Knowledge Management
Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.
- T1020: Determine the operational and safety impacts of cybersecurity lapses
- T1105: Construct access paths to suites of information
- T1222: Determine security requirements for new information technologies
- T1223: Determine security requirements for new operational technologies
- T1239: Monitor the usage of knowledge management assets and resources
- T1240: Create knowledge management assets and resources usage reports
- T1273: Plan knowledge management projects
- T1274: Deliver knowledge management projects
- T1296: Recommend data structures for use in the production of reports
- T1354: Identify system cybersecurity requirements
- T1504: Manage organizational knowledge repositories
- T1523: Design organizational knowledge management frameworks
- T1524: Implement organizational knowledge management frameworks
- T1525: Maintain organizational knowledge management frameworks
- T1658: Determine customer requirements
- T1913: Identify system security requirements
- K0674: Knowledge of computer networking protocols
- K0675: Knowledge of risk management processes
- K0676: Knowledge of cybersecurity laws and regulations
- K0677: Knowledge of cybersecurity policies and procedures
- K0678: Knowledge of privacy laws and regulations
- K0679: Knowledge of privacy policies and procedures
- K0680: Knowledge of cybersecurity principles and practices
- K0681: Knowledge of privacy principles and practices
- K0682: Knowledge of cybersecurity threats
- K0683: Knowledge of cybersecurity vulnerabilities
- K0684: Knowledge of cybersecurity threat characteristics
- K0691: Knowledge of cyber defense tools and techniques
- K0692: Knowledge of vulnerability assessment tools and techniques
- K0703: Knowledge of data mining principles and practices
- K0736: Knowledge of information technology (IT) security principles and practices
- K0751: Knowledge of system threats
- K0752: Knowledge of system vulnerabilities
- K0774: Knowledge of content creation tools and techniques
- K0775: Knowledge of information management tools and techniques
- K0776: Knowledge of collaboration tools and techniques
- K0863: Knowledge of cloud computing principles and practices
- K0864: Knowledge of knowledge management principles and practices
- K0865: Knowledge of data classification standards and best practices
- K0866: Knowledge of data classification tools and techniques
- K0895: Knowledge of taxonomy models and frameworks
- K0896: Knowledge of semantic ontology models and frameworks
- K0917: Knowledge of Personally Identifiable Information (PII) data security standards and best practices
- K0918: Knowledge of Payment Card Industry (PCI) data security standards and best practices
- K0919: Knowledge of Personal Health Information (PHI) data security standards and best practices
- K0929: Knowledge of content synchronization tools and techniques
- K0934: Knowledge of data classification policies and procedures
- K0953: Knowledge of data mining tools and techniques
- K0983: Knowledge of computer networking principles and practices
- K0991: Knowledge of database administration principles and practices
- K0992: Knowledge of database maintenance principles and practices
- K1014: Knowledge of network security principles and practices
- K1051: Knowledge of collection data flow from origin into repositories and tools
- K1088: Knowledge of knowledge management tools and techniques
- S0011: Skill in conducting information searches
- S0507: Skill in collecting terminal or environment data
- S0530: Skill in conducting research
- S0557: Skill in creating knowledge maps
- S0586: Skill in administering databases
- S0744: Skill in performing technical writing
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)