Foreword |
|
xv | |
Preface |
|
xvii | |
Acknowledgments |
|
xxiii | |
Section I Cybersecurity: Defining Competencies For The Cybersecurity Workforce And Two Frameworks |
|
|
1 Introduction: Defining the Cybersecurity Workforce |
|
|
3 | (48) |
|
|
3 | (1) |
|
Cybersecurity: Failure Is Not an Option |
|
|
3 | (1) |
|
Six Blind Men and an Elephant |
|
|
4 | (1) |
|
Cybersecurity: An Emerging Field |
|
|
5 | (2) |
|
Two Common Sense Factors That Make Cybersecurity Different |
|
|
7 | (1) |
|
Instilling Order in a Virtual World |
|
|
8 | (2) |
|
Combining Effort with Intent in Order to Get a Complete Solution |
|
|
10 | (1) |
|
Cybersecurity: Finding the Right Set of Activities |
|
|
11 | (2) |
|
Changing Times, Changing Players: The Stakes Get Higher |
|
|
13 | (1) |
|
Definitive Step to Ensure Best Practice in Cybersecurity |
|
|
14 | (1) |
|
National Initiative for Cybersecurity Education Initiative |
|
|
15 | (1) |
|
National Cybersecurity Workforce Framework (v2.0) |
|
|
16 | (4) |
|
Knowledge Area 1: Securely Provision |
|
|
20 | (4) |
|
Knowledge Area 2: Operate and Maintain |
|
|
24 | (4) |
|
Knowledge Area 3: Protect and Defend |
|
|
28 | (3) |
|
Knowledge Area 4: Investigate |
|
|
31 | (3) |
|
Knowledge Area 5: Collect and Operate |
|
|
34 | (3) |
|
Knowledge Area 6: Analyze |
|
|
37 | (3) |
|
Knowledge Area 7: Oversee and Govern |
|
|
40 | (4) |
|
|
44 | (4) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (2) |
|
2 Creating Standard Competencies for Cybersecurity Work |
|
|
51 | (56) |
|
|
51 | (1) |
|
|
51 | (3) |
|
Structure and Intent of the NICE Workforce Framework |
|
|
54 | (3) |
|
The NICE Framework Listing of Tasks for Each Specialty Area |
|
|
57 | (1) |
|
Knowledge Area 1: Securely Provision |
|
|
57 | (9) |
|
Knowledge Area 2: Operate and Maintain |
|
|
66 | (4) |
|
Knowledge Area 3: Protect and Defend |
|
|
70 | (4) |
|
Knowledge Area 4: Investigate |
|
|
74 | (3) |
|
Knowledge Area 5: Collect and Operate |
|
|
77 | (1) |
|
Knowledge Area 6: Analyze |
|
|
78 | (1) |
|
Knowledge Area 7: Oversee and Govern |
|
|
79 | (7) |
|
Implementing the Framework in Practice |
|
|
86 | (2) |
|
Adapting the NICE Framework to an Organization |
|
|
88 | (2) |
|
Planning: Converting Theory into Practice |
|
|
90 | (2) |
|
Mapping the NICE Specialty Areas to Business Purposes |
|
|
92 | (2) |
|
Deciding on Which Specialty Area to Employ in a Concrete Solution |
|
|
94 | (2) |
|
Tailoring a Solution from the Concept |
|
|
96 | (2) |
|
Tailoring Specialty Area Tasks to Specific Application |
|
|
98 | (2) |
|
Three Factors That Ensure Proper Application of the Model |
|
|
100 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
Availability of Resources |
|
|
102 | (1) |
|
|
102 | (2) |
|
|
104 | (2) |
|
|
106 | (1) |
|
3 Implementing Standard Cybersecurity |
|
|
107 | (28) |
|
|
107 | (1) |
|
Why It Is Difficult to Protect Our Critical Information Infrastructure |
|
|
107 | (3) |
|
Background: A System of Best Practices |
|
|
110 | (1) |
|
Distinction between This and Other Standards |
|
|
110 | (2) |
|
|
112 | (1) |
|
Relationship between the CSF and the NICE Framework |
|
|
112 | (2) |
|
Standard Practice Approach to Implementation |
|
|
114 | (1) |
|
Overview of the NIST Framework for Improving Critical Infrastructure Cybersecurity |
|
|
115 | (3) |
|
Benefits of Adopting the Cybersecurity Framework |
|
|
118 | (1) |
|
The Cybersecurity Framework Core |
|
|
118 | (6) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (4) |
