Skip to main content

The NETWORK domain in the Cyber Defense Matrix can be represented in a multi-layered mental model, as evidenced by the OSI Model. But what if all the other domains of the Cyber Defense Matrix has its own multi-layered mental model? What is the equivalent model for DEVICES, APPLICATIONS, DATA, and USERS?

For the DATA domain, it turns out that there is a well-established, multi-layered mental model: the DIKW Pyramid.

DIKW Pyramid Complete 3

This model represents the hierarchical stages of how content transforms, starting from raw DATA, moving through INFORMATION and KNOWLEDGE, and ultimately reaching WISDOM. Each layer builds upon the previous one, adding context to the layer below to make it more understandable, and thus more actionable.

 

Here's an example of each type on content:

Data 32
Information 32℉
Knowledge It's freezing
Wisdom Maybe you should wear a jacket

 

As with the OSI Model, each layer of the DIKW Pyramid can also be aligned against the Cyber Defense Matrix as shown below. Consequently, we can apply the functions of the NIST Cybersecurity Framework to each layer.

 

DIKW+CDM Vector

 

But what does it mean to PROTECT DATA versus INFORMATION or KNOWLEDGE? This is not so clear until we view the DIKW through the lens of our evolving digital world. What we see is a steady progression of technologies that have moved us up this pyramid.

DIKW Pyramid Miminal

 

, this model becomes a cornerstone in understanding the progression towards artificial intelligence.

bg-shape-download

Learn How to Protect Your Enterprise Data Now!

Knostic delivers an independent, objective assessment, complementing and integrating with Microsoft's own tools.
Assess, monitor and remediate.

folder-with-pocket-mockup-leaned
background for career

What’s next?

Want to solve oversharing in your enterprise AI search? Let's talk.

Knostic offers the most comprehensively holistic and impartial solution for enterprise AI search.

protect icon

Knostic leads the unbiased need-to-know based access controls space, enabling enterprises to safely adopt AI.