diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 058787d..abfb2c5 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -4,7 +4,7 @@ stages: Run unit tests: stage: test - image: &goimage golang:1.18 + image: &goimage golang:1.21 only: refs: - main diff --git a/CHANGELOG.md b/CHANGELOG.md index b87666a..5fd80c8 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,13 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). +## [v4.6.0] - unreleased +### Changed +- Answer hashes are now the first 4 characters of the hex-encoded SHA1 digest +- Reworked the built-in theme +- [moth.mjs](theme/moth.mjs) is now the standard MOTH library for ECMAScript +- Devel mode no longer accepts an empty team ID + ## [v4.4.9] - 2022-05-12 ### Changed - Added a performance optimization for events with a large number of teams diff --git a/README.md b/README.md index b78bab7..183e405 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,7 @@ Dirtbags Monarch Of The Hill Server ===================== -![Build badge](https://github.com/dirtbags/moth/workflows/Build/Test/Push/badge.svg) -![Go report card](https://goreportcard.com/badge/github.com/dirtbags/moth) +[![Go report card](https://goreportcard.com/badge/github.com/dirtbags/moth)](https://goreportcard.com/report/github.com/dirtbags/moth) Monarch Of The Hill (MOTH) is a puzzle server. We (the authors) have used it for instructional and contest events called diff --git a/cmd/mothd/httpd_test.go b/cmd/mothd/httpd_test.go index f77e044..28e7076 100644 --- a/cmd/mothd/httpd_test.go +++ b/cmd/mothd/httpd_test.go @@ -128,7 +128,7 @@ func TestHttpd(t *testing.T) { if r := hs.TestRequest("/answer", map[string]string{"cat": "pategory", "points": "1", "answer": "answer123"}); r.Result().StatusCode != 200 { t.Error(r.Result()) - } else if r.Body.String() != `{"status":"fail","data":{"short":"not accepted","description":"error awarding points: points already awarded to this team in this category"}}` { + } else if r.Body.String() != `{"status":"fail","data":{"short":"not accepted","description":"points already awarded to this team in this category"}}` { t.Error("Unexpected body", r.Body.String()) } } diff --git a/cmd/mothd/server.go b/cmd/mothd/server.go index 7fe3849..52e2400 100644 --- a/cmd/mothd/server.go +++ b/cmd/mothd/server.go @@ -156,7 +156,7 @@ func (mh *MothRequestHandler) CheckAnswer(cat string, points int, answer string) return fmt.Errorf("invalid team ID") } if err := mh.State.AwardPoints(mh.teamID, cat, points); err != nil { - return fmt.Errorf("error awarding points: %s", err) + return err } return nil @@ -169,7 +169,6 @@ func (mh *MothRequestHandler) ThemeOpen(path string) (ReadSeekCloser, time.Time, // Register associates a team name with a team ID. func (mh *MothRequestHandler) Register(teamName string) error { - // BUG(neale): Register returns an error if a team is already registered; it may make more sense to return success if teamName == "" { return fmt.Errorf("empty team name") } diff --git a/cmd/mothd/state.go b/cmd/mothd/state.go index 718371e..d9da27b 100644 --- a/cmd/mothd/state.go +++ b/cmd/mothd/state.go @@ -522,6 +522,9 @@ func (ds *DevelState) TeamName(teamID string) (string, error) { if name, err := ds.StateProvider.TeamName(teamID); err == nil { return name, nil } + if teamID == "" { + return "", fmt.Errorf("Empty team ID") + } return fmt.Sprintf("«devel:%s»", teamID), nil } diff --git a/docs/scoring.md b/docs/scoring.md new file mode 100644 index 0000000..885f657 --- /dev/null +++ b/docs/scoring.md @@ -0,0 +1,73 @@ +Scoring +======= + +MOTH does not carry any notion of who is winning: we consider this a user +interface issue. The server merely provides a timestamped log of point awards. + +The bundled scoreboard provides one way to interpret the scores: this is the +main algorithm we use at Cyber Fire events. We use other views of the scoreboard +in other contexts, though! Here are some ideas: + + +Percentage of Each Category +--------------------- + +This is implemented in the scoreboard distributed with MOTH, and is how our +primary score calculation at Cyber Fire. + +For each category: + +* Divide the team's score in this category by the highest score in this category +* Add that to the team's overall score + +This means the highest theoretical score in any event is the number of open +categories. + +This algorithm means that point values only matter relative to other point +values within that category. A category with 5 total points is worth the same as +a category with 5000 total points, and a 2 point puzzle in the first category is +worth as much as a 2000 point puzzle in the second. + +One interesting effect here is that a team solving a previously-unsolved puzzle +will reduce everybody else's ranking in that category, because it increases the +divisor for calculating that category's score. + +Cyber Fire used to not display overall score: we would only show each team's +relative ranking per category. We may go back to this at some point! + + +Category Completion +---------------- + +Cyber Fire also has a scoreboard called the "class" scoreboard, which lists each +team, and which puzzles they have completed. This provides instructors with a +graphical overview of how people are progressing through content. We can provide +assistance to the general group when we see that a large number of teams are +stuck on a particular puzzle, and we can provide individual assistance if we see +that someone isn't keeping up with the class. + + +Monarch Of The Hill +---------------- + +You could also implement a "winner takes all" approach: any team with the +maximum number of points in a category gets 1 point, and all other teams get 0. + + +Time Bonuses +----------- + +If you wanted to provide extra points to whichever team solves a puzzle first, +this is possible with the log. You could either boost a puzzle's point value or +decay it; either by timestamp, or by how many teams had solved it prior. + + +Bonkers Scoring +------------- + +Other zany options exist: + +* The first team to solve a puzzle with point value divisible by 7 gets double + points. +* [Tokens](tokens.md) with negative point values could be introduced, allowing + teams to manipulate other teams' scores, if they know the team ID. diff --git a/pkg/transpile/puzzle.go b/pkg/transpile/puzzle.go index 44d0ab5..23d8a90 100644 --- a/pkg/transpile/puzzle.go +++ b/pkg/transpile/puzzle.go @@ -4,7 +4,7 @@ import ( "bufio" "bytes" "context" - "crypto/sha256" + "crypto/sha1" "encoding/json" "errors" "fmt" @@ -37,23 +37,45 @@ type PuzzleDebug struct { Summary string } -// Puzzle contains everything about a puzzle that a client would see. +// Puzzle contains everything about a puzzle that a client will see. type Puzzle struct { - Debug PuzzleDebug - Authors []string - Attachments []string - Scripts []string - Body string + // Debug contains debugging information, omitted in mothballs + Debug PuzzleDebug + + // Authors names all authors of this puzzle + Authors []string + + // Attachments is a list of filenames used by this puzzle + Attachments []string + + // Scripts is a list of EMCAScript files needed by the client for this puzzle + Scripts []string + + // Body is the HTML rendering of this puzzle + Body string + + // AnswerPattern contains the pattern (regular expression?) used to match valid answers AnswerPattern string - AnswerHashes []string - Objective string - KSAs []string - Success struct { + + // AnswerHashes contains hashes of all answers for this puzzle + AnswerHashes []string + + // Objective is the learning objective for this puzzle + Objective string + + // KSAs lists all KSAs achieved upon successfull completion of this puzzle + KSAs []string + + // Success lists the criteria for successfully understanding this puzzle + Success struct { + // Acceptable describes the minimum work required to be considered successfully understanding this puzzle's concepts Acceptable string - Mastery string + + // Mastery describes the work required to be considered mastering this puzzle's conceptss + Mastery string } - // Answers will be empty in a mothball + // Answers lists all acceptable answers, omitted in mothballs Answers []string } @@ -63,9 +85,9 @@ func (puzzle *Puzzle) computeAnswerHashes() { } puzzle.AnswerHashes = make([]string, len(puzzle.Answers)) for i, answer := range puzzle.Answers { - sum := sha256.Sum256([]byte(answer)) + sum := sha1.Sum([]byte(answer)) hexsum := fmt.Sprintf("%x", sum) - puzzle.AnswerHashes[i] = hexsum + puzzle.AnswerHashes[i] = hexsum[:4] } } diff --git a/pkg/transpile/puzzle_test.go b/pkg/transpile/puzzle_test.go index 47db867..d6b9022 100644 --- a/pkg/transpile/puzzle_test.go +++ b/pkg/transpile/puzzle_test.go @@ -23,6 +23,12 @@ func TestPuzzle(t *testing.T) { if (len(p.Answers) == 0) || (p.Answers[0] != "YAML answer") { t.Error("Answers are wrong", p.Answers) } + if len(p.Answers) != len(p.AnswerHashes) { + t.Error("Answer hashes length does not match answers length") + } + if len(p.AnswerHashes[0]) != 4 { + t.Error("Answer hash is wrong length") + } if (len(p.Authors) != 3) || (p.Authors[1] != "Buster") { t.Error("Authors are wrong", p.Authors) } diff --git a/theme/background.mjs b/theme/background.mjs new file mode 100644 index 0000000..61bd76e --- /dev/null +++ b/theme/background.mjs @@ -0,0 +1,175 @@ +function randint(max) { + return Math.floor(Math.random() * max) +} + +const Millisecond = 1 +const Second = Millisecond * 1000 +const FrameRate = 24 / Second // Fast enough for this tomfoolery + +class Point { + constructor(x, y) { + this.x = x + this.y = y + } + + /** + * Add n to this. + * + * @param {Point} n What to add to this + * @returns {Point} + */ + Add(n) { + return new Point(this.x + n.x, this.y + n.y) + } + + /** + * Subtract n from this. + * + * @param {Point} n + * @returns {Point} + */ + Subtract(n) { + return new Point(this.x - n.x, this.y - n.y) + } + + /** + * Add velocity, then bounce point off box defined by points at min and max + * @param {Point} velocity + * @param {Point} min + * @param {Point} max + * @returns {Point} + */ + Bounce(velocity, min, max) { + let p = this.Add(velocity) + if (p.x < min.x) { + p.x += (min.x - p.x) * 2 + velocity.x *= -1 + } + if (p.x > max.x) { + p.x += (max.x - p.x) * 2 + velocity.x *= -1 + } + if (p.y < min.y) { + p.y += (min.y - p.y) * 2 + velocity.y *= -1 + } + if (p.y > max.y) { + p.y += (max.y - p.y) * 2 + velocity.y *= -1 + } + return p + } + + /** + * + * @param {Point} p + * @returns {Boolean} + */ + Equal(p) { + return (this.x == p.x) && (this.y == p.y) + } +} + +class QixLine { + /** + * @param {Number} hue + * @param {Point} a + * @param {Point} b + */ + constructor(hue, a, b) { + this.hue = hue + this.a = a + this.b = b + } +} + +/** + * Draw a line dancing around the screen, + * like the video game "qix" + */ +class QixBackground { + constructor(ctx, frameRate = 6/Second) { + this.ctx = ctx + this.min = new Point(0, 0) + this.max = new Point(this.ctx.canvas.width, this.ctx.canvas.height) + this.box = this.max.Subtract(this.min) + + this.lines = [ + new QixLine( + Math.random(), + new Point(randint(this.box.x), randint(this.box.y)), + new Point(randint(this.box.x), randint(this.box.y)), + ) + ] + while (this.lines.length < 18) { + this.lines.push(this.lines[0]) + } + this.velocity = new QixLine( + 0.001, + new Point(1 + randint(this.box.x / 100), 1 + randint(this.box.y / 100)), + new Point(1 + randint(this.box.x / 100), 1 + randint(this.box.y / 100)), + ) + + this.frameInterval = Millisecond / frameRate + this.nextFrame = 0 + } + + /** + * Maybe draw a frame + */ + Animate() { + let now = performance.now() + if (now < this.nextFrame) { + // Not today, satan + return + } + this.nextFrame = now + this.frameInterval + + this.lines.shift() + let lastLine = this.lines[this.lines.length - 1] + let nextLine = new QixLine( + (lastLine.hue + this.velocity.hue) % 1.0, + lastLine.a.Bounce(this.velocity.a, this.min, this.max), + lastLine.b.Bounce(this.velocity.b, this.min, this.max), + ) + + this.lines.push(nextLine) + + this.ctx.clearRect(0, 0, this.ctx.canvas.width, this.ctx.canvas.height) + for (let line of this.lines) { + this.ctx.save() + this.ctx.strokeStyle = `hwb(${line.hue}turn 0% 0%)` + this.ctx.beginPath() + this.ctx.moveTo(line.a.x, line.a.y) + this.ctx.lineTo(line.b.x, line.b.y) + this.ctx.stroke() + this.ctx.restore() + } + } +} + +function init() { + // Don't like the background animation? You can disable it by setting a + // property in localStorage and reloading. + if (localStorage.disableBackgroundAnimation) { + return + } + + let canvas = document.createElement("canvas") + canvas.width = 640 + canvas.height = 640 + canvas.classList.add("wallpaper") + document.body.insertBefore(canvas, document.body.firstChild) + + let ctx = canvas.getContext("2d") + + let qix = new QixBackground(ctx) + // window.requestAnimationFrame is overkill for something this silly + setInterval(() => qix.Animate(), Millisecond/FrameRate) +} + +if (document.readyState === "loading") { + document.addEventListener("DOMContentLoaded", init) +} else { + init() +} diff --git a/theme/basic.css b/theme/basic.css index 14a5a1e..808af78 100644 --- a/theme/basic.css +++ b/theme/basic.css @@ -1,132 +1,138 @@ -/* http://paletton.com/#uid=63T0u0k7O9o3ouT6LjHih7ltq4c */ +/* Color palette: http://paletton.com/#uid=33x0u0klrl-4ON9dhtKtAdqMQ4T */ + body { font-family: sans-serif; + background: #010e19 url("bg.png") center fixed; + background-size: cover; + background-blend-mode: soft-light; + background-color: #010e19; + color: #edd488; +} +canvas.wallpaper { + position: fixed; + display: block; + z-index: -1000; + top: 0; + left: 0; + height: 100vh; + width: 100vw; + opacity: 0.2; + image-rendering: pixelated; +} +main { max-width: 40em; - background: #282a33; - color: #f6efdc; + margin: 1em auto; + padding: 1px 3px; + border-radius: 5px; + background: #000d; } -body.wide { - max-width: 100%; -} -a:any-link { - color: #8b969a; +h1, h2, h3, h4, h5, h6 { + color: #cb2408cc; } h1 { - background: #5e576b; - color: #9e98a8; -} -.Fail, .Error, #messages { - background: #3a3119; - color: #ffcc98; -} -.Fail:before { - content: "Fail: "; -} -.Error:before { - content: "Error: "; + background: #cb240844; + padding: 3px; } p { margin: 1em 0em; } +a:any-link { + color: #b9cbd8; +} form, pre { margin: 1em; + overflow-x: auto; } input, select { padding: 0.6em; margin: 0.2em; max-width: 30em; } -nav { - border: solid black 2px; +input { + background-color: #ccc4; + color: inherit; +} +input:hover { + background-color: #8884; +} +input:active { + background-color: inherit; +} +.notification, .error { + padding: 0 1em; + border-radius: 8px; +} +.notification { + background: #ac8f3944; +} +.error { + background: red; + color: white; +} +.hidden { + display: none; +} + +/** Puzzles list */ +.category { + margin: 5px 0; + background: #ccc4; +} +.category h2 { + margin: 0 0.2em; +} +.category .solved { + text-decoration: line-through; } nav ul, .category ul { - padding: 1em; + margin: 0; + padding: 0.2em 1em; + display: flex; + flex-wrap: wrap; + gap: 8px 16px; } nav li, .category li { display: inline; - margin: 1em; } -iframe#body { - border: inherit; - width: 100%; +.mothball { + float: right; + text-decoration: none; + border-radius: 5px; + background: #ccc; + padding: 4px 8px; + margin: 5px; } -img { + +/** Puzzle content */ +#puzzle { + border-bottom: solid; + padding: 0 0.5em; +} +#puzzle img { max-width: 100%; } input:invalid { - border-color: red; + background-color: #800; + color: white; } -#messages { - min-height: 3em; - border: solid black 2px; -} -#rankings { - width: 100%; - position: relative; +.answer_ok { + cursor: help; } -#rankings span { - font-size: 75%; - display: inline-block; - overflow: hidden; - height: 1.7em; -} -#rankings span.teamname { - font-size: inherit; - color: white; - text-shadow: 0 0 3px black; - opacity: 0.8; - position: absolute; - right: 0.2em; -} -#rankings div * {white-space: nowrap;} -.cat0, .cat8, .cat16 {background-color: #a6cee3; color: black;} -.cat1, .cat9, .cat17 {background-color: #1f78b4; color: white;} -.cat2, .cat10, .cat18 {background-color: #b2df8a; color: black;} -.cat3, .cat11, .cat19 {background-color: #33a02c; color: white;} -.cat4, .cat12, .cat20 {background-color: #fb9a99; color: black;} -.cat5, .cat13, .cat21 {background-color: #e31a1c; color: white;} -.cat6, .cat14, .cat22 {background-color: #fdbf6f; color: black;} -.cat7, .cat15, .cat23 {background-color: #ff7f00; color: black;} - - -#devel { - background-color: #eee; +/** Development mode information */ +.debug { + overflow: auto; + padding: 1em; + border-radius: 10px; + margin: 2em auto; + background: #cccc; color: black; - overflow: scroll; } -#devel .string { - color: #9c27b0; -} -#devel .body { - background-color: #ffc107; -} -.kvpair { - border: solid black 2px; -} - -.spinner { - display: inline-block; - width: 64px; - height: 64px; - display: block; - width: 46px; - height: 46px; - margin: 1px; - border-radius: 50%; - border: 5px solid #fff; - border-color: #fff transparent #fff transparent; - animation: rotate 1.2s linear infinite; -} -@keyframes rotate { - 0% { - transform: rotate(0deg); - } - 100% { - transform: rotate(360deg); - } +.debug dt { + font-weight: bold; } +/** Draggable items, from the draggable plugin */ li[draggable]::before { content: "↕"; padding: 0.5em; @@ -144,6 +150,48 @@ li[draggable] { border: 1px white dashed; } -#cacheButton.disabled { - display: none; + + + + +/** Toasts are little pop-up informational messages. */ + .toasts { + position: fixed; + z-index: 100; + bottom: 10px; + left: 10px; + text-align: center; + width: calc(100% - 20px); + display: flex; + flex-direction: column; } +.toast { + border-radius: 0.5em; + padding: 0.2em 2em; + animation: fadeIn ease 1s; + margin: 2px auto; + background: #333; + color: #eee; + box-shadow: 0px 0px 8px 0px #0b0; +} +@keyframes fadeIn { + 0% { opacity: 0; } + 100% { opacity: 1; } +} + +@media (prefers-color-scheme: light) { + /* We uses the alpha channel to apply hue tinting to elements, to get a + * similar effect in light or dark mode. That means there aren't a whole lot of + * things to change between light and dark mode. + */ + body { + background-color: #b9cbd8; + color: black; + } + main { + background-color: #fffd; + } + a:any-link { + color: #092b45; + } +} \ No newline at end of file diff --git a/theme/bg.png b/theme/bg.png new file mode 100755 index 0000000..5578151 Binary files /dev/null and b/theme/bg.png differ diff --git a/theme/common.mjs b/theme/common.mjs new file mode 100644 index 0000000..c9e49a8 --- /dev/null +++ b/theme/common.mjs @@ -0,0 +1,84 @@ +/** + * Common functionality + */ +const Millisecond = 1 +const Second = Millisecond * 1000 +const Minute = Second * 60 + +/** URL to the top of this MOTH server */ +const BaseURL = new URL(".", location) + +/** + * Display a transient message to the user. + * + * @param {String} message Message to display + * @param {Number} timeout How long before removing this message + */ +function Toast(message, timeout=5*Second) { + console.info(message) + for (let toasts of document.querySelectorAll(".toasts")) { + let p = toasts.appendChild(document.createElement("p")) + p.classList.add("toast") + p.textContent = message + setTimeout(() => p.remove(), timeout) + } +} + +/** + * Run a function when the DOM has been loaded. + * + * @param {function():void} cb Callback function + */ +function WhenDOMLoaded(cb) { + if (document.readyState === "loading") { + document.addEventListener("DOMContentLoaded", cb) + } else { + cb() + } +} + +/** + * Interprets a String as a Boolean. + * + * Values like "no" or "disabled" to mean false here. + * + * @param {String} s + * @returns {Boolean} + */ +function Truthy(s) { + switch (s.toLowerCase()) { + case "disabled": + case "no": + case "off": + case "false": + return false + } + return true +} + + +/** + * Fetch the configuration object for this theme. + * + * @returns {Promise.} + */ +async function Config() { + let resp = await fetch( + new URL("config.json", BaseURL), + { + cache: "no-cache" + }, + ) + return resp.json() +} + +export { + Millisecond, + Second, + Minute, + BaseURL, + Toast, + WhenDOMLoaded, + Truthy, + Config, +} diff --git a/theme/config.json b/theme/config.json new file mode 100644 index 0000000..bbe7c6c --- /dev/null +++ b/theme/config.json @@ -0,0 +1,13 @@ +{ + "TrackSolved": true, + "Scoreboard": { + "DisplayServerURL": true, + "ShowCategoryLeaders": true, + "ReplayHistory": true, + "ReplayFPS": 30, + "ReplayDurationMS": 2000, + "": "" + }, + "Messages": "", + "": "this is here so you don't have to remember to take the comma off the last item" +} \ No newline at end of file diff --git a/theme/index.html b/theme/index.html index 32e2115..cf325e3 100644 --- a/theme/index.html +++ b/theme/index.html @@ -1,33 +1,44 @@ - + MOTH + - - + + -

MOTH

-
-
-
+

MOTH

+
+
-
+ Team ID:
Team name:
-
+
+
+ +
+

+ Solved puzzle tracking: disabled. +

+

+ Your team's Incident Coordinator can help coordinate team activity. +

+
+ +
-
diff --git a/theme/index.mjs b/theme/index.mjs new file mode 100644 index 0000000..4b91d5e --- /dev/null +++ b/theme/index.mjs @@ -0,0 +1,175 @@ +/** + * Functionality for index.html (Login / Puzzles list) + */ +import * as moth from "./moth.mjs" +import * as common from "./common.mjs" + +class App { + constructor(basePath=".") { + this.config = {} + + this.server = new moth.Server(basePath) + + for (let form of document.querySelectorAll("form.login")) { + form.addEventListener("submit", event => this.handleLoginSubmit(event)) + } + for (let e of document.querySelectorAll(".logout")) { + e.addEventListener("click", () => this.Logout()) + } + + setInterval(() => this.UpdateState(), common.Minute/3) + setInterval(() => this.UpdateConfig(), common.Minute* 5) + + this.UpdateConfig() + .finally(() => this.UpdateState()) + } + + handleLoginSubmit(event) { + event.preventDefault() + let f = new FormData(event.target) + this.Login(f.get("id"), f.get("name")) + } + + /** + * Attempt to log in to the server. + * + * @param {string} teamID + * @param {string} teamName + */ + async Login(teamID, teamName) { + try { + await this.server.Login(teamID, teamName) + common.Toast(`Logged in (team id = ${teamID})`) + this.UpdateState() + } + catch (error) { + common.Toast(error) + } + } + + /** + * Log out of the server by clearing the saved Team ID. + */ + async Logout() { + try { + this.server.Reset() + common.Toast("Logged out") + this.UpdateState() + } + catch (error) { + common.Toast(error) + } + } + + /** + * Update app configuration. + * + * Configuration can be updated less frequently than state, to reduce server + * load, since configuration should (hopefully) change less frequently. + */ + async UpdateConfig() { + this.config = await common.Config() + + for (let e of document.querySelectorAll(".messages")) { + e.innerHTML = this.config.Messages || "" + } + } + + /** + * Update the entire page. + * + * Fetch a new state, and rebuild all dynamic elements on this bage based on + * what's returned. If we're in development mode and not logged in, auto + * login too. + */ + async UpdateState() { + this.state = await this.server.GetState() + + // Update elements with data-track-solved + for (let e of document.querySelectorAll("[data-track-solved]")) { + // Only display if data-track-solved is the same as config.trackSolved + e.classList.toggle("hidden", common.Truthy(e.dataset.trackSolved) != this.config.TrackSolved) + } + + for (let e of document.querySelectorAll(".login")) { + this.renderLogin(e, !this.server.LoggedIn()) + } + for (let e of document.querySelectorAll(".puzzles")) { + this.renderPuzzles(e, this.server.LoggedIn()) + } + + if (this.state.DevelopmentMode() && !this.server.LoggedIn()) { + let teamID = Math.floor(Math.random() * 1000000).toString(16) + common.Toast("Automatically logging in to devel server") + console.info(`Logging in with generated Team ID: ${teamID}`) + return this.Login(teamID, `Team ${teamID}`) + } + } + + /** + * Render a login box. + * + * Just toggles visibility, there's nothing dynamic in a login box. + */ + renderLogin(element, visible) { + element.classList.toggle("hidden", !visible) + } + + /** + * Render a puzzles box. + * + * Displays the list of open puzzles, and adds mothball download links + * if the server is in development mode. + */ + renderPuzzles(element, visible) { + element.classList.toggle("hidden", !visible) + while (element.firstChild) element.firstChild.remove() + for (let cat of this.state.Categories()) { + let pdiv = element.appendChild(document.createElement("div")) + pdiv.classList.add("category") + + let h = pdiv.appendChild(document.createElement("h2")) + h.textContent = cat + + // Extras if we're running a devel server + if (this.state.DevelopmentMode()) { + let a = h.appendChild(document.createElement('a')) + a.classList.add("mothball") + a.textContent = "⬇️" + a.href = this.server.URL(`mothballer/${cat}.mb`) + a.title = "Download a compiled puzzle for this category" + } + + // List out puzzles in this category + let l = pdiv.appendChild(document.createElement("ul")) + for (let puzzle of this.state.Puzzles(cat)) { + let i = l.appendChild(document.createElement("li")) + + let url = new URL("puzzle.html", common.BaseURL) + url.hash = `${puzzle.Category}:${puzzle.Points}` + let a = i.appendChild(document.createElement("a")) + a.textContent = puzzle.Points + a.href = url + a.target = "_blank" + + if (this.config.TrackSolved) { + a.classList.toggle("solved", this.state.IsSolved(puzzle)) + } + } + + if (!this.state.ContainsUnsolved(cat)) { + l.appendChild(document.createElement("li")).textContent = "✿" + } + + element.appendChild(pdiv) + } + } +} + +function init() { + window.app = { + server: new App() + } +} + +common.WhenDOMLoaded(init) diff --git a/theme/logout.html b/theme/logout.html deleted file mode 100644 index 14f3caf..0000000 --- a/theme/logout.html +++ /dev/null @@ -1,23 +0,0 @@ - - - - MOTH - - - - - -

MOTH

-
-

Okay, you've been logged out.

