risk</Name><Description>cyber-risk</Description><Type>Keyword</Type></Query>
<Query><ID>2578567</ID><Parent_ID>82</Parent_ID><Name>cyber-threat</Name><Description>cyber-threat</Description><Type>Keyword</Type></Query>
<Query><ID>2579523</ID><Parent_ID>39</Parent_ID><Name>cyberattacks</Name><Description>cyberattacks</Description><Type>Keyword</Type></Query>
<Query><ID>2579598</ID><Parent_ID>291</Parent_ID><Name>cyberaware</Name><Description>cyberaware</Description><Type>Keyword</Type></Query>
<Query><ID>2581602</ID><Parent_ID>293</Parent_ID><Name>cyberespionage</Name><Description>cyberespionage</Description><Type>Keyword</Type></Query>
<Query><ID>2581996</ID><Parent_ID>170</Parent_ID><Name>cyberinsurance</Name><Description>cyberinsurance</Description><Type>Keyword</Type></Query>
<Query><ID>2582554</ID><Parent_ID>1</Parent_ID><Name>cybersec</Name><Description>cybersec</Description><Type>Keyword</Type></Query>
<Query><ID>2583025</ID><Parent_ID>1</Parent_ID><Name>cybersecurity</Name><Description>cybersecurity</Description><Type>Keyword</Type></Query>
<Query><ID>2583166</ID><Parent_ID>3</Parent_ID><Name>cybersecurity awareness</Name><Description>cybersecurity awareness</Description><Type>Keyword</Type></Query>
<Query><ID>2583187</ID><Parent_ID>3</Parent_ID><Name>cybersecurity awareness month</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>2583457</ID><Parent_ID>36</Parent_ID><Name>cybersecurity company</Name><Description>cybersecurity company</Description><Type>Keyword</Type></Query>
<Query><ID>2584004</ID><Parent_ID>12</Parent_ID><Name>cybersecurity expert</Name><Description>cybersecurity expert</Description><Type>Keyword</Type></Query>
<Query><ID>2584104</ID><Parent_ID>36</Parent_ID><Name>cybersecurity firm</Name><Description>cybersecurity firm</Description><Type>Keyword</Type></Query>
<Query><ID>2584144</ID><Parent_ID>172</Parent_ID><Name>cybersecurity framework</Name><Description>cybersecurity framework</Description><Type>Keyword</Type></Query>
<Query><ID>2584425</ID><Parent_ID>240</Parent_ID><Name>cybersecurity incident</Name><Description>cybersecurity incident</Description><Type>Keyword</Type></Query>
<Query><ID>2584839</ID><Parent_ID>111</Parent_ID><Name>cybersecurity law</Name><Description>cybersecurity law</Description><Type>Keyword</Type></Query>
<Query><ID>2585291</ID><Parent_ID>318</Parent_ID><Name>cybersecurity professional</Name><Description>cybersecurity professional</Description><Type>Keyword</Type></Query>
<Query><ID>2585392</ID><Parent_ID>210</Parent_ID><Name>cybersecurity report</Name><Description>cybersecurity report</Description><Type>Keyword</Type></Query>
<Query><ID>2585484</ID><Parent_ID>150</Parent_ID><Name>cybersecurity risk</Name><Description>cybersecurity risk</Description><Type>Keyword</Type></Query>
<Query><ID>2585768</ID><Parent_ID>172</Parent_ID><Name>cybersecurity strategy</Name><Description>cybersecurity strategy</Description><Type>Keyword</Type></Query>
<Query><ID>2585810</ID><Parent_ID>6</Parent_ID><Name>cybersecurity summit</Name><Description>cybersecurity summit</Description><Type>Keyword</Type></Query>
<Query><ID>2585900</ID><Parent_ID>82</Parent_ID><Name>cybersecurity threat</Name><Description>cybersecurity threat</Description><Type>Keyword</Type></Query>
<Query><ID>2586463</ID><Parent_ID>47</Parent_ID><Name>cyberspy</Name><Description>cyberspy</Description><Type>Keyword</Type></Query>
<Query><ID>2586670</ID><Parent_ID>82</Parent_ID><Name>cyberthreat</Name><Description>cyberthreat</Description><Type>Keyword</Type></Query>
<Query><ID>2586818</ID><Parent_ID>291</Parent_ID><Name>cyberwar</Name><Description>cyberwar</Description><Type>Keyword</Type></Query>
<Query><ID>2587805</ID><Parent_ID>291</Parent_ID><Name>cyberwarfare</Name><Description>cyberwarfare</Description><Type>Keyword</Type></Query>
<Query><ID>2588849</ID><Parent_ID>36</Parent_ID><Name>cylance</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Cylance</Description><Type>Keyword</Type></Query>
<Query><ID>2593826</ID><Parent_ID>318</Parent_ID><Name>dan geer</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>2595995</ID><Parent_ID>379</Parent_ID><Name>dark read</Name><Description>darkreading.com</Description><Type>Keyword</Type></Query>
<Query><ID>2596134</ID><Parent_ID>461</Parent_ID><Name>dark web drug market</Name><Description>dark web drug market</Description><Type>Keyword</Type></Query>
<Query><ID>2596213</ID><Parent_ID>460</Parent_ID><Name>dark web site</Name><Description>dark web site</Description><Type>Keyword</Type></Query>
<Query><ID>2596290</ID><Parent_ID>46</Parent_ID><Name>darkcomet</Name><Description>Malware: https://en.wikipedia.org/wiki/DarkComet</Description><Type>Keyword</Type></Query>
<Query><ID>2596506</ID><Parent_ID>460</Parent_ID><Name>darknet</Name><Description>darknet</Description><Type>Keyword</Type></Query>
<Query><ID>2596689</ID><Parent_ID>460</Parent_ID><Name>darkweb</Name><Description>darkweb</Description><Type>Keyword</Type></Query>
<Query><ID>2596888</ID><Parent_ID>373</Parent_ID><Name>darpa cyber grand challenge</Name><Description>darpa cyber grand challenge</Description><Type>Keyword</Type></Query>
<Query><ID>2598438</ID><Parent_ID>441</Parent_ID><Name>data anonymization</Name><Description>data anonymization</Description><Type>Keyword</Type></Query>
<Query><ID>2598682</ID><Parent_ID>447</Parent_ID><Name>data breach cost</Name><Description>data breach cost</Description><Type>Keyword</Type></Query>
<Query><ID>2598796</ID><Parent_ID>447</Parent_ID><Name>data breach investigations</Name><Description>data breach investigations</Description><Type>Keyword</Type></Query>
<Query><ID>2598797</ID><Parent_ID>442</Parent_ID><Name>data breach investigations report</Name><Description>data breach investigations report</Description><Type>Keyword</Type></Query>
<Query><ID>2598821</ID><Parent_ID>447</Parent_ID><Name>data breach lawsuit</Name><Description>data breach lawsuit</Description><Type>Keyword</Type></Query>
<Query><ID>2598841</ID><Parent_ID>442</Parent_ID><Name>data breach notification</Name><Description>data breach notification</Description><Type>Keyword</Type></Query>
<Query><ID>2598846</ID><Parent_ID>442</Parent_ID><Name>data breach notification law</Name><Description>data breach notification law</Description><Type>Keyword</Type></Query>
<Query><ID>2598922</ID><Parent_ID>342</Parent_ID><Name>data breach response</Name><Description>data breach response</Description><Type>Keyword</Type></Query>
<Query><ID>2599548</ID><Parent_ID>277</Parent_ID><Name>data controller</Name><Description>GDPR term</Description><Type>Keyword</Type></Query>
<Query><ID>2599975</ID><Parent_ID>120</Parent_ID><Name>data encryption</Name><Description>data encryption</Description><Type>Keyword</Type></Query>
<Query><ID>2600701</ID><Parent_ID>383</Parent_ID><Name>data integrity</Name><Description>data integrity</Description><Type>Keyword</Type></Query>
<Query><ID>2601899</ID><Parent_ID>3</Parent_ID><Name>data privacy day</Name><Description>data privacy day</Description><Type>Keyword</Type></Query>
<Query><ID>2601922</ID><Parent_ID>275</Parent_ID><Name>data privacy law</Name><Description>data privacy law</Description><Type>Keyword</Type></Query>
<Query><ID>2602115</ID><Parent_ID>277</Parent_ID><Name>data protection authority</Name><Description>data protection authority</Description><Type>Keyword</Type></Query>
<Query><ID>2602172</ID><Parent_ID>277</Parent_ID><Name>data protection directive</Name><Description>data protection directive</Description><Type>Keyword</Type></Query>
<Query><ID>2602209</ID><Parent_ID>277</Parent_ID><Name>data protection impact assessment</Name><Description>data protection impact assessment</Description><Type>Keyword</Type></Query>
<Query><ID>2602254</ID><Parent_ID>277</Parent_ID><Name>data protection legislation</Name><Description>data protection legislation</Description><Type>Keyword</Type></Query>
<Query><ID>2602276</ID><Parent_ID>12</Parent_ID><Name>data protection officer</Name><Description>data protection officer</Description><Type>Keyword</Type></Query>
<Query><ID>2602290</ID><Parent_ID>277</Parent_ID><Name>data protection principle</Name><Description>data protection principle</Description><Type>Keyword</Type></Query>
<Query><ID>2602313</ID><Parent_ID>277</Parent_ID><Name>data protection regulation</Name><Description>data protection regulation</Description><Type>Keyword</Type></Query>
<Query><ID>2602335</ID><Parent_ID>277</Parent_ID><Name>data protection requirement</Name><Description>data protection requirement</Description><Type>Keyword</Type></Query>
<Query><ID>2602346</ID><Parent_ID>277</Parent_ID><Name>data protection rule</Name><Description>data protection rule</Description><Type>Keyword</Type></Query>
<Query><ID>2602367</ID><Parent_ID>277</Parent_ID><Name>data protection supervisor</Name><Description>data protection supervisor</Description><Type>Keyword</Type></Query>
<Query><ID>2603079</ID><Parent_ID>173</Parent_ID><Name>data security standard</Name><Description>data security standard</Description><Type>Keyword</Type></Query>
<Query><ID>2603247</ID><Parent_ID>96</Parent_ID><Name>data share agreement</Name><Description>data share agreement</Description><Type>Keyword</Type></Query>
<Query><ID>2603496</ID><Parent_ID>456</Parent_ID><Name>data steal</Name><Description>data steal</Description><Type>Keyword</Type></Query>
<Query><ID>2605043</ID><Parent_ID>349</Parent_ID><Name>database hack</Name><Description>Not useful</Description><Type>Keyword</Type></Query>
<Query><ID>2605915</ID><Parent_ID>428</Parent_ID><Name>datagram transport layer security</Name><Description>datagram transport layer security</Description><Type>Keyword</Type></Query>
<Query><ID>2610162</ID><Parent_ID>442</Parent_ID><Name>dbir</Name><Description>Data Breach Investigations Report from Verizon: https://enterprise.verizon.com/en-gb/resources/reports/dbir/</Description><Type>Keyword</Type></Query>
<Query><ID>2611463</ID><Parent_ID>58</Parent_ID><Name>ddos attack</Name><Description>ddos attack</Description><Type>Keyword</Type></Query>
<Query><ID>2611623</ID><Parent_ID>58</Parent_ID><Name>ddos botnet</Name><Description>ddos botnet</Description><Type>Keyword</Type></Query>
<Query><ID>2612231</ID><Parent_ID>441</Parent_ID><Name>de-anonymization</Name><Description>de-anonymization</Description><Type>Keyword</Type></Query>
<Query><ID>2619378</ID><Parent_ID>129</Parent_ID><Name>decryption key</Name><Description>decryption key</Description><Type>Keyword</Type></Query>
<Query><ID>2619456</ID><Parent_ID>389</Parent_ID><Name>decryption tool</Name><Description>decryption tool</Description><Type>Keyword</Type></Query>
<Query><ID>2620381</ID><Parent_ID>560</Parent_ID><Name>deep packet inspection</Name><Description>deep packet inspection</Description><Type>Keyword</Type></Query>
<Query><ID>2622220</ID><Parent_ID>471</Parent_ID><Name>defcon</Name><Description>DEF CON is one of the world&#39;s largest hacker conventions, held annually in Las Vegas, Nevada, with the first DEF CON taking place in June 1993.</Description><Type>Keyword</Type></Query>
<Query><ID>2622258</ID><Parent_ID>471</Parent_ID><Name>defcon badge</Name><Description>defcon badge</Description><Type>Keyword</Type></Query>
<Query><ID>2622403</ID><Parent_ID>374</Parent_ID><Name>defcon ctf</Name><Description>defcon ctf</Description><Type>Keyword</Type></Query>
<Query><ID>2622932</ID><Parent_ID>471</Parent_ID><Name>defcon talk</Name><Description>defcon talk</Description><Type>Keyword</Type></Query>
<Query><ID>2623201</ID><Parent_ID>471</Parent_ID><Name>defcon25</Name><Description>2017 DEFCON</Description><Type>Keyword</Type></Query>
<Query><ID>2624593</ID><Parent_ID>364</Parent_ID><Name>defender exploit guard</Name><Description>defender exploit guard</Description><Type>Keyword</Type></Query>
<Query><ID>2628567</ID><Parent_ID>224</Parent_ID><Name>dehart</Name><Description>https://en.wikipedia.org/wiki/Matt_DeHart</Description><Type>Keyword</Type></Query>
<Query><ID>2638274</ID><Parent_ID>57</Parent_ID><Name>denial-of-service</Name><Description>denial-of-service</Description><Type>Keyword</Type></Query>
<Query><ID>2638276</ID><Parent_ID>57</Parent_ID><Name>denial-of-service attack</Name><Description>denial-of-service attack</Description><Type>Keyword</Type></Query>
<Query><ID>2642822</ID><Parent_ID>4</Parent_ID><Name>derbycon</Name><Description>https://www.derbycon.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2658205</ID><Parent_ID>425</Parent_ID><Name>device security</Name><Description>device security</Description><Type>Keyword</Type></Query>
<Query><ID>2659424</ID><Parent_ID>258</Parent_ID><Name>dfir</Name><Description>Digital Forensics and Incident Response Distribution: https://en.wikipedia.org/wiki/SIFT_Workstation_-_Digital_Forensics_and_Incident_Response_Distribution</Description><Type>Keyword</Type></Query>
<Query><ID>2659633</ID><Parent_ID>258</Parent_ID><Name>dfir infosec</Name><Description>dfir infosec</Description><Type>Keyword</Type></Query>
<Query><ID>2660004</ID><Parent_ID>478</Parent_ID><Name>dfirsummit</Name><Description>SANS Digital Forensics &amp; Incident Response (DFIR) Summit</Description><Type>Keyword</Type></Query>
<Query><ID>2662538</ID><Parent_ID>53</Parent_ID><Name>dictionary attack</Name><Description>dictionary attack</Description><Type>Keyword</Type></Query>
<Query><ID>2667099</ID><Parent_ID>515</Parent_ID><Name>digital geneva convention</Name><Description>digital geneva convention</Description><Type>Keyword</Type></Query>
<Query><ID>2667522</ID><Parent_ID>515</Parent_ID><Name>digital rights management</Name><Description>digital rights management</Description><Type>Keyword</Type></Query>
<Query><ID>2667570</ID><Parent_ID>167</Parent_ID><Name>digital security</Name><Description>digital security</Description><Type>Keyword</Type></Query>
<Query><ID>2683977</ID><Parent_ID>231</Parent_ID><Name>distribute intrusion detection system</Name><Description>distribute intrusion detection system</Description><Type>Keyword</Type></Query>
<Query><ID>2684433</ID><Parent_ID>406</Parent_ID><Name>distribute system security symposium</Name><Description>distribute system security symposium</Description><Type>Keyword</Type></Query>
<Query><ID>2687319</ID><Parent_ID>329</Parent_ID><Name>dll injection</Name><Description>dll injection</Description><Type>Keyword</Type></Query>
<Query><ID>2687820</ID><Parent_ID>20</Parent_ID><Name>dmitry</Name><Description>He may be seen as a cyber criminal (who often just use tools, not develop tools).</Description><Type>Keyword</Type></Query>
<Query><ID>2688382</ID><Parent_ID>349</Parent_ID><Name>dnc hack</Name><Description>2016 Democratic National Committee email leak: https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak</Description><Type>Keyword</Type></Query>
<Query><ID>2693572</ID><Parent_ID>43</Parent_ID><Name>domain generation algorithm</Name><Description>https://en.wikipedia.org/wiki/Domain_generation_algorithm</Description><Type>Keyword</Type></Query>
<Query><ID>2696955</ID><Parent_ID>57</Parent_ID><Name>dos attack</Name><Description>dos attack</Description><Type>Keyword</Type></Query>
<Query><ID>2698395</ID><Parent_ID>46</Parent_ID><Name>doublepulsar</Name><Description>DoublePulsar is a backdoor implant tool developed by the U.S. National Security Agency&#39;s (NSA) Equation Group that was leaked by The Shadow Brokers in early 2017.</Description><Type>Keyword</Type></Query>
<Query><ID>2703294</ID><Parent_ID>479</Parent_ID><Name>dridex</Name><Description>malware: https://en.wikipedia.org/wiki/Dridex</Description><Type>Keyword</Type></Query>
<Query><ID>2705388</ID><Parent_ID>216</Parent_ID><Name>droidjack</Name><Description>droidjack</Description><Type>Keyword</Type></Query>
<Query><ID>2712062</ID><Parent_ID>479</Parent_ID><Name>duqu</Name><Description>Malware: https://en.wikipedia.org/wiki/Duqu</Description><Type>Keyword</Type></Query>
<Query><ID>2713451</ID><Parent_ID>18</Parent_ID><Name>dwork</Name><Description>Cyber security researcher Cynthia Dwork: https://en.wikipedia.org/wiki/Cynthia_Dwork</Description><Type>Keyword</Type></Query>
<Query><ID>2714271</ID><Parent_ID>310</Parent_ID><Name>dynamic malware analysis</Name><Description>dynamic malware analysis</Description><Type>Keyword</Type></Query>
<Query><ID>2714615</ID><Parent_ID>294</Parent_ID><Name>dynamic threat intelligence</Name><Description>dynamic threat intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>2715090</ID><Parent_ID>479</Parent_ID><Name>dyre</Name><Description>Malware: https://www.secureworks.com/research/dyre-banking-trojan</Description><Type>Keyword</Type></Query>
<Query><ID>2720222</ID><Parent_ID>120</Parent_ID><Name>eax</Name><Description>https://en.wikipedia.org/wiki/EAX_mode</Description><Type>Keyword</Type></Query>
<Query><ID>2726221</ID><Parent_ID>113</Parent_ID><Name>edr</Name><Description>Endpoint Detection and Response (it may mean other things)</Description><Type>Keyword</Type></Query>
<Query><ID>2726988</ID><Parent_ID>26</Parent_ID><Name>edward snowden</Name><Description>Cyber security related person: https://en.wikipedia.org/wiki/Edward_Snowden</Description><Type>Keyword</Type></Query>
<Query><ID>2734779</ID><Parent_ID>349</Parent_ID><Name>election hacking</Name><Description>election hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2738297</ID><Parent_ID>126</Parent_ID><Name>elliptic curve cryptography</Name><Description>elliptic curve cryptography</Description><Type>Keyword</Type></Query>
<Query><ID>2740419</ID><Parent_ID>349</Parent_ID><Name>email interception hack</Name><Description>email interception hack</Description><Type>Keyword</Type></Query>
<Query><ID>2742425</ID><Parent_ID>227</Parent_ID><Name>email security</Name><Description>email security</Description><Type>Keyword</Type></Query>
<Query><ID>2746834</ID><Parent_ID>364</Parent_ID><Name>emet</Name><Description>Enhanced Mitigation Experience Toolkit: https://en.wikipedia.org/wiki/Enhanced_Mitigation_Experience_Toolkit</Description><Type>Keyword</Type></Query>
<Query><ID>2753722</ID><Parent_ID>544</Parent_ID><Name>encrypted email</Name><Description>encrypted email</Description><Type>Keyword</Type></Query>
<Query><ID>2753959</ID><Parent_ID>501</Parent_ID><Name>encrypted messaging app</Name><Description>encrypted messaging app</Description><Type>Keyword</Type></Query>
<Query><ID>2755300</ID><Parent_ID>501</Parent_ID><Name>end-to-end encryption</Name><Description>end-to-end encryption</Description><Type>Keyword</Type></Query>
<Query><ID>2756217</ID><Parent_ID>232</Parent_ID><Name>endpoint protection</Name><Description>endpoint protection</Description><Type>Keyword</Type></Query>
<Query><ID>2756246</ID><Parent_ID>232</Parent_ID><Name>endpoint protection platforms</Name><Description>endpoint protection platforms</Description><Type>Keyword</Type></Query>
<Query><ID>2756290</ID><Parent_ID>167</Parent_ID><Name>endpoint security</Name><Description>endpoint security</Description><Type>Keyword</Type></Query>
<Query><ID>2761203</ID><Parent_ID>357</Parent_ID><Name>enigma2017</Name><Description>Security event: ENIGMA conference 2017</Description><Type>Keyword</Type></Query>
<Query><ID>2761255</ID><Parent_ID>31</Parent_ID><Name>enisa</Name><Description>enisa</Description><Type>Keyword</Type></Query>
<Query><ID>2761489</ID><Parent_ID>330</Parent_ID><Name>enisa threat landscape report</Name><Description>enisa threat landscape report</Description><Type>Keyword</Type></Query>
<Query><ID>2764486</ID><Parent_ID>164</Parent_ID><Name>enterprise risk management</Name><Description>enterprise risk management</Description><Type>Keyword</Type></Query>
<Query><ID>2764512</ID><Parent_ID>167</Parent_ID><Name>enterprise security</Name><Description>enterprise security</Description><Type>Keyword</Type></Query>
<Query><ID>2770750</ID><Parent_ID>575</Parent_ID><Name>equifax data breach</Name><Description>equifax data breach</Description><Type>Keyword</Type></Query>
<Query><ID>2775670</ID><Parent_ID>115</Parent_ID><Name>escan internet security suite</Name><Description>eScan Internet Security Suite: https://www.escanav.com/en/windows-antivirus/internet-security-suite.asp</Description><Type>Keyword</Type></Query>
<Query><ID>2776307</ID><Parent_ID>36</Parent_ID><Name>eset</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/ESET</Description><Type>Keyword</Type></Query>
<Query><ID>2777395</ID><Parent_ID>293</Parent_ID><Name>espionage campaign</Name><Description>espionage campaign</Description><Type>Keyword</Type></Query>
<Query><ID>2782138</ID><Parent_ID>46</Parent_ID><Name>eternalblue</Name><Description>https://en.wikipedia.org/wiki/EternalBlue</Description><Type>Keyword</Type></Query>
<Query><ID>2782394</ID><Parent_ID>248</Parent_ID><Name>ethereum</Name><Description>ethereum</Description><Type>Keyword</Type></Query>
<Query><ID>2782750</ID><Parent_ID>23</Parent_ID><Name>ethical hacker</Name><Description>ethical hacker</Description><Type>Keyword</Type></Query>
<Query><ID>2783268</ID><Parent_ID>526</Parent_ID><Name>ettercap</Name><Description>Security tool: https://en.wikipedia.org/wiki/Ettercap_(software)</Description><Type>Keyword</Type></Query>
<Query><ID>2783440</ID><Parent_ID>577</Parent_ID><Name>eu-us privacy shield</Name><Description>eu-us privacy shield</Description><Type>Keyword</Type></Query>