|
The Cybersecurity Framework Implementation Tiers |
|
|
124 | (2) |
|
|
126 | (1) |
|
The Cybersecurity Framework Is Descriptive and Not Prescriptive |
|
|
127 | (2) |
|
Structure of the Book's Presentation of the NICE and Cybersecurity Framework |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (4) |
Section II The Nice Cybersecurity Workforce Framework And How It Maps To The CFS Framework |
|
|
|
135 | (86) |
|
|
135 | (1) |
|
Securely Provision Category Overview |
|
|
136 | (1) |
|
Specialty Area 1: Secure Acquisition |
|
|
137 | (7) |
|
Supply Chain Risk Management Implications |
|
|
140 | (1) |
|
Factoring Secure Acquisition Workforce Tasks into the Cybersecurity Framework Functions |
|
|
141 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Secure Acquisition |
|
|
142 | (2) |
|
Specialty Area 2: Secure Software Engineering |
|
|
144 | (17) |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
149 | (2) |
|
Factoring Secure Software Engineering Workforce Tasks into the Cybersecurity Framework Functions |
|
|
151 | (4) |
|
Identify/Asset Management |
|
|
151 | (1) |
|
Identify/Business Environment |
|
|
151 | (3) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Secure Software Engineering |
|
|
155 | (6) |
|
Specialty Area 3: Systems Security Architecture |
|
|
161 | (7) |
|
Contextual Security Architecture |
|
|
163 | (1) |
|
Conceptual Security Architecture |
|
|
164 | (1) |
|
Logical Security Architecture |
|
|
165 | (1) |
|
Physical Security Architecture |
|
|
166 | (1) |
|
Factoring Systems Security Architecture Workforce Tasks into the Cybersecurity Framework Functions |
|
|
167 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Systems Security Architecture |
|
|
168 | (1) |
|
Specialty Area 4: Technology Research and Development |
|
|
168 | (10) |
|
Factoring Technology Research and Development Workforce Tasks into the Cybersecurity Framework Functions |
|
|
176 | (2) |
|
Underlying Knowledge, Skill, and Ability Requirements for Technology Research and Development |
|
|
178 | (1) |
|
Specialty Area 5: Systems Requirements Planning |
|
|
178 | (17) |
|
Stakeholder Requirements Definition |
|
|
183 | (1) |
|
System Requirements Analysis |
|
|
184 | (1) |
|
|
185 | (1) |
|
Security Control Formulation and Implementation |
|
|
186 | (1) |
|
Factoring Systems Requirements Planning Workforce Tasks into the Cybersecurity Framework Functions |
|
|
187 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Systems Requirements Planning |
|
|
188 | (7) |
|
Specialty Area 6: Test and Evaluation |
|
|
195 | (5) |
|
|
195 | (1) |
|
Functional and Security Testing |
|
|
195 | (1) |
|
|
196 | (1) |
|
Factoring Test and Evaluation Workforce Tasks into the Cybersecurity Framework Functions |
|
|
197 | (1) |
|
|
197 | (1) |
|
System Monitoring Tool Testing |
|
|
198 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Test and Evaluation |
|
|
198 | (2) |
|
Specialty Area 7: Systems Development |
|
|
200 | (16) |
|
|
203 | (1) |
|
Selection and Documentation of Security Controls |
|
|
204 | (1) |
|
Security Architecture Design |
|
|
205 | (1) |
|
|
205 | (1) |
|
Factoring Systems Development Workforce Tasks into the Cybersecurity Framework Functions |
|
|
206 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Systems Development |
|
|
207 | (9) |
|
|
216 | (1) |
|
|
217 | (2) |
|
|
219 | (2) |
|
|
221 | (52) |
|
|
221 | (1) |
|
Operate and Maintain Knowledge Area Overview |
|
|
222 | (3) |
|
