As a common carrier of human and information, cyberspace is intertwined and integrated with geographical space. It has become a new spatial form of human activities as well as an important basis for the operation and development of social system. The diversity and volume of elements in cyberspace and the frequency and complexity of cyber-attacks have brought new challenges to the governance and security of cyberspace. At present, the cognition of cyberspace is inadequate, the geographical attributes of cyberspace are ignored, and a reasonable and complete classification framework of cyberspace elements has not been formed, making it difficult to meet the practical needs of cybersecurity business. Therefore, comprehensively considering both the interactions between cyberspace and geographical space and their characteristics, constructing a hierarchical system of cyberspace elements with all sorts of themes and clear layers, are of great importance for drawing geographic maps of cyberspace and realizing the visual expression of cyberspace. Based on the review of cyberspace hierarchical model, with cyberspace geography theory as guidance, focusing on the "man-land-network" relationship, combining with the practical demand for cybersecurity business, drawing on the construction method of geographic factor index system, the present study put forward a four-layer cyberspace hierarchical model including the geographical environment layer, the network environment layer, the behavior subject layer, and the business environment layer. Specifically, the geographical environment layer is the base layer, which is the carrier of all kinds of cyberspace infrastructure as well as the foundation of multi-source data integration, visualization, and comprehensive analysis; The upper layer is the network environment layer, including physical network and logical network. The behavior subject layer is composed of realistic roles, cyberspace roles, managers and organizations, and also involves their activities and social relations; The business environment layer is abstracted from the previous three layers, including all kinds of cybersecurity cases (incidents), critical network assets, security situation, cybersecurity protection activities, cybersecurity intelligence, and other elements related to cybersecurity business. Additionally, the methods to express and link the elements of each layer were also explored. All of these efforts could provide a scientific basis for the management of network asset and for the comprehensive prevention and control of cybersecurity.