<Query><ID>2783665</ID><Parent_ID>12</Parent_ID><Name>eugene kaspersky</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>2784012</ID><Parent_ID>4</Parent_ID><Name>eurocrypt</Name><Description>crypto conference</Description><Type>Keyword</Type></Query>
<Query><ID>2786369</ID><Parent_ID>277</Parent_ID><Name>european data protection directive</Name><Description>european data protection directive</Description><Type>Keyword</Type></Query>
<Query><ID>2786373</ID><Parent_ID>277</Parent_ID><Name>european data protection law</Name><Description>european data protection law</Description><Type>Keyword</Type></Query>
<Query><ID>2786384</ID><Parent_ID>277</Parent_ID><Name>european data protection supervisor</Name><Description>european data protection supervisor</Description><Type>Keyword</Type></Query>
<Query><ID>2786968</ID><Parent_ID>474</Parent_ID><Name>europol</Name><Description>Law enforcement agency</Description><Type>Keyword</Type></Query>
<Query><ID>2787367</ID><Parent_ID>111</Parent_ID><Name>evade breach notification law</Name><Description>evade breach notification law</Description><Type>Keyword</Type></Query>
<Query><ID>2787402</ID><Parent_ID>113</Parent_ID><Name>evade detection</Name><Description>evade detection</Description><Type>Keyword</Type></Query>
<Query><ID>2788693</ID><Parent_ID>218</Parent_ID><Name>evasion technique</Name><Description>evasion technique</Description><Type>Keyword</Type></Query>
<Query><ID>2807686</ID><Parent_ID>52</Parent_ID><Name>exploit dev</Name><Description>exploit dev</Description><Type>Keyword</Type></Query>
<Query><ID>2808208</ID><Parent_ID>52</Parent_ID><Name>exploit kit</Name><Description>exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>2808601</ID><Parent_ID>52</Parent_ID><Name>exploit mitigation</Name><Description>exploit mitigation</Description><Type>Keyword</Type></Query>
<Query><ID>2808763</ID><Parent_ID>516</Parent_ID><Name>exploit pack</Name><Description>exploit pack</Description><Type>Keyword</Type></Query>
<Query><ID>2809658</ID><Parent_ID>52</Parent_ID><Name>exploitability</Name><Description>exploitability</Description><Type>Keyword</Type></Query>
<Query><ID>2810004</ID><Parent_ID>39</Parent_ID><Name>exploitation technique</Name><Description>exploitation technique</Description><Type>Keyword</Type></Query>
<Query><ID>2810241</ID><Parent_ID>39</Parent_ID><Name>exploits</Name><Description>exploits</Description><Type>Keyword</Type></Query>
<Query><ID>2812590</ID><Parent_ID>454</Parent_ID><Name>expose sensitive data</Name><Description>expose sensitive data</Description><Type>Keyword</Type></Query>
<Query><ID>2819541</ID><Parent_ID>36</Parent_ID><Name>f-secure</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/F-Secure</Description><Type>Keyword</Type></Query>
<Query><ID>2819559</ID><Parent_ID>115</Parent_ID><Name>f-secure internet security</Name><Description>f-secure internet security</Description><Type>Keyword</Type></Query>
<Query><ID>2823022</ID><Parent_ID>189</Parent_ID><Name>facial recognition</Name><Description>Biometrics</Description><Type>Keyword</Type></Query>
<Query><ID>2827180</ID><Parent_ID>289</Parent_ID><Name>fake news</Name><Description>General term, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>2831222</ID><Parent_ID>564</Parent_ID><Name>fancy bear</Name><Description>Fancy Bear is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU</Description><Type>Keyword</Type></Query>
<Query><ID>2841746</ID><Parent_ID>90</Parent_ID><Name>federated identity management</Name><Description>federated identity management</Description><Type>Keyword</Type></Query>
<Query><ID>2852553</ID><Parent_ID>81</Parent_ID><Name>file upload vulnerability</Name><Description>file upload vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>2852935</ID><Parent_ID>43</Parent_ID><Name>fileless malware</Name><Description>fileless malware</Description><Type>Keyword</Type></Query>
<Query><ID>2856108</ID><Parent_ID>85</Parent_ID><Name>financial cyber threat</Name><Description>financial cyber threat</Description><Type>Keyword</Type></Query>
<Query><ID>2858157</ID><Parent_ID>90</Parent_ID><Name>fine-grained access control</Name><Description>fine-grained access control</Description><Type>Keyword</Type></Query>
<Query><ID>2858445</ID><Parent_ID>47</Parent_ID><Name>finfisher</Name><Description>Spyware: https://en.wikipedia.org/wiki/FinFisher</Description><Type>Keyword</Type></Query>
<Query><ID>2860311</ID><Parent_ID>36</Parent_ID><Name>fireeye</Name><Description>https://www.fireeye.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2860324</ID><Parent_ID>330</Parent_ID><Name>fireeye advanced threat report</Name><Description>https://www.fireeye.com/current-threats/annual-threat-report.html</Description><Type>Keyword</Type></Query>
<Query><ID>2860411</ID><Parent_ID>335</Parent_ID><Name>fireeye dynamic threat intelligence</Name><Description>fireeye dynamic threat intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>2861494</ID><Parent_ID>89</Parent_ID><Name>firewall rule</Name><Description>firewall rule</Description><Type>Keyword</Type></Query>
<Query><ID>2861611</ID><Parent_ID>89</Parent_ID><Name>firewalls</Name><Description>firewalls</Description><Type>Keyword</Type></Query>
<Query><ID>2863657</ID><Parent_ID>580</Parent_ID><Name>fisma</Name><Description>Federal Information Security Management Act: https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002</Description><Type>Keyword</Type></Query>
<Query><ID>2866736</ID><Parent_ID>41</Parent_ID><Name>flash exploit</Name><Description>flash exploit</Description><Type>Keyword</Type></Query>
<Query><ID>2867162</ID><Parent_ID>217</Parent_ID><Name>flash zero-day</Name><Description>flash zero-day</Description><Type>Keyword</Type></Query>
<Query><ID>2869123</ID><Parent_ID>219</Parent_ID><Name>flip feng shui</Name><Description>Flip Feng Shui (FFS) is a new exploitation vector that allows an attacker virtual machine (VM) to flip a bit in a memory page of a victim VM that runs on the same host as the attacker VM. https://www.vusec.net/projects/flip-feng-shui/</Description><Type>Keyword</Type></Query>
<Query><ID>2871460</ID><Parent_ID>201</Parent_ID><Name>flow analysis</Name><Description>General netwroking term, but connection with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>2887263</ID><Parent_ID>113</Parent_ID><Name>fraud detection</Name><Description>fraud detection</Description><Type>Keyword</Type></Query>
<Query><ID>2891147</ID><Parent_ID>497</Parent_ID><Name>free open-source disk encryption software</Name><Description>free open-source disk encryption software</Description><Type>Keyword</Type></Query>
<Query><ID>2892285</ID><Parent_ID>506</Parent_ID><Name>free vpn</Name><Description>Privacy related</Description><Type>Keyword</Type></Query>
<Query><ID>2892651</ID><Parent_ID>494</Parent_ID><Name>freeanon</Name><Description>freeanon</Description><Type>Keyword</Type></Query>
<Query><ID>2892734</ID><Parent_ID>494</Parent_ID><Name>freeanons</Name><Description>https://www.freeanons.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2892942</ID><Parent_ID>494</Parent_ID><Name>freebogatov</Name><Description>Campaign to free Dmitry Bogatov: https://twitter.com/hashtag/freebogatov?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>2893614</ID><Parent_ID>494</Parent_ID><Name>freejeremy</Name><Description>https://freejeremy.net/</Description><Type>Keyword</Type></Query>
<Query><ID>2893743</ID><Parent_ID>493</Parent_ID><Name>freelauri</Name><Description>Campaign for free Lauri Love: https://freelauri.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2894089</ID><Parent_ID>494</Parent_ID><Name>freemattdehart</Name><Description>https://twitter.com/freemattdehart?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>2902650</ID><Parent_ID>378</Parent_ID><Name>fullz</Name><Description>https://www.investopedia.com/fullz-definition-4684000</Description><Type>Keyword</Type></Query>
<Query><ID>2907710</ID><Parent_ID>371</Parent_ID><Name>fuzz arbitrary binary code</Name><Description>Better changed to &quot;Fuzzing&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>2907916</ID><Parent_ID>537</Parent_ID><Name>fuzzer</Name><Description>Class of security tools</Description><Type>Keyword</Type></Query>
<Query><ID>2911214</ID><Parent_ID>510</Parent_ID><Name>gameover zeus botnet</Name><Description>gameover zeus botnet</Description><Type>Keyword</Type></Query>
<Query><ID>2912962</ID><Parent_ID>4</Parent_ID><Name>gartnersec</Name><Description>Gartner Security &amp; Risk Management Conference?</Description><Type>Keyword</Type></Query>
<Query><ID>2915561</ID><Parent_ID>29</Parent_ID><Name>gchq</Name><Description>The Government Communications Headquarters is an intelligence and security organisation responsible for providing signals intelligence and information assurance to the government and armed forces of the United Kingdom.</Description><Type>Keyword</Type></Query>
<Query><ID>2933126</ID><Parent_ID>330</Parent_ID><Name>global internet security threat report</Name><Description>global internet security threat report</Description><Type>Keyword</Type></Query>
<Query><ID>2939561</ID><Parent_ID>69</Parent_ID><Name>google docs phish attack</Name><Description>google docs phish attack</Description><Type>Keyword</Type></Query>
<Query><ID>2939572</ID><Parent_ID>69</Parent_ID><Name>google docs phishing scam</Name><Description>google docs phishing scam</Description><Type>Keyword</Type></Query>
<Query><ID>2939594</ID><Parent_ID>538</Parent_ID><Name>google dork</Name><Description>The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.</Description><Type>Keyword</Type></Query>
<Query><ID>2940628</ID><Parent_ID>409</Parent_ID><Name>google project zero bug</Name><Description>google project zero bug</Description><Type>Keyword</Type></Query>
<Query><ID>2944517</ID><Parent_ID>349</Parent_ID><Name>government hacking</Name><Description>government hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2945361</ID><Parent_ID>540</Parent_ID><Name>government surveillance</Name><Description>Privacy related</Description><Type>Keyword</Type></Query>
<Query><ID>2953417</ID><Parent_ID>486</Parent_ID><Name>grizzly steppe report</Name><Description>GRIZZLY STEPPE - Russian Malicious Cyber Activity | CISA - US-Cert</Description><Type>Keyword</Type></Query>
<Query><ID>2953720</ID><Parent_ID>18</Parent_ID><Name>grossklags</Name><Description>Cyber security researchers Jens Grossklags: http://www.cybertrust.in.tum.de/index.php?id=101</Description><Type>Keyword</Type></Query>
<Query><ID>2956814</ID><Parent_ID>21</Parent_ID><Name>guccifer</Name><Description>Hacker: https://en.wikipedia.org/wiki/Guccifer</Description><Type>Keyword</Type></Query>
<Query><ID>2959568</ID><Parent_ID>499</Parent_ID><Name>guy fawkes mask</Name><Description>Cyber security culture</Description><Type>Keyword</Type></Query>
<Query><ID>2964442</ID><Parent_ID>528</Parent_ID><Name>hack team</Name><Description>hack team</Description><Type>Keyword</Type></Query>
<Query><ID>2965018</ID><Parent_ID>541</Parent_ID><Name>hackaday</Name><Description>https://hackaday.com/</Description><Type>Keyword</Type></Query>
<Query><ID>2966356</ID><Parent_ID>350</Parent_ID><Name>hacker conference</Name><Description>hacker conference</Description><Type>Keyword</Type></Query>
<Query><ID>2966940</ID><Parent_ID>350</Parent_ID><Name>hacker forum</Name><Description>hacker forum</Description><Type>Keyword</Type></Query>
<Query><ID>2967145</ID><Parent_ID>21</Parent_ID><Name>hacker hero john draper</Name><Description>https://en.wikipedia.org/wiki/John_Draper</Description><Type>Keyword</Type></Query>
<Query><ID>2967537</ID><Parent_ID>21</Parent_ID><Name>hacker lauri love</Name><Description>https://en.wikipedia.org/wiki/Lauri_Love</Description><Type>Keyword</Type></Query>
<Query><ID>2968672</ID><Parent_ID>350</Parent_ID><Name>hacker summer camp</Name><Description>hacker summer camp</Description><Type>Keyword</Type></Query>
<Query><ID>2968718</ID><Parent_ID>349</Parent_ID><Name>hacker target</Name><Description>hacker target</Description><Type>Keyword</Type></Query>
<Query><ID>2969936</ID><Parent_ID>349</Parent_ID><Name>hackerspace</Name><Description>https://en.wikipedia.org/wiki/Hackerspace</Description><Type>Keyword</Type></Query>
<Query><ID>2970750</ID><Parent_ID>477</Parent_ID><Name>hacking facebook account</Name><Description>hacking facebook account</Description><Type>Keyword</Type></Query>
<Query><ID>2970789</ID><Parent_ID>350</Parent_ID><Name>hacking forum</Name><Description>hacking forum</Description><Type>Keyword</Type></Query>
<Query><ID>2972214</ID><Parent_ID>349</Parent_ID><Name>hacking service</Name><Description>hacking service</Description><Type>Keyword</Type></Query>
<Query><ID>2972289</ID><Parent_ID>367</Parent_ID><Name>hacking software</Name><Description>hacking software</Description><Type>Keyword</Type></Query>
<Query><ID>2972535</ID><Parent_ID>349</Parent_ID><Name>hacking technique</Name><Description>hacking technique</Description><Type>Keyword</Type></Query>
<Query><ID>2972656</ID><Parent_ID>367</Parent_ID><Name>hacking tools</Name><Description>hacking tools</Description><Type>Keyword</Type></Query>
<Query><ID>2972770</ID><Parent_ID>349</Parent_ID><Name>hacking tutorial</Name><Description>hacking tutorial</Description><Type>Keyword</Type></Query>
<Query><ID>2972873</ID><Parent_ID>368</Parent_ID><Name>hacking village</Name><Description>Event: https://def.camp/hacking-village/</Description><Type>Keyword</Type></Query>
<Query><ID>2973410</ID><Parent_ID>364</Parent_ID><Name>hackrf</Name><Description>https://greatscottgadgets.com/hackrf/</Description><Type>Keyword</Type></Query>
<Query><ID>2973637</ID><Parent_ID>364</Parent_ID><Name>hacksys extreme vulnerable driver</Name><Description>hacksys extreme vulnerable driver</Description><Type>Keyword</Type></Query>
<Query><ID>2975049</ID><Parent_ID>519</Parent_ID><Name>hak5</Name><Description>Pentesting device: https://shop.hak5.org/</Description><Type>Keyword</Type></Query>
<Query><ID>2979598</ID><Parent_ID>461</Parent_ID><Name>hansa dark web market</Name><Description>Dark web market</Description><Type>Keyword</Type></Query>
<Query><ID>2982685</ID><Parent_ID>349</Parent_ID><Name>hardware hacking</Name><Description>hardware hacking</Description><Type>Keyword</Type></Query>
<Query><ID>2982939</ID><Parent_ID>40</Parent_ID><Name>hardware security</Name><Description>hardware security</Description><Type>Keyword</Type></Query>
<Query><ID>2984678</ID><Parent_ID>133</Parent_ID><Name>hash algorithm</Name><Description>hash algorithm</Description><Type>Keyword</Type></Query>
<Query><ID>2984828</ID><Parent_ID>133</Parent_ID><Name>hash function</Name><Description>hash function</Description><Type>Keyword</Type></Query>
<Query><ID>2985029</ID><Parent_ID>375</Parent_ID><Name>hash table</Name><Description>hash table</Description><Type>Keyword</Type></Query>
<Query><ID>2985068</ID><Parent_ID>375</Parent_ID><Name>hash value</Name><Description>hash value</Description><Type>Keyword</Type></Query>
<Query><ID>2985136</ID><Parent_ID>364</Parent_ID><Name>hashcat</Name><Description>Security tool: https://en.wikipedia.org/wiki/Hashcat</Description><Type>Keyword</Type></Query>
<Query><ID>2987277</ID><Parent_ID>518</Parent_ID><Name>havij</Name><Description>Havij SQL Injection tool</Description><Type>Keyword</Type></Query>
<Query><ID>2987513</ID><Parent_ID>21</Parent_ID><Name>haxor</Name><Description>Alternrative spelling of hacker: https://en.wiktionary.org/wiki/haxor</Description><Type>Keyword</Type></Query>
<Query><ID>2988106</ID><Parent_ID>36</Parent_ID><Name>hbgary</Name><Description>https://en.wikipedia.org/wiki/HBGary</Description><Type>Keyword</Type></Query>
<Query><ID>2991657</ID><Parent_ID>522</Parent_ID><Name>heap overflow</Name><Description>heap overflow</Description><Type>Keyword</Type></Query>
<Query><ID>2992452</ID><Parent_ID>409</Parent_ID><Name>heartbleed</Name><Description>https://en.wikipedia.org/wiki/Heartbleed</Description><Type>Keyword</Type></Query>
<Query><ID>2996895</ID><Parent_ID>379</Parent_ID><Name>help net security</Name><Description>https://www.helpnetsecurity.com/</Description><Type>Keyword</Type></Query>
<Query><ID>3000321</ID><Parent_ID>219</Parent_ID><Name>hex editor</Name><Description>General term, connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3010478</ID><Parent_ID>358</Parent_ID><Name>hitb</Name><Description>Cyber security event: https://conference.hitb.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3010636</ID><Parent_ID>358</Parent_ID><Name>hitb2017ams</Name><Description>Hash tag for security event: https://twitter.com/hashtag/hitb2017ams?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>3010776</ID><Parent_ID>4</Parent_ID><Name>hitbgsec</Name><Description>Security conference: https://gsec.hitb.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3015248</ID><Parent_ID>495</Parent_ID><Name>homomorphic encryption scheme</Name><Description>homomorphic encryption scheme</Description><Type>Keyword</Type></Query>
<Query><ID>3015786</ID><Parent_ID>113</Parent_ID><Name>honeynet</Name><Description>honeynet</Description><Type>Keyword</Type></Query>
<Query><ID>3015840</ID><Parent_ID>113</Parent_ID><Name>honeypot</Name><Description>honeypot</Description><Type>Keyword</Type></Query>
<Query><ID>3020193</ID><Parent_ID>232</Parent_ID><Name>host-based intrusion detection system</Name><Description>host-based intrusion detection system</Description><Type>Keyword</Type></Query>
<Query><ID>3021653</ID><Parent_ID>506</Parent_ID><Name>hotspot shield vpn</Name><Description>hotspot shield vpn</Description><Type>Keyword</Type></Query>
<Query><ID>3025518</ID><Parent_ID>142</Parent_ID><Name>http public key pinning</Name><Description>https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning</Description><Type>Keyword</Type></Query>
<Query><ID>3025660</ID><Parent_ID>167</Parent_ID><Name>http strict transport security</Name><Description>http strict transport security</Description><Type>Keyword</Type></Query>
<Query><ID>3025859</ID><Parent_ID>34</Parent_ID><Name>huawei</Name><Description>ICT company with major presence on security solutions</Description><Type>Keyword</Type></Query>
<Query><ID>3030901</ID><Parent_ID>184</Parent_ID><Name>hxxp</Name><Description>Security protocol: https://tools.ietf.org/id/draft-salgado-hxxp-01.xml</Description><Type>Keyword</Type></Query>
<Query><ID>3037606</ID><Parent_ID>167</Parent_ID><Name>ics security</Name><Description>ics security</Description><Type>Keyword</Type></Query>
<Query><ID>3037739</ID><Parent_ID>344</Parent_ID><Name>ics-cert</Name><Description>Industrial Control System CERT</Description><Type>Keyword</Type></Query>
<Query><ID>3039279</ID><Parent_ID>552</Parent_ID><Name>ida pro</Name><Description>https://www.hex-rays.com/products/ida/</Description><Type>Keyword</Type></Query>
<Query><ID>3039533</ID><Parent_ID>552</Parent_ID><Name>idapython</Name><Description>Python plugin for Interactive Disassembler: https://github.com/idapython/</Description><Type>Keyword</Type></Query>
<Query><ID>3040372</ID><Parent_ID>277</Parent_ID><Name>identifiable natural person</Name><Description>GDPR: An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification ...</Description><Type>Keyword</Type></Query>
<Query><ID>3042187</ID><Parent_ID>339</Parent_ID><Name>identify threat</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>3042806</ID><Parent_ID>90</Parent_ID><Name>identity management</Name><Description>identity management</Description><Type>Keyword</Type></Query>
<Query><ID>3044128</ID><Parent_ID>36</Parent_ID><Name>idss</Name><Description>Integrated Defense &amp; Security Solutions</Description><Type>Keyword</Type></Query>
<Query><ID>3044625</ID><Parent_ID>10</Parent_ID><Name>ieee computer security foundations workshop</Name><Description>ieee computer security foundations workshop</Description><Type>Keyword</Type></Query>
<Query><ID>3057363</ID><Parent_ID>176</Parent_ID><Name>imsi</Name><Description>International mobile subscriber identity, connection with security is strong enough</Description><Type>Keyword</Type></Query>
<Query><ID>3057368</ID><Parent_ID>216</Parent_ID><Name>imsi catcher</Name><Description>https://en.wikipedia.org/wiki/IMSI-catcher</Description><Type>Keyword</Type></Query>
<Query><ID>3057978</ID><Parent_ID>551</Parent_ID><Name>in-memory private rsa key recovery</Name><Description>in-memory private rsa key recovery</Description><Type>Keyword</Type></Query>
<Query><ID>3059498</ID><Parent_ID>346</Parent_ID><Name>incident detection</Name><Description>incident detection</Description><Type>Keyword</Type></Query>
<Query><ID>3059599</ID><Parent_ID>346</Parent_ID><Name>incident handling</Name><Description>incident handling</Description><Type>Keyword</Type></Query>
<Query><ID>3059738</ID><Parent_ID>346</Parent_ID><Name>incident management</Name><Description>incident management</Description><Type>Keyword</Type></Query>
<Query><ID>3059832</ID><Parent_ID>348</Parent_ID><Name>incident object description</Name><Description>incident object description</Description><Type>Keyword</Type></Query>