-
- - - diff --git a/theme/manifest.json b/theme/manifest.json deleted file mode 100644 index acc15b6..0000000 --- a/theme/manifest.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "name": "Monarch of the Hill", - "short_name": "MOTH", - "start_url": ".", - "display": "standalone", - "background_color": "#282a33", - "theme_color": "#ECB", - "description": "The MOTH CTF engine" -} diff --git a/theme/moment.min.js b/theme/moment.min.js deleted file mode 100644 index 5787a40..0000000 --- a/theme/moment.min.js +++ /dev/null @@ -1 +0,0 @@ -!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?module.exports=t():"function"==typeof define&&define.amd?define(t):e.moment=t()}(this,function(){"use strict";var e,i;function c(){return e.apply(null,arguments)}function o(e){return e instanceof Array||"[object Array]"===Object.prototype.toString.call(e)}function u(e){return null!=e&&"[object Object]"===Object.prototype.toString.call(e)}function l(e){return void 0===e}function h(e){return"number"==typeof e||"[object Number]"===Object.prototype.toString.call(e)}function d(e){return e instanceof Date||"[object Date]"===Object.prototype.toString.call(e)}function f(e,t){var n,s=[];for(n=0;n>>0,s=0;sSe(e)?(r=e+1,o-Se(e)):(r=e,o),{year:r,dayOfYear:a}}function Ie(e,t,n){var s,i,r=Ve(e.year(),t,n),a=Math.floor((e.dayOfYear()-r-1)/7)+1;return a<1?s=a+Ae(i=e.year()-1,t,n):a>Ae(e.year(),t,n)?(s=a-Ae(e.year(),t,n),i=e.year()+1):(i=e.year(),s=a),{week:s,year:i}}function Ae(e,t,n){var s=Ve(e,t,n),i=Ve(e+1,t,n);return(Se(e)-s+i)/7}I("w",["ww",2],"wo","week"),I("W",["WW",2],"Wo","isoWeek"),C("week","w"),C("isoWeek","W"),F("week",5),F("isoWeek",5),ue("w",B),ue("ww",B,z),ue("W",B),ue("WW",B,z),fe(["w","ww","W","WW"],function(e,t,n,s){t[s.substr(0,1)]=D(e)});function je(e,t){return e.slice(t,7).concat(e.slice(0,t))}I("d",0,"do","day"),I("dd",0,0,function(e){return this.localeData().weekdaysMin(this,e)}),I("ddd",0,0,function(e){return this.localeData().weekdaysShort(this,e)}),I("dddd",0,0,function(e){return this.localeData().weekdays(this,e)}),I("e",0,0,"weekday"),I("E",0,0,"isoWeekday"),C("day","d"),C("weekday","e"),C("isoWeekday","E"),F("day",11),F("weekday",11),F("isoWeekday",11),ue("d",B),ue("e",B),ue("E",B),ue("dd",function(e,t){return t.weekdaysMinRegex(e)}),ue("ddd",function(e,t){return t.weekdaysShortRegex(e)}),ue("dddd",function(e,t){return t.weekdaysRegex(e)}),fe(["dd","ddd","dddd"],function(e,t,n,s){var i=n._locale.weekdaysParse(e,s,n._strict);null!=i?t.d=i:g(n).invalidWeekday=e}),fe(["d","e","E"],function(e,t,n,s){t[s]=D(e)});var Ze="Sunday_Monday_Tuesday_Wednesday_Thursday_Friday_Saturday".split("_");var ze="Sun_Mon_Tue_Wed_Thu_Fri_Sat".split("_");var $e="Su_Mo_Tu_We_Th_Fr_Sa".split("_");var qe=ae;var Je=ae;var Be=ae;function Qe(){function e(e,t){return t.length-e.length}var t,n,s,i,r,a=[],o=[],u=[],l=[];for(t=0;t<7;t++)n=y([2e3,1]).day(t),s=this.weekdaysMin(n,""),i=this.weekdaysShort(n,""),r=this.weekdays(n,""),a.push(s),o.push(i),u.push(r),l.push(s),l.push(i),l.push(r);for(a.sort(e),o.sort(e),u.sort(e),l.sort(e),t=0;t<7;t++)o[t]=he(o[t]),u[t]=he(u[t]),l[t]=he(l[t]);this._weekdaysRegex=new RegExp("^("+l.join("|")+")","i"),this._weekdaysShortRegex=this._weekdaysRegex,this._weekdaysMinRegex=this._weekdaysRegex,this._weekdaysStrictRegex=new RegExp("^("+u.join("|")+")","i"),this._weekdaysShortStrictRegex=new RegExp("^("+o.join("|")+")","i"),this._weekdaysMinStrictRegex=new RegExp("^("+a.join("|")+")","i")}function Xe(){return this.hours()%12||12}function Ke(e,t){I(e,0,0,function(){return this.localeData().meridiem(this.hours(),this.minutes(),t)})}function et(e,t){return t._meridiemParse}I("H",["HH",2],0,"hour"),I("h",["hh",2],0,Xe),I("k",["kk",2],0,function(){return this.hours()||24}),I("hmm",0,0,function(){return""+Xe.apply(this)+L(this.minutes(),2)}),I("hmmss",0,0,function(){return""+Xe.apply(this)+L(this.minutes(),2)+L(this.seconds(),2)}),I("Hmm",0,0,function(){return""+this.hours()+L(this.minutes(),2)}),I("Hmmss",0,0,function(){return""+this.hours()+L(this.minutes(),2)+L(this.seconds(),2)}),Ke("a",!0),Ke("A",!1),C("hour","h"),F("hour",13),ue("a",et),ue("A",et),ue("H",B),ue("h",B),ue("k",B),ue("HH",B,z),ue("hh",B,z),ue("kk",B,z),ue("hmm",Q),ue("hmmss",X),ue("Hmm",Q),ue("Hmmss",X),ce(["H","HH"],ge),ce(["k","kk"],function(e,t,n){var s=D(e);t[ge]=24===s?0:s}),ce(["a","A"],function(e,t,n){n._isPm=n._locale.isPM(e),n._meridiem=e}),ce(["h","hh"],function(e,t,n){t[ge]=D(e),g(n).bigHour=!0}),ce("hmm",function(e,t,n){var s=e.length-2;t[ge]=D(e.substr(0,s)),t[ve]=D(e.substr(s)),g(n).bigHour=!0}),ce("hmmss",function(e,t,n){var s=e.length-4,i=e.length-2;t[ge]=D(e.substr(0,s)),t[ve]=D(e.substr(s,2)),t[pe]=D(e.substr(i)),g(n).bigHour=!0}),ce("Hmm",function(e,t,n){var s=e.length-2;t[ge]=D(e.substr(0,s)),t[ve]=D(e.substr(s))}),ce("Hmmss",function(e,t,n){var s=e.length-4,i=e.length-2;t[ge]=D(e.substr(0,s)),t[ve]=D(e.substr(s,2)),t[pe]=D(e.substr(i))});var tt,nt=Te("Hours",!0),st={calendar:{sameDay:"[Today at] LT",nextDay:"[Tomorrow at] LT",nextWeek:"dddd [at] LT",lastDay:"[Yesterday at] LT",lastWeek:"[Last] dddd [at] LT",sameElse:"L"},longDateFormat:{LTS:"h:mm:ss A",LT:"h:mm A",L:"MM/DD/YYYY",LL:"MMMM D, YYYY",LLL:"MMMM D, YYYY h:mm A",LLLL:"dddd, MMMM D, YYYY h:mm A"},invalidDate:"Invalid date",ordinal:"%d",dayOfMonthOrdinalParse:/\d{1,2}/,relativeTime:{future:"in %s",past:"%s ago",s:"a few seconds",ss:"%d seconds",m:"a minute",mm:"%d minutes",h:"an hour",hh:"%d hours",d:"a day",dd:"%d days",M:"a month",MM:"%d months",y:"a year",yy:"%d years"},months:Ce,monthsShort:He,week:{dow:0,doy:6},weekdays:Ze,weekdaysMin:$e,weekdaysShort:ze,meridiemParse:/[ap]\.?m?\.?/i},it={},rt={};function at(e){return e?e.toLowerCase().replace("_","-"):e}function ot(e){var t=null;if(!it[e]&&"undefined"!=typeof module&&module&&module.exports)try{t=tt._abbr,require("./locale/"+e),ut(t)}catch(e){}return it[e]}function ut(e,t){var n;return e&&((n=l(t)?ht(e):lt(e,t))?tt=n:"undefined"!=typeof console&&console.warn&&console.warn("Locale "+e+" not found. Did you forget to load it?")),tt._abbr}function lt(e,t){if(null===t)return delete it[e],null;var n,s=st;if(t.abbr=e,null!=it[e])T("defineLocaleOverride","use moment.updateLocale(localeName, config) to change an existing locale. moment.defineLocale(localeName, config) should only be used for creating a new locale See http://momentjs.com/guides/#/warnings/define-locale/ for more info."),s=it[e]._config;else if(null!=t.parentLocale)if(null!=it[t.parentLocale])s=it[t.parentLocale]._config;else{if(null==(n=ot(t.parentLocale)))return rt[t.parentLocale]||(rt[t.parentLocale]=[]),rt[t.parentLocale].push({name:e,config:t}),null;s=n._config}return it[e]=new P(x(s,t)),rt[e]&&rt[e].forEach(function(e){lt(e.name,e.config)}),ut(e),it[e]}function ht(e){var t;if(e&&e._locale&&e._locale._abbr&&(e=e._locale._abbr),!e)return tt;if(!o(e)){if(t=ot(e))return t;e=[e]}return function(e){for(var t,n,s,i,r=0;r=t&&a(i,n,!0)>=t-1)break;t--}r++}return tt}(e)}function dt(e){var t,n=e._a;return n&&-2===g(e).overflow&&(t=n[_e]<0||11Pe(n[me],n[_e])?ye:n[ge]<0||24Ae(n,r,a)?g(e)._overflowWeeks=!0:null!=u?g(e)._overflowWeekday=!0:(o=Ee(n,s,i,r,a),e._a[me]=o.year,e._dayOfYear=o.dayOfYear)}(e),null!=e._dayOfYear&&(r=ct(e._a[me],s[me]),(e._dayOfYear>Se(r)||0===e._dayOfYear)&&(g(e)._overflowDayOfYear=!0),n=Ge(r,0,e._dayOfYear),e._a[_e]=n.getUTCMonth(),e._a[ye]=n.getUTCDate()),t=0;t<3&&null==e._a[t];++t)e._a[t]=a[t]=s[t];for(;t<7;t++)e._a[t]=a[t]=null==e._a[t]?2===t?1:0:e._a[t];24===e._a[ge]&&0===e._a[ve]&&0===e._a[pe]&&0===e._a[we]&&(e._nextDay=!0,e._a[ge]=0),e._d=(e._useUTC?Ge:function(e,t,n,s,i,r,a){var o;return e<100&&0<=e?(o=new Date(e+400,t,n,s,i,r,a),isFinite(o.getFullYear())&&o.setFullYear(e)):o=new Date(e,t,n,s,i,r,a),o}).apply(null,a),i=e._useUTC?e._d.getUTCDay():e._d.getDay(),null!=e._tzm&&e._d.setUTCMinutes(e._d.getUTCMinutes()-e._tzm),e._nextDay&&(e._a[ge]=24),e._w&&void 0!==e._w.d&&e._w.d!==i&&(g(e).weekdayMismatch=!0)}}var mt=/^\s*((?:[+-]\d{6}|\d{4})-(?:\d\d-\d\d|W\d\d-\d|W\d\d|\d\d\d|\d\d))(?:(T| )(\d\d(?::\d\d(?::\d\d(?:[.,]\d+)?)?)?)([\+\-]\d\d(?::?\d\d)?|\s*Z)?)?$/,_t=/^\s*((?:[+-]\d{6}|\d{4})(?:\d\d\d\d|W\d\d\d|W\d\d|\d\d\d|\d\d))(?:(T| )(\d\d(?:\d\d(?:\d\d(?:[.,]\d+)?)?)?)([\+\-]\d\d(?::?\d\d)?|\s*Z)?)?$/,yt=/Z|[+-]\d\d(?::?\d\d)?/,gt=[["YYYYYY-MM-DD",/[+-]\d{6}-\d\d-\d\d/],["YYYY-MM-DD",/\d{4}-\d\d-\d\d/],["GGGG-[W]WW-E",/\d{4}-W\d\d-\d/],["GGGG-[W]WW",/\d{4}-W\d\d/,!1],["YYYY-DDD",/\d{4}-\d{3}/],["YYYY-MM",/\d{4}-\d\d/,!1],["YYYYYYMMDD",/[+-]\d{10}/],["YYYYMMDD",/\d{8}/],["GGGG[W]WWE",/\d{4}W\d{3}/],["GGGG[W]WW",/\d{4}W\d{2}/,!1],["YYYYDDD",/\d{7}/]],vt=[["HH:mm:ss.SSSS",/\d\d:\d\d:\d\d\.\d+/],["HH:mm:ss,SSSS",/\d\d:\d\d:\d\d,\d+/],["HH:mm:ss",/\d\d:\d\d:\d\d/],["HH:mm",/\d\d:\d\d/],["HHmmss.SSSS",/\d\d\d\d\d\d\.\d+/],["HHmmss,SSSS",/\d\d\d\d\d\d,\d+/],["HHmmss",/\d\d\d\d\d\d/],["HHmm",/\d\d\d\d/],["HH",/\d\d/]],pt=/^\/?Date\((\-?\d+)/i;function wt(e){var t,n,s,i,r,a,o=e._i,u=mt.exec(o)||_t.exec(o);if(u){for(g(e).iso=!0,t=0,n=gt.length;tn.valueOf():n.valueOf()this.clone().month(0).utcOffset()||this.utcOffset()>this.clone().month(5).utcOffset()},mn.isLocal=function(){return!!this.isValid()&&!this._isUTC},mn.isUtcOffset=function(){return!!this.isValid()&&this._isUTC},mn.isUtc=Et,mn.isUTC=Et,mn.zoneAbbr=function(){return this._isUTC?"UTC":""},mn.zoneName=function(){return this._isUTC?"Coordinated Universal Time":""},mn.dates=n("dates accessor is deprecated. Use date instead.",un),mn.months=n("months accessor is deprecated. Use month instead",Ue),mn.years=n("years accessor is deprecated. Use year instead",Oe),mn.zone=n("moment().zone is deprecated, use moment().utcOffset instead. http://momentjs.com/guides/#/warnings/zone/",function(e,t){return null!=e?("string"!=typeof e&&(e=-e),this.utcOffset(e,t),this):-this.utcOffset()}),mn.isDSTShifted=n("isDSTShifted is deprecated. See http://momentjs.com/guides/#/warnings/dst-shifted/ for more information",function(){if(!l(this._isDSTShifted))return this._isDSTShifted;var e={};if(w(e,this),(e=Ot(e))._a){var t=e._isUTC?y(e._a):bt(e._a);this._isDSTShifted=this.isValid()&&0 { p.remove() }, - timeout - ) -} - -function renderNotices(obj) { - let ne = document.getElementById("notices") - if (ne) { - ne.innerHTML = obj - } -} - -function renderPuzzles(obj) { - let puzzlesElement = document.createElement('div') - - document.getElementById("login").style.display = "none" - - // Create a sorted list of category names - let cats = Object.keys(obj) - cats.sort() - if (cats.length == 0) { - toast("No categories to serve!") - } - for (let cat of cats) { - if (cat.startsWith("__")) { - // Skip metadata - continue - } - let puzzles = obj[cat] - - let pdiv = document.createElement('div') - pdiv.className = 'category' - - let h = document.createElement('h2') - pdiv.appendChild(h) - h.textContent = cat - - // Extras if we're running a devel server - if (devel) { - let a = document.createElement('a') - h.insertBefore(a, h.firstChild) - a.textContent = "⬇️" - a.href = "mothballer/" + cat + ".mb" - a.classList.add("mothball") - a.title = "Download a compiled puzzle for this category" - } - - // List out puzzles in this category - let l = document.createElement('ul') - pdiv.appendChild(l) - for (let puzzle of puzzles) { - let points = puzzle - let id = null - - if (Array.isArray(puzzle)) { - points = puzzle[0] - id = puzzle[1] - } - - let i = document.createElement('li') - l.appendChild(i) - i.textContent = " " - - if (points === 0) { - // Sentry: there are no more puzzles in this category - i.textContent = "✿" - } else { - let a = document.createElement('a') - i.appendChild(a) - a.textContent = points - let url = new URL("puzzle.html", window.location) - url.searchParams.set("cat", cat) - url.searchParams.set("points", points) - if (id) { url.searchParams.set("pid", id) } - a.href = url.toString() - } - } - - puzzlesElement.appendChild(pdiv) - } - - // Drop that thing in - let container = document.getElementById("puzzles") - while (container.firstChild) { - container.firstChild.remove() - } - container.appendChild(puzzlesElement) -} - -function renderState(obj) { - window.state = obj - devel = obj.Config.Devel - if (devel) { - let params = new URLSearchParams(window.location.search) - sessionStorage.id = "1" - renderPuzzles(obj.Puzzles) - } else if (Object.keys(obj.Puzzles).length > 0) { - renderPuzzles(obj.Puzzles) - } - renderNotices(obj.Messages) -} - -function heartbeat() { - let teamId = sessionStorage.id || "" - let url = new URL("state", window.location) - url.searchParams.set("id", teamId) - - let fd = new FormData() - fd.append("id", teamId) - fetch(url) - .then(resp => { - if (resp.ok) { - resp.json() - .then(renderState) - .catch(err => { - toast("Error fetching recent state. I'll try again in a moment.") - console.log(err) - }) - } - }) - .catch(err => { - toast("Error fetching recent state. I'll try again in a moment.") - console.log(err) - }) -} - -function showPuzzles() { - let spinner = document.createElement("span") - spinner.classList.add("spinner") - - document.getElementById("login").style.display = "none" - document.getElementById("puzzles").appendChild(spinner) -} - -function login(e) { - e.preventDefault() - let name = document.querySelector("[name=name]").value - let teamId = document.querySelector("[name=id]").value - - fetch("register", { - method: "POST", - body: new FormData(e.target), - }) - .then(resp => { - if (resp.ok) { - resp.json() - .then(obj => { - if ((obj.status == "success") || (obj.data.short == "Already registered")) { - toast("Logged in") - sessionStorage.id = teamId - showPuzzles() - heartbeat() - } else { - toast(obj.data.description) - } - }) - .catch(err => { - toast("Oops, the server has lost its mind. You probably need to tell someone so they can fix it.") - console.log(err, resp) - }) - } else { - toast("Oops, something's wrong with the server. Try again in a few seconds.") - console.log(resp) - } - }) - .catch(err => { - toast("Oops, something went wrong. Try again in a few seconds.") - console.log(err) - }) -} - -function init() { - heartbeat() - setInterval(e => heartbeat(), 40000) - - document.getElementById("login").addEventListener("submit", login) -} - -if (document.readyState === "loading") { - document.addEventListener("DOMContentLoaded", init) -} else { - init() -} - diff --git a/theme/moth.mjs b/theme/moth.mjs new file mode 100644 index 0000000..dd23081 --- /dev/null +++ b/theme/moth.mjs @@ -0,0 +1,681 @@ +/** + * Hash/digest functions + */ +class Hash { + /** + * Dan Bernstein hash + * + * Used until MOTH v3.5 + * + * @param {string} buf Input + * @returns {number} + */ + static djb2(buf) { + let h = 5381 + for (let c of (new TextEncoder()).encode(buf)) { // Encode as UTF-8 and read in each byte + // JavaScript converts everything to a signed 32-bit integer when you do bitwise operations. + // So we have to do "unsigned right shift" by zero to get it back to unsigned. + h = ((h * 33) + c) >>> 0 + } + return h + } + + /** + * Dan Bernstein hash with xor + * + * @param {string} buf Input + * @returns {number} + */ + static djb2xor(buf) { + let h = 5381 + for (let c of (new TextEncoder()).encode(buf)) { + h = ((h * 33) ^ c) >>> 0 + } + return h + } + + /** + * SHA 256 + * + * Used until MOTH v4.5 + * + * @param {string} buf Input + * @returns {Promise.} hex-encoded digest + */ + static async sha256(buf) { + const msgUint8 = new TextEncoder().encode(buf) + const hashBuffer = await crypto.subtle.digest('SHA-256', msgUint8) + const hashArray = Array.from(new Uint8Array(hashBuffer)) + return this.hexlify(hashArray); + } + + /** + * SHA 1, but only the first 4 hexits (2 octets). + * + * Git uses this technique with 7 hexits (default) as a "short identifier". + * + * @param {string} buf Input + */ + static async sha1_slice(buf, end=4) { + const msgUint8 = new TextEncoder().encode(buf) + const hashBuffer = await crypto.subtle.digest("SHA-1", msgUint8) + const hashArray = Array.from(new Uint8Array(hashBuffer)) + const hexits = this.hexlify(hashArray) + return hexits.slice(0, end) + } + + /** + * Hex-encode a byte array + * + * @param {number[]} buf Byte array + * @returns {string} + */ + static hexlify(buf) { + return buf.map(b => b.toString(16).padStart(2, "0")).join("") + } + + /** + * Apply every hash to the input buffer. + * + * @param {string} buf Input + * @returns {Promise.} + */ + static async All(buf) { + return [ + String(this.djb2(buf)), + await this.sha256(buf), + await this.sha1_slice(buf), + ] + } +} + +/** + * A point award. + */ +class Award { + constructor(when, teamid, category, points) { + /** Unix epoch timestamp for this award + * @type {number} + */ + this.When = when + /** Team ID this award belongs to + * @type {string} + */ + this.TeamID = teamid + /** Puzzle category for this award + * @type {string} + */ + this.Category = category + /** Points value of this award + * @type {number} + */ + this.Points = points + } +} + +/** + * A puzzle. + * + * A new Puzzle only knows its category and point value. + * If you want to populate it with meta-information, you must call Populate(). + * + * Parameters created by Populate are described in the server source code: + * {@link https://pkg.go.dev/github.com/dirtbags/moth/v4/pkg/transpile#Puzzle} + * + */ +class Puzzle { + /** + * @param {Server} server + * @param {string} category + * @param {number} points + */ + constructor (server, category, points) { + if (points < 1) { + throw(`Invalid points value: ${points}`) + } + + /** Server where this puzzle lives + * @type {Server} + */ + this.server = server + + /** Category this puzzle belongs to */ + this.Category = String(category) + + /** Point value of this puzzle */ + this.Points = Number(points) + + /** Error returned trying to retrieve this puzzle */ + this.Error = { + /** Status code provided by server */ + Status: 0, + /** Status text provided by server */ + StatusText: "", + /** Full text of server error */ + Body: "", + } + } + + /** + * Populate this Puzzle object with meta-information from the server. + */ + async Populate() { + let resp = await this.Get("puzzle.json") + if (!resp.ok) { + let body = await resp.text() + this.Error = { + Status: resp.status, + StatusText: resp.statusText, + Body: body, + } + throw(this.Error) + } + let obj = await resp.json() + Object.assign(this, obj) + + // Make sure lists are lists + this.AnswerHashes ||= [] + this.Answers ||= [] + this.Attachments ||= [] + this.Authors ||= [] + this.Debug.Errors ||= [] + this.Debug.Hints ||= [] + this.Debug.Log ||= [] + this.KSAs ||= [] + this.Scripts ||= [] + } + + /** + * Get a resource associated with this puzzle. + * + * @param {string} filename Attachment/Script to retrieve + * @returns {Promise.} + */ + Get(filename) { + return this.server.GetContent(this.Category, this.Points, filename) + } + + /** + * Check if a string is possibly correct. + * + * The server sends a list of answer hashes with each puzzle: this method + * checks to see if any of those hashes match a hash of the string. + * + * The MOTH development team likes obscure hash functions with a lot of + * collisions, which means that a given input may match another possible + * string's hash. We do this so that if you run a brute force attack against + * the list of hashes, you have to write your own brute force program, and + * you still have to pick through a lot of potentially correct answers when + * it's done. + * + * @param {string} str User-submitted possible answer + * @returns {Promise.} + */ + async IsPossiblyCorrect(str) { + let userAnswerHashes = await Hash.All(str) + + for (let pah of this.AnswerHashes) { + for (let uah of userAnswerHashes) { + if (pah == uah) { + return true + } + } + } + return false + } + + /** + * Submit a proposed answer for points. + * + * The returned promise will fail if anything goes wrong, including the + * proposed answer being rejected. + * + * @param {string} proposed Answer to submit + * @returns {Promise.} Success message + */ + SubmitAnswer(proposed) { + return this.server.SubmitAnswer(this.Category, this.Points, proposed) + } +} + +/** + * A snapshot of scores. + */ +class Scores { + constructor() { + /** + * Timestamp of this score snapshot + * @type number + */ + this.Timestamp = 0 + + /** + * All categories present in this snapshot. + * + * ECMAScript sets preserve order, so iterating over this will yield + * categories as they were added to the points log. + * + * @type {Set.} + */ + this.Categories = new Set() + + /** + * All team IDs present in this snapshot + * @type {Set.} + */ + this.TeamIDs = new Set() + + /** + * Highest score in each category + * @type {Object.} + */ + this.MaxPoints = {} + + this.categoryTeamPoints = {} + } + + /** + * Return a sorted list of category names + * + * @returns {string[]} + */ + SortedCategories() { + let categories = [...this.Categories] + categories.sort((a,b) => a.localeCompare(b, "en", {sensitivity: "base"})) + return categories + } + + /** + * Add an award to a team's score. + * + * Updates this.Timestamp to the award's timestamp. + * + * @param {Award} award + */ + Add(award) { + this.Timestamp = award.Timestamp + this.Categories.add(award.Category) + this.TeamIDs.add(award.TeamID) + + let teamPoints = (this.categoryTeamPoints[award.Category] ??= {}) + let points = (teamPoints[award.TeamID] || 0) + award.Points + teamPoints[award.TeamID] = points + + let max = this.MaxPoints[award.Category] || 0 + this.MaxPoints[award.Category] = Math.max(max, points) + } + + /** + * Get a team's score within a category. + * + * @param {string} category + * @param {string} teamID + * @returns {number} + */ + GetPoints(category, teamID) { + let teamPoints = this.categoryTeamPoints[category] || {} + return teamPoints[teamID] || 0 + } + + /** + * Calculate a team's score in a category, using the Cyber Fire algorithm. + * + *@param {string} category + * @param {string} teamID + */ + CyFiCategoryScore(category, teamID) { + return this.GetPoints(category, teamID) / this.MaxPoints[category] + } + + /** + * Calculate a team's overall score, using the Cyber Fire algorithm. + * + *@param {string} category + * @param {string} teamID + * @returns {number} + */ + CyFiScore(teamID) { + let score = 0 + for (let category of this.Categories) { + score += this.CyFiCategoryScore(category, teamID) + } + return score + } +} + +/** + * MOTH instance state. + */ +class State { + /** + * @param {Server} server Server where we got this + * @param {Object} obj Raw state data + */ + constructor(server, obj) { + for (let key of ["Config", "TeamNames", "PointsLog"]) { + if (!obj[key]) { + throw(`Missing state property: ${key}`) + } + } + this.server = server + + /** Configuration */ + this.Config = { + /** Is the server in development mode? + * @type {boolean} + */ + Devel: obj.Config.Devel, + } + + /** Global messages, in HTML + * @type {string} + */ + this.Messages = obj.Messages + + /** Map from Team ID to Team Name + * @type {Object.} + */ + this.TeamNames = obj.TeamNames + + /** Map from category name to puzzle point values + * @type {Object.} + */ + this.PointsByCategory = obj.Puzzles + + /** Log of points awarded + * @type {Award[]} + */ + this.PointsLog = obj.PointsLog.map(entry => new Award(entry[0], entry[1], entry[2], entry[3])) + } + + /** + * Returns a sorted list of open category names + * + * @returns {string[]} List of categories + */ + Categories() { + let ret = [] + for (let category in this.PointsByCategory) { + ret.push(category) + } + ret.sort() + return ret + } + + /** + * Check whether a category contains unsolved puzzles. + * + * The server adds a puzzle with 0 points in every "solved" category, + * so this just checks whether there is a 0-point puzzle in the category's point list. + * + * @param {string} category + * @returns {boolean} + */ + ContainsUnsolved(category) { + return !this.PointsByCategory[category].includes(0) + } + + /** + * Is the server in development mode? + * + * @returns {boolean} + */ + DevelopmentMode() { + return this.Config && this.Config.Devel + } + + /** + * Return all open puzzles. + * + * The returned list will be sorted by (category, points). + * If not categories are given, all puzzles will be returned. + * + * @param {string} categories Limit results to these categories + * @returns {Puzzle[]} + */ + Puzzles(...categories) { + if (categories.length == 0) { + categories = this.Categories() + } + let ret = [] + for (let category of categories) { + for (let points of this.PointsByCategory[category]) { + if (0 == points) { + // This means all potential puzzles in the category are open + continue + } + let p = new Puzzle(this.server, category, points) + ret.push(p) + } + } + return ret + } + + /** + * Has this puzzle been solved by this team? + * + * @param {Puzzle} puzzle + * @param {string} teamID Team to check, default the logged-in team + * @returns {boolean} + */ + IsSolved(puzzle, teamID="self") { + for (let award of this.PointsLog) { + if ( + (award.Category == puzzle.Category) + && (award.Points == puzzle.Points) + && (award.TeamID == teamID) + ) { + return true + } + } + return false + } + + /** + * Replay scores. + * + * MOTH has no notion of who is "winning", we consider this a user interface + * decision. There are lots of interesting options: see + * [scoring]{@link ../docs/scoring.md} for more. + * + * @yields {Scores} Snapshot at a point in time + */ + * ScoresHistory() { + let scores = new Scores() + for (let award of this.PointsLog) { + scores.Add(award) + yield scores + } + } + + /** + * Calculate the current scores. + * + * @returns {Scores} + */ + CurrentScores() { + let scores + for (scores of this.ScoreHistory()); + return scores + } +} + +/** + * A MOTH Server interface. + * + * This uses localStorage to remember Team ID, + * and will send a Team ID with every request, if it can find one. + */ +class Server { + /** + * @param {string | URL} baseUrl Base URL to server, for constructing API URLs + */ + constructor(baseUrl) { + if (!baseUrl) { + throw("Must provide baseURL") + } + this.baseUrl = new URL(baseUrl, location) + this.teamIDKey = this.baseUrl.toString() + " teamID" + this.TeamID = localStorage[this.teamIDKey] + } + + /** + * Fetch a MOTH resource. + * + * If anything other than a 2xx code is returned, + * this function throws an error. + * + * This always sends teamID. + * If args is set, POST will be used instead of GET + * + * @param {string} path Path to API endpoint + * @param {Object.} args Key/Values to send in POST data + * @returns {Promise.} Response + */ + fetch(path, args={}) { + let body = new URLSearchParams(args) + if (this.TeamID && !body.has("id")) { + body.set("id", this.TeamID) + } + + let url = new URL(path, this.baseUrl) + return fetch(url, { + method: "POST", + body, + cache: "no-cache", + }) + } + + /** + * Send a request to a JSend API endpoint. + * + * @param {string} path Path to API endpoint + * @param {Object.} args Key/Values to send in POST + * @returns {Promise.} JSend Data + */ + async call(path, args={}) { + let resp = await this.fetch(path, args) + let obj = await resp.json() + switch (obj.status) { + case "success": + return obj.data + case "fail": + throw new Error(obj.data.description || obj.data.short || obj.data) + case "error": + throw new Error(obj.message) + default: + throw new Error(`Unknown JSend status: ${obj.status}`) + } + } + + /** + * Make a new URL for the given resource. + * + * The returned URL instance will be absolute, and immune to changes to the + * page that would affect relative URLs. + * + * @returns {URL} + */ + URL(url) { + return new URL(url, this.baseUrl) + } + + /** + * Are we logged in to the server? + * + * @returns {boolean} + */ + LoggedIn() { + return this.TeamID ? true : false + } + + /** + * Forget about any previous Team ID. + * + * This is equivalent to logging out. + */ + Reset() { + localStorage.removeItem(this.teamIDKey) + this.TeamID = null + } + + /** + * Fetch current contest state. + * + * @returns {Promise.} + */ + async GetState() { + let resp = await this.fetch("/state") + let obj = await resp.json() + return new State(this, obj) + } + + /** + * Log in to a team. + * + * This calls the server's registration endpoint; if the call succeds, or + * fails with "team already exists", the login is returned as successful. + * + * @param {string} teamID + * @param {string} teamName + * @returns {Promise.} Success message from server + */ + async Login(teamID, teamName) { + let data = await this.call("/register", {id: teamID, name: teamName}) + this.TeamID = teamID + this.TeamName = teamName + localStorage[this.teamIDKey] = teamID + return data.description || data.short + } + + /** + * Submit a proposed answer for points. + * + * The returned promise will fail if anything goes wrong, including the + * proposed answer being rejected. + * + * @param {string} category Category of puzzle + * @param {number} points Point value of puzzle + * @param {string} proposed Answer to submit + * @returns {Promise.} Success message + */ + async SubmitAnswer(category, points, proposed) { + let data = await this.call("/answer", { + cat: category, + points, + answer: proposed, + }) + return data.description || data.short + } + + /** + * Fetch a file associated with a puzzle. + * + * @param {string} category Category of puzzle + * @param {number} points Point value of puzzle + * @param {string} filename + * @returns {Promise.} + */ + GetContent(category, points, filename) { + return this.fetch(`/content/${category}/${points}/${filename}`) + } + + /** + * Return a Puzzle object. + * + * New Puzzle objects only know their category and point value. + * See docstrings on the Puzzle object for more information. + * + * @param {string} category + * @param {number} points + * @returns {Puzzle} + */ + GetPuzzle(category, points) { + return new Puzzle(this, category, points) + } +} + +export { + Hash, + Server, +} \ No newline at end of file diff --git a/theme/puzzle.html b/theme/puzzle.html index 37206f6..a5e4232 100644 --- a/theme/puzzle.html +++ b/theme/puzzle.html @@ -1,37 +1,34 @@ - + Puzzle - - - + + + + -

Puzzle

-
-
-
    -

    Puzzle by

    -
    -
    -
    - - - - Team ID:
    - Answer:
    - -
    -
    - +

    [loading]

    +
    +
    +

    + Starting script... +

    +
    +
    +
      +

      Puzzle by [loading]

      + +
      + + +
      + +
      +
      +
      +
      diff --git a/theme/puzzle.js b/theme/puzzle.js deleted file mode 100644 index 9913878..0000000 --- a/theme/puzzle.js +++ /dev/null @@ -1,225 +0,0 @@ -// jshint asi:true - -// prettify adds classes to various types, returning an HTML string. -function prettify(key, val) { - switch (key) { - case "Body": - return '[HTML]' - } - return val -} - -// devel_addin drops a bunch of development extensions into element e. -// It will only modify stuff inside e. -function devel_addin(e) { - let h = e.appendChild(document.createElement("h2")) - h.textContent = "Developer Output" - - let log = window.puzzle.Debug.Log || [] - if (log.length > 0) { - e.appendChild(document.createElement("h3")).textContent = "Log" - let le = e.appendChild(document.createElement("ul")) - for (entry of log) { - le.appendChild(document.createElement("li")).textContent = entry - } - } - - e.appendChild(document.createElement("h3")).textContent = "Puzzle object" - - let hobj = JSON.stringify(window.puzzle, prettify, 2) - let d = e.appendChild(document.createElement("pre")) - d.classList.add("object") - d.innerHTML = hobj - - e.appendChild(document.createElement("p")).textContent = "This debugging information will not be available to participants." -} - -// Hash routine used in v3.4 and earlier -function djb2hash(buf) { - let h = 5381 - for (let c of (new TextEncoder()).encode(buf)) { // Encode as UTF-8 and read in each byte - // JavaScript converts everything to a signed 32-bit integer when you do bitwise operations. - // So we have to do "unsigned right shift" by zero to get it back to unsigned. - h = (((h * 33) + c) & 0xffffffff) >>> 0 - } - return h -} - -// The routine used to hash answers in compiled puzzle packages -async function sha256Hash(message) { - const msgUint8 = new TextEncoder().encode(message); // encode as (utf-8) Uint8Array - const hashBuffer = await crypto.subtle.digest('SHA-256', msgUint8); // hash the message - const hashArray = Array.from(new Uint8Array(hashBuffer)); // convert buffer to byte array - const hashHex = hashArray.map(b => b.toString(16).padStart(2, '0')).join(''); // convert bytes to hex string - return hashHex; -} - -// Is the provided answer possibly correct? -async function checkAnswer(answer) { - let answerHashes = [] - answerHashes.push(djb2hash(answer)) - answerHashes.push(await sha256Hash(answer)) - - for (let hash of answerHashes) { - for (let correctHash of window.puzzle.AnswerHashes) { - if (hash == correctHash) { - return true - } - } - } - return false -} - -// Pop up a message -function toast(message, timeout=5000) { - let p = document.createElement("p") - - p.innerText = message - document.getElementById("messages").appendChild(p) - setTimeout( - e => { p.remove() }, - timeout - ) -} - -// When the user submits an answer -function submit(e) { - e.preventDefault() - let data = new FormData(e.target) - - window.data = data - fetch("answer", { - method: "POST", - body: data, - }) - .then(resp => { - if (resp.ok) { - resp.json() - .then(obj => { - toast(obj.data.description) - }) - } else { - toast("Error submitting your answer. Try again in a few seconds.") - console.log(resp) - } - }) - .catch(err => { - toast("Error submitting your answer. Try again in a few seconds.") - console.log(err) - }) -} - -async function loadPuzzle(categoryName, points, puzzleId) { - let puzzle = document.getElementById("puzzle") - let base = "content/" + categoryName + "/" + puzzleId + "/" - - let resp = await fetch(base + "puzzle.json") - if (! resp.ok) { - console.log(resp) - let err = await resp.text() - Array.from(puzzle.childNodes).map(e => e.remove()) - p = puzzle.appendChild(document.createElement("p")) - p.classList.add("Error") - p.textContent = err - return - } - - // Make the whole puzzle available - window.puzzle = await resp.json() - - // Populate authors - document.getElementById("authors").textContent = window.puzzle.Authors.join(", ") - - // If answers are provided, this is the devel server - if (window.puzzle.Answers.length > 0) { - devel_addin(document.getElementById("devel")) - } - - // Load scripts - for (let script of (window.puzzle.Scripts || [])) { - let st = document.createElement("script") - document.head.appendChild(st) - st.src = base + script - } - - // List associated files - for (let fn of (window.puzzle.Attachments || [])) { - let li = document.createElement("li") - let a = document.createElement("a") - a.href = base + fn - a.innerText = fn - li.appendChild(a) - document.getElementById("files").appendChild(li) - } - - // Prefix `base` to relative URLs in the puzzle body - let doc = new DOMParser().parseFromString(window.puzzle.Body, "text/html") - for (let se of doc.querySelectorAll("[src],[href]")) { - se.outerHTML = se.outerHTML.replace(/(src|href)="([^/]+)"/i, "$1=\"" + base + "$2\"") - } - - // If a validation pattern was provided, set that - if (window.puzzle.AnswerPattern) { - document.querySelector("#answer").pattern = window.puzzle.AnswerPattern - } - - // Replace puzzle children with what's in `doc` - Array.from(puzzle.childNodes).map(e => e.remove()) - Array.from(doc.body.childNodes).map(e => puzzle.appendChild(e)) - - document.title = categoryName + " " + points - document.querySelector("body > h1").innerText = document.title - document.querySelector("input[name=cat]").value = categoryName - document.querySelector("input[name=points]").value = points -} - -// Check to see if the answer might be correct -// This might be better done with the "constraint validation API" -// https://developer.mozilla.org/en-US/docs/Learn/HTML/Forms/Form_validation#Validating_forms_using_JavaScript -function answerCheck(e) { - let answer = e.target.value - let ok = document.querySelector("#answer_ok") - - // You have to provide someplace to put the check - if (! ok) { - return - } - - checkAnswer(answer) - .then (correct => { - if (correct) { - ok.textContent = "⭕" - ok.title = "Possibly correct" - } else { - ok.textContent = "❌" - ok.title = "Definitely not correct" - } - }) -} - -function init() { - let params = new URLSearchParams(window.location.search) - let categoryName = params.get("cat") - let points = params.get("points") - let puzzleId = params.get("pid") - - if (categoryName && points) { - loadPuzzle(categoryName, points, puzzleId || points) - } - - let teamId = sessionStorage.getItem("id") - if (teamId) { - document.querySelector("input[name=id]").value = teamId - } - - if (document.querySelector("#answer")) { - document.querySelector("#answer").addEventListener("input", answerCheck) - } - document.querySelector("form").addEventListener("submit", submit) -} - -if (document.readyState === "loading") { - document.addEventListener("DOMContentLoaded", init) -} else { - init() -} diff --git a/theme/puzzle.mjs b/theme/puzzle.mjs new file mode 100644 index 0000000..ef830a3 --- /dev/null +++ b/theme/puzzle.mjs @@ -0,0 +1,239 @@ +/** + * Functionality for puzzle.html (Puzzle display / answer form) + */ +import * as moth from "./moth.mjs" +import * as common from "./common.mjs" + +const server = new moth.Server(".") + +/** + * Handle a submit event on a form. + * + * Called when the user submits the form, + * either by clicking a "submit" button, + * or by some other means provided by the browser, + * like hitting the Enter key. + * + * @param {Event} event + */ +async function formSubmitHandler(event) { + event.preventDefault() + let data = new FormData(event.target) + let proposed = data.get("answer") + let message + + console.groupCollapsed("Submit answer") + console.info(`Proposed answer: ${proposed}`) + try { + message = await window.app.puzzle.SubmitAnswer(proposed) + common.Toast(message) + } + catch (err) { + common.Toast(err) + } + console.groupEnd("Submit answer") +} + +/** + * Handle an input event on the answer field. + * + * @param {Event} event + */ +async function answerInputHandler(event) { + let answer = event.target.value + let correct = await window.app.puzzle.IsPossiblyCorrect(answer) + for (let ok of event.target.parentElement.querySelectorAll(".answer_ok")) { + if (correct) { + ok.textContent = "⭕" + ok.title = "Possibly correct" + } else { + ok.textContent = "❌" + ok.title = "Definitely not correct" + } + } +} + +/** + * Return the puzzle content element, possibly with everything cleared out of it. + * + * @param {boolean} clear Should the element be cleared of children? Default true. + * @returns {Element} + */ +function puzzleElement(clear=true) { + let e = document.querySelector("#puzzle") + if (clear) { + while (e.firstChild) e.firstChild.remove() + } + return e +} + +/** + * Display an error in the puzzle area, and also send it to the console. + * + * Errors are rendered in the puzzle area, so the user can see a bit more about + * what the problem is. + * + * @param {string} error + */ +function error(error) { + console.error(error) + let e = puzzleElement().appendChild(document.createElement("pre")) + e.classList.add("error") + e.textContent = error.Body || error +} + +/** + * Set the answer and invoke input handlers. + * + * Makes sure the Circle Of Success gets updated. + * + * @param {string} s + */ +function SetAnswer(s) { + let e = document.querySelector("#answer") + e.value = s + e.dispatchEvent(new Event("input")) +} + +function writeObject(e, obj) { + let keys = Object.keys(obj) + keys.sort() + for (let key of keys) { + let val = obj[key] + if ((key === "Body") || (!val) || (val.length === 0)) { + continue + } + + let d = e.appendChild(document.createElement("dt")) + d.textContent = key + + let t = e.appendChild(document.createElement("dd")) + if (Array.isArray(val)) { + let vi = t.appendChild(document.createElement("ul")) + vi.multiple = true + for (let a of val) { + let opt = vi.appendChild(document.createElement("li")) + opt.textContent = a + } + } else if (typeof(val) === "object") { + writeObject(t, val) + } else { + t.textContent = val + } + } +} + +/** + * Load the given puzzle. + * + * @param {string} category + * @param {number} points + */ +async function loadPuzzle(category, points) { + console.groupCollapsed("Loading puzzle:", category, points) + let contentBase = new URL(`content/${category}/${points}/`, common.BaseURL) + + // Tell user we're loading + puzzleElement().appendChild(document.createElement("progress")) + for (let qs of ["#authors", "#title", "title"]) { + for (let e of document.querySelectorAll(qs)) { + e.textContent = "[loading]" + } + } + + let puzzle = server.GetPuzzle(category, points) + + console.time("Populate") + try { + await puzzle.Populate() + } + catch { + let error = puzzleElement().appendChild(document.createElement("pre")) + error.classList.add("notification", "error") + error.textContent = puzzle.Error.Body + return + } + finally { + console.timeEnd("Populate") + } + + console.info(`Setting base tag to ${contentBase}`) + let baseElement = document.head.appendChild(document.createElement("base")) + baseElement.href = contentBase + + console.info("Tweaking HTML...") + let title = `${category} ${points}` + document.querySelector("title").textContent = title + document.querySelector("#title").textContent = title + document.querySelector("#authors").textContent = puzzle.Authors.join(", ") + if (puzzle.AnswerPattern) { + document.querySelector("#answer").pattern = puzzle.AnswerPattern + } + puzzleElement().innerHTML = puzzle.Body + + console.info("Adding attached scripts...") + for (let script of (puzzle.Scripts || [])) { + let st = document.createElement("script") + document.head.appendChild(st) + st.src = new URL(script, contentBase) + } + + console.info("Listing attached files...") + for (let fn of (puzzle.Attachments || [])) { + let li = document.createElement("li") + let a = document.createElement("a") + a.href = new URL(fn, contentBase) + a.innerText = fn + li.appendChild(a) + document.getElementById("files").appendChild(li) + } + + + console.info("Filling debug information...") + for (let e of document.querySelectorAll(".debug")) { + if (puzzle.Answers.length > 0) { + writeObject(e, puzzle) + } else { + e.classList.add("hidden") + } + } + + window.app.puzzle = puzzle + console.info("window.app.puzzle =", window.app.puzzle) + + console.groupEnd() + + return puzzle +} + +async function init() { + window.app = {} + window.setanswer = (str => SetAnswer(str)) + + for (let form of document.querySelectorAll("form.answer")) { + form.addEventListener("submit", formSubmitHandler) + for (let e of form.querySelectorAll("[name=answer]")) { + e.addEventListener("input", answerInputHandler) + } + } + // There isn't a more graceful way to "unload" scripts attached to the current puzzle + window.addEventListener("hashchange", () => location.reload()) + + // Make all links absolute, because we're going to be changing the base URL + for (let e of document.querySelectorAll("[href]")) { + e.href = new URL(e.href, common.BaseURL) + } + + let hashpart = location.hash.split("#")[1] || "" + let catpoints = hashpart.split(":") + let category = catpoints[0] + let points = Number(catpoints[1]) + if (!category && !points) { + error(`Doesn't look like a puzzle reference: ${hashpart}`) + return + } + + window.app.puzzle = await loadPuzzle(category, points) +} + +common.WhenDOMLoaded(init) diff --git a/theme/reports/NICEFramework2017.json b/theme/reports/NICEFramework2017.json new file mode 100755 index 0000000..a94c7e2 --- /dev/null +++ b/theme/reports/NICEFramework2017.json @@ -0,0 +1,48340 @@ +{ + "documents": [ + { + "doc_identifier": "nicewf_2017", + "name": "National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework", + "version": "2017", + "website": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf" + } + ], + "relationship_types": [ + { + "relationship_identifier": "projection" + } + ], + "elements": [ + { + "element_type": "specialty area", + "element_identifier": "RSK", + "title": "Risk Management", + "text": "Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "DEV", + "title": "Software Development", + "text": "Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "ARC", + "title": "Systems Architecture", + "text": "Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "TRD", + "title": "Technology R&D", + "text": "Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "SRP", + "title": "Systems Requirements Planning", + "text": "Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "TST", + "title": "Test and Evaluation", + "text": "Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "SYS", + "title": "Systems Development", + "text": "Works on the development phases of the systems development life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "DTA", + "title": "Data Administration", + "text": "Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "KMG", + "title": "Knowledge Management", + "text": "Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "STS", + "title": "Customer Service and Technical Support", + "text": "Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "NET", + "title": "Network Services", + "text": "Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "ADM", + "title": "Systems Administration", + "text": "Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "ANA", + "title": "Systems Analysis", + "text": "Studies an organization's current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "LGA", + "title": "Legal Advice and Advocacy", + "text": "Provides legally sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocates legal and policy changes, and makes a case on behalf of client via a wide range of written and oral work products, including legal briefs and proceedings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "TEA", + "title": "Training, Education, and Awareness", + "text": "Conducts training of personnel within pertinent subject domain. Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "MGT", + "title": "Cybersecurity Management", + "text": "Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "SPP", + "title": "Strategic Planning and Policy", + "text": "Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "EXL", + "title": "Executive Cyber Leadership", + "text": "Supervises, manages, and/or leads work and workers performing cyber and cyber-related and/or cyber operations work.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "PMA", + "title": "Program/Project Management and Acquisition", + "text": "Applies knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities to manage acquisition programs. Executes duties governing hardware, software, and information system acquisition programs and other program management policies. Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "CDA", + "title": "Cybersecurity Defense Analysis", + "text": "Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "INF", + "title": "Cybersecurity Defense Infrastructure Support", + "text": "Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "CIR", + "title": "Incident Response", + "text": "Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "VAM", + "title": "Vulnerability Assessment and Management", + "text": "Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "TWA", + "title": "Threat Analysis", + "text": "Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "EXP", + "title": "Exploitation Analysis", + "text": "Analyzes collected information to identify vulnerabilities and potential for exploitation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "ASA", + "title": "All-Source Analysis", + "text": "Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "TGT", + "title": "Targets", + "text": "Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "LNG", + "title": "Language Analysis", + "text": "Applies language, cultural, and technical expertise to support information collection, analysis, and other cybersecurity activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "CLO", + "title": "Collection Operations", + "text": "Executes collection using appropriate strategies and within the priorities established through the collection management process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "OPL", + "title": "Cyber Operational Planning", + "text": "Performs in-depth joint targeting and cybersecurity planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "OPS", + "title": "Cyber Operations", + "text": "Performs activities to gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "INV", + "title": "Cyber Investigation", + "text": "Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "specialty area", + "element_identifier": "FOR", + "title": "Digital Forensics", + "text": "Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "SP", + "title": "Securely Provision", + "text": "Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "OM", + "title": "Operate and Maintain", + "text": "Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "OV", + "title": "Oversee and Govern", + "text": "Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "PR", + "title": "Protect and Defend", + "text": "Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "AN", + "title": "Analyze", + "text": "Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "CO", + "title": "Collect and Operate", + "text": "Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "category", + "element_identifier": "IN", + "title": "Investigate", + "text": "Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-RSK-001", + "title": "Authorizing Official/Designating Representative", + "text": "Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-RSK-002", + "title": "Security Control Assessor", + "text": "Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-DEV-001", + "title": "Software Developer", + "text": "Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-DEV-002", + "title": "Secure Software Assessor", + "text": "Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-ARC-001", + "title": "Enterprise Architect ", + "text": "Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-ARC-002", + "title": "Security Architect ", + "text": "Ensures that the stakeholder security requirements necessary to protect the organization\u2019s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-TRD-001", + "title": "Research & Development Specialist ", + "text": "Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-SRP-001", + "title": "Systems Requirements Planner ", + "text": "Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-TST-001", + "title": "System Testing and Evaluation Specialist ", + "text": "Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-SYS-001", + "title": "Information Systems Security Developer ", + "text": "Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "SP-SYS-002", + "title": "Systems Developer ", + "text": "Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-DTA-001", + "title": "Database Administrator", + "text": "Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-DTA-002", + "title": "Data Analyst ", + "text": "Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-KMG-001", + "title": "Knowledge Manager", + "text": "Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-STS-001", + "title": "Technical Support Specialist", + "text": "Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-NET-001", + "title": "Network Operations Specialist", + "text": "Plans, implements, and operates network services/systems, to include hardware and virtual environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-ADM-001", + "title": "System Administrator", + "text": "Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OM-ANA-001", + "title": "Systems Security Analyst", + "text": "Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-LGA-001", + "title": "Cyber Legal Advisor ", + "text": "Provides legal advice and recommendations on relevant topics related to cyber law. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-LGA-002", + "title": "Privacy Officer/Privacy Compliance Manager", + "text": "Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance, governance/policy, and incident response needs of privacy and security executives and their teams.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-TEA-001", + "title": "Cyber Instructional Curriculum Developer ", + "text": "Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-TEA-002", + "title": "Cyber Instructor ", + "text": "Develops and conducts training or education of personnel within cyber domain. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-MGT-001", + "title": "Information Systems Security Manager", + "text": "Responsible for the cybersecurity of a program, organization, system, or enclave. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-MGT-002", + "title": "Communications Security (COMSEC) Manager", + "text": "Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-SPP-001", + "title": "Cyber Workforce Developer and Manager ", + "text": "Develops cyberspace workforce plans, strategies, and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-SPP-002", + "title": "Cyber Policy and Strategy Planner", + "text": "Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-EXL-001", + "title": "Executive Cyber Leadership ", + "text": "Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-PMA-001", + "title": "Program Manager ", + "text": "Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-PMA-002", + "title": "IT Project Manager", + "text": "Directly manages information technology projects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-PMA-003", + "title": "Product Support Manager", + "text": "Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-PMA-004", + "title": "IT Investment/Portfolio Manager", + "text": "Manages a portfolio of IT investments that align with the overall needs of mission and enterprise priorities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "OV-PMA-005", + "title": "IT Program Auditor", + "text": "Conducts evaluations of an IT program or its individual components to determine compliance with published standards. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "PR-CDA-001", + "title": "Cyber Defense Analyst", + "text": "Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "PR-INF-001", + "title": "Cyber Defense Infrastructure Support Specialist", + "text": "Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "PR-CIR-001", + "title": "Cyber Defense Incident Responder ", + "text": "Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "PR-VAM-001", + "title": "Vulnerability Assessment Analyst", + "text": "Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-TWA-001", + "title": "Threat/Warning Analyst", + "text": "Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-EXP-001", + "title": "Exploitation Analyst", + "text": "Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-ASA-001", + "title": "All-Source Analyst", + "text": "Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-ASA-002", + "title": "Mission Assessment Specialist", + "text": "Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-TGT-001", + "title": "Target Developer", + "text": "Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-TGT-002", + "title": "Target Network Analyst", + "text": "Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "AN-LNG-001", + "title": "Multi-Disciplined Language Analyst", + "text": "Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-CLO-001", + "title": "All Source-Collection Manager", + "text": "Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-CLO-002", + "title": "All Source-Collection Requirements Manager", + "text": "Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-OPL-001", + "title": "Cyber Intel Planner", + "text": "Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-OPL-002", + "title": "Cyber Ops Planner", + "text": "Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-OPL-003", + "title": "Partner Integration Planner", + "text": "Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "CO-OPS-001", + "title": "Cyber Operator", + "text": "Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "IN-INV-001", + "title": "Cyber Crime Investigator", + "text": "Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "IN-FOR-001", + "title": "Law Enforcement /CounterIntelligence Forensics Analyst", + "text": "Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "work role", + "element_identifier": "IN-FOR-002", + "title": "Cyber Defense Forensics Analyst", + "text": "Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0001", + "title": "N/A", + "text": "Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0002", + "title": "N/A", + "text": "Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0003", + "title": "N/A", + "text": "Advise senior management (e.g., Chief Information Officer [CIO]) on risk levels and security posture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0004", + "title": "N/A", + "text": "Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0005", + "title": "N/A", + "text": "Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0006", + "title": "N/A", + "text": "Advocate organization's official position in legal and legislative proceedings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0007", + "title": "N/A", + "text": "Analyze and define data requirements and specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0008", + "title": "N/A", + "text": "Analyze and plan for anticipated changes in data capacity requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0009", + "title": "N/A", + "text": "Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0010", + "title": "N/A", + "text": "Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0011", + "title": "N/A", + "text": "Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0012", + "title": "N/A", + "text": "Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0013", + "title": "N/A", + "text": "Apply coding and testing standards, apply security testing tools including \"'fuzzing\" static-analysis code scanning tools, and conduct code reviews.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0014", + "title": "N/A", + "text": "Apply secure code documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0015", + "title": "N/A", + "text": "Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0016", + "title": "N/A", + "text": "Apply security policies to meet security objectives of the system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0017", + "title": "N/A", + "text": "Apply service-oriented security architecture principles to meet organization's confidentiality, integrity, and availability requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0018", + "title": "N/A", + "text": "Assess the effectiveness of cybersecurity measures utilized by system(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0019", + "title": "N/A", + "text": "Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0020", + "title": "N/A", + "text": "Develop content for cyber defense tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0021", + "title": "N/A", + "text": "Build, test, and modify product prototypes using working models or theoretical models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0022", + "title": "N/A", + "text": "Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0023", + "title": "N/A", + "text": "Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0024", + "title": "N/A", + "text": "Collect and maintain data needed to meet system cybersecurity reporting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0025", + "title": "N/A", + "text": "Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0026", + "title": "N/A", + "text": "Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0027", + "title": "N/A", + "text": "Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0028", + "title": "N/A", + "text": "Conduct and/or support authorized penetration testing on enterprise network assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0029", + "title": "N/A", + "text": "Conduct functional and connectivity testing to ensure continuing operability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0030", + "title": "N/A", + "text": "Conduct interactive training exercises to create an effective learning environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0031", + "title": "N/A", + "text": "Conduct interviews of victims and witnesses and conduct interviews or interrogations of suspects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0032", + "title": "N/A", + "text": "Conduct Privacy Impact Assessments (PIAs) of the application\u2019s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0033", + "title": "N/A", + "text": "Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0034", + "title": "N/A", + "text": "Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0035", + "title": "N/A", + "text": "Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0036", + "title": "N/A", + "text": "Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0037", + "title": "N/A", + "text": "Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0038", + "title": "N/A", + "text": "Develop threat model based on customer interviews and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0039", + "title": "N/A", + "text": "Consult with customers to evaluate functional requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0040", + "title": "N/A", + "text": "Consult with engineering staff to evaluate interface between hardware and software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0041", + "title": "N/A", + "text": "Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0042", + "title": "N/A", + "text": "Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0043", + "title": "N/A", + "text": "Coordinate with enterprise-wide cyber defense staff to validate network alerts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0044", + "title": "N/A", + "text": "Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0045", + "title": "N/A", + "text": "Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0046", + "title": "N/A", + "text": "Correct errors by making appropriate changes and rechecking the program to ensure that desired results are produced.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0047", + "title": "N/A", + "text": "Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0048", + "title": "N/A", + "text": "Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0049", + "title": "N/A", + "text": "Decrypt seized data using technical means.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0050", + "title": "N/A", + "text": "Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0051", + "title": "N/A", + "text": "Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0052", + "title": "N/A", + "text": "Define project scope and objectives based on customer requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0053", + "title": "N/A", + "text": "Design and develop cybersecurity or cybersecurity-enabled products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0054", + "title": "N/A", + "text": "Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0055", + "title": "N/A", + "text": "Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0056", + "title": "N/A", + "text": "Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0057", + "title": "N/A", + "text": "Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0058", + "title": "N/A", + "text": "Determine level of assurance of developed capabilities based on test results.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0059", + "title": "N/A", + "text": "Develop a plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the Internet.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0060", + "title": "N/A", + "text": "Develop an understanding of the needs and requirements of information end-users.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0061", + "title": "N/A", + "text": "Develop and direct system testing and validation procedures and documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0062", + "title": "N/A", + "text": "Develop and document requirements, capabilities, and constraints for design procedures and processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0063", + "title": "N/A", + "text": "Develop and document systems administration standard operating procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0064", + "title": "N/A", + "text": "Review and validate data mining and data warehousing programs, processes, and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0065", + "title": "N/A", + "text": "Develop and implement network backup and recovery procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0066", + "title": "N/A", + "text": "Develop and maintain strategic plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0067", + "title": "N/A", + "text": "Develop architectures or system components consistent with technical specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0068", + "title": "N/A", + "text": "Develop data standards, policies, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0069", + "title": "N/A", + "text": "Develop detailed security design documentation for component and interface specifications to support system design and development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0070", + "title": "N/A", + "text": "Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0071", + "title": "N/A", + "text": "Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0072", + "title": "N/A", + "text": "Develop methods to monitor and measure risk, compliance, and assurance efforts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0073", + "title": "N/A", + "text": "Develop new or identify existing awareness and training materials that are appropriate for intended audiences.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0074", + "title": "N/A", + "text": "Develop policy, programs, and guidelines for implementation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0075", + "title": "N/A", + "text": "Provide technical summary of findings in accordance with established reporting procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0076", + "title": "N/A", + "text": "Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0077", + "title": "N/A", + "text": "Develop secure code and error handling.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0078", + "title": "N/A", + "text": "Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0079", + "title": "N/A", + "text": "Develop specifications to ensure that risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0080", + "title": "N/A", + "text": "Develop test plans to address specifications and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0081", + "title": "N/A", + "text": "Diagnose network connectivity problem.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0082", + "title": "N/A", + "text": "Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0083", + "title": "N/A", + "text": "Draft statements of preliminary or residual security risks for system operation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0084", + "title": "N/A", + "text": "Employ secure configuration management processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0085", + "title": "N/A", + "text": "Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0086", + "title": "N/A", + "text": "Ensure that the application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0087", + "title": "N/A", + "text": "Ensure that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0088", + "title": "N/A", + "text": "Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0089", + "title": "N/A", + "text": "Ensure that security improvement actions are evaluated, validated, and implemented as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0090", + "title": "N/A", + "text": "Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0091", + "title": "N/A", + "text": "Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0092", + "title": "N/A", + "text": "Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0093", + "title": "N/A", + "text": "Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0094", + "title": "N/A", + "text": "Establish and maintain communication channels with stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0095", + "title": "N/A", + "text": "Establish overall enterprise information security architecture (EISA) with the organization\u2019s overall security strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0096", + "title": "N/A", + "text": "Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, public relations professionals).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0097", + "title": "N/A", + "text": "Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0098", + "title": "N/A", + "text": "Evaluate contracts to ensure compliance with funding, legal, and program requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0099", + "title": "N/A", + "text": "Evaluate cost/benefit, economic, and risk analysis in decision-making process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0100", + "title": "N/A", + "text": "Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0101", + "title": "N/A", + "text": "Evaluate the effectiveness and comprehensiveness of existing training programs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0102", + "title": "N/A", + "text": "Evaluate the effectiveness of laws, regulations, policies, standards, or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0103", + "title": "N/A", + "text": "Examine recovered data for information of relevance to the issue at hand.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0104", + "title": "N/A", + "text": "Fuse computer network attack analyses with criminal and counterintelligence investigations and operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0105", + "title": "N/A", + "text": "Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0106", + "title": "N/A", + "text": "Identify alternative information security strategies to address organizational security objective.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0107", + "title": "N/A", + "text": "Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0108", + "title": "N/A", + "text": "Identify and prioritize critical business functions in collaboration with organizational stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0109", + "title": "N/A", + "text": "Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0110", + "title": "N/A", + "text": "Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0111", + "title": "N/A", + "text": "Identify basic common coding flaws at a high level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0112", + "title": "N/A", + "text": "Identify data or intelligence of evidentiary value to support counterintelligence and criminal investigations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0113", + "title": "N/A", + "text": "Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0114", + "title": "N/A", + "text": "Identify elements of proof of the crime.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0115", + "title": "N/A", + "text": "Identify information technology (IT) security program implications of new technologies or technology upgrades.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0116", + "title": "N/A", + "text": "Identify organizational policy stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0117", + "title": "N/A", + "text": "Identify security implications and apply methodologies within centralized and decentralized environments across the enterprise\u2019s computer systems in software development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0118", + "title": "N/A", + "text": "Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0119", + "title": "N/A", + "text": "Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0120", + "title": "N/A", + "text": "Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0121", + "title": "N/A", + "text": "Implement new system design procedures, test procedures, and quality standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0122", + "title": "N/A", + "text": "Implement security designs for new or existing system(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0123", + "title": "N/A", + "text": "Implement specific cybersecurity countermeasures for systems and/or applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0124", + "title": "N/A", + "text": "Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0125", + "title": "N/A", + "text": "Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0126", + "title": "N/A", + "text": "Install or replace network hubs, routers, and switches.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0127", + "title": "N/A", + "text": "Integrate and align information security and/or cybersecurity policies to ensure that system analysis meets security requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0128", + "title": "N/A", + "text": "Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0129", + "title": "N/A", + "text": "Integrate new systems into existing network architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0130", + "title": "N/A", + "text": "Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0131", + "title": "N/A", + "text": "Interpret and apply laws, regulations, policies, standards, or procedures to specific issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0132", + "title": "N/A", + "text": "Interpret and/or approve security requirements relative to the capabilities of new information technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0133", + "title": "N/A", + "text": "Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise\u2019s cybersecurity program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0134", + "title": "N/A", + "text": "Lead and align information technology (IT) security priorities with the security strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0135", + "title": "N/A", + "text": "Lead and oversee information security budget, staffing, and contracting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0136", + "title": "N/A", + "text": "Maintain baseline system security according to organizational policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0137", + "title": "N/A", + "text": "Maintain database management systems software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0138", + "title": "N/A", + "text": "Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0139", + "title": "N/A", + "text": "Maintain directory replication services that enable information to replicate automatically from rear servers to forward units via optimized routing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0140", + "title": "N/A", + "text": "Maintain information exchanges through publish, subscribe, and alert functions that enable users to send and receive critical information as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0141", + "title": "N/A", + "text": "Maintain information systems assurance and accreditation materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0142", + "title": "N/A", + "text": "Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0143", + "title": "N/A", + "text": "Make recommendations based on test results.