Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
6. Privacy & Ethical/Legal Considerations
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Describe how global legal, ethical, and privacy constraints might impact cybersecurity. | knowledge | 2 | |
b | Identify the established legal, ethical and privacy issues in cybersecurity facing organizations. | knowledge | 2 | Data Management |
c | Explain how ethical, legal, and privacy issues should/must be considered in securing systems and data. | knowledge | 2 | |
d | Discuss the importance issues around privacy. | knowledge | 2 | |
e | Recognize the importance that cybersecurity plays in managing information and systems. | knowledge | 2 | |
f | Demonstrate an understanding of the way your systems are vulnerable and can be manipulated. | knowledge | 2 | |
g | Understand the limitations of cybersecurity. | knowledge | 2 | |
h | Demonstrate awareness of personal privacy issues and how cybersecurity can protect it. | knowledge | 3 | |
i | Explain the tradeoffs between privacy and security. | knowledge | 2 | |
j | Recognize potential societal impacts of using machine learning. | knowledge | 2 |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP