Data Administration
The intent of the Data Administration Knowledge Unit is to provide students with methods to protect the confidentiality, integrity, and availability of data throughout the data life cycle.
Topics
- Data Information/Classification Systems
- Data/Information classification systems.
a. Level of classification
b. Classification criteria
c. Need to know.
d. Classification/Declassification processes
e. Classification authorities
- Data/Information lifecycle a-g
- Data storage and archiving a. Data Warehousing
- Data/Information lifecycle
a. Capture/Acquisition
b. Maintenance
c. Synthesis/transformation/aggregation
d. Usage
e. Publication/Distribution
f. Archival
g. Disposition/Purging
- Data/Information utility
- Data/Information control
a. Ownership - Who information belongs to.
b. Stewardship - Responsibility for assembling and protecting data.
c. Management - Providing the right data in the right place at the right time.
d. Possession - Data residing in a system.
e. Governance - How data should be managed and used.
- Data storage and archiving
a. Data Warehousing
b. Long Term Archival
c. Big Data
i. Hadoop / Mongo DB / HBASE
- Overview of database types with advantages and disadvantages a. Flat b. Relational c. Network d. Hierarchical e. Object-Oriented f. Object-based g. Key-value h. Distributed
- SQL Data Manipulation Language a. SELECT b. INSERT c. DELETE d. UPDATE
- SQL Database Administration a. User creation/deletion, permissions and access controls)
- Database concepts a. Indexing, Inference, Aggregation, Polyinstantiation
- Database Security a. How to protect data (confidentiality, integrity and availability in a DBMS context) b. Vulnerabilities (e.g., SQL injection)
- Data/Information lifecycle
- Data storage and archiving
- Data/Information control
- Data/Information Quality
- Data/Information classification systems.
- Accuracy, Completeness, relevance, consistency, integrity
- Data cleansing
- Verification/Validation
- Data Policies
- Data/Information Security (access control, encryption)
- i. Hadoop / Mongo DB / HBASE
- Data/Information accessibility
- Data/Information classification systems-
- a. Level of classification
- b. Classification criteria
- c. Need to know.
- d. Classification/Declassification processes
- e. Classification authorities
- Capture/Acquisition
- Maintenance
- Synthesis/transformation/aggregation
- Usage
- Publication/Distribution
- Archival
- Disposition/Purging
- Data/Information classification systems
- Data/Information Quality
a. Accuracy, Completeness, relevance, consistency, integrity
b. Data cleansing
c. Verification/Validation
Outcomes
- Draw and describe a data and information lifecycle, identifying specific and general security issues at all stages.
- Define and evaluate data and information quality, accessibility, and utility.
- Examine how the origination, change, distribution, storage, and deletion of information is managed and secured.
- Compare and contrast data and information ownership, stewardship, management, possession, and governance.
- Outline the role of data and information classification in security.
KSA-T
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
ID |
DESCRIPTION |
K0287 |
Knowledge of an organization's information classification program and procedures for information compromise. |
K0195 |
Knowledge of data classification standards and methodologies based on sensitivity and other risk factors. |
K0020 |
Knowledge of data administration and data standardization policies. |
K0022 |
Knowledge of data mining and data warehousing principles. |
K0096 |
Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint). |
K0338 |
Knowledge of data mining techniques. |
K0038 |
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
K0193 |
Knowledge of advanced data remediation security features in databases. |
K0270 |
Knowledge of the acquisition/procurement life cycle process. |
K0622 |
Knowledge of controls related to the use, processing, storage, and transmission of data. |
K0257 |
Knowledge of information technology (IT) acquisition/procurement requirements. |
K0222 |
Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. |
K0157 |
Knowledge of cyber defense and information security policies, procedures, and regulations. |
K0007 |
Knowledge of authentication, authorization, and access control methods. |
K0033 |
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
K0236 |
Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data. |
K0028 |
Knowledge of organization's evaluation and validation requirements. |
ID |
DESCRIPTION |
S0369 |
Skill to identify sources, characteristics, and uses of the organization??s data assets. |
S0372 |
Skill to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise. |
S0123 |
Skill in transformation analytics (e.g., aggregation, enrichment, processing). |
S0028 |
Skill in developing data dictionaries. |
S0019 |
Skill in creating programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams. |
ID |
DESCRIPTION |
A0083 |
Ability to evaluate information for reliability, validity, and relevance. |