Explore KSACs by Pathway

Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.

10. Data Security

Label KSAC Description Bloom's Taxonomy Level Cross-Cutting
a Describe the following terms: cipher, cryptanalysis, cryptographic algorithm, and cryptology, and describe the two basic methods (ciphers) for transforming plaintext to ciphertext. knowledge 2
b Describe which cryptographic protocols, tools and techniques are appropriate for a given situation. knowledge 2
c Implement end-to-end data security including maintaining data security using data labeling, handling and disposal, as required by policy skill 3
d Describe what a digital investigation is, the sources of digital evidence, and the limitations of forensics. knowledge 2
e Compare and contrast a variety of forensics tools. knowledge 4
f Use the concepts of authentication, authorization, access control, and data integrity. skill 2
g Implement secure storage of passwords and PII. skill 3
h Describe the various techniques for data erasure. knowledge 2



  1. Security+
  2. Network+
  3. Cloud+
  4. CEH
  5. GSEC
  6. CAP


  1. CCNA
  2. CYSA+


  1. CASP
  2. CISSP
  3. CISA
  4. CISM
  5. CRISC
  6. CCSP