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0144", + "title": "N/A", + "text": "Manage accounts, network rights, and access to systems and equipment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0145", + "title": "N/A", + "text": "Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0146", + "title": "N/A", + "text": "Manage the compilation, cataloging, caching, distribution, and retrieval of data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0147", + "title": "N/A", + "text": "Manage the monitoring of information security data sources to maintain organizational situational awareness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0148", + "title": "N/A", + "text": "Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0149", + "title": "N/A", + "text": "Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0150", + "title": "N/A", + "text": "Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0151", + "title": "N/A", + "text": "Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0152", + "title": "N/A", + "text": "Monitor and maintain databases to ensure optimal performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0153", + "title": "N/A", + "text": "Monitor network capacity and performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0154", + "title": "N/A", + "text": "Monitor and report the usage of knowledge management assets and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0155", + "title": "N/A", + "text": "Document and escalate incidents (including event\u2019s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0156", + "title": "N/A", + "text": "Oversee and make recommendations regarding configuration management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0157", + "title": "N/A", + "text": "Oversee the information security training and awareness program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0158", + "title": "N/A", + "text": "Participate in an information security risk assessment during the Security Assessment and Authorization process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0159", + "title": "N/A", + "text": "Participate in the development or modification of the computer environment cybersecurity program plans and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0160", + "title": "N/A", + "text": "Patch network vulnerabilities to ensure that information is safeguarded against outside parties.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0161", + "title": "N/A", + "text": "Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0162", + "title": "N/A", + "text": "Perform backup and recovery of databases to ensure data integrity.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0163", + "title": "N/A", + "text": "Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0164", + "title": "N/A", + "text": "Perform cyber defense trend analysis and reporting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0165", + "title": "N/A", + "text": "Perform dynamic analysis to boot an \u201cimage\u201d of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0166", + "title": "N/A", + "text": "Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0167", + "title": "N/A", + "text": "Perform file signature analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0168", + "title": "N/A", + "text": "Perform hash comparison against established database.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0169", + "title": "N/A", + "text": "Perform cybersecurity testing of developed applications and/or systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0170", + "title": "N/A", + "text": "Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0171", + "title": "N/A", + "text": "Perform integrated quality assurance testing for security functionality and resiliency attack.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0172", + "title": "N/A", + "text": "Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0173", + "title": "N/A", + "text": "Perform timeline analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0174", + "title": "N/A", + "text": "Perform needs analysis to determine opportunities for new and improved business process solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0175", + "title": "N/A", + "text": "Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0176", + "title": "N/A", + "text": "Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0177", + "title": "N/A", + "text": "Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0178", + "title": "N/A", + "text": "Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0179", + "title": "N/A", + "text": "Perform static media analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0180", + "title": "N/A", + "text": "Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0181", + "title": "N/A", + "text": "Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0182", + "title": "N/A", + "text": "Perform tier 1, 2, and 3 malware analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0183", + "title": "N/A", + "text": "Perform validation steps, comparing actual results with expected results and analyze the differences to identify impact and risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0184", + "title": "N/A", + "text": "Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0185", + "title": "N/A", + "text": "Plan and manage the delivery of knowledge management projects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0186", + "title": "N/A", + "text": "Plan, execute, and verify data redundancy and system recovery procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0187", + "title": "N/A", + "text": "Plan and recommend modifications or adjustments based on exercise results or system environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0188", + "title": "N/A", + "text": "Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0189", + "title": "N/A", + "text": "Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0190", + "title": "N/A", + "text": "Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0191", + "title": "N/A", + "text": "Prepare use cases to justify the need for specific information technology (IT) solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0192", + "title": "N/A", + "text": "Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0193", + "title": "N/A", + "text": "Process crime scenes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0194", + "title": "N/A", + "text": "Properly document all systems security implementation, operations, and maintenance activities and update as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0195", + "title": "N/A", + "text": "Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0196", + "title": "N/A", + "text": "Provide advice on project costs, design concepts, or design changes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0197", + "title": "N/A", + "text": "Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0198", + "title": "N/A", + "text": "Provide daily summary reports of network events and activity relevant to cyber defense practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0199", + "title": "N/A", + "text": "Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0200", + "title": "N/A", + "text": "Provide feedback on network requirements, including network architecture and infrastructure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0201", + "title": "N/A", + "text": "Provide guidelines for implementing developed systems to customers or installation teams.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0202", + "title": "N/A", + "text": "Provide cybersecurity guidance to leadership.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0203", + "title": "N/A", + "text": "Provide input on security requirements to be included in statements of work and other appropriate procurement documents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0204", + "title": "N/A", + "text": "Provide input to implementation plans and standard operating procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0205", + "title": "N/A", + "text": "Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0206", + "title": "N/A", + "text": "Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0207", + "title": "N/A", + "text": "Provide ongoing optimization and problem-solving support.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0208", + "title": "N/A", + "text": "Provide recommendations for possible improvements and upgrades.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0209", + "title": "N/A", + "text": "Provide recommendations on data structures and databases that ensure correct and quality production of reports/management information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0210", + "title": "N/A", + "text": "Provide recommendations on new database technologies and architectures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0211", + "title": "N/A", + "text": "Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0212", + "title": "N/A", + "text": "Provide technical assistance on digital evidence matters to appropriate personnel.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0213", + "title": "N/A", + "text": "Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0214", + "title": "N/A", + "text": "Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0215", + "title": "N/A", + "text": "Recognize a possible security violation and take appropriate action to report the incident, as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0216", + "title": "N/A", + "text": "Recognize and accurately report forensic artifacts indicative of a particular operating system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0217", + "title": "N/A", + "text": "Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0218", + "title": "N/A", + "text": "Recommend new or revised security, resilience, and dependability measures based on the results of reviews.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0219", + "title": "N/A", + "text": "Recommend resource allocations required to securely operate and maintain an organization\u2019s cybersecurity requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0220", + "title": "N/A", + "text": "Resolve conflicts in laws, regulations, policies, standards, or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0221", + "title": "N/A", + "text": "Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0222", + "title": "N/A", + "text": "Review existing and proposed policies with stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0223", + "title": "N/A", + "text": "Review or conduct audits of information technology (IT) programs and projects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0224", + "title": "N/A", + "text": "Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0225", + "title": "N/A", + "text": "Secure the electronic device or information source.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0226", + "title": "N/A", + "text": "Serve on agency and interagency policy boards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0227", + "title": "N/A", + "text": "Recommend policy and coordinate review and approval.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0228", + "title": "N/A", + "text": "Store, retrieve, and manipulate data for analysis of system capabilities and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0229", + "title": "N/A", + "text": "Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0230", + "title": "N/A", + "text": "Support the design and execution of exercise scenarios.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0231", + "title": "N/A", + "text": "Provide support to security/certification test and evaluation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0232", + "title": "N/A", + "text": "Test and maintain network infrastructure including software and hardware devices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0233", + "title": "N/A", + "text": "Track and document cyber defense incidents from initial detection through final resolution.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0234", + "title": "N/A", + "text": "Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0235", + "title": "N/A", + "text": "Translate functional requirements into technical solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0236", + "title": "N/A", + "text": "Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0237", + "title": "N/A", + "text": "Troubleshoot system hardware and software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0238", + "title": "N/A", + "text": "Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0239", + "title": "N/A", + "text": "Use federal and organization-specific published documents to manage operations of their computing environment system(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0240", + "title": "N/A", + "text": "Capture and analyze network traffic associated with malicious activities using network monitoring tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0241", + "title": "N/A", + "text": "Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0242", + "title": "N/A", + "text": "Utilize models and simulations to analyze or predict system performance under different operating conditions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0243", + "title": "N/A", + "text": "Verify and update security documentation reflecting the application/system security design features.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0244", + "title": "N/A", + "text": "Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0245", + "title": "N/A", + "text": "Verify that the software application/network/system accreditation and assurance documentation is current.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0246", + "title": "N/A", + "text": "Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0247", + "title": "N/A", + "text": "Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0248", + "title": "N/A", + "text": "Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0249", + "title": "N/A", + "text": "Research current technology to understand capabilities of required system or network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0250", + "title": "N/A", + "text": "Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0251", + "title": "N/A", + "text": "Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0252", + "title": "N/A", + "text": "Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0253", + "title": "N/A", + "text": "Conduct cursory binary analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0254", + "title": "N/A", + "text": "Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0255", + "title": "N/A", + "text": "Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0256", + "title": "N/A", + "text": "Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0257", + "title": "N/A", + "text": "Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0258", + "title": "N/A", + "text": "Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0259", + "title": "N/A", + "text": "Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0260", + "title": "N/A", + "text": "Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0261", + "title": "N/A", + "text": "Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0262", + "title": "N/A", + "text": "Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0263", + "title": "N/A", + "text": "Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0264", + "title": "N/A", + "text": "Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0265", + "title": "N/A", + "text": "Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0266", + "title": "N/A", + "text": "Perform penetration testing as required for new or updated applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0267", + "title": "N/A", + "text": "Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0268", + "title": "N/A", + "text": "Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0269", + "title": "N/A", + "text": "Design and develop key management functions (as related to cybersecurity).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0270", + "title": "N/A", + "text": "Analyze user needs and requirements to plan and conduct system security development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0271", + "title": "N/A", + "text": "Develop cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0272", + "title": "N/A", + "text": "Ensure that security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0273", + "title": "N/A", + "text": "Develop and document supply chain risks for critical system elements, as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0274", + "title": "N/A", + "text": "Create auditable evidence of security measures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0275", + "title": "N/A", + "text": "Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0276", + "title": "N/A", + "text": "Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0277", + "title": "N/A", + "text": "Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0278", + "title": "N/A", + "text": "Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0279", + "title": "N/A", + "text": "Serve as technical expert and liaison to law enforcement personnel and explain incident details as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0280", + "title": "N/A", + "text": "Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0281", + "title": "N/A", + "text": "Forecast ongoing service demands and ensure that security assumptions are reviewed as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0282", + "title": "N/A", + "text": "Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0283", + "title": "N/A", + "text": "Collaborate with stakeholders to identify and/or develop appropriate solutions technology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0284", + "title": "N/A", + "text": "Design and develop new tools/technologies as related to cybersecurity.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0285", + "title": "N/A", + "text": "Perform virus scanning on digital media.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0286", + "title": "N/A", + "text": "Perform file system forensic analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0287", + "title": "N/A", + "text": "Perform static analysis to mount an \"image\" of a drive (without necessarily having the original drive).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0288", + "title": "N/A", + "text": "Perform static malware analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0289", + "title": "N/A", + "text": "Utilize deployable forensics toolkit to support operations as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0290", + "title": "N/A", + "text": "Determine tactics, techniques, and procedures (TTPs) for intrusion sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0291", + "title": "N/A", + "text": "Examine network topologies to understand data flows through the network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0292", + "title": "N/A", + "text": "Recommend computing environment vulnerability corrections.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0293", + "title": "N/A", + "text": "Identify and analyze anomalies in network traffic using metadata.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0294", + "title": "N/A", + "text": "Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0295", + "title": "N/A", + "text": "Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0296", + "title": "N/A", + "text": "Isolate and remove malware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0297", + "title": "N/A", + "text": "Identify applications and operating systems of a network device based on network traffic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0298", + "title": "N/A", + "text": "Reconstruct a malicious attack or activity based off network traffic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0299", + "title": "N/A", + "text": "Identify network mapping and operating system (OS) fingerprinting activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0300", + "title": "N/A", + "text": "Develop and document User Experience (UX) requirements including information architecture and user interface requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0301", + "title": "N/A", + "text": "Develop and implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0302", + "title": "N/A", + "text": "Develop contract language to ensure supply chain, system, network, and operational security are met.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0303", + "title": "N/A", + "text": "Identify and leverage the enterprise-wide version control system while designing and developing secure applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0304", + "title": "N/A", + "text": "Implement and integrate system development life cycle (SDLC) methodologies (e.g., IBM Rational Unified Process) into development environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0305", + "title": "N/A", + "text": "Performs configuration management, problem management, capacity management, and financial management for databases and data management systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0306", + "title": "N/A", + "text": "Supports incident management, service-level management, change management, release management, continuity management, and availability management for databases and data management systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0307", + "title": "N/A", + "text": "Analyze candidate architectures, allocate security services, and select security mechanisms. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0308", + "title": "N/A", + "text": "Analyze incident data for emerging trends. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0309", + "title": "N/A", + "text": "Assess the effectiveness of security controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0310", + "title": "N/A", + "text": "Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0311", + "title": "N/A", + "text": "Consult with customers about software system design and maintenance. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0312", + "title": "N/A", + "text": "Coordinate with intelligence analysts to correlate threat assessment data. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0313", + "title": "N/A", + "text": "Design and document quality standards. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0314", + "title": "N/A", + "text": "Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0315", + "title": "N/A", + "text": "Develop and deliver technical training to educate others or meet customer needs. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0316", + "title": "N/A", + "text": "Develop or assist in the development of computer based training modules or classes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0317", + "title": "N/A", + "text": "Develop or assist in the development of course assignments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0318", + "title": "N/A", + "text": "Develop or assist in the development of course evaluations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0319", + "title": "N/A", + "text": "Develop or assist in the development of grading and proficiency standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0320", + "title": "N/A", + "text": "Assist in the development of individual/collective development, training, and/or remediation plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0321", + "title": "N/A", + "text": "Develop or assist in the development of learning objectives and goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0322", + "title": "N/A", + "text": "Develop or assist in the development of on-the-job training materials or programs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0323", + "title": "N/A", + "text": "Develop or assist in the development of written tests for measuring and assessing learner proficiency.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0324", + "title": "N/A", + "text": "Direct software programming and development of documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0325", + "title": "N/A", + "text": "Document a system's purpose and preliminary system security concept of operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0326", + "title": "N/A", + "text": "Employ configuration management processes. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0327", + "title": "N/A", + "text": "Evaluate network infrastructure vulnerabilities to enhance capabilities being developed.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0328", + "title": "N/A", + "text": "Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0329", + "title": "N/A", + "text": "Follow software and systems engineering life cycle standards and processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0330", + "title": "N/A", + "text": "Maintain assured message delivery systems. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0331", + "title": "N/A", + "text": "Maintain incident tracking and solution database. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0332", + "title": "N/A", + "text": "Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0333", + "title": "N/A", + "text": "Perform cyber defense trend analysis and reporting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0334", + "title": "N/A", + "text": "Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0335", + "title": "N/A", + "text": "Build, install, configure, and test dedicated cyber defense hardware. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0336", + "title": "N/A", + "text": "WITHDRAWN: Integrated with T0228", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0337", + "title": "N/A", + "text": "Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0338", + "title": "N/A", + "text": "Write detailed functional specifications that document the architecture development process. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0339", + "title": "N/A", + "text": "Lead efforts to promote the organization's use of knowledge management and information sharing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0340", + "title": "N/A", + "text": "Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0341", + "title": "N/A", + "text": "Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0342", + "title": "N/A", + "text": "Analyze data sources to provide actionable recommendations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0343", + "title": "N/A", + "text": "Analyze the crisis to ensure public, personal, and resource protection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0344", + "title": "N/A", + "text": "Assess all the configuration management (change configuration/release management) processes. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0345", + "title": "N/A", + "text": "Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0346", + "title": "N/A", + "text": "Assess the behavior of the individual victim, witness, or suspect as it relates to the investigation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0347", + "title": "N/A", + "text": "Assess the validity of source data and subsequent findings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0348", + "title": "N/A", + "text": "Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0349", + "title": "N/A", + "text": "Collect metrics and trending data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0350", + "title": "N/A", + "text": "Conduct a market analysis to identify, assess, and recommend commercial, Government off-the-shelf, and open source products for use within a system and ensure recommended products are in compliance with organization's evaluation and validation requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0351", + "title": "N/A", + "text": "Conduct hypothesis testing using statistical processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0352", + "title": "N/A", + "text": "Conduct learning needs assessments and identify requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0353", + "title": "N/A", + "text": "Confer with systems analysts, engineers, programmers, and others to design application.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0354", + "title": "N/A", + "text": "Coordinate and manage the overall service provided to a customer end-to-end.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0355", + "title": "N/A", + "text": "Coordinate with internal and external subject matter experts to ensure existing qualification standards reflect organizational functional requirements and meet industry standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0356", + "title": "N/A", + "text": "Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0357", + "title": "N/A", + "text": "Create interactive learning exercises to create an effective learning environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0358", + "title": "N/A", + "text": "Design and develop system administration and management functionality for privileged access users.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0359", + "title": "N/A", + "text": "Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0360", + "title": "N/A", + "text": "Determine the extent of threats and recommend courses of action or countermeasures to mitigate risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0361", + "title": "N/A", + "text": "Develop and facilitate data-gathering methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0362", + "title": "N/A", + "text": "Develop and implement standardized position descriptions based on established cyber work roles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0363", + "title": "N/A", + "text": "Develop and review recruiting, hiring, and retention procedures in accordance with current HR policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0364", + "title": "N/A", + "text": "Develop cyber career field classification structure to include establishing career field entry requirements and other nomenclature such as codes and identifiers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0365", + "title": "N/A", + "text": "Develop or assist in the development of training policies and protocols for cyber training.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0366", + "title": "N/A", + "text": "Develop strategic insights from large data sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0367", + "title": "N/A", + "text": "Develop the goals and objectives for cyber curriculum.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0368", + "title": "N/A", + "text": "Ensure that cyber career fields are managed in accordance with organizational HR policies and directives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0369", + "title": "N/A", + "text": "Ensure that cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0370", + "title": "N/A", + "text": "Ensure that appropriate Service-Level Agreements (SLAs) and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0371", + "title": "N/A", + "text": "Establish acceptable limits for the software application, network, or system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0372", + "title": "N/A", + "text": "Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0373", + "title": "N/A", + "text": "Establish and oversee waiver processes for cyber career field entry and training qualification requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0374", + "title": "N/A", + "text": "Establish cyber career paths to allow career progression, deliberate development, and growth within and between cyber career fields.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0375", + "title": "N/A", + "text": "Establish manpower, personnel, and qualification data element standards to support cyber workforce management and reporting requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0376", + "title": "N/A", + "text": "Establish, resource, implement, and assess cyber workforce management programs in accordance with organizational requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0377", + "title": "N/A", + "text": "Gather feedback on customer satisfaction and internal service performance to foster continual improvement.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0378", + "title": "N/A", + "text": "Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0379", + "title": "N/A", + "text": "Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of Operating Level Agreements (OLAs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0380", + "title": "N/A", + "text": "Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment in conjunction with educators and trainers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0381", + "title": "N/A", + "text": "Present technical information to technical and nontechnical audiences.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0382", + "title": "N/A", + "text": "Present data in creative formats.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0383", + "title": "N/A", + "text": "Program custom algorithms.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0384", + "title": "N/A", + "text": "Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization's mission, vision, and goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0385", + "title": "N/A", + "text": "Provide actionable recommendations to critical stakeholders based on data analysis and findings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0386", + "title": "N/A", + "text": "Provide criminal investigative support to trial counsel during the judicial process. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0387", + "title": "N/A", + "text": "Review and apply cyber career field qualification standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0388", + "title": "N/A", + "text": "Review and apply organizational policies related to or influencing the cyber workforce.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0389", + "title": "N/A", + "text": "Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0390", + "title": "N/A", + "text": "Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0391", + "title": "N/A", + "text": "Support integration of qualified cyber workforce personnel into information systems life cycle development processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0392", + "title": "N/A", + "text": "Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0393", + "title": "N/A", + "text": "Validate specifications and requirements for testability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0394", + "title": "N/A", + "text": "Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0395", + "title": "N/A", + "text": "Write and publish after action reviews.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0396", + "title": "N/A", + "text": "Process image with appropriate tools depending on analyst\u2019s goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0397", + "title": "N/A", + "text": "Perform Windows registry analysis. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0398", + "title": "N/A", + "text": "Perform file and registry monitoring on the running system after identifying intrusion via dynamic analysis. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0399", + "title": "N/A", + "text": "Enter media information into tracking database (e.g., Product Tracker Tool) for digital media that has been acquired. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0400", + "title": "N/A", + "text": "Correlate incident data and perform cyber defense reporting. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0401", + "title": "N/A", + "text": "Maintain deployable cyber defense toolkit (e.g., specialized cyber defense software/hardware) to support Incident Response Team mission.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0402", + "title": "N/A", + "text": "Effectively allocate storage capacity in the design of data management systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0403", + "title": "N/A", + "text": "Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0404", + "title": "N/A", + "text": "Utilize different programming languages to write code, open files, read files, and write output to different files.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0405", + "title": "N/A", + "text": "Utilize open source language such as R and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0406", + "title": "N/A", + "text": "Ensure that design and development activities are properly documented (providing a functional description of implementation) and updated as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0407", + "title": "N/A", + "text": "Participate in the acquisition process as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0408", + "title": "N/A", + "text": "Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0409", + "title": "N/A", + "text": "Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0410", + "title": "N/A", + "text": "Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0411", + "title": "N/A", + "text": "Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0412", + "title": "N/A", + "text": "Conduct import/export reviews for acquiring systems and software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0413", + "title": "N/A", + "text": "Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0414", + "title": "N/A", + "text": "Develop supply chain, system, network, performance, and cybersecurity requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0415", + "title": "N/A", + "text": "Ensure that supply chain, system, network, performance, and cybersecurity requirements are included in contract language and delivered.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0416", + "title": "N/A", + "text": "Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0417", + "title": "N/A", + "text": "Identify and leverage the enterprise-wide security services while designing and developing secure applications (e.g., Enterprise PKI, Federated Identity server, Enterprise Antivirus solution) when appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0418", + "title": "N/A", + "text": "Install, update, and troubleshoot systems/servers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0419", + "title": "N/A", + "text": "Acquire and maintain a working knowledge of constitutional issues which arise in relevant laws, regulations, policies, agreements, standards, procedures, or other issuances.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0420", + "title": "N/A", + "text": "Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0421", + "title": "N/A", + "text": "Manage the indexing/cataloguing, storage, and access of explicit organizational knowledge (e.g., hard copy documents, digital files).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0422", + "title": "N/A", + "text": "Implement data management standards, requirements, and specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0423", + "title": "N/A", + "text": "Analyze computer-generated threats for counter intelligence or criminal activity. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0424", + "title": "N/A", + "text": "Analyze and provide information to stakeholders that will support the development of security application or modification of an existing security application.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0425", + "title": "N/A", + "text": "Analyze organizational cyber policy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0426", + "title": "N/A", + "text": "Analyze the results of software, hardware, or interoperability testing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0427", + "title": "N/A", + "text": "Analyze user needs and requirements to plan architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0428", + "title": "N/A", + "text": "Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0429", + "title": "N/A", + "text": "Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0430", + "title": "N/A", + "text": "Gather and preserve evidence used on the prosecution of computer crimes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0431", + "title": "N/A", + "text": "Check system hardware availability, functionality, integrity, and efficiency.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0432", + "title": "N/A", + "text": "Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0433", + "title": "N/A", + "text": "Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion or other crimes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0434", + "title": "N/A", + "text": "Conduct framing of pleadings to properly identify alleged violations of law, regulations, or policy/guidance. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0435", + "title": "N/A", + "text": "Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0436", + "title": "N/A", + "text": "Conduct trial runs of programs and software applications to ensure that the desired information is produced and instructions and security levels are correct. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0437", + "title": "N/A", + "text": "Correlate training and learning to business or mission requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0438", + "title": "N/A", + "text": "Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0439", + "title": "N/A", + "text": "Detect and analyze encrypted data, stenography, alternate data streams and other forms of concealed data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0440", + "title": "N/A", + "text": "Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0441", + "title": "N/A", + "text": "Define and integrate current and future mission environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0442", + "title": "N/A", + "text": "Create training courses tailored to the audience and physical environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0443", + "title": "N/A", + "text": "Deliver training courses tailored to the audience and physical/virtual environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0444", + "title": "N/A", + "text": "Apply concepts, procedures, software, equipment, and/or technology applications to students.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0445", + "title": "N/A", + "text": "Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization\u2019s strategic plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0446", + "title": "N/A", + "text": "Design, develop, integrate, and update system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0447", + "title": "N/A", + "text": "Design hardware, operating systems, and software applications to adequately address requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0448", + "title": "N/A", + "text": "Develop enterprise architecture or system components required to meet user needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0449", + "title": "N/A", + "text": "Design to security requirements to ensure requirements are met for all systems and/or applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0450", + "title": "N/A", + "text": "Design training curriculum and course content based on requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0451", + "title": "N/A", + "text": "Participate in development of training curriculum and course content.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0452", + "title": "N/A", + "text": "Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization\u2019s intellectual capital.