Knowledge ID: K1079
Knowledge of web application security risks
Work roles with this Knowledge
Cybersecurity Policy and Planning
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-002Responsible for developing and maintaining cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.
Executive Cybersecurity Leadership
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-007Responsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.
Security Control Assessment
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-012Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Systems Authorization
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-013Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Systems Security Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-014Responsible for managing the cybersecurity of a program, organization, system, or enclave.
Secure Software Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-003Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.
Software Security Assessment
Category: Design and DevelopmentNICE Framework ID: DD-WRL-005Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.
Defensive Cybersecurity
Category: Protection and DefenseNICE Framework ID: PD-WRL-001Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
Digital Forensics
Category: Protection and DefenseNICE Framework ID: PD-WRL-002Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
Incident Response
Category: Protection and DefenseNICE Framework ID: PD-WRL-003Responsible for investigating, analyzing, and responding to network cybersecurity incidents.
Vulnerability Analysis
Category: Protection and DefenseNICE Framework ID: PD-WRL-007Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Cybercrime Investigation
Category: InvestigationNICE Framework ID: IN-WRL-001Responsible for investigating cyberspace intrusion incidents and crimes. Applies tactics, techniques, and procedures for a full range of investigative tools and processes and appropriately balances the benefits of prosecution versus intelligence gathering.
Digital Evidence Analysis
Category: InvestigationNICE Framework ID: IN-WRL-002Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)