<Query><ID>3059834</ID><Parent_ID>348</Parent_ID><Name>incident object description exchange format</Name><Description>incident object description exchange format</Description><Type>Keyword</Type></Query>
<Query><ID>3059991</ID><Parent_ID>342</Parent_ID><Name>incident responder</Name><Description>incident responder</Description><Type>Keyword</Type></Query>
<Query><ID>3059998</ID><Parent_ID>342</Parent_ID><Name>incident response</Name><Description>incident response</Description><Type>Keyword</Type></Query>
<Query><ID>3060000</ID><Parent_ID>342</Parent_ID><Name>incident response activity</Name><Description>incident response activity</Description><Type>Keyword</Type></Query>
<Query><ID>3060024</ID><Parent_ID>342</Parent_ID><Name>incident response capability</Name><Description>incident response capability</Description><Type>Keyword</Type></Query>
<Query><ID>3060172</ID><Parent_ID>342</Parent_ID><Name>incident response plan</Name><Description>incident response plan</Description><Type>Keyword</Type></Query>
<Query><ID>3060206</ID><Parent_ID>342</Parent_ID><Name>incident response process</Name><Description>incident response process</Description><Type>Keyword</Type></Query>
<Query><ID>3060278</ID><Parent_ID>343</Parent_ID><Name>incident response team</Name><Description>incident response team</Description><Type>Keyword</Type></Query>
<Query><ID>3075965</ID><Parent_ID>167</Parent_ID><Name>industrial control system security</Name><Description>industrial control system security</Description><Type>Keyword</Type></Query>
<Query><ID>3078413</ID><Parent_ID>520</Parent_ID><Name>infected computer</Name><Description>infected computer</Description><Type>Keyword</Type></Query>
<Query><ID>3078477</ID><Parent_ID>520</Parent_ID><Name>infected host</Name><Description>infected host</Description><Type>Keyword</Type></Query>
<Query><ID>3078624</ID><Parent_ID>520</Parent_ID><Name>infected system</Name><Description>infected system</Description><Type>Keyword</Type></Query>
<Query><ID>3078866</ID><Parent_ID>483</Parent_ID><Name>infection vector</Name><Description>https://en.wikipedia.org/wiki/Vector_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>3081935</ID><Parent_ID>1</Parent_ID><Name>infosec</Name><Description>infosec</Description><Type>Keyword</Type></Query>
<Query><ID>3082249</ID><Parent_ID>38</Parent_ID><Name>infosec community</Name><Description>infosec community</Description><Type>Keyword</Type></Query>
<Query><ID>3082954</ID><Parent_ID>349</Parent_ID><Name>infosec hacking</Name><Description>infosec hacking</Description><Type>Keyword</Type></Query>
<Query><ID>3083374</ID><Parent_ID>309</Parent_ID><Name>infosec malware</Name><Description>infosec malware</Description><Type>Keyword</Type></Query>
<Query><ID>3083812</ID><Parent_ID>11</Parent_ID><Name>infosec people</Name><Description>infosec people</Description><Type>Keyword</Type></Query>
<Query><ID>3083927</ID><Parent_ID>318</Parent_ID><Name>infosec pro</Name><Description>infosec pro</Description><Type>Keyword</Type></Query>
<Query><ID>3083950</ID><Parent_ID>318</Parent_ID><Name>infosec professional</Name><Description>infosec professional</Description><Type>Keyword</Type></Query>
<Query><ID>3084872</ID><Parent_ID>1</Parent_ID><Name>infosecurity</Name><Description>infosecurity</Description><Type>Keyword</Type></Query>
<Query><ID>3085627</ID><Parent_ID>30</Parent_ID><Name>infrastructure protection</Name><Description>infrastructure protection</Description><Type>Keyword</Type></Query>
<Query><ID>3085741</ID><Parent_ID>425</Parent_ID><Name>infrastructure security</Name><Description>infrastructure security</Description><Type>Keyword</Type></Query>
<Query><ID>3089365</ID><Parent_ID>329</Parent_ID><Name>injection attack</Name><Description>Maybe too general?</Description><Type>Keyword</Type></Query>
<Query><ID>3089489</ID><Parent_ID>514</Parent_ID><Name>injection flaw</Name><Description>injection flaw</Description><Type>Keyword</Type></Query>
<Query><ID>3089650</ID><Parent_ID>514</Parent_ID><Name>injection technique</Name><Description>injection technique</Description><Type>Keyword</Type></Query>
<Query><ID>3093157</ID><Parent_ID>54</Parent_ID><Name>insider attack</Name><Description>insider attack</Description><Type>Keyword</Type></Query>
<Query><ID>3093424</ID><Parent_ID>82</Parent_ID><Name>insider threat</Name><Description>insider threat</Description><Type>Keyword</Type></Query>
<Query><ID>3099391</ID><Parent_ID>78</Parent_ID><Name>integer overflow</Name><Description>integer overflow</Description><Type>Keyword</Type></Query>
<Query><ID>3100697</ID><Parent_ID>80</Parent_ID><Name>intel amt vulnerability</Name><Description>intel amt vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3100772</ID><Parent_ID>469</Parent_ID><Name>intel boot guard</Name><Description>intel boot guard</Description><Type>Keyword</Type></Query>
<Query><ID>3101505</ID><Parent_ID>88</Parent_ID><Name>intel software guard extension</Name><Description>intel software guard extension</Description><Type>Keyword</Type></Query>
<Query><ID>3111646</ID><Parent_ID>474</Parent_ID><Name>internet crime complaint center</Name><Description>internet crime complaint center</Description><Type>Keyword</Type></Query>
<Query><ID>3113210</ID><Parent_ID>82</Parent_ID><Name>internet security threat</Name><Description>internet security threat</Description><Type>Keyword</Type></Query>
<Query><ID>3113212</ID><Parent_ID>330</Parent_ID><Name>internet security threat report</Name><Description>internet security threat report</Description><Type>Keyword</Type></Query>
<Query><ID>3113385</ID><Parent_ID>35</Parent_ID><Name>internet storm center</Name><Description>Security body: https://en.wikipedia.org/wiki/Internet_Storm_Center</Description><Type>Keyword</Type></Query>
<Query><ID>3113415</ID><Parent_ID>540</Parent_ID><Name>internet surveillance</Name><Description>internet surveillance</Description><Type>Keyword</Type></Query>
<Query><ID>3117929</ID><Parent_ID>114</Parent_ID><Name>intrusion detection systems</Name><Description>intrusion detection systems</Description><Type>Keyword</Type></Query>
<Query><ID>3117984</ID><Parent_ID>184</Parent_ID><Name>intrusion prevention</Name><Description>intrusion prevention</Description><Type>Keyword</Type></Query>
<Query><ID>3117995</ID><Parent_ID>184</Parent_ID><Name>intrusion prevention system</Name><Description>intrusion prevention system</Description><Type>Keyword</Type></Query>
<Query><ID>3122531</ID><Parent_ID>36</Parent_ID><Name>ioactive</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/IOActive</Description><Type>Keyword</Type></Query>
<Query><ID>3123688</ID><Parent_ID>176</Parent_ID><Name>ios security</Name><Description>ios security</Description><Type>Keyword</Type></Query>
<Query><ID>3124027</ID><Parent_ID>63</Parent_ID><Name>iot botnet</Name><Description>iot botnet</Description><Type>Keyword</Type></Query>
<Query><ID>3126042</ID><Parent_ID>331</Parent_ID><Name>iphone hack</Name><Description>iphone hack</Description><Type>Keyword</Type></Query>
<Query><ID>3126211</ID><Parent_ID>333</Parent_ID><Name>iphone secure boot firmware component</Name><Description>Too specific</Description><Type>Keyword</Type></Query>
<Query><ID>3127911</ID><Parent_ID>351</Parent_ID><Name>iranian hacker</Name><Description>iranian hacker</Description><Type>Keyword</Type></Query>
<Query><ID>3130289</ID><Parent_ID>37</Parent_ID><Name>isac</Name><Description>Information Sharing and Analysis Centers / Information Sharing and Analysis Center</Description><Type>Keyword</Type></Query>
<Query><ID>3130559</ID><Parent_ID>37</Parent_ID><Name>isc2</Name><Description>Cyber security organisation: (ISC)2</Description><Type>Keyword</Type></Query>
<Query><ID>3138521</ID><Parent_ID>167</Parent_ID><Name>itsecurity</Name><Description>itsecurity</Description><Type>Keyword</Type></Query>
<Query><ID>3141283</ID><Parent_ID>18</Parent_ID><Name>jajodia</Name><Description>Cyber security researcher Sushil Jajodia: https://csis.gmu.edu/jajodia/</Description><Type>Keyword</Type></Query>
<Query><ID>3146178</ID><Parent_ID>21</Parent_ID><Name>jeremy hammond</Name><Description>Hacker: https://en.wikipedia.org/wiki/Jeremy_Hammond</Description><Type>Keyword</Type></Query>
<Query><ID>3150146</ID><Parent_ID>12</Parent_ID><Name>john mcafee</Name><Description>john mcafee</Description><Type>Keyword</Type></Query>
<Query><ID>3155897</ID><Parent_ID>26</Parent_ID><Name>julian assange</Name><Description>WikiLeaks: https://en.wikipedia.org/wiki/Julian_Assange</Description><Type>Keyword</Type></Query>
<Query><ID>3158487</ID><Parent_ID>451</Parent_ID><Name>k-anonymity privacy protection</Name><Description>k-anonymity privacy protection</Description><Type>Keyword</Type></Query>
<Query><ID>3158528</ID><Parent_ID>296</Parent_ID><Name>k-anonymization</Name><Description>k-anonymization</Description><Type>Keyword</Type></Query>
<Query><ID>3159513</ID><Parent_ID>549</Parent_ID><Name>kali linux</Name><Description>kali linux</Description><Type>Keyword</Type></Query>
<Query><ID>3161189</ID><Parent_ID>36</Parent_ID><Name>kaspersky</Name><Description>kaspersky</Description><Type>Keyword</Type></Query>
<Query><ID>3161476</ID><Parent_ID>115</Parent_ID><Name>kaspersky internet security</Name><Description>kaspersky internet security</Description><Type>Keyword</Type></Query>
<Query><ID>3161499</ID><Parent_ID>36</Parent_ID><Name>kaspersky lab</Name><Description>kaspersky lab</Description><Type>Keyword</Type></Query>
<Query><ID>3161823</ID><Parent_ID>6</Parent_ID><Name>kaspersky security analyst summit</Name><Description>kaspersky security analyst summit</Description><Type>Keyword</Type></Query>
<Query><ID>3164120</ID><Parent_ID>63</Parent_ID><Name>kelihos botnet</Name><Description>kelihos botnet</Description><Type>Keyword</Type></Query>
<Query><ID>3164861</ID><Parent_ID>90</Parent_ID><Name>kerberos</Name><Description>User authentication protocol</Description><Type>Keyword</Type></Query>
<Query><ID>3165480</ID><Parent_ID>553</Parent_ID><Name>kernel memory corruption</Name><Description>kernel memory corruption</Description><Type>Keyword</Type></Query>
<Query><ID>3165488</ID><Parent_ID>113</Parent_ID><Name>kernel memory infoleak detector</Name><Description>kernel memory infoleak detector</Description><Type>Keyword</Type></Query>
<Query><ID>3165616</ID><Parent_ID>413</Parent_ID><Name>kernel pool overflow</Name><Description>kernel pool overflow</Description><Type>Keyword</Type></Query>
<Query><ID>3165642</ID><Parent_ID>328</Parent_ID><Name>kernel privilege escalation vulnerability</Name><Description>kernel privilege escalation vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3166275</ID><Parent_ID>21</Parent_ID><Name>kevin mitnick</Name><Description>kevin mitnick</Description><Type>Keyword</Type></Query>
<Query><ID>3166762</ID><Parent_ID>129</Parent_ID><Name>key cryptography</Name><Description>key cryptography</Description><Type>Keyword</Type></Query>
<Query><ID>3166880</ID><Parent_ID>307</Parent_ID><Name>key distribution</Name><Description>key distribution</Description><Type>Keyword</Type></Query>
<Query><ID>3166959</ID><Parent_ID>129</Parent_ID><Name>key encryption</Name><Description>key encryption</Description><Type>Keyword</Type></Query>
<Query><ID>3167136</ID><Parent_ID>307</Parent_ID><Name>key generation algorithm</Name><Description>key generation algorithm</Description><Type>Keyword</Type></Query>
<Query><ID>3167387</ID><Parent_ID>312</Parent_ID><Name>key logger</Name><Description>key logger</Description><Type>Keyword</Type></Query>
<Query><ID>3167578</ID><Parent_ID>129</Parent_ID><Name>key pair</Name><Description>key pair</Description><Type>Keyword</Type></Query>
<Query><ID>3167766</ID><Parent_ID>403</Parent_ID><Name>key reinstallation attack</Name><Description>key reinstallation attack</Description><Type>Keyword</Type></Query>
<Query><ID>3167959</ID><Parent_ID>129</Parent_ID><Name>key size</Name><Description>key size</Description><Type>Keyword</Type></Query>
<Query><ID>3168649</ID><Parent_ID>307</Parent_ID><Name>keygen</Name><Description>keygen</Description><Type>Keyword</Type></Query>
<Query><ID>3168901</ID><Parent_ID>312</Parent_ID><Name>keylogging</Name><Description>keylogging</Description><Type>Keyword</Type></Query>
<Query><ID>3171379</ID><Parent_ID>171</Parent_ID><Name>kill chain</Name><Description>Not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>3179147</ID><Parent_ID>403</Parent_ID><Name>krack attack</Name><Description>krack attack</Description><Type>Keyword</Type></Query>
<Query><ID>3179872</ID><Parent_ID>479</Parent_ID><Name>kronos banking trojan</Name><Description>kronos banking trojan</Description><Type>Keyword</Type></Query>
<Query><ID>3179936</ID><Parent_ID>18</Parent_ID><Name>kruegel</Name><Description>Cyber security researcher Christopher Kruegel: https://sites.cs.ucsb.edu/~chris/</Description><Type>Keyword</Type></Query>
<Query><ID>3181453</ID><Parent_ID>296</Parent_ID><Name>l-diversity</Name><Description>l-diversity</Description><Type>Keyword</Type></Query>
<Query><ID>3181513</ID><Parent_ID>223</Parent_ID><Name>l0pht</Name><Description>Hacker group: https://en.wikipedia.org/wiki/L0pht</Description><Type>Keyword</Type></Query>
<Query><ID>3190781</ID><Parent_ID>90</Parent_ID><Name>lastpass</Name><Description>password manager</Description><Type>Keyword</Type></Query>
<Query><ID>3225066</ID><Parent_ID>475</Parent_ID><Name>linux malware</Name><Description>linux malware</Description><Type>Keyword</Type></Query>
<Query><ID>3231846</ID><Parent_ID>223</Parent_ID><Name>lizard squad</Name><Description>Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service attacks primarily to disrupt gaming-related services.</Description><Type>Keyword</Type></Query>
<Query><ID>3235636</ID><Parent_ID>90</Parent_ID><Name>local privilege</Name><Description>Access control term</Description><Type>Keyword</Type></Query>
<Query><ID>3235653</ID><Parent_ID>328</Parent_ID><Name>local privilege escalation vulnerability</Name><Description>local privilege escalation vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3235772</ID><Parent_ID>79</Parent_ID><Name>local root exploit</Name><Description>https://github.com/5H311-1NJ3C706/local-root-exploits</Description><Type>Keyword</Type></Query>
<Query><ID>3238091</ID><Parent_ID>393</Parent_ID><Name>locky ransomware</Name><Description>https://en.wikipedia.org/wiki/Locky</Description><Type>Keyword</Type></Query>
<Query><ID>3249202</ID><Parent_ID>516</Parent_ID><Name>low orbit ion cannon</Name><Description>Low Orbit Ion Cannon is an open-source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.</Description><Type>Keyword</Type></Query>
<Query><ID>3252972</ID><Parent_ID>224</Parent_ID><Name>lulz</Name><Description>https://www.wired.com/2011/11/anonymous-101/</Description><Type>Keyword</Type></Query>
<Query><ID>3253207</ID><Parent_ID>223</Parent_ID><Name>lulzsec</Name><Description>Hacker group: https://en.wikipedia.org/wiki/LulzSec</Description><Type>Keyword</Type></Query>
<Query><ID>3256445</ID><Parent_ID>475</Parent_ID><Name>mac malware</Name><Description>mac malware</Description><Type>Keyword</Type></Query>
<Query><ID>3260726</ID><Parent_ID>218</Parent_ID><Name>magnitude exploit kit</Name><Description>magnitude exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>3267180</ID><Parent_ID>465</Parent_ID><Name>malicious android app</Name><Description>malicious android app</Description><Type>Keyword</Type></Query>
<Query><ID>3267199</ID><Parent_ID>465</Parent_ID><Name>malicious app</Name><Description>malicious app</Description><Type>Keyword</Type></Query>
<Query><ID>3267213</ID><Parent_ID>465</Parent_ID><Name>malicious application</Name><Description>malicious application</Description><Type>Keyword</Type></Query>
<Query><ID>3267276</ID><Parent_ID>462</Parent_ID><Name>malicious behavior</Name><Description>malicious behavior</Description><Type>Keyword</Type></Query>
<Query><ID>3267388</ID><Parent_ID>465</Parent_ID><Name>malicious code</Name><Description>malicious code</Description><Type>Keyword</Type></Query>
<Query><ID>3267484</ID><Parent_ID>462</Parent_ID><Name>malicious content</Name><Description>malicious content</Description><Type>Keyword</Type></Query>
<Query><ID>3267585</ID><Parent_ID>467</Parent_ID><Name>malicious domain</Name><Description>malicious domain</Description><Type>Keyword</Type></Query>
<Query><ID>3267617</ID><Parent_ID>462</Parent_ID><Name>malicious email</Name><Description>malicious email</Description><Type>Keyword</Type></Query>
<Query><ID>3267657</ID><Parent_ID>465</Parent_ID><Name>malicious executable</Name><Description>malicious executable</Description><Type>Keyword</Type></Query>
<Query><ID>3267833</ID><Parent_ID>466</Parent_ID><Name>malicious insider</Name><Description>malicious insider</Description><Type>Keyword</Type></Query>
<Query><ID>3267942</ID><Parent_ID>467</Parent_ID><Name>malicious link</Name><Description>malicious link</Description><Type>Keyword</Type></Query>
<Query><ID>3268142</ID><Parent_ID>465</Parent_ID><Name>malicious payload</Name><Description>malicious payload</Description><Type>Keyword</Type></Query>
<Query><ID>3268156</ID><Parent_ID>464</Parent_ID><Name>malicious pdf</Name><Description>malicious pdf</Description><Type>Keyword</Type></Query>
<Query><ID>3268267</ID><Parent_ID>465</Parent_ID><Name>malicious program</Name><Description>malicious program</Description><Type>Keyword</Type></Query>
<Query><ID>3268634</ID><Parent_ID>466</Parent_ID><Name>malicious user</Name><Description>malicious user</Description><Type>Keyword</Type></Query>
<Query><ID>3268694</ID><Parent_ID>467</Parent_ID><Name>malicious website</Name><Description>malicious website</Description><Type>Keyword</Type></Query>
<Query><ID>3268727</ID><Parent_ID>464</Parent_ID><Name>malicious word document</Name><Description>malicious word document</Description><Type>Keyword</Type></Query>
<Query><ID>3269121</ID><Parent_ID>483</Parent_ID><Name>malspam</Name><Description>Malware spam: https://blog.malwarebytes.com/threats/malspam/</Description><Type>Keyword</Type></Query>
<Query><ID>3269230</ID><Parent_ID>258</Parent_ID><Name>maltego</Name><Description>Digital forensics software: https://en.wikipedia.org/wiki/Maltego</Description><Type>Keyword</Type></Query>
<Query><ID>3269376</ID><Parent_ID>484</Parent_ID><Name>malvertise</Name><Description>Better change to &quot;malvertising&quot;: https://en.wikipedia.org/wiki/Malvertising</Description><Type>Keyword</Type></Query>
<Query><ID>3269384</ID><Parent_ID>484</Parent_ID><Name>malvertise campaign</Name><Description>malvertise campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3269848</ID><Parent_ID>310</Parent_ID><Name>malware analysis system</Name><Description>malware analysis system</Description><Type>Keyword</Type></Query>
<Query><ID>3269861</ID><Parent_ID>310</Parent_ID><Name>malware analysis tool</Name><Description>malware analysis tool</Description><Type>Keyword</Type></Query>
<Query><ID>3269890</ID><Parent_ID>310</Parent_ID><Name>malware analyst</Name><Description>malware analyst</Description><Type>Keyword</Type></Query>
<Query><ID>3270026</ID><Parent_ID>43</Parent_ID><Name>malware attack</Name><Description>malware attack</Description><Type>Keyword</Type></Query>
<Query><ID>3270097</ID><Parent_ID>310</Parent_ID><Name>malware attribute enumeration</Name><Description>malware attribute enumeration</Description><Type>Keyword</Type></Query>
<Query><ID>3270116</ID><Parent_ID>314</Parent_ID><Name>malware author</Name><Description>Not useful</Description><Type>Keyword</Type></Query>
<Query><ID>3270241</ID><Parent_ID>310</Parent_ID><Name>malware behavior</Name><Description>malware behavior</Description><Type>Keyword</Type></Query>
<Query><ID>3270430</ID><Parent_ID>313</Parent_ID><Name>malware campaign</Name><Description>malware campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3270971</ID><Parent_ID>315</Parent_ID><Name>malware detection</Name><Description>malware detection</Description><Type>Keyword</Type></Query>
<Query><ID>3271002</ID><Parent_ID>315</Parent_ID><Name>malware detection method</Name><Description>malware detection method</Description><Type>Keyword</Type></Query>
<Query><ID>3271023</ID><Parent_ID>315</Parent_ID><Name>malware detection system</Name><Description>malware detection system</Description><Type>Keyword</Type></Query>
<Query><ID>3271544</ID><Parent_ID>43</Parent_ID><Name>malware family</Name><Description>malware family</Description><Type>Keyword</Type></Query>
<Query><ID>3272139</ID><Parent_ID>313</Parent_ID><Name>malware infection</Name><Description>malware infection</Description><Type>Keyword</Type></Query>
<Query><ID>3272987</ID><Parent_ID>315</Parent_ID><Name>malware protection</Name><Description>malware protection</Description><Type>Keyword</Type></Query>
<Query><ID>3272995</ID><Parent_ID>315</Parent_ID><Name>malware protection engine</Name><Description>malware protection engine</Description><Type>Keyword</Type></Query>
<Query><ID>3273256</ID><Parent_ID>314</Parent_ID><Name>malware sample</Name><Description>Not useful</Description><Type>Keyword</Type></Query>
<Query><ID>3273724</ID><Parent_ID>313</Parent_ID><Name>malware target</Name><Description>malware target</Description><Type>Keyword</Type></Query>
<Query><ID>3273926</ID><Parent_ID>313</Parent_ID><Name>malware threat</Name><Description>malware threat</Description><Type>Keyword</Type></Query>
