Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
6. Data Security
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Explain information assurance (IA) principles and organizational requirements that are relevant to confidentiality, integrity, availability, authentication, and non-repudiation | knowledge | 2 | |
b | Understand confidentiality, integrity, and availability principles | knowledge | 2 | |
c | Explain data classification standards and methodologies based on sensitivity and other risk factors | knowledge | 2 | |
d | Explain authorization and access control principles and methods | knowledge | 2 | |
e | Describe the fundamental concepts of Risk Management and Risk Management Life Cycle | knowledge | 2 | |
f | Explain rationale for data anonymization and data security standards- | knowledge | 2 | |
g | Identify situations vulnerable to insider threats | knowledge | 2 | |
h | Explain various methods to prevent insider threats | knowledge | 2 | |
i | Describe the spectrum of insider threats and its implications | knowledge | 2 |