DkvVGTeZwXm//pgI0gH0n1SpdnomstvKR8iM3242/vI=
4.1 Cybersecurity Technology
The knowledge, skills, and abilities needed to understand the purpose and function of cybersecurity technology, including tools and systems.
Critical Work Functions
- 4.1.1 Cryptography
- Explain the core concepts of cryptography and cryptographic key management concepts
- Explain the concept of public key infrastructure (PKI)
- Explain symmetric key rotation techniques and concepts
- Describe encryption methodologies
- 4.1.2 Information Technology (IT) Architecture
- Explain IT architectural concepts and frameworks
- Explain security system design tools, methods, and techniques
- Demonstrate knowledge of information theory
- Demonstrate knowledge of communication methods, principles, and concepts
- Explain parallel and distributed computing concepts
- Explain remote access technology concepts
- Describe how different file types can be used for anomalous behavior
- Distinguish between data in use, data in motion (transit), and data at rest
- Describe the capabilities of different electronic communication systems and methods
- Understand system life cycle management principles, including software security and usability
- 4.1.3 Operational Technology (OT) Architecture
- Explain typical OT architecture
- Differentiate between IT and OT architectures and the operation of these architectures
- Explain the typical communications network options and communications protocols used in OT architectures, with their relative pros and cons
- Identify the principal drivers of OT systems, particularly process safety and system availability
- 4.1.4 Networks
- Explain computer networking concepts and protocols, and network security methodologies
- Explain network design processes, to include understanding of security objectives, operational objectives, and tradeoffs
- Explain local area network (LAN) and wide area network (WAN) principles and concepts, including bandwidth management
- Explain service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, v3 [ITL])
- Identify the range of existing networks types
- Explain how traffic flows across the network
- Explain server administration and systems engineering theories, concepts, and methods
- Identify host and network access control mechanisms (e.g., access control list)
- Recognize the impact on OT systems of security hardware and software options such as encryption and intrusion detection
- Explain guidance on separation of OT and IT system networks and components
- Describe basic system administration, network, and operating system hardening techniques
- 4.1.5 Operating Systems
- Demonstrate familiarity with the security features and functions of common operating systems
- Explain virtualization technologies and virtual machine development and maintenance
- Describe how to manage patches to IT and OT operating systems
- Recognize the implications of installed patches to IT and OT systems
- Demonstrate familiarity with Windows command line
- Demonstrate familiarity with Unix/Linux operating system structure and internals (e.g., process management, directory structure, installed applications)
- Identify file system implementations
- Demonstrate familiarity with Windows/Unix/Android, iOS, and Windows Mobile ports and services
- 4.1.6 Security Technology Awareness[2]
- Understand emerging security issues, risks, and vulnerabilities
- Identify emerging computer-based technology that has potential for exploitation by adversaries
- Demonstrate skill in applying and incorporating new and emerging cybersecurity technologies and trends into proposed solutions
- Understand products and nomenclature of major IT security vendors and how differences affect exploitation/vulnerabilities
- 4.1.7 Telecommunications
- Explain basic concepts, terminology, and operations of a wide range of communications media
- Describe transmission methods and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly
- Describe the communications protocols used in OT architectures, with their relative pros and cons
- Understand Voice over Internet Protocols (VoIPs)
- 4.1.8 Web Technologies
- Explain web services, including service oriented architecture, Representational State Transfer (REST), Simple Object Access Protocol (SOAP), and web service description language
- Demonstrate Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration
- Explain web filtering technologies
Technical Content Areas
- 4.1.9 Cryptography
- Core concepts and methodologies
- Encryption concepts (e.g., symmetric vs. asymmetric, transport encryption, digital signatures)
- Cryptographic tools and products (e.g., WEP, MD5, SHA)
- Public Key Infrastructure (PKI)
- Certificate authorities and digital certificates
- 4.1.10 IT Architecture
- Electronic communication systems and methods
- Voice over Internet Protocol (VoIP)
- Information theory
- Algorithm complexity theory
- Communication methods, principles, and concepts, such as
- 4.1.11 OT Architecture
- Architecture concepts
- Supervisory Control and Data Acquisition (SCADA)
- 4.1.12 Networks
- Architecture concepts
- Components (e.g., firewalls, routers, switches)
- Network Types, such as
- Local Area Networks (LANs)
- Wide Area Networks (WANs)
- Wireless Fidelity (Wi-Fi)
- Private Branching Exchange (PBX)
- Network Protocols, such as
- Transmission Control Protocol and Internet Protocol (TCP/IP)
- Dynamic Host Configuration Protocol (DHCP)
- Hardening Techniques
- Hardware-based computer protection components (e.g., hardware firewalls, servers, routers)
- Software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware)
- 4.1.13 Operating Systems
- Common Operating Systems (OS)
- File system implementations, such as
- New Technology File System (NTFS)
- File Allocation Table (FAT)
- 4.1.14 Telecommunications
- Concepts
- Fiber optics systems link budgeting
- Communication media, such as
- Computer and telephone networks
- Transmission methods, such as
- Radio Frequency Identification (RFID)
- Wireless Fidelity (Wi-Fi)
- OT communication protocols, such as