Knowledge ID: K0701

Knowledge of data backup and recovery policies and procedures

Work roles with this Knowledge

  • Security Control Assessment

    NICE Framework ID: OG-WRL-012

    Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

  • Systems Security Management

    NICE Framework ID: OG-WRL-014

    Responsible for managing the cybersecurity of a program, organization, system, or enclave.

  • Database Administration

    NICE Framework ID: IO-WRL-002

    Responsible for administering databases and data management systems that allow for the secure storage, query, protection, and utilization of data.

  • Digital Forensics

    NICE Framework ID: PD-WRL-002

    Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.

  • Incident Response

    NICE Framework ID: PD-WRL-003

    Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

  • Infrastructure Support

    NICE Framework ID: PD-WRL-004

    Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.

  • Vulnerability Analysis

    NICE Framework ID: PD-WRL-007

    Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

  • Digital Evidence Analysis

    Category: Investigation
    NICE Framework ID: IN-WRL-002

    Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.

  • Cyberspace Operations

    NICE Framework ID: CE-WRL-001

    Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.