Specialty Area 1: Data Administration |
|
|
225 | (2) |
|
Factoring Data Administration Workforce Tasks into the Cybersecurity Framework Functions |
|
|
227 | (2) |
|
Underlying Knowledge, Skill, and Ability Requirements for Data Administration |
|
|
229 | (4) |
|
Specialty Area 2: Customer Service and Technical Support |
|
|
233 | (1) |
|
Factoring Customer Service and Technical Support Workforce Tasks into the Cybersecurity Framework Functions |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Customer Service and Technical Support |
|
|
236 | (1) |
|
Specialty Area 3: Network Services |
|
|
237 | (5) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
Maintenance and Troubleshooting |
|
|
241 | (1) |
|
Embracing the Value of Outsourcing Network Services Tasks |
|
|
242 | (1) |
|
Factoring Network Services Workforce Tasks into the Cybersecurity Framework Functions |
|
|
242 | (4) |
|
Network Integrity Protection |
|
|
243 | (1) |
|
Communication and Control Network Protection |
|
|
243 | (2) |
|
Establishment of a Baseline Network Operations and Data Flows |
|
|
245 | (1) |
|
Continuous Security Monitoring |
|
|
246 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Network Services |
|
|
246 | (2) |
|
Specialty Area 4: System Administration |
|
|
248 | (6) |
|
Factoring System Administration Workforce Tasks into the Cybersecurity Framework Functions |
|
|
254 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for System Administration |
|
|
255 | (2) |
|
Specialty Area 5: Systems Security Analysis |
|
|
257 | (4) |
|
Factoring Systems Security Analysis Workforce Tasks into the Cybersecurity Framework Functions |
|
|
261 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Systems Security Analysis |
|
|
262 | (3) |
|
|
265 | (7) |
|
|
272 | (1) |
|
|
272 | (1) |
|
6 Protect and Defend: Description of Standard Roles and KSAs |
|
|
273 | (62) |
|
|
273 | (1) |
|
Introduction to the Protect and Defend General Knowledge Area |
|
|
273 | (1) |
|
Specialty Area 1: Enterprise Network Defense Analysis |
|
|
274 | (23) |
|
Factoring Enterprise Network Defense Analysis Workforce Tasks into the Cybersecurity Framework Functions |
|
|
276 | (10) |
|
Continuous Monitoring to Protect and Detect |
|
|
279 | (2) |
|
Intrusion Detection and Prevention Technologies |
|
|
281 | (2) |
|
Intrusion Detection and Protection Methodologies |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Enterprise Network Defense Analysis |
|
|
286 | (11) |
|
Ethical Hacking: Hardening Checks and Penetration Testing |
|
|
295 | (2) |
|
|
297 | (1) |
|
Specialty Area 2: Incident Response |
|
|
297 | (17) |
|
Factoring Incident Response Workforce Tasks into the Cybersecurity Framework Functions |
|
|
299 | (10) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Preparing to Handle Incidents |
|
|
305 | (1) |
|
Incident Detection and Analysis |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
Evidence Collection and Retention |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Incident Response |
|
|
310 | (4) |
|
Specialty Area 3: Enterprise Network Defense Infrastructure Support |
|
|
314 | (3) |
|
Factoring Enterprise Network Defense Infrastructure Support Workforce Tasks into the Cybersecurity Framework Functions |
|
|
314 | (2) |
|
Underlying Knowledge, Skill, and Ability Requirements for Enterprise Network Defense Infrastructure Support |
|
|
316 | (1) |
|
Specialty Area 4: Vulnerability Assessment and Management |
|
|
317 | (7) |
|