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0453", + "title": "N/A", + "text": "Determine and develop leads and identify sources of information to identify and/or prosecute the responsible parties to an intrusion or other crimes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0454", + "title": "N/A", + "text": "Define baseline security requirements in accordance with applicable guidelines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0455", + "title": "N/A", + "text": "Develop software system testing and validation procedures, programming, and documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0456", + "title": "N/A", + "text": "Develop secure software testing and validation procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0457", + "title": "N/A", + "text": "Develop system testing and validation procedures, programming, and documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0458", + "title": "N/A", + "text": "Comply with organization systems administration standard operating procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0459", + "title": "N/A", + "text": "Implement data mining and data warehousing applications. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0460", + "title": "N/A", + "text": "Develop and implement data mining and data warehousing programs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0461", + "title": "N/A", + "text": "Implement and enforce local network usage policies and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0462", + "title": "N/A", + "text": "Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0463", + "title": "N/A", + "text": "Develop cost estimates for new or modified system(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0464", + "title": "N/A", + "text": "Develop detailed design documentation for component and interface specifications to support system design and development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0465", + "title": "N/A", + "text": "Develop guidelines for implementation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0466", + "title": "N/A", + "text": "Develop mitigation strategies to address cost, schedule, performance, and security risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0467", + "title": "N/A", + "text": "Ensure that training meets the goals and objectives for cybersecurity training, education, or awareness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0468", + "title": "N/A", + "text": "Diagnose and resolve customer reported system incidents, problems, and events.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0469", + "title": "N/A", + "text": "Analyze and report organizational security posture trends.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0470", + "title": "N/A", + "text": "Analyze and report system security posture trends.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0471", + "title": "N/A", + "text": "Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0472", + "title": "N/A", + "text": "Draft, staff, and publish cyber policy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0473", + "title": "N/A", + "text": "Document and update as necessary all definition and architecture activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0474", + "title": "N/A", + "text": "Provide legal analysis and decisions to inspectors general, privacy officers, oversight and compliance personnel regarding compliance with cybersecurity policies and relevant legal and regulatory requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0475", + "title": "N/A", + "text": "Assess adequate access controls based on principles of least privilege and need-to-know.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0476", + "title": "N/A", + "text": "Evaluate the impact of changes to laws, regulations, policies, standards, or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0477", + "title": "N/A", + "text": "Ensure the execution of disaster recovery and continuity of operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0478", + "title": "N/A", + "text": "Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0479", + "title": "N/A", + "text": "Employ information technology (IT) systems and digital storage media to solve, investigate, and/or prosecute cybercrimes and fraud committed against people and property. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0480", + "title": "N/A", + "text": "Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0481", + "title": "N/A", + "text": "Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0482", + "title": "N/A", + "text": "Make recommendations based on trend analysis for enhancements to software and hardware solutions to enhance customer experience.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0483", + "title": "N/A", + "text": "Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0484", + "title": "N/A", + "text": "Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0485", + "title": "N/A", + "text": "Implement security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to system or system components as needed.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0486", + "title": "N/A", + "text": "Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0487", + "title": "N/A", + "text": "Facilitate implementation of new or revised laws, regulations, executive orders, policies, standards, or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0488", + "title": "N/A", + "text": "Implement designs for new or existing system(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0489", + "title": "N/A", + "text": "Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0490", + "title": "N/A", + "text": "Install and configure database management systems and software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0491", + "title": "N/A", + "text": "Install and configure hardware, software, and peripheral equipment for system users in accordance with organizational standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0492", + "title": "N/A", + "text": "Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0493", + "title": "N/A", + "text": "Lead and oversee budget, staffing, and contracting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0494", + "title": "N/A", + "text": "Administer accounts, network rights, and access to systems and equipment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0495", + "title": "N/A", + "text": "Manage Accreditation Packages (e.g., ISO/IEC 15026-2).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0496", + "title": "N/A", + "text": "Perform asset management/inventory of information technology (IT) resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0497", + "title": "N/A", + "text": "Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0498", + "title": "N/A", + "text": "Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0499", + "title": "N/A", + "text": "Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0500", + "title": "N/A", + "text": "Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0501", + "title": "N/A", + "text": "Monitor and maintain system/server configuration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0502", + "title": "N/A", + "text": "Monitor and report client-level computer system performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0503", + "title": "N/A", + "text": "Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0504", + "title": "N/A", + "text": "Assess and monitor cybersecurity related to system implementation and testing practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0505", + "title": "N/A", + "text": "Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0506", + "title": "N/A", + "text": "Seek consensus on proposed policy changes from stakeholders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0507", + "title": "N/A", + "text": "Oversee installation, implementation, configuration, and support of system components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0508", + "title": "N/A", + "text": "Verify minimum security requirements are in place for all applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0509", + "title": "N/A", + "text": "Perform an information security risk assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0510", + "title": "N/A", + "text": "Coordinate incident response functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0511", + "title": "N/A", + "text": "Perform developmental testing on systems under development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0512", + "title": "N/A", + "text": "Perform interoperability testing on systems exchanging electronic information with other systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0513", + "title": "N/A", + "text": "Perform operational testing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0514", + "title": "N/A", + "text": "Diagnose faulty system/server hardware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0515", + "title": "N/A", + "text": "Perform repairs on faulty system/server hardware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0516", + "title": "N/A", + "text": "Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0517", + "title": "N/A", + "text": "Integrate results regarding the identification of gaps in security architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0518", + "title": "N/A", + "text": "Perform security reviews and identify security gaps in architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0519", + "title": "N/A", + "text": "Plan and coordinate the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, multimedia presentations) for the most effective learning environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0520", + "title": "N/A", + "text": "Plan non-classroom educational techniques and formats (e.g., video courses, mentoring, web-based courses).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0521", + "title": "N/A", + "text": "Plan implementation strategy to ensure that enterprise components can be integrated and aligned.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0522", + "title": "N/A", + "text": "Prepare legal and other relevant documents (e.g., depositions, briefs, affidavits, declarations, appeals, pleadings, discovery).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0523", + "title": "N/A", + "text": "Prepare reports to document the investigation following legal standards and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0524", + "title": "N/A", + "text": "Promote knowledge sharing between information owners/users through an organization\u2019s operational processes and systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0525", + "title": "N/A", + "text": "Provide enterprise cybersecurity and supply chain risk management guidance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0526", + "title": "N/A", + "text": "Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0527", + "title": "N/A", + "text": "Provide input to implementation plans and standard operating procedures as they relate to information systems security. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0528", + "title": "N/A", + "text": "Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0529", + "title": "N/A", + "text": "Provide policy guidance to cyber management, staff, and users.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0530", + "title": "N/A", + "text": "Develop a trend analysis and impact report.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0531", + "title": "N/A", + "text": "Troubleshoot hardware/software interface and interoperability problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0532", + "title": "N/A", + "text": "Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0533", + "title": "N/A", + "text": "Review, conduct, or participate in audits of cyber programs and projects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0534", + "title": "N/A", + "text": "Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0535", + "title": "N/A", + "text": "Recommend revisions to curriculum and course content based on feedback from previous training sessions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0536", + "title": "N/A", + "text": "Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0537", + "title": "N/A", + "text": "Support the CIO in the formulation of cyber-related policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0538", + "title": "N/A", + "text": "Provide support to test and evaluation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0539", + "title": "N/A", + "text": "Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0540", + "title": "N/A", + "text": "Record and manage test data. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0541", + "title": "N/A", + "text": "Trace system requirements to design components and perform gap analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0542", + "title": "N/A", + "text": "Translate proposed capabilities into technical requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0543", + "title": "N/A", + "text": "WITHDRAWN: Use data carving techniques (e.g., FTK-Foremost) to extract data for further analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0544", + "title": "N/A", + "text": "Verify stability, interoperability, portability, and/or scalability of system architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0545", + "title": "N/A", + "text": "Work with stakeholders to resolve computer security incidents and vulnerability compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0546", + "title": "N/A", + "text": "Write and publish cyber defense recommendations, reports, and white papers on incident findings to appropriate constituencies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0547", + "title": "N/A", + "text": "Research and evaluate available technologies and standards to meet customer requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0548", + "title": "N/A", + "text": "Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0549", + "title": "N/A", + "text": "Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0550", + "title": "N/A", + "text": "Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0551", + "title": "N/A", + "text": "Draft and publish supply chain security and risk management documents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0552", + "title": "N/A", + "text": "Review and approve a supply chain security/risk management policy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0553", + "title": "N/A", + "text": "Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0554", + "title": "N/A", + "text": "Determine and document software patches or the extent of releases that would leave software vulnerable.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0555", + "title": "N/A", + "text": "Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0556", + "title": "N/A", + "text": "Assess and design security management functions as related to cyberspace.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0557", + "title": "N/A", + "text": "Integrate key management functions as related to cyberspace.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0558", + "title": "N/A", + "text": "Analyze user needs and requirements to plan and conduct system development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0559", + "title": "N/A", + "text": "Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0560", + "title": "N/A", + "text": "Collaborate on cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0561", + "title": "N/A", + "text": "Accurately characterize targets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0562", + "title": "N/A", + "text": "Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0563", + "title": "N/A", + "text": "Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0564", + "title": "N/A", + "text": "Analyze feedback to determine extent to which collection products and services are meeting requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0565", + "title": "N/A", + "text": "Analyze incoming collection requests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0566", + "title": "N/A", + "text": "Analyze internal operational architecture, tools, and procedures for ways to improve performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0567", + "title": "N/A", + "text": "Analyze target operational architecture for ways to gain access.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0568", + "title": "N/A", + "text": "Analyze plans, directives, guidance and policy for factors that would influence collection management's operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0569", + "title": "N/A", + "text": "Answer requests for information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0570", + "title": "N/A", + "text": "Apply and utilize authorized cyber capabilities to enable access to targeted networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0571", + "title": "N/A", + "text": "Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0572", + "title": "N/A", + "text": "Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0573", + "title": "N/A", + "text": "Assess and apply operational environment factors and risks to collection management process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0574", + "title": "N/A", + "text": "Apply and obey applicable statutes, laws, regulations and policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0575", + "title": "N/A", + "text": "Coordinate for intelligence support to operational planning activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0576", + "title": "N/A", + "text": "Assess all-source intelligence and recommend targets to support cyber operation objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0577", + "title": "N/A", + "text": "Assess efficiency of existing information exchange and management systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0578", + "title": "N/A", + "text": "Assess performance of collection assets against prescribed specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0579", + "title": "N/A", + "text": "Assess target vulnerabilities and/or operational capabilities to determine course of action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0580", + "title": "N/A", + "text": "Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and adjust collection strategies and collection requirements accordingly.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0581", + "title": "N/A", + "text": "Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0582", + "title": "N/A", + "text": "Provide expertise to course of action development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0583", + "title": "N/A", + "text": "Provide subject matter expertise to the development of a common operational picture. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0584", + "title": "N/A", + "text": "Maintain a common intelligence picture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0585", + "title": "N/A", + "text": "Provide subject matter expertise to the development of cyber operations specific indicators.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0586", + "title": "N/A", + "text": "Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0587", + "title": "N/A", + "text": "Assist in the development and refinement of priority information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0588", + "title": "N/A", + "text": "Provide expertise to the development of measures of effectiveness and measures of performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0589", + "title": "N/A", + "text": "Assist in the identification of intelligence collection shortfalls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0590", + "title": "N/A", + "text": "Enable synchronization of intelligence support plans across partner organizations as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0591", + "title": "N/A", + "text": "Perform analysis for target infrastructure exploitation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0592", + "title": "N/A", + "text": "Provide input to the identification of cyber-related success criteria.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0593", + "title": "N/A", + "text": "Brief threat and/or target current situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0594", + "title": "N/A", + "text": "Build and maintain electronic target folders.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0595", + "title": "N/A", + "text": "Classify documents in accordance with classification guidelines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0596", + "title": "N/A", + "text": "Close requests for information once satisfied.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0597", + "title": "N/A", + "text": "Collaborate with intelligence analysts/targeting organizations involved in related areas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0598", + "title": "N/A", + "text": "Collaborate with development organizations to create and deploy the tools needed to achieve objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0599", + "title": "N/A", + "text": "Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0600", + "title": "N/A", + "text": "Collaborate with other internal and external partner organizations on target access and operational issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0601", + "title": "N/A", + "text": "Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0602", + "title": "N/A", + "text": "Collaborate with customer to define information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0603", + "title": "N/A", + "text": "Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0604", + "title": "N/A", + "text": "Compare allocated and available assets to collection demand as expressed through requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0605", + "title": "N/A", + "text": "Compile lessons learned from collection management activity's execution of organization collection objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0606", + "title": "N/A", + "text": "Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0607", + "title": "N/A", + "text": "Identify and conduct analysis of target communications to identify information essential to support operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0608", + "title": "N/A", + "text": "Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0609", + "title": "N/A", + "text": "Conduct access enabling of wireless computer and digital networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0610", + "title": "N/A", + "text": "Conduct collection and processing of wireless computer and digital networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0611", + "title": "N/A", + "text": "Conduct end-of-operations assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0612", + "title": "N/A", + "text": "Conduct exploitation of wireless computer and digital networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0613", + "title": "N/A", + "text": "Conduct formal and informal coordination of collection requirements in accordance with established guidelines and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0614", + "title": "N/A", + "text": "Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0615", + "title": "N/A", + "text": "Conduct in-depth research and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0616", + "title": "N/A", + "text": "Conduct network scouting and vulnerability analyses of systems within a network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0617", + "title": "N/A", + "text": "Conduct nodal analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0618", + "title": "N/A", + "text": "Conduct on-net activities to control and exfiltrate data from deployed technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0619", + "title": "N/A", + "text": "Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0620", + "title": "N/A", + "text": "Conduct open source data collection via various online tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0621", + "title": "N/A", + "text": "Conduct quality control to determine validity and relevance of information gathered about networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0622", + "title": "N/A", + "text": "Develop, review and implement all levels of planning guidance in support of cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0623", + "title": "N/A", + "text": "Conduct survey of computer and digital networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0624", + "title": "N/A", + "text": "Conduct target research and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0625", + "title": "N/A", + "text": "Consider efficiency and effectiveness of collection assets and resources if/when applied against priority information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0626", + "title": "N/A", + "text": "Construct collection plans and matrixes using established guidance and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0627", + "title": "N/A", + "text": "Contribute to crisis action planning for cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0628", + "title": "N/A", + "text": "Contribute to the development of the organization's decision support tools if necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0629", + "title": "N/A", + "text": "Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0630", + "title": "N/A", + "text": "Incorporate intelligence equities into the overall design of cyber operations plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0631", + "title": "N/A", + "text": "Coordinate resource allocation of collection assets against prioritized collection requirements with collection discipline leads.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0632", + "title": "N/A", + "text": "Coordinate inclusion of collection plan in appropriate documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0633", + "title": "N/A", + "text": "Coordinate target vetting with appropriate partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0634", + "title": "N/A", + "text": "Re-task or re-direct collection assets and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0635", + "title": "N/A", + "text": "Coordinate with intelligence and cyber defense partners to obtain relevant essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0636", + "title": "N/A", + "text": "Coordinate with intelligence planners to ensure that collection managers receive information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0637", + "title": "N/A", + "text": "Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0638", + "title": "N/A", + "text": "Coordinate, produce, and track intelligence requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0639", + "title": "N/A", + "text": "Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0640", + "title": "N/A", + "text": "Use intelligence estimates to counter potential target actions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0641", + "title": "N/A", + "text": "Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0642", + "title": "N/A", + "text": "Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0643", + "title": "N/A", + "text": "Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0644", + "title": "N/A", + "text": "Detect exploits against targeted networks and hosts and react accordingly.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0645", + "title": "N/A", + "text": "Determine course of action for addressing changes to objectives, guidance, and operational environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0646", + "title": "N/A", + "text": "Determine existing collection management webpage databases, libraries and storehouses.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0647", + "title": "N/A", + "text": "Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture's form and function.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0648", + "title": "N/A", + "text": "Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0649", + "title": "N/A", + "text": "Determine organizations and/or echelons with collection authority over all accessible collection assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0650", + "title": "N/A", + "text": "Determine what technologies are used by a given target.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0651", + "title": "N/A", + "text": "Develop a method for comparing collection reports to outstanding requirements to identify information gaps.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0652", + "title": "N/A", + "text": "Develop all-source intelligence targeting materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0653", + "title": "N/A", + "text": "Apply analytic techniques to gain more target information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0654", + "title": "N/A", + "text": "Develop and maintain deliberate and/or crisis plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0655", + "title": "N/A", + "text": "Develop and review specific cyber operations guidance for integration into broader planning activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0656", + "title": "N/A", + "text": "Develop and review intelligence guidance for integration into supporting cyber operations planning and execution.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0657", + "title": "N/A", + "text": "Develop coordinating instructions by collection discipline for each phase of an operation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0658", + "title": "N/A", + "text": "Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0659", + "title": "N/A", + "text": "Develop detailed intelligence support to cyber operations requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0660", + "title": "N/A", + "text": "Develop information requirements necessary for answering priority information requests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0661", + "title": "N/A", + "text": "Develop measures of effectiveness and measures of performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0662", + "title": "N/A", + "text": "Allocate collection assets based on leadership's guidance, priorities, and/or operational emphasis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0663", + "title": "N/A", + "text": "Develop munitions effectiveness assessment or operational assessment materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0664", + "title": "N/A", + "text": "Develop new techniques for gaining and keeping access to target systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0665", + "title": "N/A", + "text": "Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0666", + "title": "N/A", + "text": "Develop or shape international cyber engagement strategies, policies, and activities to meet organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0667", + "title": "N/A", + "text": "Develop potential courses of action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0668", + "title": "N/A", + "text": "Develop procedures for providing feedback to collection managers, asset managers, and processing, exploitation and dissemination centers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0669", + "title": "N/A", + "text": "Develop strategy and processes for partner planning, operations, and capability development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0670", + "title": "N/A", + "text": "Develop, implement, and recommend changes to appropriate planning procedures and policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0671", + "title": "N/A", + "text": "Develop, maintain, and assess cyber cooperation security agreements with external partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0672", + "title": "N/A", + "text": "Devise, document, and validate cyber operation strategy and planning documents.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0673", + "title": "N/A", + "text": "Disseminate reports to inform decision makers on collection issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0674", + "title": "N/A", + "text": "Disseminate tasking messages and collection plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0675", + "title": "N/A", + "text": "Conduct and document an assessment of the collection results using established procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0676", + "title": "N/A", + "text": "Draft cyber intelligence collection and production requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0677", + "title": "N/A", + "text": "Edit or execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0678", + "title": "N/A", + "text": "Engage customers to understand customers\u2019 intelligence needs and wants.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0679", + "title": "N/A", + "text": "Ensure operational planning efforts are effectively transitioned to current operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0680", + "title": "N/A", + "text": "Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0681", + "title": "N/A", + "text": "Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0682", + "title": "N/A", + "text": "Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0683", + "title": "N/A", + "text": "Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0684", + "title": "N/A", + "text": "Estimate operational effects generated through cyber activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0685", + "title": "N/A", + "text": "Evaluate threat decision-making processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0686", + "title": "N/A", + "text": "Identify threat vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0687", + "title": "N/A", + "text": "Identify threats to Blue Force vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0688", + "title": "N/A", + "text": "Evaluate available capabilities against desired effects to recommend efficient solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0689", + "title": "N/A", + "text": "Evaluate extent to which collected information and/or produced intelligence satisfy information requests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0690", + "title": "N/A", + "text": "Evaluate intelligence estimates to support the planning cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0691", + "title": "N/A", + "text": "Evaluate the conditions that affect employment of available cyber intelligence capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0692", + "title": "N/A", + "text": "Generate and evaluate the effectiveness of network analysis strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0693", + "title": "N/A", + "text": "Evaluate extent to which collection operations are synchronized with operational requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0694", + "title": "N/A", + "text": "Evaluate the effectiveness of collection operations against the collection plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0695", + "title": "N/A", + "text": "Examine intercept-related metadata and content with an understanding of targeting significance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0696", + "title": "N/A", + "text": "Exploit network devices, security devices, and/or terminals or environments using various methods or tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0697", + "title": "N/A", + "text": "Facilitate access enabling by physical and/or wireless means.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0698", + "title": "N/A", + "text": "Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0699", + "title": "N/A", + "text": "Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0700", + "title": "N/A", + "text": "Facilitate the sharing of \u201cbest practices\u201d and \u201clessons learned\u201d throughout the cyber operations community.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0701", + "title": "N/A", + "text": "Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0702", + "title": "N/A", + "text": "Formulate collection strategies based on knowledge of available intelligence discipline capabilities and gathering methods that align multi-discipline collection capabilities and accesses with targets and their observables.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0703", + "title": "N/A", + "text": "Gather and analyze data (e.g., measures of effectiveness) to determine effectiveness, and provide reporting for follow-on activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0704", + "title": "N/A", + "text": "Incorporate cyber operations and communications security support plans into organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0705", + "title": "N/A", + "text": "Incorporate intelligence and counterintelligence to support plan development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0706", + "title": "N/A", + "text": "Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0707", + "title": "N/A", + "text": "Generate requests for information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0708", + "title": "N/A", + "text": "Identify threat tactics, and methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0709", + "title": "N/A", + "text": "Identify all available partner intelligence capabilities and limitations supporting cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0710", + "title": "N/A", + "text": "Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0711", + "title": "N/A", + "text": "Identify, draft, evaluate, and prioritize relevant intelligence or information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0712", + "title": "N/A", + "text": "Identify and manage security cooperation priorities with external partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0713", + "title": "N/A", + "text": "Identify and submit intelligence requirements for the purposes of designating priority information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0714", + "title": "N/A", + "text": "Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0715", + "title": "N/A", + "text": "Identify collection gaps and potential collection strategies against targets. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0716", + "title": "N/A", + "text": "Identify coordination requirements and procedures with designated collection authorities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0717", + "title": "N/A", + "text": "Identify critical target elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0718", + "title": "N/A", + "text": "Identify intelligence gaps and shortfalls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0719", + "title": "N/A", + "text": "Identify cyber intelligence gaps and shortfalls for cyber operational planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0720", + "title": "N/A", + "text": "Identify gaps in our understanding of target technology and developing innovative collection approaches.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0721", + "title": "N/A", + "text": "Identify issues or problems that can disrupt and/or degrade processing, exploitation and dissemination architecture effectiveness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0722", + "title": "N/A", + "text": "Identify network components and their functionality to enable analysis and target development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0723", + "title": "N/A", + "text": "Identify potential collection disciplines for application against priority information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0724", + "title": "N/A", + "text": "Identify potential points of strength and vulnerability within a network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0725", + "title": "N/A", + "text": "Identify and mitigate risks to collection management ability to support the plan, operations and target cycle.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0726", + "title": "N/A", + "text": "Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0727", + "title": "N/A", + "text": "Identify, locate, and track targets via geospatial analysis techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0728", + "title": "N/A", + "text": "Provide input to or develop courses of action based on threat factors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0729", + "title": "N/A", + "text": "Inform external partners of the potential effects of new or revised policy and guidance on cyber operations partnering activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0730", + "title": "N/A", + "text": "Inform stakeholders (e.g., collection managers, asset managers, processing, exploitation and dissemination centers) of evaluation results using established procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0731", + "title": "N/A", + "text": "Initiate requests to guide tasking and assist with collection management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0732", + "title": "N/A", + "text": "Integrate cyber planning/targeting efforts with other organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0733", + "title": "N/A", + "text": "Interpret environment preparations assessments to determine a course of action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0734", + "title": "N/A", + "text": "Issue requests for information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0735", + "title": "N/A", + "text": "Lead and coordinate intelligence support to operational planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0736", + "title": "N/A", + "text": "Lead or enable exploitation operations in support of organization objectives and target requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0737", + "title": "N/A", + "text": "Link priority collection requirements to optimal assets and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0738", + "title": "N/A", + "text": "Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0739", + "title": "N/A", + "text": "Maintain relationships with internal and external partners involved in cyber planning or related areas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0740", + "title": "N/A", + "text": "Maintain situational awareness and functionality of organic operational infrastructure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0741", + "title": "N/A", + "text": "Maintain situational awareness of cyber-related intelligence requirements and associated tasking.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0742", + "title": "N/A", + "text": "Maintain situational awareness of partner capabilities and activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0743", + "title": "N/A", + "text": "Maintain situational awareness to determine if changes to the operating environment require review of the plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0744", + "title": "N/A", + "text": "Maintain target lists (i.e., RTL, JTL, CTL, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0745", + "title": "N/A", + "text": "Make recommendations to guide collection in support of customer requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0746", + "title": "N/A", + "text": "Modify collection requirements as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0747", + "title": "N/A", + "text": "Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0748", + "title": "N/A", + "text": "Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0749", + "title": "N/A", + "text": "Monitor and report on validated threat activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0750", + "title": "N/A", + "text": "Monitor completion of reallocated collection efforts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0751", + "title": "N/A", + "text": "Monitor open source websites for hostile content directed towards organizational or partner interests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0752", + "title": "N/A", + "text": "Monitor operational environment and report on adversarial activities which fulfill leadership\u2019s priority information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0753", + "title": "N/A", + "text": "Monitor operational status and effectiveness of the processing, exploitation and dissemination architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0754", + "title": "N/A", + "text": "Monitor target networks to provide indications and warning of target communications changes or processing failures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0755", + "title": "N/A", + "text": "Monitor the operational environment for potential factors and risks to the collection operation management process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0756", + "title": "N/A", + "text": "Operate and maintain automated systems for gaining and maintaining access to target systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0757", + "title": "N/A", + "text": "Optimize mix of collection assets and resources to increase effectiveness and efficiency against essential information associated with priority intelligence requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0758", + "title": "N/A", + "text": "Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0759", + "title": "N/A", + "text": "Contribute to the review and refinement of policy, to include assessments of the consequences of endorsing or not endorsing such policy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0760", + "title": "N/A", + "text": "Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0761", + "title": "N/A", + "text": "Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0762", + "title": "N/A", + "text": "WITHDRAWN: Provide subject matter expertise in course of action development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0763", + "title": "N/A", + "text": "Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0764", + "title": "N/A", + "text": "Provide subject matter expertise to planning efforts with internal and external cyber operations partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0765", + "title": "N/A", + "text": "Provide subject matter expertise to development of exercises.