Knowledge ID: K0177

Knowledge Description: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 

Work Roles with this Knowledge:

  • Work Role ID: AN-ASA-001
    Work Roles: All-Source Analyst
    Work Role Description: Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.
    Category: Analyze
    Specialty Area(s): All-Source Analysis
  • Work Role ID: AN-ASA-002
    Work Role Description: Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.
    Category: Analyze
    Specialty Area(s): All-Source Analysis
  • Work Role ID: AN-EXP-001
    Work Role Description: Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
    Category: Analyze
    Specialty Area(s): Exploitation Analysis
  • Work Role ID: AN-LNG-001
    Work Role Description: Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.
    Category: Analyze
    Specialty Area(s): Language Analysis
  • Work Role ID: AN-TGT-001
    Work Roles: Target Developer
    Work Role Description: Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.
    Category: Analyze
    Specialty Area(s): Targets
  • Work Role ID: AN-TGT-002
    Work Role Description: Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.
    Category: Analyze
    Specialty Area(s): Targets
  • Work Role ID: AN-TWA-001
    Work Role Description: Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.
    Category: Analyze
    Specialty Area(s): Threat Analysis
  • Work Role ID: CO-CLO-001
    Work Role Description: Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.
    Specialty Area(s): Collection Operations
  • Work Role ID: CO-CLO-002
    Work Role Description: Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.
    Specialty Area(s): Collection Operations
  • Work Role ID: PR-CDA-001
    Work Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
    Specialty Area(s): Cyber Defense Analysis
  • Work Role ID: PR-CIR-001
    Work Role Description: Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
    Specialty Area(s): Incident Response
  • Work Role ID: PR-VAM-001
    Work Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.