<Query><ID>3274117</ID><Parent_ID>43</Parent_ID><Name>malware variant</Name><Description>malware variant</Description><Type>Keyword</Type></Query>
<Query><ID>3274287</ID><Parent_ID>314</Parent_ID><Name>malware writer</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>3274595</ID><Parent_ID>116</Parent_ID><Name>malwarebytes</Name><Description>Cyber security software: https://en.wikipedia.org/wiki/Malwarebytes_(software)</Description><Type>Keyword</Type></Query>
<Query><ID>3274966</ID><Parent_ID>56</Parent_ID><Name>man-in-the-middle</Name><Description>man-in-the-middle</Description><Type>Keyword</Type></Query>
<Query><ID>3274967</ID><Parent_ID>56</Parent_ID><Name>man-in-the-middle attack</Name><Description>man-in-the-middle attack</Description><Type>Keyword</Type></Query>
<Query><ID>3275307</ID><Parent_ID>164</Parent_ID><Name>manage cyber risk</Name><Description>manage cyber risk</Description><Type>Keyword</Type></Query>
<Query><ID>3276010</ID><Parent_ID>429</Parent_ID><Name>managed security service</Name><Description>managed security service</Description><Type>Keyword</Type></Query>
<Query><ID>3278784</ID><Parent_ID>36</Parent_ID><Name>mandiant</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Mandiant</Description><Type>Keyword</Type></Query>
<Query><ID>3282982</ID><Parent_ID>18</Parent_ID><Name>marcus hutchins</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>3286648</ID><Parent_ID>12</Parent_ID><Name>mary ann davidson</Name><Description>CSO at Oracle</Description><Type>Keyword</Type></Query>
<Query><ID>3287872</ID><Parent_ID>540</Parent_ID><Name>mass surveillance</Name><Description>Loosely related especially on privacy</Description><Type>Keyword</Type></Query>
<Query><ID>3289423</ID><Parent_ID>548</Parent_ID><Name>master boot record</Name><Description>master boot record</Description><Type>Keyword</Type></Query>
<Query><ID>3289495</ID><Parent_ID>129</Parent_ID><Name>master decryption key</Name><Description>master decryption key</Description><Type>Keyword</Type></Query>
<Query><ID>3289566</ID><Parent_ID>129</Parent_ID><Name>master key</Name><Description>master key</Description><Type>Keyword</Type></Query>
<Query><ID>3297579</ID><Parent_ID>136</Parent_ID><Name>md5 hash</Name><Description>md5 hash</Description><Type>Keyword</Type></Query>
<Query><ID>3307395</ID><Parent_ID>300</Parent_ID><Name>memory analysis</Name><Description>technique for security analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3307523</ID><Parent_ID>416</Parent_ID><Name>memory corruption bug</Name><Description>memory corruption bug</Description><Type>Keyword</Type></Query>
<Query><ID>3307549</ID><Parent_ID>569</Parent_ID><Name>memory corruption vulnerability</Name><Description>memory corruption vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3307669</ID><Parent_ID>258</Parent_ID><Name>memory forensic</Name><Description>memory forensic</Description><Type>Keyword</Type></Query>
<Query><ID>3311333</ID><Parent_ID>388</Parent_ID><Name>message authentication code</Name><Description>message authentication code</Description><Type>Keyword</Type></Query>
<Query><ID>3314100</ID><Parent_ID>516</Parent_ID><Name>metasploit framework</Name><Description>metasploit framework</Description><Type>Keyword</Type></Query>
<Query><ID>3314145</ID><Parent_ID>516</Parent_ID><Name>metasploit module</Name><Description>metasploit module</Description><Type>Keyword</Type></Query>
<Query><ID>3314617</ID><Parent_ID>43</Parent_ID><Name>meterpreter</Name><Description>Security term: https://www.offensive-security.com/metasploit-unleashed/about-meterpreter/</Description><Type>Keyword</Type></Query>
<Query><ID>3324340</ID><Parent_ID>434</Parent_ID><Name>microsoft security bulletin</Name><Description>microsoft security bulletin</Description><Type>Keyword</Type></Query>
<Query><ID>3324358</ID><Parent_ID>115</Parent_ID><Name>microsoft security essentials</Name><Description>microsoft security essentials</Description><Type>Keyword</Type></Query>
<Query><ID>3324368</ID><Parent_ID>210</Parent_ID><Name>microsoft security intelligence report</Name><Description>microsoft security intelligence report</Description><Type>Keyword</Type></Query>
<Query><ID>3329106</ID><Parent_ID>494</Parent_ID><Name>millionmaskmarch</Name><Description>Cyber security related protest event: Million Mask March: https://en.wikipedia.org/wiki/Million_Mask_March</Description><Type>Keyword</Type></Query>
<Query><ID>3329712</ID><Parent_ID>365</Parent_ID><Name>mimikatz</Name><Description>https://github.com/gentilkiwi/mimikatz</Description><Type>Keyword</Type></Query>
<Query><ID>3331197</ID><Parent_ID>256</Parent_ID><Name>mini123</Name><Description>Magnetic Stripe Credit Card Reader sub model name</Description><Type>Keyword</Type></Query>
<Query><ID>3334238</ID><Parent_ID>485</Parent_ID><Name>mirai</Name><Description>Malware: https://en.wikipedia.org/wiki/Mirai_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>3335040</ID><Parent_ID>74</Parent_ID><Name>misconfiguration</Name><Description>General term, but can have security implications</Description><Type>Keyword</Type></Query>
<Query><ID>3335709</ID><Parent_ID>335</Parent_ID><Name>misp</Name><Description>Project: https://www.misp-project.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3338554</ID><Parent_ID>56</Parent_ID><Name>mitm</Name><Description>Man-in-the-Middle</Description><Type>Keyword</Type></Query>
<Query><ID>3338567</ID><Parent_ID>56</Parent_ID><Name>mitm attack</Name><Description>mitm attack</Description><Type>Keyword</Type></Query>
<Query><ID>3338792</ID><Parent_ID>244</Parent_ID><Name>mitre corporation</Name><Description>mitre corporation</Description><Type>Keyword</Type></Query>
<Query><ID>3340792</ID><Parent_ID>176</Parent_ID><Name>mobile app security</Name><Description>mobile app security</Description><Type>Keyword</Type></Query>
<Query><ID>3341202</ID><Parent_ID>176</Parent_ID><Name>mobile device security</Name><Description>mobile device security</Description><Type>Keyword</Type></Query>
<Query><ID>3341686</ID><Parent_ID>176</Parent_ID><Name>mobile phone hacking</Name><Description>mobile phone hacking</Description><Type>Keyword</Type></Query>
<Query><ID>3341813</ID><Parent_ID>176</Parent_ID><Name>mobile pwn2own</Name><Description>mobile pwn2own</Description><Type>Keyword</Type></Query>
<Query><ID>3342101</ID><Parent_ID>176</Parent_ID><Name>mobile threat</Name><Description>mobile threat</Description><Type>Keyword</Type></Query>
<Query><ID>3342382</ID><Parent_ID>176</Parent_ID><Name>mobilesecurity</Name><Description>mobilesecurity</Description><Type>Keyword</Type></Query>
<Query><ID>3350270</ID><Parent_ID>20</Parent_ID><Name>money mule</Name><Description>A money mule, sometimes called a &quot;smurfer,&quot; is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others. Typically, the mule is paid for services with a small part of the money transferred.</Description><Type>Keyword</Type></Query>
<Query><ID>3359718</ID><Parent_ID>499</Parent_ID><Name>mrrobot</Name><Description>Movie describing cyber security: https://en.wikipedia.org/wiki/Mr._Robot</Description><Type>Keyword</Type></Query>
<Query><ID>3360350</ID><Parent_ID>424</Parent_ID><Name>ms17-010</Name><Description>Security patch: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010</Description><Type>Keyword</Type></Query>
<Query><ID>3361228</ID><Parent_ID>521</Parent_ID><Name>msr2000</Name><Description>Magnetic Stripe Credit Card Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361229</ID><Parent_ID>521</Parent_ID><Name>msr206</Name><Description>Magnetic Stripe Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361233</ID><Parent_ID>521</Parent_ID><Name>msr3000</Name><Description>Magnetic Stripe Credit Card Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361234</ID><Parent_ID>521</Parent_ID><Name>msr400</Name><Description>Magnetic Stripe Credit Card Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361235</ID><Parent_ID>521</Parent_ID><Name>msr500m</Name><Description>Magnetic Stripe Credit Card Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361237</ID><Parent_ID>521</Parent_ID><Name>msr505</Name><Description>Magnetic Swipe Card Reader</Description><Type>Keyword</Type></Query>
<Query><ID>3361333</ID><Parent_ID>429</Parent_ID><Name>mssp</Name><Description>managed security service provider</Description><Type>Keyword</Type></Query>
<Query><ID>3365230</ID><Parent_ID>459</Parent_ID><Name>multiparty unconditionally secure protocol</Name><Description>multiparty unconditionally secure protocol</Description><Type>Keyword</Type></Query>
<Query><ID>3366179</ID><Parent_ID>522</Parent_ID><Name>multiple heap buffer overflow</Name><Description>multiple heap buffer overflow</Description><Type>Keyword</Type></Query>
<Query><ID>3377455</ID><Parent_ID>474</Parent_ID><Name>national crime agency</Name><Description>They have a cybercrime unit.</Description><Type>Keyword</Type></Query>
<Query><ID>3377479</ID><Parent_ID>30</Parent_ID><Name>national critical infrastructure</Name><Description>national critical infrastructure</Description><Type>Keyword</Type></Query>
<Query><ID>3377528</ID><Parent_ID>344</Parent_ID><Name>national cyber incident response plan</Name><Description>national cyber incident response plan</Description><Type>Keyword</Type></Query>
<Query><ID>3377548</ID><Parent_ID>37</Parent_ID><Name>national cyber security alliance</Name><Description>national cyber security alliance</Description><Type>Keyword</Type></Query>
<Query><ID>3377598</ID><Parent_ID>491</Parent_ID><Name>national cyber security strategy</Name><Description>national cyber security strategy</Description><Type>Keyword</Type></Query>
<Query><ID>3377631</ID><Parent_ID>3</Parent_ID><Name>national cybersecurity awareness</Name><Description>national cybersecurity awareness</Description><Type>Keyword</Type></Query>
<Query><ID>3377634</ID><Parent_ID>3</Parent_ID><Name>national cybersecurity awareness month</Name><Description>national cybersecurity awareness month</Description><Type>Keyword</Type></Query>
<Query><ID>3377688</ID><Parent_ID>277</Parent_ID><Name>national data protection authority</Name><Description>national data protection authority</Description><Type>Keyword</Type></Query>
<Query><ID>3378624</ID><Parent_ID>491</Parent_ID><Name>national security letter</Name><Description>national security letter</Description><Type>Keyword</Type></Query>
<Query><ID>3378874</ID><Parent_ID>75</Parent_ID><Name>national vulnerability database</Name><Description>national vulnerability database</Description><Type>Keyword</Type></Query>
<Query><ID>3379734</ID><Parent_ID>288</Parent_ID><Name>nato ccd coe</Name><Description>The NATO Cooperative Cyber Defence Centre of Excellence is a multinational and interdisciplinary hub of cyber defence expertise.</Description><Type>Keyword</Type></Query>
<Query><ID>3379781</ID><Parent_ID>288</Parent_ID><Name>nato cooperative cyber defence centre</Name><Description>nato cooperative cyber defence centre</Description><Type>Keyword</Type></Query>
<Query><ID>3382532</ID><Parent_ID>3</Parent_ID><Name>ncsam</Name><Description>National Cybersecurity Awareness Month: https://staysafeonline.org/ncsam/</Description><Type>Keyword</Type></Query>
<Query><ID>3383887</ID><Parent_ID>63</Parent_ID><Name>necurs</Name><Description>Botnet: https://en.wikipedia.org/wiki/Necurs_botnet</Description><Type>Keyword</Type></Query>
<Query><ID>3386905</ID><Parent_ID>234</Parent_ID><Name>nessus</Name><Description>Security software: https://en.wikipedia.org/wiki/Nessus_(software)</Description><Type>Keyword</Type></Query>
<Query><ID>3387461</ID><Parent_ID>581</Parent_ID><Name>net neutrality rule</Name><Description>net neutrality rule</Description><Type>Keyword</Type></Query>
<Query><ID>3387927</ID><Parent_ID>525</Parent_ID><Name>netcat</Name><Description>Network security and forensics tool: https://en.wikipedia.org/wiki/Netcat</Description><Type>Keyword</Type></Query>
<Query><ID>3388413</ID><Parent_ID>36</Parent_ID><Name>netgear</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Netgear</Description><Type>Keyword</Type></Query>
<Query><ID>3388956</ID><Parent_ID>36</Parent_ID><Name>netsec</Name><Description>netsec</Description><Type>Keyword</Type></Query>
<Query><ID>3390638</ID><Parent_ID>90</Parent_ID><Name>network access control</Name><Description>network access control</Description><Type>Keyword</Type></Query>
<Query><ID>3391829</ID><Parent_ID>428</Parent_ID><Name>network flow data</Name><Description>network flow data</Description><Type>Keyword</Type></Query>
<Query><ID>3392211</ID><Parent_ID>231</Parent_ID><Name>network intrusion detection system</Name><Description>network intrusion detection system</Description><Type>Keyword</Type></Query>
<Query><ID>3393116</ID><Parent_ID>428</Parent_ID><Name>network security analysis</Name><Description>network security analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3393234</ID><Parent_ID>428</Parent_ID><Name>network security monitoring</Name><Description>network security monitoring</Description><Type>Keyword</Type></Query>
<Query><ID>3393776</ID><Parent_ID>428</Parent_ID><Name>network traffic analysis</Name><Description>network traffic analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3393806</ID><Parent_ID>428</Parent_ID><Name>network traffic data</Name><Description>network traffic data</Description><Type>Keyword</Type></Query>
<Query><ID>3394177</ID><Parent_ID>231</Parent_ID><Name>network-based intrusion detection system</Name><Description>network-based intrusion detection system</Description><Type>Keyword</Type></Query>
<Query><ID>3406314</ID><Parent_ID>491</Parent_ID><Name>nist cybersecurity framework</Name><Description>nist cybersecurity framework</Description><Type>Keyword</Type></Query>
<Query><ID>3407784</ID><Parent_ID>526</Parent_ID><Name>nmap</Name><Description>https://nmap.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3410425</ID><Parent_ID>494</Parent_ID><Name>nolove4usgov</Name><Description>Compaign for freeing Lauri Love: https://twitter.com/hashtag/nolove4usgov?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>3421427</ID><Parent_ID>394</Parent_ID><Name>notpetya</Name><Description>https://en.wikipedia.org/wiki/Petya_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>3424546</ID><Parent_ID>349</Parent_ID><Name>nsa malware staging server</Name><Description>nsa malware staging server</Description><Type>Keyword</Type></Query>
<Query><ID>3424927</ID><Parent_ID>156</Parent_ID><Name>nsa spy</Name><Description>nsa spy</Description><Type>Keyword</Type></Query>
<Query><ID>3425005</ID><Parent_ID>540</Parent_ID><Name>nsa surveillance</Name><Description>nsa surveillance</Description><Type>Keyword</Type></Query>
<Query><ID>3426751</ID><Parent_ID>39</Parent_ID><Name>nuclear exploit kit</Name><Description>nuclear exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>3429125</ID><Parent_ID>75</Parent_ID><Name>nvd</Name><Description>National Vulnerability Database: https://nvd.nist.gov/</Description><Type>Keyword</Type></Query>
<Query><ID>3430932</ID><Parent_ID>37</Parent_ID><Name>oasis cyber threat intelligence</Name><Description>oasis cyber threat intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>3431016</ID><Parent_ID>92</Parent_ID><Name>oauth</Name><Description>Security technology: https://en.wikipedia.org/wiki/OAuth</Description><Type>Keyword</Type></Query>
<Query><ID>3432087</ID><Parent_ID>572</Parent_ID><Name>obfuscation technique</Name><Description>obfuscation technique</Description><Type>Keyword</Type></Query>
<Query><ID>3438963</ID><Parent_ID>541</Parent_ID><Name>offensive community</Name><Description>Not useful</Description><Type>Keyword</Type></Query>
<Query><ID>3443599</ID><Parent_ID>88</Parent_ID><Name>offsec</Name><Description>Offensive Security</Description><Type>Keyword</Type></Query>
<Query><ID>3448213</ID><Parent_ID>524</Parent_ID><Name>ollydbg</Name><Description>Reverse engineering tool: https://en.wikipedia.org/wiki/OllyDbg</Description><Type>Keyword</Type></Query>
<Query><ID>3451499</ID><Parent_ID>503</Parent_ID><Name>onion service</Name><Description>onion service</Description><Type>Keyword</Type></Query>
<Query><ID>3461280</ID><Parent_ID>69</Parent_ID><Name>online dating scams</Name><Description>online dating scams</Description><Type>Keyword</Type></Query>
<Query><ID>3464907</ID><Parent_ID>453</Parent_ID><Name>online safety</Name><Description>online safety</Description><Type>Keyword</Type></Query>
<Query><ID>3469511</ID><Parent_ID>549</Parent_ID><Name>openbsd</Name><Description>OpenBSD is a free and open-source, security-focused, Unix-like operating system based on the Berkeley Software Distribution. Theo de Raadt created OpenBSD in 1995 by forking NetBSD. According to de Raadt, OpenBSD is a research operating system for developing security mitigations.</Description><Type>Keyword</Type></Query>
<Query><ID>3469730</ID><Parent_ID>74</Parent_ID><Name>openflow</Name><Description>General networking term, but connection with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3469871</ID><Parent_ID>423</Parent_ID><Name>openioc</Name><Description>Incident management: https://www.fireeye.com/blog/threat-research/2013/10/openioc-basics.html</Description><Type>Keyword</Type></Query>
<Query><ID>3470335</ID><Parent_ID>145</Parent_ID><Name>openssh</Name><Description>openssh</Description><Type>Keyword</Type></Query>
<Query><ID>3470388</ID><Parent_ID>141</Parent_ID><Name>openssl</Name><Description>openssl</Description><Type>Keyword</Type></Query>
<Query><ID>3471172</ID><Parent_ID>506</Parent_ID><Name>openvpn</Name><Description>Cyber security software: https://en.wikipedia.org/wiki/OpenVPN</Description><Type>Keyword</Type></Query>
<Query><ID>3473103</ID><Parent_ID>167</Parent_ID><Name>operational security</Name><Description>operational security</Description><Type>Keyword</Type></Query>
<Query><ID>3474495</ID><Parent_ID>39</Parent_ID><Name>opisrael</Name><Description>Attack: https://en.wikipedia.org/wiki/OpIsrael</Description><Type>Keyword</Type></Query>
<Query><ID>3479664</ID><Parent_ID>427</Parent_ID><Name>oreillysecurity</Name><Description>oreillysecurity</Description><Type>Keyword</Type></Query>
<Query><ID>3485563</ID><Parent_ID>353</Parent_ID><Name>oscp</Name><Description>Offensive Security Certified Professional: https://en.wikipedia.org/wiki/Offensive_Security_Certified_Professional</Description><Type>Keyword</Type></Query>
<Query><ID>3485761</ID><Parent_ID>171</Parent_ID><Name>osint</Name><Description>https://en.wikipedia.org/wiki/Open-source_intelligence</Description><Type>Keyword</Type></Query>
<Query><ID>3497194</ID><Parent_ID>449</Parent_ID><Name>owasp</Name><Description>https://en.wikipedia.org/wiki/OWASP</Description><Type>Keyword</Type></Query>
<Query><ID>3497451</ID><Parent_ID>449</Parent_ID><Name>owasp zed attack proxy</Name><Description>owasp zed attack proxy</Description><Type>Keyword</Type></Query>
<Query><ID>3501392</ID><Parent_ID>54</Parent_ID><Name>packet loss</Name><Description>packet loss</Description><Type>Keyword</Type></Query>
<Query><ID>3501572</ID><Parent_ID>430</Parent_ID><Name>packet trace anonymization</Name><Description>packet trace anonymization</Description><Type>Keyword</Type></Query>
<Query><ID>3501778</ID><Parent_ID>4</Parent_ID><Name>pacsec</Name><Description>Cyber security event: https://pacsec.jp/</Description><Type>Keyword</Type></Query>
<Query><ID>3504546</ID><Parent_ID>36</Parent_ID><Name>palo alto networks</Name><Description>palo alto networks</Description><Type>Keyword</Type></Query>
<Query><ID>3504826</ID><Parent_ID>575</Parent_ID><Name>panama papers</Name><Description>The Panama Papers are 11.5 million leaked documents that detail financial and attorney–client information for more than 214,488 offshore entities</Description><Type>Keyword</Type></Query>
<Query><ID>3516114</ID><Parent_ID>193</Parent_ID><Name>passphrase</Name><Description>passphrase</Description><Type>Keyword</Type></Query>
<Query><ID>3516481</ID><Parent_ID>438</Parent_ID><Name>password crack</Name><Description>password crack</Description><Type>Keyword</Type></Query>
<Query><ID>3516519</ID><Parent_ID>438</Parent_ID><Name>password crack tool</Name><Description>password crack tool</Description><Type>Keyword</Type></Query>
<Query><ID>3516530</ID><Parent_ID>438</Parent_ID><Name>password cracker</Name><Description>password cracker</Description><Type>Keyword</Type></Query>
<Query><ID>3516734</ID><Parent_ID>375</Parent_ID><Name>password hash</Name><Description>password hash</Description><Type>Keyword</Type></Query>
<Query><ID>3516842</ID><Parent_ID>90</Parent_ID><Name>password management</Name><Description>password management</Description><Type>Keyword</Type></Query>
<Query><ID>3516862</ID><Parent_ID>93</Parent_ID><Name>password manager</Name><Description>password manager</Description><Type>Keyword</Type></Query>
<Query><ID>3517096</ID><Parent_ID>539</Parent_ID><Name>password recovery</Name><Description>password recovery</Description><Type>Keyword</Type></Query>
<Query><ID>3517151</ID><Parent_ID>539</Parent_ID><Name>password reset</Name><Description>password reset</Description><Type>Keyword</Type></Query>