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0766", + "title": "N/A", + "text": "Propose policy which governs interactions with external coordination groups.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0767", + "title": "N/A", + "text": "Perform content and/or metadata analysis to meet organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0768", + "title": "N/A", + "text": "Conduct cyber activities to degrade/remove information resident in computers and computer networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0769", + "title": "N/A", + "text": "Perform targeting automation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0770", + "title": "N/A", + "text": "Characterize websites.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0771", + "title": "N/A", + "text": "Provide subject matter expertise to website characterizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0772", + "title": "N/A", + "text": "Prepare for and provide subject matter expertise to exercises.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0773", + "title": "N/A", + "text": "Prioritize collection requirements for collection platforms based on platform capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0774", + "title": "N/A", + "text": "Process exfiltrated data for analysis and/or dissemination to customers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0775", + "title": "N/A", + "text": "Produce network reconstructions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0776", + "title": "N/A", + "text": "Produce target system analysis products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0777", + "title": "N/A", + "text": "Profile network or system administrators and their activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0778", + "title": "N/A", + "text": "Profile targets and their activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0779", + "title": "N/A", + "text": "Provide advice/assistance to operations and intelligence decision makers with reassignment of collection assets and resources in response to dynamic operational situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0780", + "title": "N/A", + "text": "Provide advisory and advocacy support to promote collection planning as an integrated component of the strategic campaign plans and other adaptive plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0781", + "title": "N/A", + "text": "Provide aim point and reengagement recommendations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0782", + "title": "N/A", + "text": "Provide analyses and support for effectiveness assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0783", + "title": "N/A", + "text": "Provide current intelligence support to critical internal/external stakeholders as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0784", + "title": "N/A", + "text": "Provide cyber focused guidance and advice on intelligence support plan inputs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0785", + "title": "N/A", + "text": "Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0786", + "title": "N/A", + "text": "Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0787", + "title": "N/A", + "text": "Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0788", + "title": "N/A", + "text": "Provide input and assist in post-action effectiveness assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0789", + "title": "N/A", + "text": "Provide input and assist in the development of plans and guidance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0790", + "title": "N/A", + "text": "Provide input for targeting effectiveness assessments for leadership acceptance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0791", + "title": "N/A", + "text": "Provide input to the administrative and logistical elements of an operational support plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0792", + "title": "N/A", + "text": "Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0793", + "title": "N/A", + "text": "Provide effectiveness support to designated exercises, and/or time sensitive operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0794", + "title": "N/A", + "text": "Provide operations and reengagement recommendations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0795", + "title": "N/A", + "text": "Provide planning support between internal and external partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0796", + "title": "N/A", + "text": "Provide real-time actionable geolocation information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0797", + "title": "N/A", + "text": "Provide target recommendations which meet leadership objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0798", + "title": "N/A", + "text": "Provide targeting products and targeting support as designated.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0799", + "title": "N/A", + "text": "Provide time sensitive targeting support. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0800", + "title": "N/A", + "text": "Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0801", + "title": "N/A", + "text": "Recommend refinement, adaption, termination, and execution of operational plans as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0802", + "title": "N/A", + "text": "Review appropriate information sources to determine validity and relevance of information gathered.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0803", + "title": "N/A", + "text": "Reconstruct networks in diagram or report format.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0804", + "title": "N/A", + "text": "Record information collection and/or environment preparation activities against targets during operations designed to achieve cyber effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0805", + "title": "N/A", + "text": "Report intelligence-derived significant network events and intrusions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0806", + "title": "N/A", + "text": "Request discipline-specific processing, exploitation, and disseminate information collected using discipline's collection assets and resources in accordance with approved guidance and/or procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0807", + "title": "N/A", + "text": "Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0808", + "title": "N/A", + "text": "Review and comprehend organizational leadership objectives and guidance for planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0809", + "title": "N/A", + "text": "Review capabilities of allocated collection assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0810", + "title": "N/A", + "text": "Review intelligence collection guidance for accuracy/applicability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0811", + "title": "N/A", + "text": "Review list of prioritized collection requirements and essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0812", + "title": "N/A", + "text": "Review and update overarching collection plan, as required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0813", + "title": "N/A", + "text": "Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of cyber capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0814", + "title": "N/A", + "text": "Revise collection matrix based on availability of optimal assets and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0815", + "title": "N/A", + "text": "Sanitize and minimize information to protect sources and methods. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0816", + "title": "N/A", + "text": "Scope the cyber intelligence planning effort.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0817", + "title": "N/A", + "text": "Serve as a conduit of information from partner teams by identifying subject matter experts who can assist in the investigation of complex or unusual situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0818", + "title": "N/A", + "text": "Serve as a liaison with external partners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0819", + "title": "N/A", + "text": "Solicit and manage to completion feedback from requestors on quality, timeliness, and effectiveness of collection against collection requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0820", + "title": "N/A", + "text": "Specify changes to collection plan and/or operational environment that necessitate re-tasking or re-directing of collection assets and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0821", + "title": "N/A", + "text": "Specify discipline-specific collections and/or taskings that must be executed in the near term.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0822", + "title": "N/A", + "text": "Submit information requests to collection requirement management section for processing as collection requests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0823", + "title": "N/A", + "text": "Submit or respond to requests for deconfliction of cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0824", + "title": "N/A", + "text": "Support identification and documentation of collateral effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0825", + "title": "N/A", + "text": "Synchronize cyber international engagement activities and associated resource requirements as appropriate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0826", + "title": "N/A", + "text": "Synchronize cyber portions of security cooperation plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0827", + "title": "N/A", + "text": "Synchronize the integrated employment of all available organic and partner intelligence collection assets using available collaboration capabilities and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0828", + "title": "N/A", + "text": "Test and evaluate locally developed tools for operational use.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0829", + "title": "N/A", + "text": "Test internal developed tools and techniques against target tools. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0830", + "title": "N/A", + "text": "Track status of information requests, including those processed as collection requests and production requirements, using established procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0831", + "title": "N/A", + "text": "Translate collection requests into applicable discipline-specific collection requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0832", + "title": "N/A", + "text": "Use feedback results (e.g., lesson learned) to identify opportunities to improve collection management efficiency and effectiveness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0833", + "title": "N/A", + "text": "Validate requests for information according to established criteria.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0834", + "title": "N/A", + "text": "Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0835", + "title": "N/A", + "text": "Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0836", + "title": "N/A", + "text": "Document lessons learned that convey the results of events and/or exercises.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0837", + "title": "N/A", + "text": "Advise managers and operators on language and cultural issues that impact organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0838", + "title": "N/A", + "text": "Analyze and process information using language and/or cultural expertise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0839", + "title": "N/A", + "text": "Assess, document, and apply a target's motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0840", + "title": "N/A", + "text": "Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0841", + "title": "N/A", + "text": "Conduct all-source target research to include the use of open source materials in the target language. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0842", + "title": "N/A", + "text": "Conduct analysis of target communications to identify essential information in support of organization objectives. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0843", + "title": "N/A", + "text": "Perform quality review and provide feedback on transcribed or translated materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0844", + "title": "N/A", + "text": "Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0845", + "title": "N/A", + "text": "Identify cyber threat tactics and methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0846", + "title": "N/A", + "text": "Identify target communications within the global network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0847", + "title": "N/A", + "text": "Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0848", + "title": "N/A", + "text": "Provide feedback to collection managers to enhance future collection and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0849", + "title": "N/A", + "text": "Perform foreign language and dialect identification in initial source data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0850", + "title": "N/A", + "text": "Perform or support technical network analysis and mapping. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0851", + "title": "N/A", + "text": "Provide requirements and feedback to optimize the development of language processing tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0852", + "title": "N/A", + "text": "Perform social network analysis and document as appropriate. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0853", + "title": "N/A", + "text": "Scan, identify and prioritize target graphic (including machine-to-machine communications) and/or voice language material.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0854", + "title": "N/A", + "text": "Tip critical or time-sensitive information to appropriate customers. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0855", + "title": "N/A", + "text": "Transcribe target voice materials in the target language. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0856", + "title": "N/A", + "text": "Translate (e.g., verbatim, gist, and/or summaries) target graphic material.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0857", + "title": "N/A", + "text": "Translate (e.g., verbatim, gist, and/or summaries) target voice material.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0858", + "title": "N/A", + "text": "Identify foreign language terminology within computer programs (e.g., comments, variable names).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0859", + "title": "N/A", + "text": "Provide near-real time language analysis support (e.g., live operations). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0860", + "title": "N/A", + "text": "Identify cyber/technology-related terminology in the target language.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0861", + "title": "N/A", + "text": "Work with the general counsel, external affairs and businesses to ensure both existing and new services comply with privacy and data security obligations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0862", + "title": "N/A", + "text": "Work with legal counsel and management, key departments and committees to ensure the organization has and maintains appropriate privacy and confidentiality consent, authorization forms and information notices and materials reflecting current organization and legal practices and requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0863", + "title": "N/A", + "text": "Coordinate with the appropriate regulating bodies to ensure that programs, policies and procedures involving civil rights, civil liberties and privacy considerations are addressed in an integrated and comprehensive manner.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0864", + "title": "N/A", + "text": "Liaise with regulatory and accrediting bodies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0865", + "title": "N/A", + "text": "Work with external affairs to develop relationships with regulators and other government officials responsible for privacy and data security issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0866", + "title": "N/A", + "text": "Maintain current knowledge of applicable federal and state privacy laws and accreditation standards, and monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0867", + "title": "N/A", + "text": "Ensure all processing and/or databases are registered with the local privacy/data protection authorities where required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0868", + "title": "N/A", + "text": "Work with business teams and senior management to ensure awareness of \u201cbest practices\u201d on privacy and data security issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0869", + "title": "N/A", + "text": "Work with organization senior management to establish an organization-wide Privacy Oversight Committee", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0870", + "title": "N/A", + "text": "Serve in a leadership role for Privacy Oversight Committee activities", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0871", + "title": "N/A", + "text": "Collaborate on cyber privacy and security policies and procedures", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0872", + "title": "N/A", + "text": "Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0873", + "title": "N/A", + "text": "Interface with Senior Management to develop strategic plans for the collection, use and sharing of information in a manner that maximizes its value while complying with applicable privacy regulations", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0874", + "title": "N/A", + "text": "Provide strategic guidance to corporate officers regarding information resources and technology", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0875", + "title": "N/A", + "text": "Assist the Security Officer with the development and implementation of an information infrastructure", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0876", + "title": "N/A", + "text": "Coordinate with the Corporate Compliance Officer regarding procedures for documenting and reporting self-disclosures of any evidence of privacy violations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0877", + "title": "N/A", + "text": "Work cooperatively with applicable organization units in overseeing consumer information access rights", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0878", + "title": "N/A", + "text": "Serve as the information privacy liaison for users of technology systems", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0879", + "title": "N/A", + "text": "Act as a liaison to the information systems department", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0880", + "title": "N/A", + "text": "Develop privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0881", + "title": "N/A", + "text": "Oversee, direct, deliver or ensure delivery of initial privacy training and orientation to all employees, volunteers, contractors, alliances, business associates and other appropriate third parties", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0882", + "title": "N/A", + "text": "Conduct on-going privacy training and awareness activities", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0883", + "title": "N/A", + "text": "Work with external affairs to develop relationships with consumer organizations and other NGOs with an interest in privacy and data security issues\u2014and to manage company participation in public events related to privacy and data security", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0884", + "title": "N/A", + "text": "Work with organization administration, legal counsel and other related parties to represent the organization\u2019s information privacy interests with external parties, including government bodies, which undertake to adopt or amend privacy legislation, regulation or standard.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0885", + "title": "N/A", + "text": "Report on a periodic basis regarding the status of the privacy program to the Board, CEO or other responsible individual or committee", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0886", + "title": "N/A", + "text": "Work with External Affairs to respond to press and other inquiries regarding concern over consumer and employee data", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0887", + "title": "N/A", + "text": "Provide leadership for the organization\u2019s privacy program", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0888", + "title": "N/A", + "text": "Direct and oversee privacy specialists and coordinate privacy and data security programs with senior executives globally to ensure consistency across the organization", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0889", + "title": "N/A", + "text": "Ensure compliance with privacy practices and consistent application of sanctions for failure to comply with privacy policies for all individuals in the organization\u2019s workforce, extended workforce and for all business associates in cooperation with Human Resources, the information security officer, administration and legal counsel as applicable", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0890", + "title": "N/A", + "text": "Develop appropriate sanctions for failure to comply with the corporate privacy policies and procedures", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0891", + "title": "N/A", + "text": "Resolve allegations of noncompliance with the corporate privacy policies or notice of information practices", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0892", + "title": "N/A", + "text": "Develop and coordinate a risk management and compliance framework for privacy", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0893", + "title": "N/A", + "text": "Undertake a comprehensive review of the company\u2019s data and privacy projects and ensure that they are consistent with corporate privacy and data security goals and policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0894", + "title": "N/A", + "text": "Develop and manage enterprise-wide procedures to ensure the development of new products and services is consistent with company privacy policies and legal obligations", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0895", + "title": "N/A", + "text": "Establish a process for receiving, documenting, tracking, investigating and acting on all complaints concerning the organization\u2019s privacy policies and procedures", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0896", + "title": "N/A", + "text": "Establish with management and operations a mechanism to track access to protected health information, within the purview of the organization and as required by law and to allow qualified individuals to review or receive a report on such activity", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0897", + "title": "N/A", + "text": "Provide leadership in the planning, design and evaluation of privacy and security related projects", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0898", + "title": "N/A", + "text": "Establish an internal privacy audit program", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0899", + "title": "N/A", + "text": "Periodically revise the privacy program considering changes in laws, regulatory or company policy", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0900", + "title": "N/A", + "text": "Provide development guidance and assist in the identification, implementation and maintenance of organization information privacy policies and procedures in coordination with organization management and administration and legal counsel", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0901", + "title": "N/A", + "text": "Assure that the use of technologies maintains, and does not erode, privacy protections on use, collection and disclosure of personal information", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0902", + "title": "N/A", + "text": "Monitor systems development and operations for security and privacy compliance", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0903", + "title": "N/A", + "text": "Conduct privacy impact assessments of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0904", + "title": "N/A", + "text": "Conduct periodic information privacy impact assessments and ongoing compliance monitoring activities in coordination with the organization\u2019s other compliance and operational assessment functions", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0905", + "title": "N/A", + "text": "Review all system-related information security plans to ensure alignment between security and privacy practices", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0906", + "title": "N/A", + "text": "Work with all organization personnel involved with any aspect of release of protected information to ensure coordination with the organization\u2019s policies, procedures and legal requirements", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0907", + "title": "N/A", + "text": "Account for and administer individual requests for release or disclosure of personal and/or protected information", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0908", + "title": "N/A", + "text": "Develop and manage procedures for vetting and auditing vendors for compliance with the privacy and data security policies and legal requirements", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0909", + "title": "N/A", + "text": "Participate in the implementation and ongoing compliance monitoring of all trading partner and business associate agreements, to ensure all privacy concerns, requirements and responsibilities are addressed", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0910", + "title": "N/A", + "text": "Act as, or work with, counsel relating to business partner contracts", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0911", + "title": "N/A", + "text": "Mitigate effects of a use or disclosure of personal information by employees or business partners", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0912", + "title": "N/A", + "text": "Develop and apply corrective action procedures", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0913", + "title": "N/A", + "text": "Administer action on all complaints concerning the organization\u2019s privacy policies and procedures in coordination and collaboration with other similar functions and, when necessary, legal counsel", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0914", + "title": "N/A", + "text": "Support the organization\u2019s privacy compliance program, working closely with the Privacy Officer, Chief Information Security Officer, and other business leaders to ensure compliance with federal and state privacy laws and regulations ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0915", + "title": "N/A", + "text": "Identify and correct potential company compliance gaps and/or areas of risk to ensure full compliance with privacy regulations", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0916", + "title": "N/A", + "text": "Manage privacy incidents and breaches in conjunction with the Privacy Officer, Chief Information Security Officer, legal counsel and the business units", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0917", + "title": "N/A", + "text": "Coordinate with the Chief Information Security Officer to ensure alignment between security and privacy practices", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0918", + "title": "N/A", + "text": "Establish, implement and maintains organization-wide policies and procedures to comply with privacy regulations", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0919", + "title": "N/A", + "text": "Ensure that the company maintains appropriate privacy and confidentiality notices, consent and authorization forms, and materials", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0920", + "title": "N/A", + "text": "Develop and maintain appropriate communications and training to promote and educate all workforce members and members of the Board regarding privacy compliance issues and requirements, and the consequences of noncompliance", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0921", + "title": "N/A", + "text": "Determine business partner requirements related to the organization\u2019s privacy program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0922", + "title": "N/A", + "text": "Establish and administer a process for receiving, documenting, tracking, investigating and taking corrective action as appropriate on complaints concerning the company\u2019s privacy policies and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0923", + "title": "N/A", + "text": "Cooperate with the relevant regulatory agencies and other legal entities, and organization officers, in any compliance reviews or investigations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0924", + "title": "N/A", + "text": "Perform ongoing privacy compliance monitoring activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0925", + "title": "N/A", + "text": "Monitor advancements in information privacy technologies to ensure organization adoption and compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0926", + "title": "N/A", + "text": "Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0927", + "title": "N/A", + "text": "Appoint and guide a team of IT security experts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0928", + "title": "N/A", + "text": "Collaborate with key stakeholders to establish a cybersecurity risk management program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0929", + "title": "N/A", + "text": "Identify and assign individuals to specific roles associated with the execution of the Risk Management Framework.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0930", + "title": "N/A", + "text": "Establish a risk management strategy for the organization that includes a determination of risk tolerance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0931", + "title": "N/A", + "text": "Identify the missions, business functions, and mission/business processes the system will support.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0932", + "title": "N/A", + "text": "Identify stakeholders who have a security interest in the development, implementation, operation, or sustainment of a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0933", + "title": "N/A", + "text": "Identify stakeholders who have a security interest in the development, implementation, operation, or sustainment of a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0934", + "title": "N/A", + "text": "Identify stakeholder assets that require protection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0935", + "title": "N/A", + "text": "Conduct an initial risk assessment of stakeholder assets and update the risk assessment on an ongoing basis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0936", + "title": "N/A", + "text": "Define the stakeholder protection needs and stakeholder security requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0937", + "title": "N/A", + "text": "Determine the placement of a system within the enterprise architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0938", + "title": "N/A", + "text": "Identify organization-wide common controls that are available for inheritance by organizational systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0939", + "title": "N/A", + "text": "Conduct a second-level security categorization for organizational systems with the same impact level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0940", + "title": "N/A", + "text": "Determine the boundary of a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0941", + "title": "N/A", + "text": "Identify the security requirements allocated to a system and to the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0942", + "title": "N/A", + "text": "Identify the types of information to be processed, stored, or transmitted by a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0943", + "title": "N/A", + "text": "Categorize the system and document the security categorization results as part of system requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0944", + "title": "N/A", + "text": "Describe the characteristics of a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0945", + "title": "N/A", + "text": "Register the system with appropriate organizational program/management offices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0946", + "title": "N/A", + "text": "Select the security controls for a system and document the functional description of the planned control implementations in a security plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0947", + "title": "N/A", + "text": "Develop a strategy for monitoring security control effectiveness; coordinate the system-level strategy with the organization and mission/business process-level monitoring strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0948", + "title": "N/A", + "text": "Review and approve security plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0949", + "title": "N/A", + "text": "Implement the security controls specified in a security plan or other system documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0950", + "title": "N/A", + "text": "Document changes to planned security control implementation and establish the configuration baseline for a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0951", + "title": "N/A", + "text": "Develop, review, and approve a plan to assess the security controls in a system and the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0952", + "title": "N/A", + "text": "Assess the security controls in accordance with the assessment procedures defined in a security assessment plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0953", + "title": "N/A", + "text": "Prepare a security assessment report documenting the issues, findings, and recommendations from the security control assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0954", + "title": "N/A", + "text": "Conduct initial remediation actions on security controls based on the findings and recommendations of a security assessment report; reassess remediated controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0955", + "title": "N/A", + "text": "Prepare a plan of action and milestones based on the findings and recommendations of a security assessment report excluding any remediation actions taken.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0956", + "title": "N/A", + "text": "Assemble an authorization package and submit the package to an authorizing official for adjudication.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0957", + "title": "N/A", + "text": "Determine the risk from the operation or use of a system or the provision or use of common controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0958", + "title": "N/A", + "text": "Identify and implement a preferred course of action in response to the risk determined.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0959", + "title": "N/A", + "text": "Determine if the risk from the operation or use of the system or the provision or use of common controls, is acceptable.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0960", + "title": "N/A", + "text": "Monitor changes to a system and its environment of operation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0961", + "title": "N/A", + "text": "Assess the security controls employed within and inherited by the system in accordance with an organization-defined monitoring strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0962", + "title": "N/A", + "text": "Respond to risk based on the results of ongoing monitoring activities, assessment of risk, and outstanding items in a plan of action and milestones.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0963", + "title": "N/A", + "text": "Update a security plan, security assessment report, and plan of action and milestones based on the results of a continuous monitoring process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0964", + "title": "N/A", + "text": "Report the security status of a system (including the effectiveness of security controls) to an authorizing official on an ongoing basis in accordance with the monitoring strategy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0965", + "title": "N/A", + "text": "Review the security status of a system (including the effectiveness of security controls) on an ongoing basis to determine whether the risk remains acceptable.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0966", + "title": "N/A", + "text": "Implement a system disposal strategy which executes required actions when a system is removed from service.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0967", + "title": "N/A", + "text": "Sponsor and promote continuous monitoring within the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0968", + "title": "N/A", + "text": "Assign staff as needed to appropriate continuous monitoring working groups.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0969", + "title": "N/A", + "text": "Identify reporting requirements to support continuous monitoring activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0970", + "title": "N/A", + "text": "Establish scoring and grading metrics to measure effectiveness of continuous monitoring program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0971", + "title": "N/A", + "text": "Determine how to integrate a continuous monitoring program into the organization\u2019s broader information security governance structures and policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0972", + "title": "N/A", + "text": "Use continuous monitoring scoring and grading metrics to make information security investment decisions to address persistent issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0973", + "title": "N/A", + "text": "Ensure that the continuous monitoring staff have the training and resources (e.g., staff and budget) needed to perform assigned duties.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0974", + "title": "N/A", + "text": "Work with organizational risk analysts to ensure that continuous monitoring reporting covers appropriate levels of the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0975", + "title": "N/A", + "text": "Work with the organizational risk analysts to ensure risk metrics are defining realistically to support continuous monitoring.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0976", + "title": "N/A", + "text": "Work with organizational officials to ensure continuous monitoring tool data provides situation awareness of risk levels.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0977", + "title": "N/A", + "text": "Establish triggers for unacceptable risk thresholds for continuous monitoring data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0978", + "title": "N/A", + "text": "Work with organizational officials to establish system level reporting categories that can be used by the organization\u2019s continuous monitoring program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0980", + "title": "N/A", + "text": "Designate a qualified person to be responsible for the management and implementation of the continuous monitoring program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0981", + "title": "N/A", + "text": "Identify the continuous monitoring stakeholders and establish a process to keep them informed about the program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0982", + "title": "N/A", + "text": "Identify security oriented organization reporting requirements that are fulfilled by the continuous monitoring program. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0983", + "title": "N/A", + "text": "Use the continuous monitoring data to make information security investment decisions to address persistent issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0984", + "title": "N/A", + "text": "Define triggers within the continuous monitoring program that can be used to define unacceptable risk and result in action being taken to resolve.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0985", + "title": "N/A", + "text": "Establish scoring and grading metrics to measure effectiveness of continuous monitoring program.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0986", + "title": "N/A", + "text": "Work with security managers to establish appropriate continuous monitoring reporting requirements at the system level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0987", + "title": "N/A", + "text": "Use the continuous monitoring tools and technologies to assess risk on an ongoing basis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0988", + "title": "N/A", + "text": "Establish appropriate reporting requirements in adherence to the criteria identified in the continuous monitoring program for use in automated control assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0989", + "title": "N/A", + "text": "Use non-automated assessment methods where the data from the continuous monitoring tools and technologies is not yet of adequate sufficiency or quality.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0990", + "title": "N/A", + "text": "Develop processes with the external audit group on how to share information regarding the continuous monitoring program and its impact on security control assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0991", + "title": "N/A", + "text": "Identify reporting requirements for use in automated control assessment to support continuous monitoring.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0992", + "title": "N/A", + "text": "Determine how the continuous monitoring results will be used in ongoing authorization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0993", + "title": "N/A", + "text": "Establish continuous monitoring tools and technologies access control process and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0994", + "title": "N/A", + "text": "Ensure that continuous monitoring tools and technologies access control is managed adequately. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0995", + "title": "N/A", + "text": "Establish a process to provide technical help to continuous monitoring mitigators.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0996", + "title": "N/A", + "text": "Coordinate continuous monitoring reporting requirements across various users.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0997", + "title": "N/A", + "text": "Establish responsibilities for supporting implementation of each continuous monitoring tool or technology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0998", + "title": "N/A", + "text": "Establish liaison with scoring and metrics working group to support continuous monitoring.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T0999", + "title": "N/A", + "text": "Establish and operate a process to manage introduction of new risk to support continuous monitoring.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1000", + "title": "N/A", + "text": "Establish continuous monitoring configuration settings issues and coordination sub-group.