Knowledge ID: K0915
Knowledge of network architecture principles and practices
Work roles with this Knowledge
Privacy Compliance
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-008Responsible for developing and overseeing an organization’s privacy compliance program and staff, including establishing and managing privacy-related governance, policy, and incident response needs.
Security Control Assessment
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-012Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Systems Authorization
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-013Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Systems Security Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-014Responsible for managing the cybersecurity of a program, organization, system, or enclave.
Cybersecurity Architecture
Category: Design and DevelopmentNICE Framework ID: DD-WRL-001Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Enterprise Architecture
Category: Design and DevelopmentNICE Framework ID: DD-WRL-002Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.
Secure Software Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-003Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.
Secure Systems Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-004Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.
Software Security Assessment
Category: Design and DevelopmentNICE Framework ID: DD-WRL-005Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.
Systems Testing and Evaluation
Category: Design and DevelopmentNICE Framework ID: DD-WRL-007Responsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.
Technology Research and Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-008Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Network Operations
Category: Implementation and OperationNICE Framework ID: IO-WRL-004Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.
Systems Administration
Category: Implementation and OperationNICE Framework ID: IO-WRL-005Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.
Systems Security Analysis
Category: Implementation and OperationNICE Framework ID: IO-WRL-006Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.
Defensive Cybersecurity
Category: Protection and DefenseNICE Framework ID: PD-WRL-001Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
Digital Forensics
Category: Protection and DefenseNICE Framework ID: PD-WRL-002Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
Incident Response
Category: Protection and DefenseNICE Framework ID: PD-WRL-003Responsible for investigating, analyzing, and responding to network cybersecurity incidents.
Infrastructure Support
Category: Protection and DefenseNICE Framework ID: PD-WRL-004Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Threat Analysis
Category: Protection and DefenseNICE Framework ID: PD-WRL-006Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.
Vulnerability Analysis
Category: Protection and DefenseNICE Framework ID: PD-WRL-007Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Digital Evidence Analysis
Category: InvestigationNICE Framework ID: IN-WRL-002Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
All-Source Analysis
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-001Responsible for analyzing data and information from one or multiple sources to conduct preparation of the operational environment, respond to requests for information, and submit intelligence collection and production requirements in support of intelligence planning and operations.
Cyber Intelligence Planning
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-004Responsible for developing intelligence plans to satisfy cyber operation requirements. Identifies, validates, and levies requirements for intelligence collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
Multi-Disciplined Language Analysis
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-005<p>Responsible for applying language and cultural expertise with target, threat, and technical knowledge to process, analyze, and disseminate intelligence information derived from language, voice, and/or graphic materials. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.</p>
Cyberspace Operations
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-001Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.
Cyber Operations Planning
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-002Responsible for developing cybersecurity operations plans; participating in targeting selection, validation, and synchronization; and enabling integration during the execution of cyber actions.
Exploitation Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-003Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Mission Assessment
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-004Responsible for developing assessment plans and performance measures; conducting strategic and operational effectiveness assessments for cyber events; determining whether systems perform as expected; and providing input to the determination of operational effectiveness.
Partner Integration Planning
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-005<p>Responsible for advancing cooperation across organizational or national borders between cyber operations partners. Provides guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.</p>
Target Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-006Responsible for conducting target development at the system, component, and entity levels. Builds and maintains electronic target folders to include inputs from environment preparation and/or internal or external intelligence sources. Coordinates with partner target working groups and intelligence community members, and presents candidate targets for vetting and validation. Assesses and reports on damage resulting from the application of military force and coordinates federal support as required.
Target Network Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-007Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)