<Query><ID>3517227</ID><Parent_ID>167</Parent_ID><Name>password security</Name><Description>password security</Description><Type>Keyword</Type></Query>
<Query><ID>3517846</ID><Parent_ID>567</Parent_ID><Name>pastebin</Name><Description>General online service, but connection with security is strong enough: https://en.wikipedia.org/wiki/Pastebin</Description><Type>Keyword</Type></Query>
<Query><ID>3518549</ID><Parent_ID>424</Parent_ID><Name>patch management</Name><Description>patch management</Description><Type>Keyword</Type></Query>
<Query><ID>3524285</ID><Parent_ID>378</Parent_ID><Name>payment card breach</Name><Description>payment card breach</Description><Type>Keyword</Type></Query>
<Query><ID>3524291</ID><Parent_ID>376</Parent_ID><Name>payment card data</Name><Description>payment card data</Description><Type>Keyword</Type></Query>
<Query><ID>3525390</ID><Parent_ID>559</Parent_ID><Name>pcap</Name><Description>General term, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3525663</ID><Parent_ID>377</Parent_ID><Name>pci dss</Name><Description>The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.</Description><Type>Keyword</Type></Query>
<Query><ID>3528516</ID><Parent_ID>326</Parent_ID><Name>pegasus ios kernel vulnerability</Name><Description>pegasus ios kernel vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3528961</ID><Parent_ID>11</Parent_ID><Name>pen tester</Name><Description>pen tester</Description><Type>Keyword</Type></Query>
<Query><ID>3528968</ID><Parent_ID>90</Parent_ID><Name>pen testing</Name><Description>pen testing</Description><Type>Keyword</Type></Query>
<Query><ID>3529571</ID><Parent_ID>12</Parent_ID><Name>penetration tester</Name><Description>penetration tester</Description><Type>Keyword</Type></Query>
<Query><ID>3529585</ID><Parent_ID>519</Parent_ID><Name>penetration testing</Name><Description>penetration testing</Description><Type>Keyword</Type></Query>
<Query><ID>3530544</ID><Parent_ID>12</Parent_ID><Name>pentester</Name><Description>pentester</Description><Type>Keyword</Type></Query>
<Query><ID>3530616</ID><Parent_ID>519</Parent_ID><Name>pentesting</Name><Description>pentesting</Description><Type>Keyword</Type></Query>
<Query><ID>3537781</ID><Parent_ID>90</Parent_ID><Name>permissions</Name><Description>permissions</Description><Type>Keyword</Type></Query>
<Query><ID>3540084</ID><Parent_ID>447</Parent_ID><Name>personal data breach</Name><Description>personal data breach</Description><Type>Keyword</Type></Query>
<Query><ID>3540175</ID><Parent_ID>444</Parent_ID><Name>personal data protection</Name><Description>personal data protection</Description><Type>Keyword</Type></Query>
<Query><ID>3543206</ID><Parent_ID>394</Parent_ID><Name>petya ransomware</Name><Description>https://en.wikipedia.org/wiki/Petya_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>3543704</ID><Parent_ID>544</Parent_ID><Name>pgp key</Name><Description>pgp key</Description><Type>Keyword</Type></Query>
<Query><ID>3543750</ID><Parent_ID>544</Parent_ID><Name>pgp public key</Name><Description>pgp public key</Description><Type>Keyword</Type></Query>
<Query><ID>3543751</ID><Parent_ID>544</Parent_ID><Name>pgp public key block</Name><Description>pgp public key block</Description><Type>Keyword</Type></Query>
<Query><ID>3546770</ID><Parent_ID>21</Parent_ID><Name>phineas fisher hack hacking team</Name><Description>Need to be simplified to the name of the hacker &quot;Phineas Fisher&quot;.</Description><Type>Keyword</Type></Query>
<Query><ID>3547123</ID><Parent_ID>69</Parent_ID><Name>phish site</Name><Description>phish site</Description><Type>Keyword</Type></Query>
<Query><ID>3547306</ID><Parent_ID>69</Parent_ID><Name>phishing attack</Name><Description>phishing attack</Description><Type>Keyword</Type></Query>
<Query><ID>3547480</ID><Parent_ID>494</Parent_ID><Name>phishing campaign</Name><Description>phishing campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3547655</ID><Parent_ID>69</Parent_ID><Name>phishing email</Name><Description>phishing email</Description><Type>Keyword</Type></Query>
<Query><ID>3548023</ID><Parent_ID>69</Parent_ID><Name>phishing scam</Name><Description>phishing scam</Description><Type>Keyword</Type></Query>
<Query><ID>3548193</ID><Parent_ID>69</Parent_ID><Name>phishing site</Name><Description>phishing site</Description><Type>Keyword</Type></Query>
<Query><ID>3550918</ID><Parent_ID>541</Parent_ID><Name>phrack</Name><Description>Hacker magazine: https://en.wikipedia.org/wiki/Phrack</Description><Type>Keyword</Type></Query>
<Query><ID>3555048</ID><Parent_ID>277</Parent_ID><Name>pii</Name><Description>personally identifiable information (it may have other meanings)</Description><Type>Keyword</Type></Query>
<Query><ID>3556495</ID><Parent_ID>376</Parent_ID><Name>pin code</Name><Description>pin code</Description><Type>Keyword</Type></Query>
<Query><ID>3557791</ID><Parent_ID>500</Parent_ID><Name>pirate bay</Name><Description>Piracy service: https://en.wikipedia.org/wiki/The_Pirate_Bay</Description><Type>Keyword</Type></Query>
<Query><ID>3566808</ID><Parent_ID>78</Parent_ID><Name>poc exploit</Name><Description>poc exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3568700</ID><Parent_ID>60</Parent_ID><Name>poisoning attack</Name><Description>poisoning attack</Description><Type>Keyword</Type></Query>
<Query><ID>3574914</ID><Parent_ID>31</Parent_ID><Name>ponemon</Name><Description>Cyber security organisation: https://www.ponemon.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3574919</ID><Parent_ID>31</Parent_ID><Name>ponemon institute</Name><Description>The Ponemon Institute is a private research organization that conducts independent research on privacy, data protection and information security policy.</Description><Type>Keyword</Type></Query>
<Query><ID>3579834</ID><Parent_ID>519</Parent_ID><Name>port scan</Name><Description>Better change to &quot;port scanning&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>3580908</ID><Parent_ID>43</Parent_ID><Name>pos malware</Name><Description>pos malware</Description><Type>Keyword</Type></Query>
<Query><ID>3584163</ID><Parent_ID>388</Parent_ID><Name>post-quantum</Name><Description>This is mostly about post-quantum crypto. Check duplication.</Description><Type>Keyword</Type></Query>
<Query><ID>3588890</ID><Parent_ID>329</Parent_ID><Name>powershell code injection vulnerability</Name><Description>powershell code injection vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3589179</ID><Parent_ID>554</Parent_ID><Name>powershell script</Name><Description>This is general but may be argued based on strong connections with security.</Description><Type>Keyword</Type></Query>
<Query><ID>3589363</ID><Parent_ID>554</Parent_ID><Name>powerview</Name><Description>Security tool: https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon</Description><Type>Keyword</Type></Query>
<Query><ID>3590388</ID><Parent_ID>310</Parent_ID><Name>practical malware analysis</Name><Description>practical malware analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3604312</ID><Parent_ID>303</Parent_ID><Name>preserve data mining</Name><Description>preserve data mining</Description><Type>Keyword</Type></Query>
<Query><ID>3615539</ID><Parent_ID>156</Parent_ID><Name>privacy breach</Name><Description>privacy breach</Description><Type>Keyword</Type></Query>
<Query><ID>3615863</ID><Parent_ID>295</Parent_ID><Name>privacy constraint</Name><Description>privacy constraint</Description><Type>Keyword</Type></Query>
<Query><ID>3616252</ID><Parent_ID>305</Parent_ID><Name>privacy enhancing technologies</Name><Description>privacy enhancing technologies</Description><Type>Keyword</Type></Query>
<Query><ID>3616535</ID><Parent_ID>156</Parent_ID><Name>privacy impact</Name><Description>privacy impact</Description><Type>Keyword</Type></Query>
<Query><ID>3616538</ID><Parent_ID>156</Parent_ID><Name>privacy impact assessment</Name><Description>privacy impact assessment</Description><Type>Keyword</Type></Query>
<Query><ID>3616949</ID><Parent_ID>295</Parent_ID><Name>privacy model</Name><Description>privacy model</Description><Type>Keyword</Type></Query>
<Query><ID>3617241</ID><Parent_ID>297</Parent_ID><Name>privacy preservation</Name><Description>privacy preservation</Description><Type>Keyword</Type></Query>
<Query><ID>3617384</ID><Parent_ID>303</Parent_ID><Name>privacy preserving data mining</Name><Description>privacy preserving data mining</Description><Type>Keyword</Type></Query>
<Query><ID>3617391</ID><Parent_ID>304</Parent_ID><Name>privacy preserving data publishing</Name><Description>privacy preserving data publishing</Description><Type>Keyword</Type></Query>
<Query><ID>3617652</ID><Parent_ID>295</Parent_ID><Name>privacy requirement</Name><Description>privacy requirement</Description><Type>Keyword</Type></Query>
<Query><ID>3617884</ID><Parent_ID>295</Parent_ID><Name>privacy setting</Name><Description>privacy setting</Description><Type>Keyword</Type></Query>
<Query><ID>3617904</ID><Parent_ID>577</Parent_ID><Name>privacy shield</Name><Description>privacy shield</Description><Type>Keyword</Type></Query>
<Query><ID>3618266</ID><Parent_ID>295</Parent_ID><Name>privacy-aware access control</Name><Description>privacy-aware access control</Description><Type>Keyword</Type></Query>
<Query><ID>3618527</ID><Parent_ID>297</Parent_ID><Name>privacy-preserving</Name><Description>privacy-preserving</Description><Type>Keyword</Type></Query>
<Query><ID>3618592</ID><Parent_ID>300</Parent_ID><Name>privacy-preserving data analysis</Name><Description>privacy-preserving data analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3618602</ID><Parent_ID>303</Parent_ID><Name>privacy-preserving data mining</Name><Description>privacy-preserving data mining</Description><Type>Keyword</Type></Query>
<Query><ID>3618619</ID><Parent_ID>304</Parent_ID><Name>privacy-preserving data publishing</Name><Description>privacy-preserving data publishing</Description><Type>Keyword</Type></Query>
<Query><ID>3620261</ID><Parent_ID>295</Parent_ID><Name>private proxy</Name><Description>General term, connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3621146</ID><Parent_ID>414</Parent_ID><Name>privilege escalation exploit</Name><Description>privilege escalation exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3625492</ID><Parent_ID>364</Parent_ID><Name>process explorer</Name><Description>Security tool: https://en.wikipedia.org/wiki/Process_Explorer</Description><Type>Keyword</Type></Query>
<Query><ID>3625666</ID><Parent_ID>329</Parent_ID><Name>process injection</Name><Description>process injection</Description><Type>Keyword</Type></Query>
<Query><ID>3625669</ID><Parent_ID>329</Parent_ID><Name>process injection technique</Name><Description>process injection technique</Description><Type>Keyword</Type></Query>
<Query><ID>3625941</ID><Parent_ID>277</Parent_ID><Name>process personal data</Name><Description>process personal data</Description><Type>Keyword</Type></Query>
<Query><ID>3628537</ID><Parent_ID>343</Parent_ID><Name>product security incident response team</Name><Description>product security incident response team</Description><Type>Keyword</Type></Query>
<Query><ID>3629747</ID><Parent_ID>23</Parent_ID><Name>professional hacker</Name><Description>professional hacker</Description><Type>Keyword</Type></Query>
<Query><ID>3654037</ID><Parent_ID>529</Parent_ID><Name>psexec</Name><Description>PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console</Description><Type>Keyword</Type></Query>
<Query><ID>3656064</ID><Parent_ID>130</Parent_ID><Name>public key certificate</Name><Description>public key certificate</Description><Type>Keyword</Type></Query>
<Query><ID>3656090</ID><Parent_ID>130</Parent_ID><Name>public key cryptography</Name><Description>public key cryptography</Description><Type>Keyword</Type></Query>
<Query><ID>3656100</ID><Parent_ID>130</Parent_ID><Name>public key cryptosystem</Name><Description>public key cryptosystem</Description><Type>Keyword</Type></Query>
<Query><ID>3656118</ID><Parent_ID>130</Parent_ID><Name>public key encryption</Name><Description>public key encryption</Description><Type>Keyword</Type></Query>
<Query><ID>3656136</ID><Parent_ID>345</Parent_ID><Name>public key infrastructure certificate</Name><Description>public key infrastructure certificate</Description><Type>Keyword</Type></Query>
<Query><ID>3656163</ID><Parent_ID>142</Parent_ID><Name>public key pinning</Name><Description>public key pinning</Description><Type>Keyword</Type></Query>
<Query><ID>3665130</ID><Parent_ID>244</Parent_ID><Name>pwc</Name><Description>Company with strong cyber security presence: https://en.wikipedia.org/wiki/PricewaterhouseCoopers</Description><Type>Keyword</Type></Query>
<Query><ID>3665381</ID><Parent_ID>370</Parent_ID><Name>pwn2own</Name><Description>https://en.wikipedia.org/wiki/Pwn2Own</Description><Type>Keyword</Type></Query>
<Query><ID>3665713</ID><Parent_ID>433</Parent_ID><Name>pwnie</Name><Description>Pwnie Award: https://en.wikipedia.org/wiki/Pwnie_Awards</Description><Type>Keyword</Type></Query>
<Query><ID>3671292</ID><Parent_ID>558</Parent_ID><Name>quasi-identifier</Name><Description>https://en.wikipedia.org/wiki/Quasi-identifier</Description><Type>Keyword</Type></Query>
<Query><ID>3671429</ID><Parent_ID>549</Parent_ID><Name>qubes</Name><Description>Security focused OS: https://en.wikipedia.org/wiki/Qubes_OS</Description><Type>Keyword</Type></Query>
<Query><ID>3671471</ID><Parent_ID>167</Parent_ID><Name>qubes security bulletin</Name><Description>qubes security bulletin</Description><Type>Keyword</Type></Query>
<Query><ID>3673786</ID><Parent_ID>36</Parent_ID><Name>quick heal antivirus</Name><Description>quick heal antivirus</Description><Type>Keyword</Type></Query>
<Query><ID>3676330</ID><Parent_ID>534</Parent_ID><Name>race condition</Name><Description>A race condition or race hazard is the behavior of an electronics, software, or other system where the system&#39;s substantive behavior is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when one or more of the possible behaviors is undesirable.</Description><Type>Keyword</Type></Query>
<Query><ID>3677110</ID><Parent_ID>524</Parent_ID><Name>radare2</Name><Description>Reverse engineering software: https://en.wikipedia.org/wiki/Radare2</Description><Type>Keyword</Type></Query>
<Query><ID>3680169</ID><Parent_ID>45</Parent_ID><Name>ramnit</Name><Description>Malware: https://en.wikipedia.org/wiki/Ramnit</Description><Type>Keyword</Type></Query>
<Query><ID>3683190</ID><Parent_ID>44</Parent_ID><Name>ransomware attack</Name><Description>ransomware attack</Description><Type>Keyword</Type></Query>
<Query><ID>3683370</ID><Parent_ID>44</Parent_ID><Name>ransomware campaign</Name><Description>ransomware campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3683516</ID><Parent_ID>44</Parent_ID><Name>ransomware decryption tool</Name><Description>ransomware decryption tool</Description><Type>Keyword</Type></Query>
<Query><ID>3684056</ID><Parent_ID>44</Parent_ID><Name>ransomware outbreak</Name><Description>ransomware outbreak</Description><Type>Keyword</Type></Query>
<Query><ID>3684464</ID><Parent_ID>82</Parent_ID><Name>ransomware threat</Name><Description>ransomware threat</Description><Type>Keyword</Type></Query>
<Query><ID>3685125</ID><Parent_ID>36</Parent_ID><Name>rapid7</Name><Description>Cyber security company: https://www.rapid7.com/</Description><Type>Keyword</Type></Query>
<Query><ID>3689712</ID><Parent_ID>325</Parent_ID><Name>re-identification</Name><Description>re-identification</Description><Type>Keyword</Type></Query>
<Query><ID>3696434</ID><Parent_ID>386</Parent_ID><Name>realworldcrypto</Name><Description>Real World Crypto Symposium: https://rwc.iacr.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3701186</ID><Parent_ID>4</Parent_ID><Name>recon</Name><Description>Cyber security conference: https://recon.cx/</Description><Type>Keyword</Type></Query>
<Query><ID>3701383</ID><Parent_ID>407</Parent_ID><Name>reconmtl</Name><Description>REcon: Annual reverse engineering and security conference held in Montreal. ... Next Recon Montreal will be 19-21 of June 2020. ... Recon was the last conference on my infosec bucket list!</Description><Type>Keyword</Type></Query>
<Query><ID>3705424</ID><Parent_ID>21</Parent_ID><Name>redhack</Name><Description>redhack</Description><Type>Keyword</Type></Query>
<Query><ID>3705821</ID><Parent_ID>482</Parent_ID><Name>redoctober</Name><Description>Malware: https://en.wikipedia.org/wiki/Red_October_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>3705974</ID><Parent_ID>527</Parent_ID><Name>redteam</Name><Description>redteam</Description><Type>Keyword</Type></Query>
<Query><ID>3708388</ID><Parent_ID>329</Parent_ID><Name>reflect xss</Name><Description>reflected xss</Description><Type>Keyword</Type></Query>
<Query><ID>3709667</ID><Parent_ID>367</Parent_ID><Name>regin</Name><Description>Regin is a sophisticated malware and hacking toolkit used by United States&#39; National Security Agency (NSA) and its British counterpart, the Government ...</Description><Type>Keyword</Type></Query>
<Query><ID>3709889</ID><Parent_ID>330</Parent_ID><Name>regional advanced threat report</Name><Description>regional advanced threat report</Description><Type>Keyword</Type></Query>
<Query><ID>3719839</ID><Parent_ID>524</Parent_ID><Name>remnux</Name><Description>Reserve engineering tool REMnux: https://remnux.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3720050</ID><Parent_ID>54</Parent_ID><Name>remote attack</Name><Description>remote attack</Description><Type>Keyword</Type></Query>
<Query><ID>3720174</ID><Parent_ID>371</Parent_ID><Name>remote code exec</Name><Description>remote code exec</Description><Type>Keyword</Type></Query>
<Query><ID>3720183</ID><Parent_ID>371</Parent_ID><Name>remote code execution</Name><Description>remote code execution</Description><Type>Keyword</Type></Query>
<Query><ID>3720199</ID><Parent_ID>371</Parent_ID><Name>remote code execution exploit</Name><Description>remote code execution exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3720202</ID><Parent_ID>371</Parent_ID><Name>remote code execution flaw</Name><Description>covered by remote code execution</Description><Type>Keyword</Type></Query>
<Query><ID>3720218</ID><Parent_ID>371</Parent_ID><Name>remote code execution vuln</Name><Description>not a proper phrase</Description><Type>Keyword</Type></Query>
<Query><ID>3720221</ID><Parent_ID>327</Parent_ID><Name>remote code execution vulnerability</Name><Description>remote code execution vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3720250</ID><Parent_ID>327</Parent_ID><Name>remote command execution vulnerability</Name><Description>remote command execution vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3720361</ID><Parent_ID>529</Parent_ID><Name>remote desktop</Name><Description>Should be made equal to &quot;remote administration tool&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>3720387</ID><Parent_ID>529</Parent_ID><Name>remote desktop protocol</Name><Description>remote desktop protocol</Description><Type>Keyword</Type></Query>
<Query><ID>3720477</ID><Parent_ID>529</Parent_ID><Name>remote exploit</Name><Description>remote exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3720502</ID><Parent_ID>514</Parent_ID><Name>remote file inclusion</Name><Description>remote file inclusion</Description><Type>Keyword</Type></Query>
<Query><ID>3720726</ID><Parent_ID>416</Parent_ID><Name>remote memory corruption</Name><Description>remote memory corruption</Description><Type>Keyword</Type></Query>
<Query><ID>3720728</ID><Parent_ID>569</Parent_ID><Name>remote memory corruption vulnerability</Name><Description>remote memory corruption vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3720932</ID><Parent_ID>52</Parent_ID><Name>remote root exploit</Name><Description>remote root exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3720986</ID><Parent_ID>219</Parent_ID><Name>remote shell</Name><Description>Should be made equal to &quot;remote administration tool&quot;</Description><Type>Keyword</Type></Query>
<Query><ID>3721442</ID><Parent_ID>534</Parent_ID><Name>remotely exploitable</Name><Description>remotely exploitable</Description><Type>Keyword</Type></Query>
<Query><ID>3721449</ID><Parent_ID>534</Parent_ID><Name>remotely exploitable flaw</Name><Description>remotely exploitable flaw</Description><Type>Keyword</Type></Query>
<Query><ID>3721463</ID><Parent_ID>472</Parent_ID><Name>remotely exploitable type confusion</Name><Description>remotely exploitable type confusion</Description><Type>Keyword</Type></Query>
<Query><ID>3726037</ID><Parent_ID>442</Parent_ID><Name>report data breach</Name><Description>not a proper phrase</Description><Type>Keyword</Type></Query>
<Query><ID>3730642</ID><Parent_ID>178</Parent_ID><Name>reputation system</Name><Description>General term, connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3740384</ID><Parent_ID>321</Parent_ID><Name>responsible disclosure</Name><Description>responsible disclosure</Description><Type>Keyword</Type></Query>
<Query><ID>3749400</ID><Parent_ID>239</Parent_ID><Name>reverse engineering malware</Name><Description>reverse engineering malware</Description><Type>Keyword</Type></Query>
