Knowledge ID: K0692
Knowledge of vulnerability assessment tools and techniques
Work roles with this Knowledge
Cybersecurity Policy and Planning
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-002Responsible for developing and maintaining cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.
Cybersecurity Workforce Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-003Responsible for developing cybersecurity workforce plans, assessments, strategies, and guidance, including cybersecurity-related staff training, education, and hiring processes. Makes adjustments in response to or in anticipation of changes to cybersecurity-related policy, technology, and staffing needs and requirements.Authors mandated workforce planning strategies to maintain compliance with legislation, regulation, and policy.
Security Control Assessment
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-012Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Systems Authorization
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-013Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Cybersecurity Architecture
Category: Design and DevelopmentNICE Framework ID: DD-WRL-001Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Knowledge Management
Category: Implementation and OperationNICE Framework ID: IO-WRL-003Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.
Defensive Cybersecurity
Category: Protection and DefenseNICE Framework ID: PD-WRL-001Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
Exploitation Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-003Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)