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1001", + "title": "N/A", + "text": "Establish continuous monitoring tools and technologies performance measurement/management requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1002", + "title": "N/A", + "text": "Using scores and grades to motivate and assess performance while addressing concerns to support continuous monitoring", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1003", + "title": "N/A", + "text": "Work with security managers (i.e., system owners, information system security managers, information system security officers, etc.) to establish appropriate reporting requirements for continuous monitoring at the system level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1004", + "title": "N/A", + "text": "Use continuous monitoring tools to assess risk on an ongoing basis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1005", + "title": "N/A", + "text": "Use the continuous monitoring data to make information security investment decisions to address persistent issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1006", + "title": "N/A", + "text": "Respond to issues flagged during continuous monitoring, escalate and coordinate a response.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "task", + "element_identifier": "T1007", + "title": "N/A", + "text": "Review findings from the continuous monitoring program and mitigate risks on a timely basis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0001", + "title": "N/A", + "text": "Knowledge of computer networking concepts and protocols, and network security methodologies. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0002", + "title": "N/A", + "text": "Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0003", + "title": "N/A", + "text": "Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0004", + "title": "N/A", + "text": "Knowledge of cybersecurity and privacy principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0005", + "title": "N/A", + "text": "Knowledge of cyber threats and vulnerabilities. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0006", + "title": "N/A", + "text": "Knowledge of specific operational impacts of cybersecurity lapses.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0007", + "title": "N/A", + "text": "Knowledge of authentication, authorization, and access control methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0008", + "title": "N/A", + "text": "Knowledge of applicable business processes and operations of customer organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0009", + "title": "N/A", + "text": "Knowledge of application vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0010", + "title": "N/A", + "text": "Knowledge of communication methods, principles, and concepts that support the network infrastructure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0011", + "title": "N/A", + "text": "Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0012", + "title": "N/A", + "text": "Knowledge of capabilities and requirements analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0013", + "title": "N/A", + "text": "Knowledge of cyber defense and vulnerability assessment tools and their capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0014", + "title": "N/A", + "text": "Knowledge of complex data structures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0015", + "title": "N/A", + "text": "Knowledge of computer algorithms.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0016", + "title": "N/A", + "text": "Knowledge of computer programming principles ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0017", + "title": "N/A", + "text": "Knowledge of concepts and practices of processing digital forensic data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0018", + "title": "N/A", + "text": "Knowledge of encryption algorithms ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0019", + "title": "N/A", + "text": "Knowledge of cryptography and cryptographic key management concepts ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0020", + "title": "N/A", + "text": "Knowledge of data administration and data standardization policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0021", + "title": "N/A", + "text": "Knowledge of data backup and recovery.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0022", + "title": "N/A", + "text": "Knowledge of data mining and data warehousing principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0023", + "title": "N/A", + "text": "Knowledge of database management systems, query languages, table relationships, and views.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0024", + "title": "N/A", + "text": "Knowledge of database systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0025", + "title": "N/A", + "text": "Knowledge of digital rights management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0026", + "title": "N/A", + "text": "Knowledge of business continuity and disaster recovery continuity of operations plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0027", + "title": "N/A", + "text": "Knowledge of organization's enterprise information security architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0028", + "title": "N/A", + "text": "Knowledge of organization's evaluation and validation requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0029", + "title": "N/A", + "text": "Knowledge of organization's Local and Wide Area Network connections.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0030", + "title": "N/A", + "text": "Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0031", + "title": "N/A", + "text": "Knowledge of enterprise messaging systems and associated software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0032", + "title": "N/A", + "text": "Knowledge of resiliency and redundancy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0033", + "title": "N/A", + "text": "Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0034", + "title": "N/A", + "text": "Knowledge of network services and protocols interactions that provide network communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0035", + "title": "N/A", + "text": "Knowledge of installation, integration, and optimization of system components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0036", + "title": "N/A", + "text": "Knowledge of human-computer interaction principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0037", + "title": "N/A", + "text": "Knowledge of Security Assessment and Authorization process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0038", + "title": "N/A", + "text": "Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0039", + "title": "N/A", + "text": "Knowledge of cybersecurity and privacy principles and methods that apply to software development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0040", + "title": "N/A", + "text": "Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0041", + "title": "N/A", + "text": "Knowledge of incident categories, incident responses, and timelines for responses.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0042", + "title": "N/A", + "text": "Knowledge of incident response and handling methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0043", + "title": "N/A", + "text": "Knowledge of industry-standard and organizationally accepted analysis principles and methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0044", + "title": "N/A", + "text": "Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0045", + "title": "N/A", + "text": "Knowledge of information security systems engineering principles (NIST SP 800-160).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0046", + "title": "N/A", + "text": "Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0047", + "title": "N/A", + "text": "Knowledge of information technology (IT) architectural concepts and frameworks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0048", + "title": "N/A", + "text": "Knowledge of Risk Management Framework (RMF) requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0049", + "title": "N/A", + "text": "Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0050", + "title": "N/A", + "text": "Knowledge of local area and wide area networking principles and concepts including bandwidth management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0051", + "title": "N/A", + "text": "Knowledge of low-level computer languages (e.g., assembly languages).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0052", + "title": "N/A", + "text": "Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0053", + "title": "N/A", + "text": "Knowledge of measures or indicators of system performance and availability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0054", + "title": "N/A", + "text": "Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0055", + "title": "N/A", + "text": "Knowledge of microprocessors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0056", + "title": "N/A", + "text": "Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0057", + "title": "N/A", + "text": "Knowledge of network hardware devices and functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0058", + "title": "N/A", + "text": "Knowledge of network traffic analysis methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0059", + "title": "N/A", + "text": "Knowledge of new and emerging information technology (IT) and cybersecurity technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0060", + "title": "N/A", + "text": "Knowledge of operating systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0061", + "title": "N/A", + "text": "Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0062", + "title": "N/A", + "text": "Knowledge of packet-level analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0063", + "title": "N/A", + "text": "Knowledge of parallel and distributed computing concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0064", + "title": "N/A", + "text": "Knowledge of performance tuning tools and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0065", + "title": "N/A", + "text": "Knowledge of policy-based and risk adaptive access controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0066", + "title": "N/A", + "text": "Knowledge of Privacy Impact Assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0067", + "title": "N/A", + "text": "Knowledge of process engineering concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0068", + "title": "N/A", + "text": "Knowledge of programming language structures and logic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0069", + "title": "N/A", + "text": "Knowledge of query languages such as SQL (structured query language).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0070", + "title": "N/A", + "text": "Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0071", + "title": "N/A", + "text": "Knowledge of remote access technology concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0072", + "title": "N/A", + "text": "Knowledge of resource management principles and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0073", + "title": "N/A", + "text": "Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0074", + "title": "N/A", + "text": "Knowledge of key concepts in security management (e.g., Release Management, Patch Management).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0075", + "title": "N/A", + "text": "Knowledge of security system design tools, methods, and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0076", + "title": "N/A", + "text": "Knowledge of server administration and systems engineering theories, concepts, and methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0077", + "title": "N/A", + "text": "Knowledge of server and client operating systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0078", + "title": "N/A", + "text": "Knowledge of server diagnostic tools and fault identification techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0079", + "title": "N/A", + "text": "Knowledge of software debugging principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0080", + "title": "N/A", + "text": "Knowledge of software design tools, methods, and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0081", + "title": "N/A", + "text": "Knowledge of software development models (e.g., Waterfall Model, Spiral Model).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0082", + "title": "N/A", + "text": "Knowledge of software engineering.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0083", + "title": "N/A", + "text": "Knowledge of sources, characteristics, and uses of the organization\u2019s data assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0084", + "title": "N/A", + "text": "Knowledge of structured analysis principles and methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0085", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of system and application security threats and vulnerabilities. (See K0070)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0086", + "title": "N/A", + "text": "Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0087", + "title": "N/A", + "text": "Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0088", + "title": "N/A", + "text": "Knowledge of systems administration concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0089", + "title": "N/A", + "text": "Knowledge of systems diagnostic tools and fault identification techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0090", + "title": "N/A", + "text": "Knowledge of system life cycle management principles, including software security and usability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0091", + "title": "N/A", + "text": "Knowledge of systems testing and evaluation methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0092", + "title": "N/A", + "text": "Knowledge of technology integration processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0093", + "title": "N/A", + "text": "Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0094", + "title": "N/A", + "text": "Knowledge of the capabilities and functionality associated with content creation technologies (e.g., wikis, social networking, content management systems, blogs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0095", + "title": "N/A", + "text": "Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0096", + "title": "N/A", + "text": "Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0097", + "title": "N/A", + "text": "Knowledge of the characteristics of physical and virtual data storage media.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0098", + "title": "N/A", + "text": "Knowledge of the cyber defense Service Provider reporting structure and processes within one\u2019s own organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0099", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0100", + "title": "N/A", + "text": "Knowledge of the enterprise information technology (IT) architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0101", + "title": "N/A", + "text": "Knowledge of the organization\u2019s enterprise information technology (IT) goals and objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0102", + "title": "N/A", + "text": "Knowledge of the systems engineering process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0103", + "title": "N/A", + "text": "Knowledge of the type and frequency of routine hardware maintenance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0104", + "title": "N/A", + "text": "Knowledge of Virtual Private Network (VPN) security.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0105", + "title": "N/A", + "text": "Knowledge of web services (e.g., service-oriented architecture, Simple Object Access Protocol, and web service description language).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0106", + "title": "N/A", + "text": "Knowledge of what constitutes a network attack and a network attack\u2019s relationship to both threats and vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0107", + "title": "N/A", + "text": "Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0108", + "title": "N/A", + "text": "Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0109", + "title": "N/A", + "text": "Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0110", + "title": "N/A", + "text": "Knowledge of adversarial tactics, techniques, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0111", + "title": "N/A", + "text": "Knowledge of network tools (e.g., ping, traceroute, nslookup) ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0112", + "title": "N/A", + "text": "Knowledge of defense-in-depth principles and network security architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0113", + "title": "N/A", + "text": "Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0114", + "title": "N/A", + "text": "Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, digital scanners, electronic organizers, hard drives, memory cards, modems, network components, networked appliances, networked home control devices, printers, removable storage devices, telephones, copiers, facsimile machines, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0115", + "title": "N/A", + "text": "Knowledge that technology that can be exploited.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0116", + "title": "N/A", + "text": "Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0117", + "title": "N/A", + "text": "Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0118", + "title": "N/A", + "text": "Knowledge of processes for seizing and preserving digital evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0119", + "title": "N/A", + "text": "Knowledge of hacking methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0120", + "title": "N/A", + "text": "Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0121", + "title": "N/A", + "text": "Knowledge of information security program management and project management principles and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0122", + "title": "N/A", + "text": "Knowledge of investigative implications of hardware, Operating Systems, and network technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0123", + "title": "N/A", + "text": "Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0124", + "title": "N/A", + "text": "Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0125", + "title": "N/A", + "text": "Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0126", + "title": "N/A", + "text": "Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0127", + "title": "N/A", + "text": "Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0128", + "title": "N/A", + "text": "Knowledge of types and collection of persistent data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0129", + "title": "N/A", + "text": "Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0130", + "title": "N/A", + "text": "Knowledge of virtualization technologies and virtual machine development and maintenance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0131", + "title": "N/A", + "text": "Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0132", + "title": "N/A", + "text": "Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0133", + "title": "N/A", + "text": "Knowledge of types of digital forensics data and how to recognize them.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0134", + "title": "N/A", + "text": "Knowledge of deployable forensics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0135", + "title": "N/A", + "text": "Knowledge of web filtering technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0136", + "title": "N/A", + "text": "Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0137", + "title": "N/A", + "text": "Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0138", + "title": "N/A", + "text": "Knowledge of Wi-Fi.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0139", + "title": "N/A", + "text": "Knowledge of interpreted and compiled computer languages.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0140", + "title": "N/A", + "text": "Knowledge of secure coding techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0141", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0420", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0142", + "title": "N/A", + "text": "Knowledge of collection management processes, capabilities, and limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0143", + "title": "N/A", + "text": "Knowledge of front-end collection systems, including traffic collection, filtering, and selection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0144", + "title": "N/A", + "text": "Knowledge of social dynamics of computer attackers in a global context.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0145", + "title": "N/A", + "text": "Knowledge of security event correlation tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0146", + "title": "N/A", + "text": "Knowledge of the organization's core business/mission processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0147", + "title": "N/A", + "text": "Knowledge of emerging security issues, risks, and vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0148", + "title": "N/A", + "text": "Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0149", + "title": "N/A", + "text": "Knowledge of organization's risk tolerance and/or risk management approach.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0150", + "title": "N/A", + "text": "Knowledge of enterprise incident response program, roles, and responsibilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0151", + "title": "N/A", + "text": "Knowledge of current and emerging threats/threat vectors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0152", + "title": "N/A", + "text": "Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0153", + "title": "N/A", + "text": "Knowledge of software quality assurance process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0154", + "title": "N/A", + "text": "Knowledge of supply chain risk management standards, processes, and practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0155", + "title": "N/A", + "text": "Knowledge of electronic evidence law.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0156", + "title": "N/A", + "text": "Knowledge of legal rules of evidence and court procedure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0157", + "title": "N/A", + "text": "Knowledge of cyber defense and information security policies, procedures, and regulations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0158", + "title": "N/A", + "text": "Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0159", + "title": "N/A", + "text": "Knowledge of Voice over IP (VoIP).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0160", + "title": "N/A", + "text": "Knowledge of the common attack vectors on the network layer.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0161", + "title": "N/A", + "text": "Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0162", + "title": "N/A", + "text": "Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0163", + "title": "N/A", + "text": "Knowledge of critical information technology (IT) procurement requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0164", + "title": "N/A", + "text": "Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0165", + "title": "N/A", + "text": "Knowledge of risk/threat assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0166", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of the nature and function of the relevant information structure. (See K0127)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0167", + "title": "N/A", + "text": "Knowledge of system administration, network, and operating system hardening techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0168", + "title": "N/A", + "text": "Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0169", + "title": "N/A", + "text": "Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0170", + "title": "N/A", + "text": "Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0171", + "title": "N/A", + "text": "Knowledge of hardware reverse engineering techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0172", + "title": "N/A", + "text": "Knowledge of middleware (e.g., enterprise service bus and message queuing).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0173", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0499 (prior to draft SP 800-181)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0174", + "title": "N/A", + "text": "Knowledge of networking protocols.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0175", + "title": "N/A", + "text": "Knowledge of software reverse engineering techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0176", + "title": "N/A", + "text": "Knowledge of Extensible Markup Language (XML) schemas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0177", + "title": "N/A", + "text": "Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0178", + "title": "N/A", + "text": "Knowledge of secure software deployment methodologies, tools, and practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0179", + "title": "N/A", + "text": "Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0180", + "title": "N/A", + "text": "Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0181", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification [RFID], Infrared Networking [IR], Wireless Fidelity [Wi-Fi]. paging, cellular, satellite dishes), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. (See K0274)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0182", + "title": "N/A", + "text": "Knowledge of data carving tools and techniques (e.g., Foremost).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0183", + "title": "N/A", + "text": "Knowledge of reverse engineering concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0184", + "title": "N/A", + "text": "Knowledge of anti-forensics tactics, techniques, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0185", + "title": "N/A", + "text": "Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0186", + "title": "N/A", + "text": "Knowledge of debugging procedures and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0187", + "title": "N/A", + "text": "Knowledge of file type abuse by adversaries for anomalous behavior.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0188", + "title": "N/A", + "text": "Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0189", + "title": "N/A", + "text": "Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer\u2019s display device).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0190", + "title": "N/A", + "text": "Knowledge of encryption methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0191", + "title": "N/A", + "text": "Knowledge of signature implementation impact for viruses, malware, and attacks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0192", + "title": "N/A", + "text": "Knowledge of Windows/Unix ports and services.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0193", + "title": "N/A", + "text": "Knowledge of advanced data remediation security features in databases.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0194", + "title": "N/A", + "text": "Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0195", + "title": "N/A", + "text": "Knowledge of data classification standards and methodologies based on sensitivity and other risk factors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0196", + "title": "N/A", + "text": "Knowledge of Import/Export Regulations related to cryptography and other security technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0197", + "title": "N/A", + "text": "Knowledge of database access application programming interfaces (e.g., Java Database Connectivity [JDBC]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0198", + "title": "N/A", + "text": "Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0199", + "title": "N/A", + "text": "Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0200", + "title": "N/A", + "text": "Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0201", + "title": "N/A", + "text": "Knowledge of symmetric key rotation techniques and concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0202", + "title": "N/A", + "text": "Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0203", + "title": "N/A", + "text": "Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0204", + "title": "N/A", + "text": "Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0205", + "title": "N/A", + "text": "Knowledge of basic system, network, and OS hardening techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0206", + "title": "N/A", + "text": "Knowledge of ethical hacking principles and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0207", + "title": "N/A", + "text": "Knowledge of circuit analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0208", + "title": "N/A", + "text": "Knowledge of computer based training and e-learning services. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0209", + "title": "N/A", + "text": "Knowledge of covert communication techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0210", + "title": "N/A", + "text": "Knowledge of data backup and restoration concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0211", + "title": "N/A", + "text": "Knowledge of confidentiality, integrity, and availability requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0212", + "title": "N/A", + "text": "Knowledge of cybersecurity-enabled software products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0213", + "title": "N/A", + "text": "Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne\u2019s Events of Instruction, Kirkpatrick\u2019s model of evaluation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0214", + "title": "N/A", + "text": "Knowledge of the Risk Management Framework Assessment Methodology. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0215", + "title": "N/A", + "text": "Knowledge of organizational training policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0216", + "title": "N/A", + "text": "Knowledge of learning levels (i.e., Bloom\u2019s Taxonomy of learning).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0217", + "title": "N/A", + "text": "Knowledge of Learning Management Systems and their use in managing learning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0218", + "title": "N/A", + "text": "Knowledge of learning styles (e.g., assimilator, auditory, kinesthetic).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0219", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of local area network (LAN) and wide area network (WAN) principles. (See K0050)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0220", + "title": "N/A", + "text": "Knowledge of modes of learning (e.g., rote learning, observation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0221", + "title": "N/A", + "text": "Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0222", + "title": "N/A", + "text": "Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0223", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0073", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0224", + "title": "N/A", + "text": "Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0225", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of the common networking protocol and services deployed at CC/S/A. (See K0565)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0226", + "title": "N/A", + "text": "Knowledge of organizational training systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0227", + "title": "N/A", + "text": "Knowledge of various types of computer architectures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0228", + "title": "N/A", + "text": "Knowledge of taxonomy and semantic ontology theory.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0229", + "title": "N/A", + "text": "Knowledge of applications that can log errors, exceptions, and application faults and logging.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0230", + "title": "N/A", + "text": "Knowledge of cloud service models and how those models can limit incident response.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0231", + "title": "N/A", + "text": "Knowledge of crisis management protocols, processes, and techniques. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0232", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0233", + "title": "N/A", + "text": "Knowledge of the National Cybersecurity Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0234", + "title": "N/A", + "text": "Knowledge of full spectrum cyber capabilities (e.g., defense, attack, exploitation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0235", + "title": "N/A", + "text": "Knowledge of how to leverage research and development centers, think tanks, academic research, and industry systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0236", + "title": "N/A", + "text": "Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0237", + "title": "N/A", + "text": "Knowledge of industry best practices for service desk.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0238", + "title": "N/A", + "text": "Knowledge of machine learning theory and principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0239", + "title": "N/A", + "text": "Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0240", + "title": "N/A", + "text": "Knowledge of multi-level security systems and cross domain solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0241", + "title": "N/A", + "text": "Knowledge of organizational human resource policies, processes, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0242", + "title": "N/A", + "text": "Knowledge of organizational security policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0243", + "title": "N/A", + "text": "Knowledge of organizational training and education policies, processes, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0244", + "title": "N/A", + "text": "Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0245", + "title": "N/A", + "text": "Knowledge of principles and processes for conducting training and education needs assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0246", + "title": "N/A", + "text": "Knowledge of relevant concepts, procedures, software, equipment, and technology applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0247", + "title": "N/A", + "text": "Knowledge of remote access processes, tools, and capabilities related to customer support.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0248", + "title": "N/A", + "text": "Knowledge of strategic theory and practice.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0249", + "title": "N/A", + "text": "Knowledge of sustainment technologies, processes and strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0250", + "title": "N/A", + "text": "Knowledge of Test & Evaluation processes for learners.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0251", + "title": "N/A", + "text": "Knowledge of the judicial process, including the presentation of facts and evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0252", + "title": "N/A", + "text": "Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0253", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0227", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0254", + "title": "N/A", + "text": "Knowledge of binary analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0255", + "title": "N/A", + "text": "Knowledge of network architecture concepts including topology, protocols, and components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0256", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0224", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0257", + "title": "N/A", + "text": "Knowledge of information technology (IT) acquisition/procurement requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0258", + "title": "N/A", + "text": "Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0259", + "title": "N/A", + "text": "Knowledge of malware analysis concepts and methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0260", + "title": "N/A", + "text": "Knowledge of Personally Identifiable Information (PII) data security standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0261", + "title": "N/A", + "text": "Knowledge of Payment Card Industry (PCI) data security standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0262", + "title": "N/A", + "text": "Knowledge of Personal Health Information (PHI) data security standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0263", + "title": "N/A", + "text": "Knowledge of information technology (IT) risk management policies, requirements, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0264", + "title": "N/A", + "text": "Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0265", + "title": "N/A", + "text": "Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0266", + "title": "N/A", + "text": "Knowledge of how to evaluate the trustworthiness of the supplier and/or product.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0267", + "title": "N/A", + "text": "Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0268", + "title": "N/A", + "text": "Knowledge of forensic footprint identification.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0269", + "title": "N/A", + "text": "Knowledge of mobile communications architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0270", + "title": "N/A", + "text": "Knowledge of the acquisition/procurement life cycle process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0271", + "title": "N/A", + "text": "Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0272", + "title": "N/A", + "text": "Knowledge of network analysis tools used to identify software communications vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0273", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of general kill chain (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0274", + "title": "N/A", + "text": "Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0275", + "title": "N/A", + "text": "Knowledge of configuration management techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0276", + "title": "N/A", + "text": "Knowledge of security management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0277", + "title": "N/A", + "text": "Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases (e.g. built-in cryptographic key management features).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0278", + "title": "N/A", + "text": "Knowledge of current and emerging data remediation security features in databases.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0279", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0280", + "title": "N/A", + "text": "Knowledge of systems engineering theories, concepts, and methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0281", + "title": "N/A", + "text": "Knowledge of information technology (IT) service catalogues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0282", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0200", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0283", + "title": "N/A", + "text": "Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0284", + "title": "N/A", + "text": "Knowledge of developing and applying user credential management system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0285", + "title": "N/A", + "text": "Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0286", + "title": "N/A", + "text": "Knowledge of N-tiered typologies (e.g. including server and client operating systems).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0287", + "title": "N/A", + "text": "Knowledge of an organization's information classification program and procedures for information compromise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0288", + "title": "N/A", + "text": "Knowledge of industry standard security models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0289", + "title": "N/A", + "text": "Knowledge of system/server diagnostic tools and fault identification techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0290", + "title": "N/A", + "text": "Knowledge of systems security testing and evaluation methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0291", + "title": "N/A", + "text": "Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0292", + "title": "N/A", + "text": "Knowledge of the operations and processes for incident, problem, and event management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0293", + "title": "N/A", + "text": "Knowledge of integrating the organization\u2019s goals and objectives into the architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0294", + "title": "N/A", + "text": "Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0295", + "title": "N/A", + "text": "Knowledge of confidentiality, integrity, and availability principles. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0296", + "title": "N/A", + "text": "Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0297", + "title": "N/A", + "text": "Knowledge of countermeasure design for identified security risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0298", + "title": "N/A", + "text": "Knowledge of countermeasures for identified security risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0299", + "title": "N/A", + "text": "Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0300", + "title": "N/A", + "text": "Knowledge of network mapping and recreating network topologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0301", + "title": "N/A", + "text": "Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0302", + "title": "N/A", + "text": "Knowledge of the basic operation of computers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0303", + "title": "N/A", + "text": "Knowledge of the use of sub-netting tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0304", + "title": "N/A", + "text": "Knowledge of concepts and practices of processing digital forensic data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0305", + "title": "N/A", + "text": "Knowledge of data concealment (e.g. encryption algorithms and steganography).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0306", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic physical computer components and architectures", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0307", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of common network tools (e.g., ping, traceroute, nslookup). (See K0111)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0308", + "title": "N/A", + "text": "Knowledge of cryptology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0309", + "title": "N/A", + "text": "Knowledge of emerging technologies that have potential for exploitation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0310", + "title": "N/A", + "text": "Knowledge of hacking methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0311", + "title": "N/A", + "text": "Knowledge of industry indicators useful for identifying technology trends.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0312", + "title": "N/A", + "text": "Knowledge of intelligence gathering principles, policies, and procedures including legal authorities and restrictions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0313", + "title": "N/A", + "text": "Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0314", + "title": "N/A", + "text": "Knowledge of industry technologies\u2019 potential cybersecurity vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0315", + "title": "N/A", + "text": "Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0316", + "title": "N/A", + "text": "Knowledge of business or military operation plans, concept operation plans, orders, policies, and standing rules of engagement.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0317", + "title": "N/A", + "text": "Knowledge of procedures used for documenting and querying reported incidents, problems, and events.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0318", + "title": "N/A", + "text": "Knowledge of operating system command-line tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0319", + "title": "N/A", + "text": "Knowledge of technical delivery capabilities and their limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0320", + "title": "N/A", + "text": "Knowledge of organization's evaluation and validation criteria.