<Query><ID>3749701</ID><Parent_ID>41</Parent_ID><Name>reverse shell</Name><Description>Attacking mechanism: https://resources.infosecinstitute.com/icmp-reverse-shell/</Description><Type>Keyword</Type></Query>
<Query><ID>3754310</ID><Parent_ID>218</Parent_ID><Name>rig exploit kit</Name><Description>rig exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>3756997</ID><Parent_ID>160</Parent_ID><Name>risk assessment process</Name><Description>risk assessment process</Description><Type>Keyword</Type></Query>
<Query><ID>3757782</ID><Parent_ID>164</Parent_ID><Name>risk management approach</Name><Description>risk management approach</Description><Type>Keyword</Type></Query>
<Query><ID>3757828</ID><Parent_ID>164</Parent_ID><Name>risk management framework</Name><Description>risk management framework</Description><Type>Keyword</Type></Query>
<Query><ID>3757890</ID><Parent_ID>160</Parent_ID><Name>risk management process</Name><Description>risk management process</Description><Type>Keyword</Type></Query>
<Query><ID>3757932</ID><Parent_ID>164</Parent_ID><Name>risk management solution</Name><Description>risk management solution</Description><Type>Keyword</Type></Query>
<Query><ID>3757938</ID><Parent_ID>164</Parent_ID><Name>risk management strategy</Name><Description>risk management strategy</Description><Type>Keyword</Type></Query>
<Query><ID>3757974</ID><Parent_ID>150</Parent_ID><Name>risk manager</Name><Description>risk manager</Description><Type>Keyword</Type></Query>
<Query><ID>3758078</ID><Parent_ID>165</Parent_ID><Name>risk mitigation</Name><Description>risk mitigation</Description><Type>Keyword</Type></Query>
<Query><ID>3758105</ID><Parent_ID>165</Parent_ID><Name>risk mitigation strategy</Name><Description>risk mitigation strategy</Description><Type>Keyword</Type></Query>
<Query><ID>3764036</ID><Parent_ID>195</Parent_ID><Name>role base access control</Name><Description>role base access control</Description><Type>Keyword</Type></Query>
<Query><ID>3764316</ID><Parent_ID>195</Parent_ID><Name>role-based access control model</Name><Description>role-based access control model</Description><Type>Keyword</Type></Query>
<Query><ID>3765486</ID><Parent_ID>90</Parent_ID><Name>root access</Name><Description>Access control term</Description><Type>Keyword</Type></Query>
<Query><ID>3765619</ID><Parent_ID>79</Parent_ID><Name>root exploit</Name><Description>root exploit</Description><Type>Keyword</Type></Query>
<Query><ID>3765779</ID><Parent_ID>195</Parent_ID><Name>root privilege</Name><Description>root privilege</Description><Type>Keyword</Type></Query>
<Query><ID>3769562</ID><Parent_ID>414</Parent_ID><Name>rowhammer</Name><Description>Security issue: https://en.wikipedia.org/wiki/Row_hammer</Description><Type>Keyword</Type></Query>
<Query><ID>3770563</ID><Parent_ID>128</Parent_ID><Name>rsa key</Name><Description>rsa key</Description><Type>Keyword</Type></Query>
<Query><ID>3770864</ID><Parent_ID>399</Parent_ID><Name>rsac</Name><Description>RSA Conference</Description><Type>Keyword</Type></Query>
<Query><ID>3771413</ID><Parent_ID>4</Parent_ID><Name>rsac2017</Name><Description>RAS Conference 2017</Description><Type>Keyword</Type></Query>
<Query><ID>3777759</ID><Parent_ID>351</Parent_ID><Name>russian hackers</Name><Description>russian hackers</Description><Type>Keyword</Type></Query>
<Query><ID>3782758</ID><Parent_ID>3</Parent_ID><Name>safer internet day</Name><Description>safer internet day</Description><Type>Keyword</Type></Query>
<Query><ID>3785205</ID><Parent_ID>16</Parent_ID><Name>samarati</Name><Description>person</Description><Type>Keyword</Type></Query>
<Query><ID>3788066</ID><Parent_ID>78</Parent_ID><Name>sandbox escape</Name><Description>Not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>3788316</ID><Parent_ID>172</Parent_ID><Name>sandboxing</Name><Description>Security mechanism</Description><Type>Keyword</Type></Query>
<Query><ID>3789282</ID><Parent_ID>36</Parent_ID><Name>sans institute</Name><Description>sans institute</Description><Type>Keyword</Type></Query>
<Query><ID>3789294</ID><Parent_ID>341</Parent_ID><Name>sans internet storm center</Name><Description>https://isc.sans.edu/</Description><Type>Keyword</Type></Query>
<Query><ID>3795310</ID><Parent_ID>20</Parent_ID><Name>scammer</Name><Description>scammer</Description><Type>Keyword</Type></Query>
<Query><ID>3799058</ID><Parent_ID>12</Parent_ID><Name>schneier</Name><Description>Cyber security expert Bruce Schneier</Description><Type>Keyword</Type></Query>
<Query><ID>3799791</ID><Parent_ID>3</Parent_ID><Name>school security awareness training</Name><Description>school security awareness training</Description><Type>Keyword</Type></Query>
<Query><ID>3803635</ID><Parent_ID>223</Parent_ID><Name>script kiddie</Name><Description>Hacker: https://en.wikipedia.org/wiki/Script_kiddie</Description><Type>Keyword</Type></Query>
<Query><ID>3808722</ID><Parent_ID>129</Parent_ID><Name>secret key</Name><Description>secret key</Description><Type>Keyword</Type></Query>
<Query><ID>3809181</ID><Parent_ID>119</Parent_ID><Name>secret sharing</Name><Description>secret sharing</Description><Type>Keyword</Type></Query>
<Query><ID>3810056</ID><Parent_ID>374</Parent_ID><Name>sectf</Name><Description>Event: https://www.social-engineer.org/sevillage-def-con/the-sectf/</Description><Type>Keyword</Type></Query>
<Query><ID>3811252</ID><Parent_ID>501</Parent_ID><Name>secure communication channel</Name><Description>secure communication channel</Description><Type>Keyword</Type></Query>
<Query><ID>3811315</ID><Parent_ID>459</Parent_ID><Name>secure computing</Name><Description>secure computing</Description><Type>Keyword</Type></Query>
<Query><ID>3811716</ID><Parent_ID>176</Parent_ID><Name>secure enclave</Name><Description>secure enclave</Description><Type>Keyword</Type></Query>
<Query><ID>3812264</ID><Parent_ID>470</Parent_ID><Name>secure messaging app</Name><Description>secure messaging app</Description><Type>Keyword</Type></Query>
<Query><ID>3812341</ID><Parent_ID>459</Parent_ID><Name>secure multi-party computation</Name><Description>secure multi-party computation</Description><Type>Keyword</Type></Query>
<Query><ID>3812375</ID><Parent_ID>459</Parent_ID><Name>secure multiparty computation</Name><Description>secure multiparty computation</Description><Type>Keyword</Type></Query>
<Query><ID>3812680</ID><Parent_ID>470</Parent_ID><Name>secure protocol</Name><Description>secure protocol</Description><Type>Keyword</Type></Query>
<Query><ID>3812932</ID><Parent_ID>144</Parent_ID><Name>secure socket layer</Name><Description>secure socket layer</Description><Type>Keyword</Type></Query>
<Query><ID>3813527</ID><Parent_ID>336</Parent_ID><Name>securelist</Name><Description>Website: https://securelist.com/</Description><Type>Keyword</Type></Query>
<Query><ID>3814376</ID><Parent_ID>380</Parent_ID><Name>security alert</Name><Description>security alert</Description><Type>Keyword</Type></Query>
<Query><ID>3814470</ID><Parent_ID>380</Parent_ID><Name>security analysis</Name><Description>security analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3814513</ID><Parent_ID>12</Parent_ID><Name>security analyst</Name><Description>security analyst</Description><Type>Keyword</Type></Query>
<Query><ID>3814534</ID><Parent_ID>380</Parent_ID><Name>security analytic</Name><Description>security analytic</Description><Type>Keyword</Type></Query>
<Query><ID>3814675</ID><Parent_ID>364</Parent_ID><Name>security application</Name><Description>security application</Description><Type>Keyword</Type></Query>
<Query><ID>3814735</ID><Parent_ID>380</Parent_ID><Name>security architecture</Name><Description>security architecture</Description><Type>Keyword</Type></Query>
<Query><ID>3814810</ID><Parent_ID>480</Parent_ID><Name>security assertion markup language</Name><Description>security assertion markup language</Description><Type>Keyword</Type></Query>
<Query><ID>3814903</ID><Parent_ID>39</Parent_ID><Name>security attack</Name><Description>security attack</Description><Type>Keyword</Type></Query>
<Query><ID>3815009</ID><Parent_ID>380</Parent_ID><Name>security automation</Name><Description>security automation</Description><Type>Keyword</Type></Query>
<Query><ID>3815049</ID><Parent_ID>3</Parent_ID><Name>security awareness campaign</Name><Description>security awareness campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3815094</ID><Parent_ID>3</Parent_ID><Name>security awareness month</Name><Description>security awareness month</Description><Type>Keyword</Type></Query>
<Query><ID>3815137</ID><Parent_ID>3</Parent_ID><Name>security awareness program</Name><Description>security awareness program</Description><Type>Keyword</Type></Query>
<Query><ID>3815179</ID><Parent_ID>3</Parent_ID><Name>security awareness training</Name><Description>security awareness training</Description><Type>Keyword</Type></Query>
<Query><ID>3815387</ID><Parent_ID>337</Parent_ID><Name>security blog</Name><Description>security blog</Description><Type>Keyword</Type></Query>
<Query><ID>3815395</ID><Parent_ID>433</Parent_ID><Name>security blogger award</Name><Description>European Security Blog Awards do exist.</Description><Type>Keyword</Type></Query>
<Query><ID>3815650</ID><Parent_ID>332</Parent_ID><Name>security bug bounty program</Name><Description>security bug bounty program</Description><Type>Keyword</Type></Query>
<Query><ID>3815816</ID><Parent_ID>380</Parent_ID><Name>security capability</Name><Description>security capability</Description><Type>Keyword</Type></Query>
<Query><ID>3815890</ID><Parent_ID>288</Parent_ID><Name>security center</Name><Description>security center</Description><Type>Keyword</Type></Query>
<Query><ID>3816349</ID><Parent_ID>28</Parent_ID><Name>security community</Name><Description>security community</Description><Type>Keyword</Type></Query>
<Query><ID>3816660</ID><Parent_ID>141</Parent_ID><Name>security content automation protocol</Name><Description>security content automation protocol</Description><Type>Keyword</Type></Query>
<Query><ID>3816775</ID><Parent_ID>88</Parent_ID><Name>security controls</Name><Description>security controls</Description><Type>Keyword</Type></Query>
<Query><ID>3817483</ID><Parent_ID>1</Parent_ID><Name>security domain</Name><Description>security domain</Description><Type>Keyword</Type></Query>
<Query><ID>3817732</ID><Parent_ID>15</Parent_ID><Name>security engineer</Name><Description>security engineer</Description><Type>Keyword</Type></Query>
<Query><ID>3817751</ID><Parent_ID>380</Parent_ID><Name>security engineering</Name><Description>security engineering</Description><Type>Keyword</Type></Query>
<Query><ID>3817858</ID><Parent_ID>380</Parent_ID><Name>security evaluation</Name><Description>security evaluation</Description><Type>Keyword</Type></Query>
<Query><ID>3818427</ID><Parent_ID>424</Parent_ID><Name>security fix</Name><Description>security fix</Description><Type>Keyword</Type></Query>
<Query><ID>3818443</ID><Parent_ID>534</Parent_ID><Name>security flaw</Name><Description>security flaw</Description><Type>Keyword</Type></Query>
<Query><ID>3818501</ID><Parent_ID>38</Parent_ID><Name>security folk</Name><Description>security folk</Description><Type>Keyword</Type></Query>
<Query><ID>3818559</ID><Parent_ID>423</Parent_ID><Name>security framework</Name><Description>security framework</Description><Type>Keyword</Type></Query>
<Query><ID>3818645</ID><Parent_ID>380</Parent_ID><Name>security game</Name><Description>security game</Description><Type>Keyword</Type></Query>
<Query><ID>3818672</ID><Parent_ID>380</Parent_ID><Name>security gap</Name><Description>security gap</Description><Type>Keyword</Type></Query>
<Query><ID>3818805</ID><Parent_ID>380</Parent_ID><Name>security guide</Name><Description>security guide</Description><Type>Keyword</Type></Query>
<Query><ID>3819239</ID><Parent_ID>346</Parent_ID><Name>security incident handling</Name><Description>security incident handling</Description><Type>Keyword</Type></Query>
<Query><ID>3819259</ID><Parent_ID>346</Parent_ID><Name>security incident management</Name><Description>security incident management</Description><Type>Keyword</Type></Query>
<Query><ID>3819303</ID><Parent_ID>343</Parent_ID><Name>security incident response team</Name><Description>security incident response team</Description><Type>Keyword</Type></Query>
<Query><ID>3820144</ID><Parent_ID>380</Parent_ID><Name>security landscape</Name><Description>security landscape</Description><Type>Keyword</Type></Query>
<Query><ID>3820210</ID><Parent_ID>12</Parent_ID><Name>security leader</Name><Description>security leader</Description><Type>Keyword</Type></Query>
<Query><ID>3820556</ID><Parent_ID>172</Parent_ID><Name>security management system</Name><Description>security management system</Description><Type>Keyword</Type></Query>
<Query><ID>3820705</ID><Parent_ID>380</Parent_ID><Name>security mechanism</Name><Description>security mechanism</Description><Type>Keyword</Type></Query>
<Query><ID>3820768</ID><Parent_ID>380</Parent_ID><Name>security metric</Name><Description>security metric</Description><Type>Keyword</Type></Query>
<Query><ID>3820878</ID><Parent_ID>172</Parent_ID><Name>security model</Name><Description>security model</Description><Type>Keyword</Type></Query>
<Query><ID>3820960</ID><Parent_ID>380</Parent_ID><Name>security monitoring</Name><Description>security monitoring</Description><Type>Keyword</Type></Query>
<Query><ID>3821407</ID><Parent_ID>490</Parent_ID><Name>security operation team</Name><Description>security operation team</Description><Type>Keyword</Type></Query>
<Query><ID>3821421</ID><Parent_ID>288</Parent_ID><Name>security operations center</Name><Description>security operations center</Description><Type>Keyword</Type></Query>
<Query><ID>3821550</ID><Parent_ID>10</Parent_ID><Name>security paradigms workshop</Name><Description>security paradigms workshop</Description><Type>Keyword</Type></Query>
<Query><ID>3821551</ID><Parent_ID>380</Parent_ID><Name>security parameter</Name><Description>security parameter</Description><Type>Keyword</Type></Query>
<Query><ID>3821578</ID><Parent_ID>424</Parent_ID><Name>security patch</Name><Description>security patch</Description><Type>Keyword</Type></Query>
<Query><ID>3821799</ID><Parent_ID>380</Parent_ID><Name>security podcast</Name><Description>security podcast</Description><Type>Keyword</Type></Query>
<Query><ID>3821961</ID><Parent_ID>380</Parent_ID><Name>security posture</Name><Description>security posture</Description><Type>Keyword</Type></Query>
<Query><ID>3821987</ID><Parent_ID>172</Parent_ID><Name>security practice</Name><Description>security practice</Description><Type>Keyword</Type></Query>
<Query><ID>3822005</ID><Parent_ID>12</Parent_ID><Name>security practitioner</Name><Description>security practitioner</Description><Type>Keyword</Type></Query>
<Query><ID>3822030</ID><Parent_ID>380</Parent_ID><Name>security prediction</Name><Description>security prediction</Description><Type>Keyword</Type></Query>
<Query><ID>3822184</ID><Parent_ID>318</Parent_ID><Name>security pro</Name><Description>security pro</Description><Type>Keyword</Type></Query>
<Query><ID>3822244</ID><Parent_ID>172</Parent_ID><Name>security process</Name><Description>security process</Description><Type>Keyword</Type></Query>
<Query><ID>3822443</ID><Parent_ID>380</Parent_ID><Name>security property</Name><Description>security property</Description><Type>Keyword</Type></Query>
<Query><ID>3822486</ID><Parent_ID>184</Parent_ID><Name>security protection</Name><Description>security protection</Description><Type>Keyword</Type></Query>
<Query><ID>3822762</ID><Parent_ID>210</Parent_ID><Name>security report</Name><Description>security report</Description><Type>Keyword</Type></Query>
<Query><ID>3822875</ID><Parent_ID>18</Parent_ID><Name>security researcher</Name><Description>security researcher</Description><Type>Keyword</Type></Query>
<Query><ID>3823061</ID><Parent_ID>342</Parent_ID><Name>security response</Name><Description>security response</Description><Type>Keyword</Type></Query>
<Query><ID>3823112</ID><Parent_ID>160</Parent_ID><Name>security risk analysis</Name><Description>security risk analysis</Description><Type>Keyword</Type></Query>
<Query><ID>3823161</ID><Parent_ID>160</Parent_ID><Name>security risk management</Name><Description>security risk management</Description><Type>Keyword</Type></Query>
<Query><ID>3823342</ID><Parent_ID>380</Parent_ID><Name>security scanner</Name><Description>security scanner</Description><Type>Keyword</Type></Query>
<Query><ID>3823507</ID><Parent_ID>429</Parent_ID><Name>security service provider</Name><Description>security service provider</Description><Type>Keyword</Type></Query>
<Query><ID>3823537</ID><Parent_ID>380</Parent_ID><Name>security setting</Name><Description>security setting</Description><Type>Keyword</Type></Query>
<Query><ID>3823595</ID><Parent_ID>380</Parent_ID><Name>security skill</Name><Description>too general</Description><Type>Keyword</Type></Query>
<Query><ID>3823701</ID><Parent_ID>380</Parent_ID><Name>security solution</Name><Description>Not useful (too general)</Description><Type>Keyword</Type></Query>
<Query><ID>3823837</ID><Parent_ID>173</Parent_ID><Name>security standard</Name><Description>security standard</Description><Type>Keyword</Type></Query>
<Query><ID>3823872</ID><Parent_ID>36</Parent_ID><Name>security startup</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>3824021</ID><Parent_ID>380</Parent_ID><Name>security suite</Name><Description>security suite</Description><Type>Keyword</Type></Query>
<Query><ID>3824031</ID><Parent_ID>6</Parent_ID><Name>security summit</Name><Description>security summit</Description><Type>Keyword</Type></Query>
<Query><ID>3824099</ID><Parent_ID>7</Parent_ID><Name>security symposium</Name><Description>Too general to be useful</Description><Type>Keyword</Type></Query>
<Query><ID>3824140</ID><Parent_ID>243</Parent_ID><Name>security systems</Name><Description>security systems</Description><Type>Keyword</Type></Query>
<Query><ID>3824310</ID><Parent_ID>210</Parent_ID><Name>security technical report</Name><Description>security technical report</Description><Type>Keyword</Type></Query>
<Query><ID>3824325</ID><Parent_ID>380</Parent_ID><Name>security technology</Name><Description>security technology</Description><Type>Keyword</Type></Query>
<Query><ID>3824409</ID><Parent_ID>365</Parent_ID><Name>security testing</Name><Description>security testing</Description><Type>Keyword</Type></Query>
<Query><ID>3824536</ID><Parent_ID>330</Parent_ID><Name>security threat report</Name><Description>security threat report</Description><Type>Keyword</Type></Query>
<Query><ID>3824705</ID><Parent_ID>112</Parent_ID><Name>security training</Name><Description>security training</Description><Type>Keyword</Type></Query>
<Query><ID>3824906</ID><Parent_ID>429</Parent_ID><Name>security vendor</Name><Description>security vendor</Description><Type>Keyword</Type></Query>
<Query><ID>3825228</ID><Parent_ID>422</Parent_ID><Name>security white paper</Name><Description>security white paper</Description><Type>Keyword</Type></Query>
<Query><ID>3836570</ID><Parent_ID>557</Parent_ID><Name>sensitive attribute disclosure</Name><Description>sensitive attribute disclosure</Description><Type>Keyword</Type></Query>
<Query><ID>3836623</ID><Parent_ID>557</Parent_ID><Name>sensitive attribute value</Name><Description>sensitive attribute value</Description><Type>Keyword</Type></Query>
<Query><ID>3837001</ID><Parent_ID>277</Parent_ID><Name>sensitive personal data</Name><Description>sensitive personal data</Description><Type>Keyword</Type></Query>
<Query><ID>3837142</ID><Parent_ID>557</Parent_ID><Name>sensitive value</Name><Description>Maybe too general?</Description><Type>Keyword</Type></Query>
<Query><ID>3841716</ID><Parent_ID>520</Parent_ID><Name>server crash</Name><Description>server crash</Description><Type>Keyword</Type></Query>
<Query><ID>3842989</ID><Parent_ID>41</Parent_ID><Name>server-side template injection</Name><Description>server-side template injection</Description><Type>Keyword</Type></Query>
<Query><ID>3847081</ID><Parent_ID>41</Parent_ID><Name>session hijacking</Name><Description>session hijacking</Description><Type>Keyword</Type></Query>
<Query><ID>3847127</ID><Parent_ID>129</Parent_ID><Name>session key</Name><Description>session key</Description><Type>Keyword</Type></Query>
<Query><ID>3850005</ID><Parent_ID>471</Parent_ID><Name>sevillage</Name><Description>Social Engineer Village: https://www.social-engineer.org/social-engineer-village/</Description><Type>Keyword</Type></Query>
<Query><ID>3850953</ID><Parent_ID>378</Parent_ID><Name>sfo</Name><Description>Serious Fraud Office</Description><Type>Keyword</Type></Query>
<Query><ID>3851395</ID><Parent_ID>137</Parent_ID><Name>sha-1 collision</Name><Description>sha-1 collision</Description><Type>Keyword</Type></Query>
<Query><ID>3851513</ID><Parent_ID>137</Parent_ID><Name>sha1</Name><Description>sha1</Description><Type>Keyword</Type></Query>
<Query><ID>3851697</ID><Parent_ID>141</Parent_ID><Name>sha256</Name><Description>sha256</Description><Type>Keyword</Type></Query>
