Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
6. Privacy & Ethical/Legal Considerations
| Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
|---|---|---|---|---|
| a | Describe how global legal, ethical, and privacy constraints might impact cybersecurity. | knowledge | 2 | |
| b | Identify the established legal, ethical and privacy issues in cybersecurity facing organizations. | knowledge | 2 | Data Management |
| c | Explain how ethical, legal, and privacy issues should/must be considered in securing systems and data. | knowledge | 2 | |
| d | Discuss the importance issues around privacy. | knowledge | 2 | |
| e | Recognize the importance that cybersecurity plays in managing information and systems. | knowledge | 2 | |
| f | Demonstrate an understanding of the way your systems are vulnerable and can be manipulated. | knowledge | 2 | |
| g | Understand the limitations of cybersecurity. | knowledge | 2 | |
| h | Demonstrate awareness of personal privacy issues and how cybersecurity can protect it. | knowledge | 3 | |
| i | Explain the tradeoffs between privacy and security. | knowledge | 2 | |
| j | Recognize potential societal impacts of using machine learning. | knowledge | 2 |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP
