Knowledge ID: K0106
Knowledge Description: Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
Work Roles with this Knowledge:
- Work Role ID: OV-EXL-001Work Roles: Executive Cyber LeadershipWork Role Description: Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.Category: Oversee and GovernSpecialty Area(s): Executive Cyber Leadership
- Work Role ID: OV-MGT-001Work Roles: Information Systems Security ManagerWork Role Description: Responsible for the cybersecurity of a program, organization, system, or enclave.Category: Oversee and GovernSpecialty Area(s): Cybersecurity Management
- Work Role ID: PR-CDA-001Work Roles: Cyber Defense AnalystWork Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.Category: Protect and DefendSpecialty Area(s): Cyber Defense Analysis
- Work Role ID: PR-CIR-001Work Roles: Cyber Defense Incident ResponderWork Role Description: Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.Category: Protect and DefendSpecialty Area(s): Incident Response
- Work Role ID: PR-INF-001Work Roles: Cyber Defense Infrastructure Support SpecialistWork Role Description: Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.Category: Protect and DefendSpecialty Area(s): Cyber Defense Infrastructure Support
- Work Role ID: PR-VAM-001Work Roles: Vulnerability Assessment AnalystWork Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.Category: Protect and DefendSpecialty Area(s): Vulnerability Assessment and Management