<Query><ID>3852087</ID><Parent_ID>565</Parent_ID><Name>shadowbroker</Name><Description>Hacker group: https://en.wikipedia.org/wiki/The_Shadow_Brokers</Description><Type>Keyword</Type></Query>
<Query><ID>3852192</ID><Parent_ID>565</Parent_ID><Name>shadowbrokers</Name><Description>shadowbrokers</Description><Type>Keyword</Type></Query>
<Query><ID>3852992</ID><Parent_ID>42</Parent_ID><Name>shamoon</Name><Description>Malware: https://en.wikipedia.org/wiki/Shamoon</Description><Type>Keyword</Type></Query>
<Query><ID>3857544</ID><Parent_ID>219</Parent_ID><Name>shellcode</Name><Description>In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.</Description><Type>Keyword</Type></Query>
<Query><ID>3857754</ID><Parent_ID>409</Parent_ID><Name>shellshock</Name><Description>Software bug: https://en.wikipedia.org/wiki/Shellshock_(software_bug)</Description><Type>Keyword</Type></Query>
<Query><ID>3860131</ID><Parent_ID>4</Parent_ID><Name>shmoocon</Name><Description>https://en.wikipedia.org/wiki/ShmooCon</Description><Type>Keyword</Type></Query>
<Query><ID>3865008</ID><Parent_ID>114</Parent_ID><Name>siem</Name><Description>Security information and event management</Description><Type>Keyword</Type></Query>
<Query><ID>3866800</ID><Parent_ID>501</Parent_ID><Name>signal desktop</Name><Description>Fast, simple, secure. Privacy that fits in your pocket. https://github.com/signalapp/Signal-Desktop</Description><Type>Keyword</Type></Query>
<Query><ID>3867888</ID><Parent_ID>129</Parent_ID><Name>signing key</Name><Description>signing key</Description><Type>Keyword</Type></Query>
<Query><ID>3886372</ID><Parent_ID>247</Parent_ID><Name>smart contract</Name><Description>smart contract</Description><Type>Keyword</Type></Query>
<Query><ID>3891076</ID><Parent_ID>219</Parent_ID><Name>sniffer</Name><Description>Security and attacking tool</Description><Type>Keyword</Type></Query>
<Query><ID>3893604</ID><Parent_ID>68</Parent_ID><Name>social engineering attack</Name><Description>social engineering attack</Description><Type>Keyword</Type></Query>
<Query><ID>3893735</ID><Parent_ID>68</Parent_ID><Name>social engineering technique</Name><Description>social engineering technique</Description><Type>Keyword</Type></Query>
<Query><ID>3894318</ID><Parent_ID>167</Parent_ID><Name>social media security</Name><Description>social media security</Description><Type>Keyword</Type></Query>
<Query><ID>3894372</ID><Parent_ID>540</Parent_ID><Name>social media surveillance</Name><Description>social media surveillance</Description><Type>Keyword</Type></Query>
<Query><ID>3895435</ID><Parent_ID>20</Parent_ID><Name>socialengineer</Name><Description>socialengineer</Description><Type>Keyword</Type></Query>
<Query><ID>3895762</ID><Parent_ID>68</Parent_ID><Name>socialengineering</Name><Description>socialengineering</Description><Type>Keyword</Type></Query>
<Query><ID>3897220</ID><Parent_ID>141</Parent_ID><Name>socks5</Name><Description>General network protocol, with security enhancing features: https://en.wikipedia.org/wiki/SOCKS#SOCKS5</Description><Type>Keyword</Type></Query>
<Query><ID>3897408</ID><Parent_ID>564</Parent_ID><Name>sofacy</Name><Description>Ahttps://en.wikipedia.org/wiki/Fancy_Bear</Description><Type>Keyword</Type></Query>
<Query><ID>3898854</ID><Parent_ID>32</Parent_ID><Name>software engineering institute</Name><Description>Famous body at CMU covering security as well: https://www.sei.cmu.edu/</Description><Type>Keyword</Type></Query>
<Query><ID>3899721</ID><Parent_ID>80</Parent_ID><Name>software security vulnerability</Name><Description>software security vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3900003</ID><Parent_ID>80</Parent_ID><Name>software vulnerability</Name><Description>software vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3904770</ID><Parent_ID>349</Parent_ID><Name>sony hack</Name><Description>Change to &quot;Sony Pictures Hack&quot; https://en.wikipedia.org/wiki/Sony_Pictures_hack</Description><Type>Keyword</Type></Query>
<Query><ID>3905485</ID><Parent_ID>257</Parent_ID><Name>sophisticated cyber attack</Name><Description>sophisticated cyber attack</Description><Type>Keyword</Type></Query>
<Query><ID>3905920</ID><Parent_ID>36</Parent_ID><Name>sophos</Name><Description>Cyber security company</Description><Type>Keyword</Type></Query>
<Query><ID>3907673</ID><Parent_ID>445</Parent_ID><Name>source code leak</Name><Description>source code leak</Description><Type>Keyword</Type></Query>
<Query><ID>3912022</ID><Parent_ID>523</Parent_ID><Name>spam campaign</Name><Description>spam campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3912308</ID><Parent_ID>523</Parent_ID><Name>spam email</Name><Description>spam email</Description><Type>Keyword</Type></Query>
<Query><ID>3912419</ID><Parent_ID>430</Parent_ID><Name>spam filter</Name><Description>spam filter</Description><Type>Keyword</Type></Query>
<Query><ID>3915040</ID><Parent_ID>70</Parent_ID><Name>spear phishing attack</Name><Description>spear phishing attack</Description><Type>Keyword</Type></Query>
<Query><ID>3915065</ID><Parent_ID>70</Parent_ID><Name>spear phishing email</Name><Description>spear phishing email</Description><Type>Keyword</Type></Query>
<Query><ID>3915098</ID><Parent_ID>70</Parent_ID><Name>spear-phishing</Name><Description>spear-phishing</Description><Type>Keyword</Type></Query>
<Query><ID>3915242</ID><Parent_ID>70</Parent_ID><Name>spearphishing</Name><Description>spearphishing</Description><Type>Keyword</Type></Query>
<Query><ID>3922221</ID><Parent_ID>61</Parent_ID><Name>spoof attack</Name><Description>spoof attack</Description><Type>Keyword</Type></Query>
<Query><ID>3925311</ID><Parent_ID>367</Parent_ID><Name>spy tool</Name><Description>spy tool</Description><Type>Keyword</Type></Query>
<Query><ID>3925406</ID><Parent_ID>46</Parent_ID><Name>spyeye</Name><Description>Malware: https://en.wikipedia.org/wiki/SpyEye</Description><Type>Keyword</Type></Query>
<Query><ID>3925984</ID><Parent_ID>50</Parent_ID><Name>sql injection attack</Name><Description>sql injection attack</Description><Type>Keyword</Type></Query>
<Query><ID>3926021</ID><Parent_ID>518</Parent_ID><Name>sql injection exploitation tool</Name><Description>sql injection exploitation tool</Description><Type>Keyword</Type></Query>
<Query><ID>3926023</ID><Parent_ID>50</Parent_ID><Name>sql injection flaw</Name><Description>sql injection flaw</Description><Type>Keyword</Type></Query>
<Query><ID>3926112</ID><Parent_ID>329</Parent_ID><Name>sql injection vulnerability</Name><Description>sql injection vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>3926339</ID><Parent_ID>50</Parent_ID><Name>sqli</Name><Description>SQL Injection (SQLi) is one of the many web attack mechanisms used by hackers to steal data. It is perhaps one of the most common application layer attacks.</Description><Type>Keyword</Type></Query>
<Query><ID>3926486</ID><Parent_ID>364</Parent_ID><Name>sqlmap</Name><Description>Security tool: https://en.wikipedia.org/wiki/Sqlmap</Description><Type>Keyword</Type></Query>
<Query><ID>3928371</ID><Parent_ID>90</Parent_ID><Name>ssid</Name><Description>WiFi ID, more networking term, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3928466</ID><Parent_ID>144</Parent_ID><Name>ssl certificate</Name><Description>ssl certificate</Description><Type>Keyword</Type></Query>
<Query><ID>3929537</ID><Parent_ID>319</Parent_ID><Name>stack buffer overflow</Name><Description>stack buffer overflow</Description><Type>Keyword</Type></Query>
<Query><ID>3930628</ID><Parent_ID>409</Parent_ID><Name>stagefright</Name><Description>Software bug: https://en.wikipedia.org/wiki/Stagefright_(bug)</Description><Type>Keyword</Type></Query>
<Query><ID>3937945</ID><Parent_ID>365</Parent_ID><Name>static analysis</Name><Description>General term, but connections with security is strong enough</Description><Type>Keyword</Type></Query>
<Query><ID>3938011</ID><Parent_ID>365</Parent_ID><Name>static analysis technique</Name><Description>static analysis technique</Description><Type>Keyword</Type></Query>
<Query><ID>3938018</ID><Parent_ID>300</Parent_ID><Name>static analysis tool</Name><Description>static analysis tool</Description><Type>Keyword</Type></Query>
<Query><ID>3938965</ID><Parent_ID>297</Parent_ID><Name>statistical disclosure control</Name><Description>Security / privacy protection mechanism</Description><Type>Keyword</Type></Query>
<Query><ID>3939847</ID><Parent_ID>295</Parent_ID><Name>stay anonymous</Name><Description>stay anonymous</Description><Type>Keyword</Type></Query>
<Query><ID>3940082</ID><Parent_ID>336</Parent_ID><Name>stay safe online</Name><Description>Security website: https://staysafeonline.org/</Description><Type>Keyword</Type></Query>
<Query><ID>3941619</ID><Parent_ID>20</Parent_ID><Name>stealer</Name><Description>Although general term, connection with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>3944784</ID><Parent_ID>331</Parent_ID><Name>stingray</Name><Description>Stingray phone tracker: https://en.wikipedia.org/wiki/Stingray_phone_tracker</Description><Type>Keyword</Type></Query>
<Query><ID>3946110</ID><Parent_ID>18</Parent_ID><Name>stolfo</Name><Description>Cyber security researcher Salvatore J. Stolfo: https://en.wikipedia.org/wiki/Salvatore_J._Stolfo</Description><Type>Keyword</Type></Query>
<Query><ID>3955336</ID><Parent_ID>190</Parent_ID><Name>strong authentication</Name><Description>strong authentication</Description><Type>Keyword</Type></Query>
<Query><ID>3957266</ID><Parent_ID>82</Parent_ID><Name>structured threat</Name><Description>structured threat</Description><Type>Keyword</Type></Query>
<Query><ID>3960150</ID><Parent_ID>45</Parent_ID><Name>stuxnet</Name><Description>Stuxnet is a malicious computer worm, first uncovered in 2010, thought to have been in development since at least 2005. Stuxnet targets SCADA systems and is believed to be responsible for causing substantial damage to Iran&#39;s nuclear program.</Description><Type>Keyword</Type></Query>
<Query><ID>3965830</ID><Parent_ID>408</Parent_ID><Name>sudo</Name><Description>Access control term</Description><Type>Keyword</Type></Query>
<Query><ID>3973145</ID><Parent_ID>39</Parent_ID><Name>supply chain attack</Name><Description>supply chain attack</Description><Type>Keyword</Type></Query>
<Query><ID>3973233</ID><Parent_ID>150</Parent_ID><Name>supply chain risk</Name><Description>supply chain risk</Description><Type>Keyword</Type></Query>
<Query><ID>3973236</ID><Parent_ID>150</Parent_ID><Name>supply chain risk management</Name><Description>supply chain risk management</Description><Type>Keyword</Type></Query>
<Query><ID>3975005</ID><Parent_ID>494</Parent_ID><Name>support jeremy hammond</Name><Description>Event/campaign</Description><Type>Keyword</Type></Query>
<Query><ID>3985848</ID><Parent_ID>364</Parent_ID><Name>symantec</Name><Description>symantec</Description><Type>Keyword</Type></Query>
<Query><ID>3986142</ID><Parent_ID>115</Parent_ID><Name>symantec endpoint protection</Name><Description>symantec endpoint protection</Description><Type>Keyword</Type></Query>
<Query><ID>3986234</ID><Parent_ID>330</Parent_ID><Name>symantec internet security threat report</Name><Description>symantec internet security threat report</Description><Type>Keyword</Type></Query>
<Query><ID>3987005</ID><Parent_ID>121</Parent_ID><Name>symmetric encryption</Name><Description>symmetric encryption</Description><Type>Keyword</Type></Query>
<Query><ID>3987028</ID><Parent_ID>121</Parent_ID><Name>symmetric key</Name><Description>symmetric key</Description><Type>Keyword</Type></Query>
<Query><ID>3987272</ID><Parent_ID>57</Parent_ID><Name>syn flood</Name><Description>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target&#39;s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</Description><Type>Keyword</Type></Query>
<Query><ID>3989090</ID><Parent_ID>223</Parent_ID><Name>syrian electronic army</Name><Description>Hacker group: https://en.wikipedia.org/wiki/Syrian_Electronic_Army</Description><Type>Keyword</Type></Query>
<Query><ID>3989456</ID><Parent_ID>195</Parent_ID><Name>sysadmin</Name><Description>Access control term</Description><Type>Keyword</Type></Query>
<Query><ID>3989733</ID><Parent_ID>481</Parent_ID><Name>sysmon</Name><Description>General security tool on Windows: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon</Description><Type>Keyword</Type></Query>
<Query><ID>3992390</ID><Parent_ID>432</Parent_ID><Name>system security symposium</Name><Description>system security symposium</Description><Type>Keyword</Type></Query>
<Query><ID>3994130</ID><Parent_ID>296</Parent_ID><Name>t-closeness</Name><Description>Privacy metric</Description><Type>Keyword</Type></Query>
<Query><ID>4013783</ID><Parent_ID>529</Parent_ID><Name>teamviewer</Name><Description>Remote access software (https://en.wikipedia.org/wiki/TeamViewer), connection with security is strong.</Description><Type>Keyword</Type></Query>
<Query><ID>4015112</ID><Parent_ID>69</Parent_ID><Name>tech support scam</Name><Description>tech support scam</Description><Type>Keyword</Type></Query>
<Query><ID>4027337</ID><Parent_ID>390</Parent_ID><Name>teslacrypt</Name><Description>Malware: https://en.wikipedia.org/wiki/TeslaCrypt</Description><Type>Keyword</Type></Query>
<Query><ID>4029930</ID><Parent_ID>331</Parent_ID><Name>text message interception</Name><Description>text message interception</Description><Type>Keyword</Type></Query>
<Query><ID>4029933</ID><Parent_ID>331</Parent_ID><Name>text message interception hack</Name><Description>text message interception hack</Description><Type>Keyword</Type></Query>
<Query><ID>4034276</ID><Parent_ID>356</Parent_ID><Name>thesas2016</Name><Description>Kaspersky Security Analyst Summit 2016</Description><Type>Keyword</Type></Query>
<Query><ID>4034356</ID><Parent_ID>356</Parent_ID><Name>thesas2017</Name><Description>Kaspersky Security Analyst Summit (SAS) 2017</Description><Type>Keyword</Type></Query>
<Query><ID>4034462</ID><Parent_ID>356</Parent_ID><Name>thesas2018</Name><Description>Kaspersky Security Analyst Summit 2018</Description><Type>Keyword</Type></Query>
<Query><ID>4037584</ID><Parent_ID>340</Parent_ID><Name>threat actor target</Name><Description>threat actor target</Description><Type>Keyword</Type></Query>
<Query><ID>4037636</ID><Parent_ID>340</Parent_ID><Name>threat agent</Name><Description>threat agent</Description><Type>Keyword</Type></Query>
<Query><ID>4037692</ID><Parent_ID>339</Parent_ID><Name>threat analysis</Name><Description>threat analysis</Description><Type>Keyword</Type></Query>
<Query><ID>4037726</ID><Parent_ID>12</Parent_ID><Name>threat analyst</Name><Description>threat analyst</Description><Type>Keyword</Type></Query>
<Query><ID>4038070</ID><Parent_ID>339</Parent_ID><Name>threat detection</Name><Description>threat detection</Description><Type>Keyword</Type></Query>
<Query><ID>4038386</ID><Parent_ID>339</Parent_ID><Name>threat hunting</Name><Description>threat hunting</Description><Type>Keyword</Type></Query>
<Query><ID>4038467</ID><Parent_ID>340</Parent_ID><Name>threat indicator</Name><Description>threat indicator</Description><Type>Keyword</Type></Query>
<Query><ID>4038632</ID><Parent_ID>12</Parent_ID><Name>threat intelligence analyst</Name><Description>threat intelligence analyst</Description><Type>Keyword</Type></Query>
<Query><ID>4038680</ID><Parent_ID>335</Parent_ID><Name>threat intelligence data</Name><Description>threat intelligence data</Description><Type>Keyword</Type></Query>
<Query><ID>4038703</ID><Parent_ID>294</Parent_ID><Name>threat intelligence exchange</Name><Description>threat intelligence exchange</Description><Type>Keyword</Type></Query>
<Query><ID>4038714</ID><Parent_ID>335</Parent_ID><Name>threat intelligence feed</Name><Description>threat intelligence feed</Description><Type>Keyword</Type></Query>
<Query><ID>4038818</ID><Parent_ID>335</Parent_ID><Name>threat intelligence platform</Name><Description>threat intelligence platform</Description><Type>Keyword</Type></Query>
<Query><ID>4038880</ID><Parent_ID>210</Parent_ID><Name>threat intelligence report</Name><Description>threat intelligence report</Description><Type>Keyword</Type></Query>
<Query><ID>4038897</ID><Parent_ID>335</Parent_ID><Name>threat intelligence service</Name><Description>threat intelligence service</Description><Type>Keyword</Type></Query>
<Query><ID>4038919</ID><Parent_ID>335</Parent_ID><Name>threat intelligence share platform</Name><Description>threat intelligence share platform</Description><Type>Keyword</Type></Query>
<Query><ID>4038932</ID><Parent_ID>294</Parent_ID><Name>threat intelligence sharing</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>4039213</ID><Parent_ID>339</Parent_ID><Name>threat mitigation</Name><Description>threat mitigation</Description><Type>Keyword</Type></Query>
<Query><ID>4039230</ID><Parent_ID>340</Parent_ID><Name>threat model</Name><Description>threat model</Description><Type>Keyword</Type></Query>
<Query><ID>4039279</ID><Parent_ID>340</Parent_ID><Name>threat modeling</Name><Description>threat modeling</Description><Type>Keyword</Type></Query>
<Query><ID>4039507</ID><Parent_ID>339</Parent_ID><Name>threat protection</Name><Description>threat protection</Description><Type>Keyword</Type></Query>
<Query><ID>4040295</ID><Parent_ID>36</Parent_ID><Name>threatconnect</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/ThreatConnect</Description><Type>Keyword</Type></Query>
<Query><ID>4041048</ID><Parent_ID>171</Parent_ID><Name>threatintelligence</Name><Description>threatintelligence</Description><Type>Keyword</Type></Query>
<Query><ID>4048619</ID><Parent_ID>202</Parent_ID><Name>timing attack</Name><Description>timing attack</Description><Type>Keyword</Type></Query>
<Query><ID>4051718</ID><Parent_ID>298</Parent_ID><Name>tlp traffic light protocol</Name><Description>tlp traffic light protocol</Description><Type>Keyword</Type></Query>
<Query><ID>4059572</ID><Parent_ID>364</Parent_ID><Name>tor browser</Name><Description>tor browser</Description><Type>Keyword</Type></Query>
<Query><ID>4059588</ID><Parent_ID>364</Parent_ID><Name>tor browser bundle</Name><Description>tor browser bundle</Description><Type>Keyword</Type></Query>
<Query><ID>4059769</ID><Parent_ID>503</Parent_ID><Name>tor exit node</Name><Description>tor exit node</Description><Type>Keyword</Type></Query>
<Query><ID>4059845</ID><Parent_ID>503</Parent_ID><Name>tor hidden</Name><Description>tor hidden</Description><Type>Keyword</Type></Query>
<Query><ID>4059848</ID><Parent_ID>503</Parent_ID><Name>tor hidden service</Name><Description>tor hidden service</Description><Type>Keyword</Type></Query>
<Query><ID>4059944</ID><Parent_ID>430</Parent_ID><Name>tor network</Name><Description>tor network</Description><Type>Keyword</Type></Query>
<Query><ID>4059954</ID><Parent_ID>452</Parent_ID><Name>tor node</Name><Description>tor node</Description><Type>Keyword</Type></Query>
<Query><ID>4059962</ID><Parent_ID>452</Parent_ID><Name>tor node operator</Name><Description>tor node operator</Description><Type>Keyword</Type></Query>
<Query><ID>4059988</ID><Parent_ID>503</Parent_ID><Name>tor onion service</Name><Description>tor onion service</Description><Type>Keyword</Type></Query>
<Query><ID>4060029</ID><Parent_ID>503</Parent_ID><Name>tor project</Name><Description>https://www.torproject.org/</Description><Type>Keyword</Type></Query>
<Query><ID>4060073</ID><Parent_ID>503</Parent_ID><Name>tor relay</Name><Description>tor relay</Description><Type>Keyword</Type></Query>
<Query><ID>4060172</ID><Parent_ID>503</Parent_ID><Name>tor user</Name><Description>not a proper term</Description><Type>Keyword</Type></Query>
<Query><ID>4067196</ID><Parent_ID>293</Parent_ID><Name>tradecraft</Name><Description>General term, but connection with security is strong enough: https://en.wikipedia.org/wiki/Tradecraft</Description><Type>Keyword</Type></Query>
<Query><ID>4067509</ID><Parent_ID>90</Parent_ID><Name>traditional access control</Name><Description>traditional access control</Description><Type>Keyword</Type></Query>
<Query><ID>4068887</ID><Parent_ID>100</Parent_ID><Name>traffic light protocol</Name><Description>traffic light protocol</Description><Type>Keyword</Type></Query>
<Query><ID>4073879</ID><Parent_ID>428</Parent_ID><Name>transport layer security</Name><Description>transport layer security</Description><Type>Keyword</Type></Query>
<Query><ID>4076561</ID><Parent_ID>36</Parent_ID><Name>trend micro</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Trend_Micro</Description><Type>Keyword</Type></Query>
<Query><ID>4076625</ID><Parent_ID>115</Parent_ID><Name>trend micro internet security</Name><Description>trend micro internet security</Description><Type>Keyword</Type></Query>
<Query><ID>4076845</ID><Parent_ID>36</Parent_ID><Name>trendmicro</Name><Description>trendmicro</Description><Type>Keyword</Type></Query>
<Query><ID>4077059</ID><Parent_ID>373</Parent_ID><Name>trevorforget</Name><Description>WiFi hacking training: https://twitter.com/hashtag/trevorforget?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>4078295</ID><Parent_ID>46</Parent_ID><Name>trickbot</Name><Description>Malware: https://blog.malwarebytes.com/detections/trojan-trickbot/</Description><Type>Keyword</Type></Query>