Factoring Vulnerability Assessment and Management Workforce Tasks into the Cybersecurity Framework Functions |
|
|
321 | (2) |
|
Underlying Knowledge, Skill, and Ability Requirements for Vulnerability Assessment and Management |
|
|
323 | (1) |
|
|
324 | (9) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (42) |
|
|
335 | (2) |
|
Specialty Area 1: Digital Forensics |
|
|
337 | (29) |
|
Organizing the Tasks of Digital Forensics Using Cybersecurity Framework Functions |
|
|
338 | (1) |
|
Factoring Workforce Tasks into the Cybersecurity Framework Categories |
|
|
338 | (7) |
|
Identification/Analysis Tasks |
|
|
339 | (5) |
|
Protection and Recovery Tasks |
|
|
344 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Digital Forensics |
|
|
345 | (9) |
|
|
352 | (2) |
|
Application: Organizing a Digital Forensics Function Based on the CSF |
|
|
354 | (12) |
|
Identification: Ensuring an Accurate Picture |
|
|
355 | (2) |
|
Identification: Analyzing Data and Recording Results for Future Reference |
|
|
357 | (1) |
|
Protect and Recover: Writing a Forensic Recovery and Analysis Plan |
|
|
358 | (1) |
|
Protecting and Recovering: Setting Up an Effective Communication Process |
|
|
359 | (2) |
|
Recovery: Reconstructing Events |
|
|
361 | (1) |
|
Characterizing the Incident |
|
|
361 | (1) |
|
Identifying the Sources of Data |
|
|
362 | (1) |
|
Evidence-Handling Protocols |
|
|
363 | (1) |
|
Analysis and Reporting Phases |
|
|
363 | (1) |
|
Practical Management Considerations |
|
|
363 | (1) |
|
Ensuring a Capable Workforce |
|
|
364 | (1) |
|
Ensuring Correctness through Routine Evaluations |
|
|
365 | (1) |
|
Specialty Area 2: Cyber Investigation |
|
|
366 | (7) |
|
Application: Organizing a Digital Forensics Function Based on the CSF |
|
|
368 | (5) |
|
|
373 | (2) |
|
|
375 | (1) |
|
|
376 | (1) |
|
8 Collect and Operate and Analyze General Knowledge Areas |
|
|
377 | (48) |
|
|
377 | (1) |
|
Introduction to the Knowledge Areas of the Intelligence Community |
|
|
377 | (5) |
|
Specialty Areas: Collect and Operate and Analyze |
|
|
382 | (2) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Cyber Operations Planning |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Body of Knowledge for Collect and Operate and Analyze |
|
|
384 | (21) |
|
Addressing US Interests in Assessments |
|
|
385 | (1) |
|
|
385 | (1) |
|
Articulation of Assumptions |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
385 | (8) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
Tradecraft and Counterintelligence |
|
|
393 | (12) |
|
Implementing the Collect and Operate and Analyze Areas |
|
|
405 | (2) |
|
Performing Collection and Operations and Analysis Work |
|
|
407 | (9) |
|
|
408 | (2) |
|
|
410 | (1) |
|
Information Capture and Data Collection |
|
|
410 | (1) |
|
Information Processing and Exploitation Analysis |
|
|
411 | (1) |
|
Intelligence Assessment and Reporting |
|
|
412 | (2) |
|
Dissemination and Integration |
|
|
414 | (2) |
|
|
416 | (7) |
|
The Body of Knowledge for Collect and Operate and Analyze |
|
|
418 | (3) |
|
Addressing US Interests in Assessments |
|
|
418 | (1) |
|
|
419 | (1) |
|
Articulation of Assumptions |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
Tradecraft and Counterintelligence |
|
|
420 | (1) |
|
|
421 | (2) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (84) |
|
|
425 | (1) |
|
|
425 | (3) |
|
Specialty Area 1: Legal Advice and Advocacy |
|
|
428 | (6) |
|
Factoring Legal Advice and Advocacy Workforce Tasks into the Cybersecurity Framework Categories |
