Skip to Content

Cybersecurity

4.1 Cybersecurity Technology

The knowledge, skills, and abilities needed to understand the purpose and function of cybersecurity technology, including tools and systems.

Critical Work Functions

  • 4.1.1 Cryptography
    • Explain the core concepts of cryptography and cryptographic key management concepts
    • Explain the concept of public key infrastructure (PKI)
    • Explain symmetric key rotation techniques and concepts
    • Describe encryption methodologies
  • 4.1.2 Information Technology (IT) Architecture
    • Explain IT architectural concepts and frameworks
    • Explain security system design tools, methods, and techniques
    • Demonstrate knowledge of information theory
    • Demonstrate knowledge of communication methods, principles, and concepts
    • Explain parallel and distributed computing concepts
    • Explain remote access technology concepts
    • Describe how different file types can be used for anomalous behavior
    • Distinguish between data in use, data in motion (transit), and data at rest
    • Describe the capabilities of different electronic communication systems and methods
    • Understand system life cycle management principles, including software security and usability
  • 4.1.3 Operational Technology (OT) Architecture
    • Explain typical OT architecture
    • Differentiate between IT and OT architectures and the operation of these architectures
    • Explain the typical communications network options and communications protocols used in OT architectures, with their relative pros and cons
    • Identify the principal drivers of OT systems, particularly process safety and system availability
  • 4.1.4 Networks
    • Explain computer networking concepts and protocols, and network security methodologies
    • Explain network design processes, to include understanding of security objectives, operational objectives, and tradeoffs
    • Explain local area network (LAN) and wide area network (WAN) principles and concepts, including bandwidth management
    • Explain service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, v3 [ITL])
    • Identify the range of existing networks types
    • Explain how traffic flows across the network
    • Explain server administration and systems engineering theories, concepts, and methods
    • Identify host and network access control mechanisms (e.g., access control list)
    • Recognize the impact on OT systems of security hardware and software options such as encryption and intrusion detection
    • Explain guidance on separation of OT and IT system networks and components
    • Describe basic system administration, network, and operating system hardening techniques
  • 4.1.5 Operating Systems
    • Demonstrate familiarity with the security features and functions of common operating systems
    • Explain virtualization technologies and virtual machine development and maintenance
    • Describe how to manage patches to IT and OT operating systems
    • Recognize the implications of installed patches to IT and OT systems
    • Demonstrate familiarity with Windows command line
    • Demonstrate familiarity with Unix/Linux operating system structure and internals (e.g., process management, directory structure, installed applications)
    • Identify file system implementations
    • Demonstrate familiarity with Windows/Unix/Android, iOS, and Windows Mobile ports and services
  • 4.1.6 Security Technology Awareness[2]
    • Understand emerging security issues, risks, and vulnerabilities
    • Identify emerging computer-based technology that has potential for exploitation by adversaries
    • Demonstrate skill in applying and incorporating new and emerging cybersecurity technologies and trends into proposed solutions
    • Understand products and nomenclature of major IT security vendors and how differences affect exploitation/vulnerabilities
  • 4.1.7 Telecommunications
    • Explain basic concepts, terminology, and operations of a wide range of communications media
    • Describe transmission methods and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly
    • Describe the communications protocols used in OT architectures, with their relative pros and cons
    • Understand Voice over Internet Protocols (VoIPs)
  • 4.1.8 Web Technologies
    • Explain web services, including service oriented architecture, Representational State Transfer (REST), Simple Object Access Protocol (SOAP), and web service description language
    • Demonstrate Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration
    • Explain web filtering technologies
Technical Content Areas

  • 4.1.9 Cryptography
    • Core concepts and methodologies
      • Encryption concepts (e.g., symmetric vs. asymmetric, transport encryption, digital signatures)
      • Cryptographic tools and products (e.g., WEP, MD5, SHA)
      • Public Key Infrastructure (PKI)
      • Certificate authorities and digital certificates
      • Recovery agent
      • Registration
      • Key escrow
      • Trust models
  • 4.1.10 IT Architecture
    • Electronic communication systems and methods
      • E-mail
      • Voice over Internet Protocol (VoIP)
      • Instant Messenger (IM)
      • Web forums
      • Direct video broadcasts
    • Information theory
      • Source coding
      • Channel coding
      • Algorithm complexity theory
      • Data compression
    • Communication methods, principles, and concepts, such as
      • Encoding
      • Signaling
      • Multiplexing
  • 4.1.11 OT Architecture
    • Architecture concepts
      • Sensors
      • PLC/RTU
      • Fieldbus
      • Supervisory Control and Data Acquisition (SCADA)
      • HMI
      • DCS
      • Historians
  • 4.1.12 Networks
    • Architecture concepts
      • Topology
      • Components (e.g., firewalls, routers, switches)
    • Network Types, such as
      • Local Area Networks (LANs)
      • Wide Area Networks (WANs)
      • Wireless Fidelity (Wi-Fi)
      • Private Branching Exchange (PBX)
      • Sensor networks
    • Network Protocols, such as
      • Transmission Control Protocol and Internet Protocol (TCP/IP)
      • Dynamic Host Configuration Protocol (DHCP)
      • Domain Name System (DNS)
      • IPv4 and IPv6
    • Hardening Techniques
      • Hardware-based computer protection components (e.g., hardware firewalls, servers, routers)
      • Software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware)
  • 4.1.13 Operating Systems
    • Common Operating Systems (OS)
      • Windows
      • Unix/Linux
      • Mac OS
      • Android
      • iOS
      • Windows Mobile
    • File system implementations, such as
      • New Technology File System (NTFS)
      • File Allocation Table (FAT)
      • File Extension (EXT)
  • 4.1.14 Telecommunications
    • Concepts
      • Routing algorithms
      • Fiber optics systems link budgeting
      • Add/drop multiplexers
    • Communication media, such as
      • Computer and telephone networks
      • Satellite
      • Fiber
      • Wireless
    • Transmission methods, such as
      • Bluetooth
      • Radio Frequency Identification (RFID)
      • Infrared Networking (IR)
      • Wireless Fidelity (Wi-Fi)
      • Cellular
      • Satellite dishes
    • OT communication protocols, such as
      • DNP3
      • Modbus
      • IEC60870