<Query><ID>4078306</ID><Parent_ID>479</Parent_ID><Name>trickbot banking trojan</Name><Description>trickbot banking trojan</Description><Type>Keyword</Type></Query>
<Query><ID>4080415</ID><Parent_ID>46</Parent_ID><Name>trojans</Name><Description>trojans</Description><Type>Keyword</Type></Query>
<Query><ID>4082496</ID><Parent_ID>364</Parent_ID><Name>truecrypt</Name><Description>Security software: https://en.wikipedia.org/wiki/TrueCrypt</Description><Type>Keyword</Type></Query>
<Query><ID>4085556</ID><Parent_ID>178</Parent_ID><Name>trust decision</Name><Description>trust decision</Description><Type>Keyword</Type></Query>
<Query><ID>4085756</ID><Parent_ID>507</Parent_ID><Name>trust evaluation</Name><Description>trust evaluation</Description><Type>Keyword</Type></Query>
<Query><ID>4086106</ID><Parent_ID>178</Parent_ID><Name>trust level</Name><Description>trust level</Description><Type>Keyword</Type></Query>
<Query><ID>4086177</ID><Parent_ID>508</Parent_ID><Name>trust management framework</Name><Description>trust management framework</Description><Type>Keyword</Type></Query>
<Query><ID>4086208</ID><Parent_ID>508</Parent_ID><Name>trust management system</Name><Description>trust management system</Description><Type>Keyword</Type></Query>
<Query><ID>4086267</ID><Parent_ID>178</Parent_ID><Name>trust metric</Name><Description>trust metric</Description><Type>Keyword</Type></Query>
<Query><ID>4086299</ID><Parent_ID>178</Parent_ID><Name>trust model</Name><Description>trust model</Description><Type>Keyword</Type></Query>
<Query><ID>4086375</ID><Parent_ID>507</Parent_ID><Name>trust negotiation</Name><Description>trust negotiation</Description><Type>Keyword</Type></Query>
<Query><ID>4086452</ID><Parent_ID>178</Parent_ID><Name>trust network</Name><Description>trust network</Description><Type>Keyword</Type></Query>
<Query><ID>4086542</ID><Parent_ID>178</Parent_ID><Name>trust party</Name><Description>trust party</Description><Type>Keyword</Type></Query>
<Query><ID>4087074</ID><Parent_ID>178</Parent_ID><Name>trust platform module</Name><Description>trust platform module</Description><Type>Keyword</Type></Query>
<Query><ID>4087134</ID><Parent_ID>178</Parent_ID><Name>trust propagation</Name><Description>trust propagation</Description><Type>Keyword</Type></Query>
<Query><ID>4087231</ID><Parent_ID>178</Parent_ID><Name>trust relation</Name><Description>trust relation</Description><Type>Keyword</Type></Query>
<Query><ID>4087327</ID><Parent_ID>178</Parent_ID><Name>trust requirement</Name><Description>trust requirement</Description><Type>Keyword</Type></Query>
<Query><ID>4088417</ID><Parent_ID>178</Parent_ID><Name>trustor</Name><Description>General term, but connections with security is strong enough</Description><Type>Keyword</Type></Query>
<Query><ID>4092498</ID><Parent_ID>46</Parent_ID><Name>turla</Name><Description>Malware: https://en.wikipedia.org/wiki/Turla_(malware)</Description><Type>Keyword</Type></Query>
<Query><ID>4096084</ID><Parent_ID>477</Parent_ID><Name>twitter account hack</Name><Description>twitter account hack</Description><Type>Keyword</Type></Query>
<Query><ID>4098806</ID><Parent_ID>80</Parent_ID><Name>type confusion vulnerability</Name><Description>type confusion vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4101275</ID><Parent_ID>505</Parent_ID><Name>u2f</Name><Description>Universal 2nd Factor: https://en.wikipedia.org/wiki/Universal_2nd_Factor</Description><Type>Keyword</Type></Query>
<Query><ID>4102960</ID><Parent_ID>93</Parent_ID><Name>uconabc usage control model</Name><Description>UCONABC usage control model: https://doi.org/10.1145/984334.984339</Description><Type>Keyword</Type></Query>
<Query><ID>4103488</ID><Parent_ID>469</Parent_ID><Name>uefi secure boot</Name><Description>uefi secure boot</Description><Type>Keyword</Type></Query>
<Query><ID>4108823</ID><Parent_ID>371</Parent_ID><Name>unauthenticated remote code execution</Name><Description>unauthenticated remote code execution</Description><Type>Keyword</Type></Query>
<Query><ID>4108862</ID><Parent_ID>72</Parent_ID><Name>unauthorised access</Name><Description>unauthorised access</Description><Type>Keyword</Type></Query>
<Query><ID>4111413</ID><Parent_ID>460</Parent_ID><Name>underground forum</Name><Description>underground forum</Description><Type>Keyword</Type></Query>
<Query><ID>4111441</ID><Parent_ID>541</Parent_ID><Name>underground hacking forum</Name><Description>underground hacking forum</Description><Type>Keyword</Type></Query>
<Query><ID>4111459</ID><Parent_ID>461</Parent_ID><Name>underground market</Name><Description>underground market</Description><Type>Keyword</Type></Query>
<Query><ID>4120290</ID><Parent_ID>82</Parent_ID><Name>unknown threat</Name><Description>unknown threat</Description><Type>Keyword</Type></Query>
<Query><ID>4122380</ID><Parent_ID>74</Parent_ID><Name>unpatched vulnerability</Name><Description>unpatched vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4125131</ID><Parent_ID>154</Parent_ID><Name>untraceable internet protocol</Name><Description>untraceable internet protocol</Description><Type>Keyword</Type></Query>
<Query><ID>4129926</ID><Parent_ID>384</Parent_ID><Name>uptime</Name><Description>Loosely related to security especially resiliency</Description><Type>Keyword</Type></Query>
<Query><ID>4131614</ID><Parent_ID>344</Parent_ID><Name>us-cert</Name><Description>United States Computer Emergency Readiness Team</Description><Type>Keyword</Type></Query>
<Query><ID>4134699</ID><Parent_ID>194</Parent_ID><Name>usage control model</Name><Description>usage control model</Description><Type>Keyword</Type></Query>
<Query><ID>4135478</ID><Parent_ID>183</Parent_ID><Name>usb rubber ducky</Name><Description>https://shop.hak5.org/products/usb-rubber-ducky-deluxe</Description><Type>Keyword</Type></Query>
<Query><ID>4135561</ID><Parent_ID>400</Parent_ID><Name>usb type-c dma attack</Name><Description>A subset of DMA attack: https://en.wikipedia.org/wiki/DMA_attack</Description><Type>Keyword</Type></Query>
<Query><ID>4135962</ID><Parent_ID>327</Parent_ID><Name>use-after-free remote code execution vulnerability</Name><Description>use-after-free remote code execution vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4136193</ID><Parent_ID>182</Parent_ID><Name>usenix association</Name><Description>usenix association</Description><Type>Keyword</Type></Query>
<Query><ID>4136327</ID><Parent_ID>408</Parent_ID><Name>user account control</Name><Description>user account control</Description><Type>Keyword</Type></Query>
<Query><ID>4136898</ID><Parent_ID>91</Parent_ID><Name>user credentials</Name><Description>user credentials</Description><Type>Keyword</Type></Query>
<Query><ID>4137535</ID><Parent_ID>91</Parent_ID><Name>user identity</Name><Description>user identity</Description><Type>Keyword</Type></Query>
<Query><ID>4138101</ID><Parent_ID>193</Parent_ID><Name>user password</Name><Description>user password</Description><Type>Keyword</Type></Query>
<Query><ID>4138224</ID><Parent_ID>295</Parent_ID><Name>user privacy</Name><Description>user privacy</Description><Type>Keyword</Type></Query>
<Query><ID>4138591</ID><Parent_ID>167</Parent_ID><Name>user security</Name><Description>user security</Description><Type>Keyword</Type></Query>
<Query><ID>4142759</ID><Parent_ID>439</Parent_ID><Name>uxss</Name><Description>Common cross-site scripting (XSS) attacks target websites or web applications that are vulnerable to XSS, because of inadequate development of client-side or server-side code. ... UXSS preserves the basic XSS traits: exploit a vulnerability, execute malicious code, however there is a ..</Description><Type>Keyword</Type></Query>
<Query><ID>4148921</ID><Parent_ID>532</Parent_ID><Name>vault7</Name><Description>WikiLeaks documents: https://en.wikipedia.org/wiki/Vault_7</Description><Type>Keyword</Type></Query>
<Query><ID>4149505</ID><Parent_ID>535</Parent_ID><Name>vbv</Name><Description>Verified by Visa: https://www.visa.co.uk/pay-with-visa/featured-technologies/verified-by-visa.html</Description><Type>Keyword</Type></Query>
<Query><ID>4153115</ID><Parent_ID>36</Parent_ID><Name>veracode</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Veracode</Description><Type>Keyword</Type></Query>
<Query><ID>4165615</ID><Parent_ID>310</Parent_ID><Name>virtual machine introspection</Name><Description>virtual machine introspection</Description><Type>Keyword</Type></Query>
<Query><ID>4165863</ID><Parent_ID>430</Parent_ID><Name>virtual private network</Name><Description>virtual private network</Description><Type>Keyword</Type></Query>
<Query><ID>4166697</ID><Parent_ID>434</Parent_ID><Name>virus bulletin</Name><Description>virus bulletin</Description><Type>Keyword</Type></Query>
<Query><ID>4166705</ID><Parent_ID>420</Parent_ID><Name>virus bulletin conference</Name><Description>virus bulletin conference</Description><Type>Keyword</Type></Query>
<Query><ID>4167024</ID><Parent_ID>115</Parent_ID><Name>virus scan</Name><Description>virus scan</Description><Type>Keyword</Type></Query>
<Query><ID>4167253</ID><Parent_ID>542</Parent_ID><Name>virustotal</Name><Description>https://en.wikipedia.org/wiki/VirusTotal</Description><Type>Keyword</Type></Query>
<Query><ID>4171086</ID><Parent_ID>529</Parent_ID><Name>vnc</Name><Description>Virtual Network Computing: general software, but connections with security is strong enough.</Description><Type>Keyword</Type></Query>
<Query><ID>4174409</ID><Parent_ID>471</Parent_ID><Name>voting machine hacking village</Name><Description>DEFCON session/event: https://twitter.com/votingvillagedc?lang=en</Description><Type>Keyword</Type></Query>
<Query><ID>4175207</ID><Parent_ID>506</Parent_ID><Name>vpn server</Name><Description>vpn server</Description><Type>Keyword</Type></Query>
<Query><ID>4175215</ID><Parent_ID>506</Parent_ID><Name>vpn service</Name><Description>Security mechnism</Description><Type>Keyword</Type></Query>
<Query><ID>4176159</ID><Parent_ID>321</Parent_ID><Name>vuln disclosure</Name><Description>vuln disclosure</Description><Type>Keyword</Type></Query>
<Query><ID>4176464</ID><Parent_ID>323</Parent_ID><Name>vulnerabilities equities process</Name><Description>vulnerabilities equities process</Description><Type>Keyword</Type></Query>
<Query><ID>4176589</ID><Parent_ID>322</Parent_ID><Name>vulnerability analysis</Name><Description>vulnerability analysis</Description><Type>Keyword</Type></Query>
<Query><ID>4176944</ID><Parent_ID>75</Parent_ID><Name>vulnerability database</Name><Description>vulnerability database</Description><Type>Keyword</Type></Query>
<Query><ID>4177063</ID><Parent_ID>321</Parent_ID><Name>vulnerability discovery</Name><Description>vulnerability discovery</Description><Type>Keyword</Type></Query>
<Query><ID>4177105</ID><Parent_ID>323</Parent_ID><Name>vulnerability equity process</Name><Description>vulnerability equity process</Description><Type>Keyword</Type></Query>
<Query><ID>4177132</ID><Parent_ID>322</Parent_ID><Name>vulnerability exploit</Name><Description>vulnerability exploit</Description><Type>Keyword</Type></Query>
<Query><ID>4177419</ID><Parent_ID>322</Parent_ID><Name>vulnerability management</Name><Description>vulnerability management</Description><Type>Keyword</Type></Query>
<Query><ID>4177649</ID><Parent_ID>84</Parent_ID><Name>vulnerability report</Name><Description>vulnerability report</Description><Type>Keyword</Type></Query>
<Query><ID>4178125</ID><Parent_ID>80</Parent_ID><Name>vulnerable code</Name><Description>vulnerable code</Description><Type>Keyword</Type></Query>
<Query><ID>4178666</ID><Parent_ID>36</Parent_ID><Name>vupen</Name><Description>Cyber security company: https://en.wikipedia.org/wiki/Vupen</Description><Type>Keyword</Type></Query>
<Query><ID>4179010</ID><Parent_ID>10</Parent_ID><Name>w00t</Name><Description>Known security workshop: https://www.usenix.org/conference/woot19</Description><Type>Keyword</Type></Query>
<Query><ID>4181695</ID><Parent_ID>395</Parent_ID><Name>wanacry ransomware technical analysis</Name><Description>wanacry ransomware technical analysis</Description><Type>Keyword</Type></Query>
<Query><ID>4181901</ID><Parent_ID>395</Parent_ID><Name>wannacry attack</Name><Description>wannacry attack</Description><Type>Keyword</Type></Query>
<Query><ID>4182141</ID><Parent_ID>395</Parent_ID><Name>wannacry ransomware</Name><Description>https://en.wikipedia.org/wiki/WannaCry_ransomware_attack</Description><Type>Keyword</Type></Query>
<Query><ID>4182144</ID><Parent_ID>395</Parent_ID><Name>wannacry ransomware attack</Name><Description>wannacry ransomware attack</Description><Type>Keyword</Type></Query>
<Query><ID>4182174</ID><Parent_ID>395</Parent_ID><Name>wannacry ransomware decryption tool</Name><Description>wannacry ransomware decryption tool</Description><Type>Keyword</Type></Query>
<Query><ID>4187262</ID><Parent_ID>39</Parent_ID><Name>watering hole attack</Name><Description>watering hole attack</Description><Type>Keyword</Type></Query>
<Query><ID>4187963</ID><Parent_ID>395</Parent_ID><Name>wcry</Name><Description>WannaCry</Description><Type>Keyword</Type></Query>
<Query><ID>4188427</ID><Parent_ID>539</Parent_ID><Name>weak password</Name><Description>weak password</Description><Type>Keyword</Type></Query>
<Query><ID>4190267</ID><Parent_ID>89</Parent_ID><Name>web application firewall</Name><Description>web application firewall</Description><Type>Keyword</Type></Query>
<Query><ID>4190279</ID><Parent_ID>352</Parent_ID><Name>web application hacker</Name><Description>web application hacker</Description><Type>Keyword</Type></Query>
<Query><ID>4190336</ID><Parent_ID>167</Parent_ID><Name>web application security</Name><Description>web application security</Description><Type>Keyword</Type></Query>
<Query><ID>4190398</ID><Parent_ID>81</Parent_ID><Name>web application vulnerability</Name><Description>web application vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4190436</ID><Parent_ID>49</Parent_ID><Name>web attack</Name><Description>web attack</Description><Type>Keyword</Type></Query>
<Query><ID>4190670</ID><Parent_ID>39</Parent_ID><Name>web cache deception attack</Name><Description>web cache deception attack</Description><Type>Keyword</Type></Query>
<Query><ID>4191614</ID><Parent_ID>167</Parent_ID><Name>web security</Name><Description>web security</Description><Type>Keyword</Type></Query>
<Query><ID>4192360</ID><Parent_ID>234</Parent_ID><Name>web vulnerability scanner</Name><Description>web vulnerability scanner</Description><Type>Keyword</Type></Query>
<Query><ID>4193263</ID><Parent_ID>327</Parent_ID><Name>webex remote code execution vulnerability</Name><Description>webex remote code execution vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4193755</ID><Parent_ID>36</Parent_ID><Name>webroot</Name><Description>https://www.webroot.com/</Description><Type>Keyword</Type></Query>
<Query><ID>4194595</ID><Parent_ID>476</Parent_ID><Name>website hack</Name><Description>website hack</Description><Type>Keyword</Type></Query>
<Query><ID>4199741</ID><Parent_ID>533</Parent_ID><Name>wep</Name><Description>Wired Equivalent Privacy: https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy</Description><Type>Keyword</Type></Query>
<Query><ID>4200644</ID><Parent_ID>409</Parent_ID><Name>western union bug</Name><Description>western union bug</Description><Type>Keyword</Type></Query>
<Query><ID>4202807</ID><Parent_ID>23</Parent_ID><Name>white hat</Name><Description>white hat</Description><Type>Keyword</Type></Query>
<Query><ID>4202816</ID><Parent_ID>23</Parent_ID><Name>white hat hacker</Name><Description>white hat hacker</Description><Type>Keyword</Type></Query>
<Query><ID>4204072</ID><Parent_ID>89</Parent_ID><Name>whitelist</Name><Description>whitelist</Description><Type>Keyword</Type></Query>
<Query><ID>4206203</ID><Parent_ID>70</Parent_ID><Name>widespread post-election spear phishing</Name><Description>widespread post-election spear phishing</Description><Type>Keyword</Type></Query>
<Query><ID>4211788</ID><Parent_ID>115</Parent_ID><Name>windows defender</Name><Description>Security software: https://en.wikipedia.org/wiki/Windows_Defender</Description><Type>Keyword</Type></Query>
<Query><ID>4211804</ID><Parent_ID>364</Parent_ID><Name>windows defender exploit guard</Name><Description>windows defender exploit guard</Description><Type>Keyword</Type></Query>
<Query><ID>4212106</ID><Parent_ID>367</Parent_ID><Name>windows hacking tool</Name><Description>windows hacking tool</Description><Type>Keyword</Type></Query>
<Query><ID>4212292</ID><Parent_ID>568</Parent_ID><Name>windows kernel exploitation</Name><Description>windows kernel exploitation</Description><Type>Keyword</Type></Query>
<Query><ID>4212301</ID><Parent_ID>41</Parent_ID><Name>windows kernel font fuzzing</Name><Description>An attack</Description><Type>Keyword</Type></Query>
<Query><ID>4212321</ID><Parent_ID>416</Parent_ID><Name>windows kernel memory disclosure bug</Name><Description>windows kernel memory disclosure bug</Description><Type>Keyword</Type></Query>
<Query><ID>4212440</ID><Parent_ID>328</Parent_ID><Name>windows local privilege escalation</Name><Description>Too specific</Description><Type>Keyword</Type></Query>
<Query><ID>4212489</ID><Parent_ID>475</Parent_ID><Name>windows malware</Name><Description>windows malware</Description><Type>Keyword</Type></Query>
<Query><ID>4212954</ID><Parent_ID>167</Parent_ID><Name>windows security</Name><Description>windows security</Description><Type>Keyword</Type></Query>
<Query><ID>4216076</ID><Parent_ID>560</Parent_ID><Name>wireshark</Name><Description>Security tool</Description><Type>Keyword</Type></Query>
<Query><ID>4219593</ID><Parent_ID>182</Parent_ID><Name>woot</Name><Description>USENIX Workshop on Offensive Technologies</Description><Type>Keyword</Type></Query>
<Query><ID>4219793</ID><Parent_ID>52</Parent_ID><Name>word document exploit kit</Name><Description>word document exploit kit</Description><Type>Keyword</Type></Query>
<Query><ID>4224630</ID><Parent_ID>533</Parent_ID><Name>wpa2</Name><Description>WiFi encryption mode: https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access</Description><Type>Keyword</Type></Query>
<Query><ID>4232839</ID><Parent_ID>329</Parent_ID><Name>xss</Name><Description>Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.</Description><Type>Keyword</Type></Query>
<Query><ID>4232847</ID><Parent_ID>514</Parent_ID><Name>xss attack</Name><Description>xss attack</Description><Type>Keyword</Type></Query>
<Query><ID>4232958</ID><Parent_ID>184</Parent_ID><Name>xss filter bypass</Name><Description>xss filter bypass</Description><Type>Keyword</Type></Query>
<Query><ID>4233221</ID><Parent_ID>81</Parent_ID><Name>xss vulnerability</Name><Description>xss vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4233616</ID><Parent_ID>514</Parent_ID><Name>xxe</Name><Description>An XML External Entity (XXE) attack (sometimes called an XXE injection attack) is based on Server Side Request Forgery (SSRF).</Description><Type>Keyword</Type></Query>
<Query><ID>4234144</ID><Parent_ID>348</Parent_ID><Name>yahoo breach</Name><Description>yahoo breach</Description><Type>Keyword</Type></Query>
<Query><ID>4235095</ID><Parent_ID>300</Parent_ID><Name>yara rule</Name><Description>Malware analysis software: https://en.wikipedia.org/wiki/YARA</Description><Type>Keyword</Type></Query>
<Query><ID>4238704</ID><Parent_ID>477</Parent_ID><Name>youtube hacking tricks</Name><Description>youtube hacking tricks</Description><Type>Keyword</Type></Query>
<Query><ID>4240730</ID><Parent_ID>248</Parent_ID><Name>zcash</Name><Description>Cryptocurrency: https://en.wikipedia.org/wiki/Zcash</Description><Type>Keyword</Type></Query>
<Query><ID>4241007</ID><Parent_ID>449</Parent_ID><Name>zed attack proxy</Name><Description>zed attack proxy</Description><Type>Keyword</Type></Query>
<Query><ID>4241829</ID><Parent_ID>217</Parent_ID><Name>zero day vulnerability</Name><Description>zero day vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4242200</ID><Parent_ID>217</Parent_ID><Name>zero-day</Name><Description>zero-day</Description><Type>Keyword</Type></Query>
<Query><ID>4242222</ID><Parent_ID>217</Parent_ID><Name>zero-day attack</Name><Description>zero-day attack</Description><Type>Keyword</Type></Query>
<Query><ID>4242276</ID><Parent_ID>217</Parent_ID><Name>zero-day exploit</Name><Description>zero-day exploit</Description><Type>Keyword</Type></Query>
<Query><ID>4242319</ID><Parent_ID>217</Parent_ID><Name>zero-day flaw</Name><Description>zero-day flaw</Description><Type>Keyword</Type></Query>
<Query><ID>4242420</ID><Parent_ID>217</Parent_ID><Name>zero-day vulnerability</Name><Description>zero-day vulnerability</Description><Type>Keyword</Type></Query>
<Query><ID>4242622</ID><Parent_ID>217</Parent_ID><Name>zeroday</Name><Description>zeroday</Description><Type>Keyword</Type></Query>
<Query><ID>4242782</ID><Parent_ID>4</Parent_ID><Name>zeronights</Name><Description>Cyber security event: https://zeronights.org/</Description><Type>Keyword</Type></Query>
<Query><ID>4243189</ID><Parent_ID>509</Parent_ID><Name>zeus banking trojan</Name><Description>zeus banking trojan</Description><Type>Keyword</Type></Query>
<Query><ID>4243209</ID><Parent_ID>509</Parent_ID><Name>zeus botnet</Name><Description>zeus botnet</Description><Type>Keyword</Type></Query>
</DataTable>