|
|
428 | (3) |
|
|
428 | (2) |
|
|
430 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Legal Advice and Advocacy Specialty Area |
|
|
431 | (3) |
|
Specialty Area 2: Strategic Planning and Policy Development |
|
|
434 | (17) |
|
Factoring Strategic Planning Workforce Tasks into the Cybersecurity Framework Categories |
|
|
436 | (14) |
|
Roles and Responsibilities |
|
|
439 | (1) |
|
|
440 | (3) |
|
|
443 | (1) |
|
Information Assurance Policy and Security Control Libraries |
|
|
443 | (7) |
|
Underlying Knowledge, Skill, and Ability Requirements for Strategic Planning and Policy Development Specialty Area |
|
|
450 | (1) |
|
Specialty Area 3: Training, Education, and Awareness |
|
|
451 | (13) |
|
Factoring Training, Education, and Awareness Workforce Tasks into the Cybersecurity Framework Categories |
|
|
454 | (7) |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Training, Education, and Awareness Strategic Plan |
|
|
458 | (1) |
|
Curriculum and Course Learning Module Development |
|
|
458 | (2) |
|
|
460 | (1) |
|
Evaluating the Training, Education, and Awareness Program |
|
|
460 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Training, Education, and Awareness Specialty Area |
|
|
461 | (3) |
|
Specialty Area 4: Information Systems and Security Operations |
|
|
464 | (10) |
|
Factoring Information Systems and Security Operations Workforce Tasks into the Cybersecurity Framework Categories |
|
|
465 | (8) |
|
|
468 | (1) |
|
|
468 | (1) |
|
Establish Organization Boundaries |
|
|
469 | (1) |
|
System Security Classification |
|
|
469 | (1) |
|
|
470 | (2) |
|
Evaluation and Continuous Monitoring |
|
|
472 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Information Systems and Security Operations Specialty Area |
|
|
473 | (1) |
|
Specialty Area 5: Security Program Management |
|
|
474 | (14) |
|
Factoring Security Program Management Workforce Tasks into the Cybersecurity Framework Categories |
|
|
478 | (5) |
|
|
481 | (1) |
|
Enterprise Continuity of Operations Plan |
|
|
482 | (1) |
|
Evaluation and Validation |
|
|
482 | (1) |
|
Underlying Knowledge, Skill, and Ability Requirements for Security Program Management Specialty Area |
|
|
483 | (5) |
|
Specialty Area 6: Risk Management |
|
|
488 | (5) |
|
Factoring Risk Management Workforce Tasks into the Cybersecurity Framework Categories |
|
|
488 | (5) |
|
|
491 | (2) |
|
Underlying Knowledge, Skill, and Ability Requirements for Risk Management Specialty Area |
|
|
493 | (1) |
|
Specialty Area 7: Knowledge Management |
|
|
493 | (9) |
|
Factoring Knowledge Management Workforce Tasks into the Cybersecurity Framework Categories |
|
|
497 | (4) |
|
Underlying Knowledge, Skill, and Ability Requirements for Knowledge Management Specialty Area |
|
|
501 | (1) |
|
|
502 | (4) |
|
|
506 | (1) |
|
|
507 | (2) |
|
10 Applying the NICE Model to the Real World |
|
|
509 | (20) |
|
|
509 | (1) |
|
Why Cybersecurity Needs a Standard of Practice |
|
|
509 | (1) |
|
Three Problems with Cybersecurity |
|
|
510 | (11) |
|
Requirement for Best Practice Advice |
|
|
512 | (1) |
|
Best Practice and Strategy |
|
|
513 | (1) |
|
Applying the NICE Workforce Framework (v2.0) to the Real World |
|
|
514 | (2) |
|
Tailoring a Security Architecture to Fit Each Organizational Need |
|
|
516 | (1) |
|
Steps for Creating a Substantive Security Solution |
|
|
516 | (5) |
|
|
521 | (5) |
|
|
526 | (1) |
|
|
527 | (2) |
Index |
|
529 | |