The National Cybersecurity Workforce Framework (“The Framework”) to Provide a Analyze Investigate Common Understanding of and Lexicon for Cybersecurity Work

The National Cybersecurity Workforce Framework (“The Framework”) to Provide a Analyze Investigate Common Understanding of and Lexicon for Cybersecurity Work

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) introduction The ability of academia and public and private employers to prepare, educate, recruit, train, develop, and retain a diverse, to our nation’s security and prosperity. [full text version] operate and defining cybersecurity maintain Defining the cybersecurity population using common, standardized labels and protect definitions is an essential step in ensuring securely and provision that our country is able to educate, defend recruit, train, develop, and retain a highly-qualified workforce. The National Initiative for Cybersecurity Education oversight (NICE), in collaboration with federal and government agencies, public and private development experts and organizations, and industry partners, has published version 1.0 of the National Cybersecurity Workforce Framework (“the Framework”) to provide a analyze investigate common understanding of and lexicon for cybersecurity work. [full text version] collect and The Call To ACTION operate Only in the universal adoption of the National Cybersecurity Workforce Framework can we ensure our nation’s enduring capability to prevent and defend against an ever-increasing threat. Therefore, it is imperative that organizations in the public, private, and academic sectors begin using the Framework’s lexicon (labels and definitions) as soon as possible. [full text version] Using This Sample Securely Operate and Protect and Collect and Oversight and Home Document Job Titles Provision Maintain Defend Investigate Operate Analyze Development NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) introduction The ability of academia and public and private employers to These challenges are exacerbated by the unique aspects of prepare, educate, recruit, train, develop, and retain a highly-qualified cybersecurity work. For example, the cybersecurity workforce must cybersecurity workforce is vital to our nation’s security and prosperity. keep up with emerging risks, threats, vulnerabilities, and associated technologies that may require more rapid skill and knowledge Today, there is little consistency throughout the federal government and acquisition than other functional areas. In fact, this requirement the nation in terms of how cybersecurity work is defined or described makes a compelling case for the need for innovative, robust private- (e.g., there is significant variation in occupations, job titles, position public partnerships, and the capacity for cybersecurity talent to move descriptions, and the Office of Personnel Management [OPM] series). more easily between public and private sector jobs and in and out of This absence of a common language to describe and understand academia to maintain and develop skills and advance the collective cybersecurity work and requirements hinders our nation’s ability to knowledge base for future capabilities. establish a baseline of capabilities, identify skills gaps, ensure an adequate pipeline of future talent, and continuously develop a highly- In recognition of the criticality of these issues, President George qualified cybersecurity workforce. Consequently, establishing and W. Bush established the Comprehensive National Cybersecurity using a common lexicon, taxonomy, and other data standards for Initiative (CNCI). The workforce aspect of the CNCI was specifically cybersecurity work and requirements is not merely desirable, it is vital. emphasized and reinforced in 2010 when President Obama established the National Initiative for Cybersecurity Education (NICE), which The compelling need for enhanced public and private cybersecurity was formerly CNCI Initiative 8. The NICE is a nationally coordinated capabilities and a more enlightened public has been documented effort focused on cybersecurity awareness, education, training, and repeatedly over the last twenty years. Unfortunately, many of these professional development. Its goals are to encourage and help increase issues have persisted over time and, by virtue of not improving, have cybersecurity awareness and competence across the nation and become more acute. A National Research Council report lamented this to build an agile, highly skilled cybersecurity workforce capable of problem in 2002: responding to a dynamic and rapidly evolving array of threats. The unfortunate reality is that relative to the magnitude of the threat, More information about the National Initiative for Cybersecurity our ability and willingness to deal with threats have, on balance, changed for the worse, making many of the analyses, findings, and Education can be found at http://csrc.nist.gov/nice/. This document recommendations of these reports all the more relevant, timely, and is available online at http://csrc.nist.gov/nice/framework/ applicable today. (National Research Council Computer Science and Telecommunications Board, 2002). INTRODUCTION DEFINING THE CYBERSECURITY WORKFORCE THE CALL TO ACTION Using This Sample Securely Operate and Protect and Collect and Oversight and Home Document Job Titles Provision Maintain Defend Investigate Operate Analyze Development NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Defining the Cybersecurity workforce Defining the cybersecurity population using common, standardized The seven categories and a description of the types of specialty areas labels and definitions is an essential step in ensuring that our country included in each are below is able to educate, recruit, train, develop, and retain a highly-qualified workforce. The NICE, in collaboration with federal government SECURELY PROVISION - Specialty areas responsible for agencies, public and private experts and organizations, and industry conceptualizing, designing, and building secure information partners, has published version 1.0 of the National Cybersecurity technology (IT) systems (i.e., responsible for some aspect of Workforce Framework (“the Framework”) to provide a common systems development). understanding of and lexicon for cybersecurity work. OPERATE AND MAINTAIN - Specialty areas responsible for The National Cybersecurity Workforce Framework establishes the providing support, administration, and maintenance necessary to common taxonomy and lexicon that is to be used to describe all ensure effective and efficient information technology (IT) system cybersecurity work and workers irrespective of where or for whom the performance and security. work is performed. The Framework is intended to be applied in the public, private, and academic sectors. Use of the Framework does PROTECT AND DEFEND - Specialty areas responsible for not require that organizations change organizational or occupational identification, analysis, and mitigation of threats to internal structures. In fact, the Framework was developed because requiring information technology (IT) systems or networks. such changes would be costly, impractical, ineffective, and inefficient. INVESTIGATE - Specialty areas responsible for investigation of The Framework is agnostic to the particulars of a given organization cyber events and/or crimes of information technology (IT) systems, and is overarching by design so that it can be overlaid onto any existing networks, and digital evidence. occupational structure to facilitate achieving an agile, highly-qualified cybersecurity workforce. COLLECT AND OPERATE - Specialty areas responsible for specialized denial and deception operations and collection of The Framework consists of thirty-one specialty areas organized cybersecurity information that may be used to develop intelligence. into seven categories. These categories, serving as an overarching structure for the Framework, group related specialty areas together. In ANALYZE - Specialty areas responsible for highly specialized essence, specialty areas in a given category are typically more similar review and evaluation of incoming cybersecurity information to to one another than to specialty areas in other categories. Within each determine its usefulness for intelligence. specialty area, typical tasks and knowledges, skills, and abilities (KSAs) are provided. OVERSIGHT AND DEVELOPMENT - Specialty areas providing leadership, management, direction, and/or development and This interactive document provides the Framework in its entirety. advocacy so that individuals and organizations may effectively conduct cybersecurity work. INTRODUCTION DEFINING THE CYBERSECURITY WORKFORCE THE CALL TO ACTION Using This Sample Securely Operate and Protect and Collect and Oversight and Home Document Job Titles Provision Maintain Defend Investigate Operate Analyze Development NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) The Call to Action Only in the universal adoption of the National Cybersecurity Workforce To achieve these goals, the Framework’s specied labels and Framework can we ensure our nation’s enduring capability to prevent denitions should be used when describing the corresponding and defend against an ever-increasing threat. Therefore, it is imperative work or workers; otherwise the inability to truly understand the that organizations in the public, private, and academic sectors begin cybersecurity workforce will persist and the nation will be using the Framework’s lexicon (labels and definitions) as soon as unnecessarily vulnerable to risk. possible. While fidelity to the Framework labels and definitions is essential, the Framework is flexible by design and is intended to accommodate The Framework is at the core of this vital capability as it enables all existing organizational structures. The key is describing

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    151 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us