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0321", + "title": "N/A", + "text": "Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0322", + "title": "N/A", + "text": "Knowledge of embedded systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0323", + "title": "N/A", + "text": "Knowledge of system fault tolerance methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0324", + "title": "N/A", + "text": "Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0325", + "title": "N/A", + "text": "Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0326", + "title": "N/A", + "text": "Knowledge of demilitarized zones.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0327", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of local area network (LAN), wide area network (WAN) and enterprise principles and concepts, including bandwidth management. (See K0050)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0328", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0329", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of statistics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0330", + "title": "N/A", + "text": "Knowledge of successful capabilities to identify the solutions to less common and more complex system problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0331", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of network protocols (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Dynamic Host Configuration Protocol (DHCP)), and directory services (e.g., Domain Name System (DNS)). (See K0332)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0332", + "title": "N/A", + "text": "Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0333", + "title": "N/A", + "text": "Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0334", + "title": "N/A", + "text": "Knowledge of network traffic analysis (tools, methodologies, processes).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0335", + "title": "N/A", + "text": "Knowledge of current and emerging cyber technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0336", + "title": "N/A", + "text": "Knowledge of access authentication methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0337", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0007", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0338", + "title": "N/A", + "text": "Knowledge of data mining techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0339", + "title": "N/A", + "text": "Knowledge of how to use network analysis tools to identify vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0340", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0341", + "title": "N/A", + "text": "Knowledge of foreign disclosure policies and import/export control regulations as related to cybersecurity. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0342", + "title": "N/A", + "text": "Knowledge of penetration testing principles, tools, and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0343", + "title": "N/A", + "text": "Knowledge of root cause analysis techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0344", + "title": "N/A", + "text": "Knowledge of an organization\u2019s threat environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0345", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0346", + "title": "N/A", + "text": "Knowledge of principles and methods for integrating system components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0347", + "title": "N/A", + "text": "Knowledge and understanding of operational design.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0348", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0349", + "title": "N/A", + "text": "Knowledge of website types, administration, functions, and content management system (CMS).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0350", + "title": "N/A", + "text": "Knowledge of accepted organization planning systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0351", + "title": "N/A", + "text": "Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0352", + "title": "N/A", + "text": "Knowledge of forms of intelligence support needs, topics, and focus areas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0353", + "title": "N/A", + "text": "Knowledge of possible circumstances that would result in changing collection management authorities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0354", + "title": "N/A", + "text": "Knowledge of relevant reporting and dissemination procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0355", + "title": "N/A", + "text": "Knowledge of all-source reporting and dissemination procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0356", + "title": "N/A", + "text": "Knowledge of analytic tools and techniques for language, voice and/or graphic material.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0357", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0358", + "title": "N/A", + "text": "Knowledge of analytical standards and the purpose of intelligence confidence levels.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0359", + "title": "N/A", + "text": "Knowledge of approved intelligence dissemination processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0360", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of assembly code.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0361", + "title": "N/A", + "text": "Knowledge of asset availability, capabilities and limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0362", + "title": "N/A", + "text": "Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0363", + "title": "N/A", + "text": "Knowledge of auditing and logging procedures (including server-based logging).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0364", + "title": "N/A", + "text": "Knowledge of available databases and tools necessary to assess appropriate collection tasking.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0365", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic back-up and recovery procedures including different types of backups (e.g., full, incremental).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0366", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic computer components and architectures, including the functions of various peripherals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0367", + "title": "N/A", + "text": "Knowledge of penetration testing. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0368", + "title": "N/A", + "text": "Knowledge of implants that enable cyber collection and/or preparation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0369", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic malicious activity concepts (e.g., footprinting, scanning and enumeration).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0370", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic physical computer components and architecture, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). (See K0109)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0371", + "title": "N/A", + "text": "Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0372", + "title": "N/A", + "text": "Knowledge of programming concepts (e.g., levels, structures, compiled vs. interpreted languages).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0373", + "title": "N/A", + "text": "Knowledge of basic software applications (e.g., data storage and backup, database applications) and the types of vulnerabilities that have been found in those applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0374", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of basic structure, architecture, and design of modern digital and telephony networks. (See K0599)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0375", + "title": "N/A", + "text": "Knowledge of wireless applications vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0376", + "title": "N/A", + "text": "Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0377", + "title": "N/A", + "text": "Knowledge of classification and control markings standards, policies and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0378", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of classification and control markings standards. (See K0377)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0379", + "title": "N/A", + "text": "Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0380", + "title": "N/A", + "text": "Knowledge of collaborative tools and environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0381", + "title": "N/A", + "text": "Knowledge of collateral damage and estimating impact(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0382", + "title": "N/A", + "text": "Knowledge of collection capabilities and limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0383", + "title": "N/A", + "text": "Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0384", + "title": "N/A", + "text": "Knowledge of collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0385", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0142", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0386", + "title": "N/A", + "text": "Knowledge of collection management tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0387", + "title": "N/A", + "text": "Knowledge of collection planning process and collection plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0388", + "title": "N/A", + "text": "Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0389", + "title": "N/A", + "text": "Knowledge of collection sources including conventional and non-conventional sources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0390", + "title": "N/A", + "text": "Knowledge of collection strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0391", + "title": "N/A", + "text": "Knowledge of collection systems, capabilities, and processes. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0392", + "title": "N/A", + "text": "Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0393", + "title": "N/A", + "text": "Knowledge of common networking devices and their configurations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0394", + "title": "N/A", + "text": "Knowledge of common reporting databases and tools. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0395", + "title": "N/A", + "text": "Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0396", + "title": "N/A", + "text": "Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0397", + "title": "N/A", + "text": "Knowledge of security concepts in operating systems (e.g., Linux, Unix.)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0398", + "title": "N/A", + "text": "Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0399", + "title": "N/A", + "text": "Knowledge of crisis action planning and time sensitive planning procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0400", + "title": "N/A", + "text": "Knowledge of crisis action planning for cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0401", + "title": "N/A", + "text": "Knowledge of criteria for evaluating collection products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0402", + "title": "N/A", + "text": "Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0403", + "title": "N/A", + "text": "Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0404", + "title": "N/A", + "text": "Knowledge of current collection requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0405", + "title": "N/A", + "text": "Knowledge of current computer-based intrusion sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0406", + "title": "N/A", + "text": "Knowledge of current software and methodologies for active defense and system hardening.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0407", + "title": "N/A", + "text": "Knowledge of customer information needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0408", + "title": "N/A", + "text": "Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0409", + "title": "N/A", + "text": "Knowledge of cyber intelligence/information collection capabilities and repositories.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0410", + "title": "N/A", + "text": "Knowledge of cyber laws and their effect on Cyber planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0411", + "title": "N/A", + "text": "Knowledge of cyber laws and legal considerations and their effect on cyber planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0412", + "title": "N/A", + "text": "Knowledge of cyber lexicon/terminology", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0413", + "title": "N/A", + "text": "Knowledge of cyber operation objectives, policies, and legalities. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0414", + "title": "N/A", + "text": "Knowledge of cyber operations support or enabling processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0415", + "title": "N/A", + "text": "Knowledge of cyber operations terminology/lexicon.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0416", + "title": "N/A", + "text": "Knowledge of cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0417", + "title": "N/A", + "text": "Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0418", + "title": "N/A", + "text": "Knowledge of data flow process for terminal or environment collection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0419", + "title": "N/A", + "text": "Knowledge of database administration and maintenance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0420", + "title": "N/A", + "text": "Knowledge of database theory.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0421", + "title": "N/A", + "text": "Knowledge of databases, portals and associated dissemination vehicles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0422", + "title": "N/A", + "text": "Knowledge of deconfliction processes and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0423", + "title": "N/A", + "text": "Knowledge of deconfliction reporting to include external organization interaction.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0424", + "title": "N/A", + "text": "Knowledge of denial and deception techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0425", + "title": "N/A", + "text": "Knowledge of different organization objectives at all levels, including subordinate, lateral and higher.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0426", + "title": "N/A", + "text": "Knowledge of dynamic and deliberate targeting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0427", + "title": "N/A", + "text": "Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0428", + "title": "N/A", + "text": "Knowledge of encryption algorithms and tools for wireless local area networks (WLANs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0429", + "title": "N/A", + "text": "Knowledge of enterprise-wide information management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0430", + "title": "N/A", + "text": "Knowledge of evasion strategies and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0431", + "title": "N/A", + "text": "Knowledge of evolving/emerging communications technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0432", + "title": "N/A", + "text": "Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0433", + "title": "N/A", + "text": "Knowledge of forensic implications of operating system structure and operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0434", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of front-end collection systems, including traffic collection, filtering, and selection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0435", + "title": "N/A", + "text": "Knowledge of fundamental cyber concepts, principles, limitations, and effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0436", + "title": "N/A", + "text": "Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0437", + "title": "N/A", + "text": "Knowledge of general Supervisory control and data acquisition (SCADA) system components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0438", + "title": "N/A", + "text": "Knowledge of mobile cellular communications architecture (e.g., LTE, CDMA, GSM/EDGE and UMTS/HSPA).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0439", + "title": "N/A", + "text": "Knowledge of governing authorities for targeting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0440", + "title": "N/A", + "text": "Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0441", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0442", + "title": "N/A", + "text": "Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0443", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0444", + "title": "N/A", + "text": "Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0445", + "title": "N/A", + "text": "Knowledge of how modern digital and telephony networks impact cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0446", + "title": "N/A", + "text": "Knowledge of how modern wireless communications systems impact cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0447", + "title": "N/A", + "text": "Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0448", + "title": "N/A", + "text": "Knowledge of how to establish priorities for resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0449", + "title": "N/A", + "text": "Knowledge of how to extract, analyze, and use metadata.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0450", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0036", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0451", + "title": "N/A", + "text": "Knowledge of identification and reporting processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0452", + "title": "N/A", + "text": "Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0453", + "title": "N/A", + "text": "Knowledge of indications and warning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0454", + "title": "N/A", + "text": "Knowledge of information needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0455", + "title": "N/A", + "text": "Knowledge of information security concepts, facilitating technologies and methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0456", + "title": "N/A", + "text": "Knowledge of intelligence capabilities and limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0457", + "title": "N/A", + "text": "Knowledge of intelligence confidence levels.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0458", + "title": "N/A", + "text": "Knowledge of intelligence disciplines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0459", + "title": "N/A", + "text": "Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0460", + "title": "N/A", + "text": "Knowledge of intelligence preparation of the environment and similar processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0461", + "title": "N/A", + "text": "Knowledge of intelligence production processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0462", + "title": "N/A", + "text": "Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0463", + "title": "N/A", + "text": "Knowledge of intelligence requirements tasking systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0464", + "title": "N/A", + "text": "Knowledge of intelligence support to planning, execution, and assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0465", + "title": "N/A", + "text": "Knowledge of internal and external partner cyber operations capabilities and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0466", + "title": "N/A", + "text": "Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0467", + "title": "N/A", + "text": "Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0468", + "title": "N/A", + "text": "Knowledge of internal and external partner reporting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0469", + "title": "N/A", + "text": "Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0470", + "title": "N/A", + "text": "Knowledge of Internet and routing protocols.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0471", + "title": "N/A", + "text": "Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0472", + "title": "N/A", + "text": "Knowledge of intrusion detection systems and signature development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0473", + "title": "N/A", + "text": "Knowledge of intrusion sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0474", + "title": "N/A", + "text": "Knowledge of key cyber threat actors and their equities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0475", + "title": "N/A", + "text": "Knowledge of key factors of the operational environment and threat.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0476", + "title": "N/A", + "text": "Knowledge of language processing tools and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0477", + "title": "N/A", + "text": "Knowledge of leadership's Intent and objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0478", + "title": "N/A", + "text": "Knowledge of legal considerations in targeting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0479", + "title": "N/A", + "text": "Knowledge of malware analysis and characteristics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0480", + "title": "N/A", + "text": "Knowledge of malware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0481", + "title": "N/A", + "text": "Knowledge of methods and techniques used to detect various exploitation activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0482", + "title": "N/A", + "text": "Knowledge of methods for ascertaining collection asset posture and availability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0483", + "title": "N/A", + "text": "Knowledge of methods to integrate and summarize information from any potential sources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0484", + "title": "N/A", + "text": "Knowledge of midpoint collection (process, objectives, organization, targets, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0485", + "title": "N/A", + "text": "Knowledge of network administration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0486", + "title": "N/A", + "text": "Knowledge of network construction and topology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0487", + "title": "N/A", + "text": "Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0488", + "title": "N/A", + "text": "Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0489", + "title": "N/A", + "text": "Knowledge of network topology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0490", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0058", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0491", + "title": "N/A", + "text": "Knowledge of networking and Internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0492", + "title": "N/A", + "text": "Knowledge of non-traditional collection methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0493", + "title": "N/A", + "text": "Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0494", + "title": "N/A", + "text": "Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0495", + "title": "N/A", + "text": "Knowledge of ongoing and future operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0496", + "title": "N/A", + "text": "Knowledge of operational asset constraints.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0497", + "title": "N/A", + "text": "Knowledge of operational effectiveness assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0498", + "title": "N/A", + "text": "Knowledge of operational planning processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0499", + "title": "N/A", + "text": "Knowledge of operations security.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0500", + "title": "N/A", + "text": "Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0501", + "title": "N/A", + "text": "Knowledge of organization cyber operations programs, strategies, and resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0502", + "title": "N/A", + "text": "Knowledge of organization decision support tools and/or methods.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0503", + "title": "N/A", + "text": "Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0504", + "title": "N/A", + "text": "Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0505", + "title": "N/A", + "text": "Knowledge of organization objectives and associated demand on collection management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0506", + "title": "N/A", + "text": "Knowledge of organization objectives, leadership priorities, and decision-making risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0507", + "title": "N/A", + "text": "Knowledge of organization or partner exploitation of digital networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0508", + "title": "N/A", + "text": "Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0509", + "title": "N/A", + "text": "Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0510", + "title": "N/A", + "text": "Knowledge of organizational and partner policies, tools, capabilities, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0511", + "title": "N/A", + "text": "Knowledge of organizational hierarchy and cyber decision-making processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0512", + "title": "N/A", + "text": "Knowledge of organizational planning concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0513", + "title": "N/A", + "text": "Knowledge of organizational priorities, legal authorities and requirements submission processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0514", + "title": "N/A", + "text": "Knowledge of organizational structures and associated intelligence capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0515", + "title": "N/A", + "text": "WITHDRAWN: Knowledge of OSI model and underlying networking protocols (e.g., TCP/IP).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0516", + "title": "N/A", + "text": "Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0517", + "title": "N/A", + "text": "Knowledge of post implementation review (PIR) approval process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0518", + "title": "N/A", + "text": "Knowledge of planning activity initiation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0519", + "title": "N/A", + "text": "Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0520", + "title": "N/A", + "text": "Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0521", + "title": "N/A", + "text": "Knowledge of priority information, how it is derived, where it is published, how to access, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0522", + "title": "N/A", + "text": "Knowledge of production exploitation and dissemination needs and architectures. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0523", + "title": "N/A", + "text": "Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0524", + "title": "N/A", + "text": "Knowledge of relevant laws, regulations, and policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0525", + "title": "N/A", + "text": "Knowledge of required intelligence planning products associated with cyber operational planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0526", + "title": "N/A", + "text": "Knowledge of research strategies and knowledge management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0527", + "title": "N/A", + "text": "Knowledge of risk management and mitigation strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0528", + "title": "N/A", + "text": "Knowledge of satellite-based communication systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0529", + "title": "N/A", + "text": "Knowledge of scripting", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0530", + "title": "N/A", + "text": "Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0531", + "title": "N/A", + "text": "Knowledge of security implications of software configurations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0532", + "title": "N/A", + "text": "Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, code words).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0533", + "title": "N/A", + "text": "Knowledge of specific target identifiers, and their usage.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0534", + "title": "N/A", + "text": "Knowledge of staff management, assignment, and allocation processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0535", + "title": "N/A", + "text": "Knowledge of strategies and tools for target research.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0536", + "title": "N/A", + "text": "Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0537", + "title": "N/A", + "text": "Knowledge of system administration concepts for the Unix/Linux and Windows operating systems (e.g., process management, directory structure, installed applications, Access Controls).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0538", + "title": "N/A", + "text": "Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0539", + "title": "N/A", + "text": "Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0540", + "title": "N/A", + "text": "Knowledge of target communication tools and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0541", + "title": "N/A", + "text": "Knowledge of target cultural references, dialects, expressions, idioms, and abbreviations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0542", + "title": "N/A", + "text": "Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0543", + "title": "N/A", + "text": "Knowledge of target estimated repair and recuperation times.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0544", + "title": "N/A", + "text": "Knowledge of target intelligence gathering and operational preparation techniques and life cycles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0545", + "title": "N/A", + "text": "Knowledge of target language(s).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0546", + "title": "N/A", + "text": "Knowledge of target list development (i.e. Restricted, Joint, Candidate, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0547", + "title": "N/A", + "text": "Knowledge of target methods and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0548", + "title": "N/A", + "text": "Knowledge of target or threat cyber actors and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0549", + "title": "N/A", + "text": "Knowledge of target vetting and validation procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0550", + "title": "N/A", + "text": "Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0551", + "title": "N/A", + "text": "Knowledge of targeting cycles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0552", + "title": "N/A", + "text": "Knowledge of tasking mechanisms.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0553", + "title": "N/A", + "text": "Knowledge of tasking processes for organic and subordinate collection assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0554", + "title": "N/A", + "text": "Knowledge of tasking, collection, processing, exploitation and dissemination.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0555", + "title": "N/A", + "text": "Knowledge of TCP/IP networking protocols.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0556", + "title": "N/A", + "text": "Knowledge of telecommunications fundamentals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0557", + "title": "N/A", + "text": "Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0558", + "title": "N/A", + "text": "Knowledge of the available tools and applications associated with collection requirements and collection management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0559", + "title": "N/A", + "text": "Knowledge of the basic structure, architecture, and design of converged applications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0560", + "title": "N/A", + "text": "Knowledge of the basic structure, architecture, and design of modern communication networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0561", + "title": "N/A", + "text": "Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0562", + "title": "N/A", + "text": "Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0563", + "title": "N/A", + "text": "Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0564", + "title": "N/A", + "text": "Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0565", + "title": "N/A", + "text": "Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0566", + "title": "N/A", + "text": "Knowledge of the critical information requirements and how they're used in planning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0567", + "title": "N/A", + "text": "Knowledge of the data flow from collection origin to repositories and tools. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0568", + "title": "N/A", + "text": "Knowledge of the definition of collection management and collection management authority.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0569", + "title": "N/A", + "text": "Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0570", + "title": "N/A", + "text": "Knowledge of the factors of threat that could impact collection operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0571", + "title": "N/A", + "text": "Knowledge of the feedback cycle in collection processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0572", + "title": "N/A", + "text": "Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0573", + "title": "N/A", + "text": "Knowledge of the fundamentals of digital forensics to extract actionable intelligence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0574", + "title": "N/A", + "text": "Knowledge of the impact of language analysis on on-net operator functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0575", + "title": "N/A", + "text": "Knowledge of the impacts of internal and external partner staffing estimates.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0576", + "title": "N/A", + "text": "Knowledge of the information environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0577", + "title": "N/A", + "text": "Knowledge of the intelligence frameworks, processes, and related systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0578", + "title": "N/A", + "text": "Knowledge of the intelligence requirements development and request for information processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0579", + "title": "N/A", + "text": "Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0580", + "title": "N/A", + "text": "Knowledge of the organization\u2019s established format for collection plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0581", + "title": "N/A", + "text": "Knowledge of the organization\u2019s planning, operations and targeting cycles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0582", + "title": "N/A", + "text": "Knowledge of the organizational planning and staffing process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0583", + "title": "N/A", + "text": "Knowledge of the organizational plans/directives/guidance that describe objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0584", + "title": "N/A", + "text": "Knowledge of the organizational policies/procedures for temporary transfer of collection authority.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0585", + "title": "N/A", + "text": "Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0586", + "title": "N/A", + "text": "Knowledge of the outputs of course of action and exercise analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0587", + "title": "N/A", + "text": "Knowledge of the POC\u2019s, databases, tools and applications necessary to establish environment preparation and surveillance products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0588", + "title": "N/A", + "text": "Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0589", + "title": "N/A", + "text": "Knowledge of the process used to assess the performance and impact of operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0590", + "title": "N/A", + "text": "Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0591", + "title": "N/A", + "text": "Knowledge of the production responsibilities and organic analysis and production capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0592", + "title": "N/A", + "text": "Knowledge of the purpose and contribution of target templates.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0593", + "title": "N/A", + "text": "Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0594", + "title": "N/A", + "text": "Knowledge of the relationships between end states, objectives, effects, lines of operation, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0595", + "title": "N/A", + "text": "Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0596", + "title": "N/A", + "text": "Knowledge of the request for information process. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0597", + "title": "N/A", + "text": "Knowledge of the role of network operations in supporting and facilitating other organization operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0598", + "title": "N/A", + "text": "Knowledge of the structure and intent of organization specific plans, guidance and authorizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0599", + "title": "N/A", + "text": "Knowledge of the structure, architecture, and design of modern digital and telephony networks. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0600", + "title": "N/A", + "text": "Knowledge of the structure, architecture, and design of modern wireless communications systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0601", + "title": "N/A", + "text": "Knowledge of the systems/architecture/communications used for coordination.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0602", + "title": "N/A", + "text": "Knowledge of collection disciplines and capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0603", + "title": "N/A", + "text": "Knowledge of the ways in which targets or threats use the Internet.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0604", + "title": "N/A", + "text": "Knowledge of threat and/or target systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0605", + "title": "N/A", + "text": "Knowledge of tipping, cueing, mixing, and redundancy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0606", + "title": "N/A", + "text": "Knowledge of transcript development processes and techniques (e.g., verbatim, gist, summaries).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0607", + "title": "N/A", + "text": "Knowledge of translation processes and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0608", + "title": "N/A", + "text": "Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0609", + "title": "N/A", + "text": "Knowledge of virtual machine technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0610", + "title": "N/A", + "text": "Knowledge of virtualization products (VMware, Virtual PC).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0611", + "title": "N/A", + "text": "WITHDRAWN: Integrated into K0131", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0612", + "title": "N/A", + "text": "Knowledge of what constitutes a \u201cthreat\u201d to a network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0613", + "title": "N/A", + "text": "Knowledge of who the organization\u2019s operational planners are, how and where they can be contacted, and what are their expectations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0614", + "title": "N/A", + "text": "Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0615", + "title": "N/A", + "text": "Knowledge of privacy disclosure statements based on current laws.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0616", + "title": "N/A", + "text": "Knowledge of continuous monitoring, its processes, and Continuous Diagnostics and Mitigation (CDM) program activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0617", + "title": "N/A", + "text": "Knowledge of Automated security control assessments", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0618", + "title": "N/A", + "text": "Knowledge of hardware asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0619", + "title": "N/A", + "text": "Knowledge of software asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0620", + "title": "N/A", + "text": "Knowledge of continuous monitoring technologies and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0621", + "title": "N/A", + "text": "Knowledge of risk scoring.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0622", + "title": "N/A", + "text": "Knowledge of controls related to the use, processing, storage, and transmission of data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0623", + "title": "N/A", + "text": "Knowledge of risk assessment methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0624", + "title": "N/A", + "text": "Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0625", + "title": "N/A", + "text": "Knowledge that patching and software updates are impractical for some networked devices. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0626", + "title": "N/A", + "text": "Knowledge of secure update mechanisms.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0627", + "title": "N/A", + "text": "Knowledge of the importance of ingress filtering to protect against automated threats that rely on spoofed network addresses.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0628", + "title": "N/A", + "text": "Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0629", + "title": "N/A", + "text": "Knowledge of white/black listing", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "knowledge", + "element_identifier": "K0630", + "title": "N/A", + "text": "Knowledge of the latest intrusion techniques, methods and documented intrusions external to the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0001", + "title": "N/A", + "text": "Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0002", + "title": "N/A", + "text": "Skill in allocating storage capacity in the design of data management systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0003", + "title": "N/A", + "text": "Skill of identifying, capturing, containing, and reporting malware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0004", + "title": "N/A", + "text": "Skill in analyzing network traffic capacity and performance characteristics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0005", + "title": "N/A", + "text": "Skill in applying and incorporating information technologies into proposed solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0006", + "title": "N/A", + "text": "Skill in applying confidentiality, integrity, and availability principles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0007", + "title": "N/A", + "text": "Skill in applying host/network access controls (e.g., access control list).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0008", + "title": "N/A", + "text": "Skill in applying organization-specific systems analysis principles and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0009", + "title": "N/A", + "text": "WITHDRAWN: Skill in assessing the robustness of security systems and designs. (See S0027)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0010", + "title": "N/A", + "text": "Skill in conducting capabilities and requirements analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0011", + "title": "N/A", + "text": "Skill in conducting information searches.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0012", + "title": "N/A", + "text": "Skill in conducting knowledge mapping (e.g., map of knowledge repositories).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0013", + "title": "N/A", + "text": "Skill in conducting queries and developing algorithms to analyze data structures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0014", + "title": "N/A", + "text": "Skill in conducting software debugging.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0015", + "title": "N/A", + "text": "Skill in conducting test events.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0016", + "title": "N/A", + "text": "Skill in configuring and optimizing software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0017", + "title": "N/A", + "text": "Skill in creating and utilizing mathematical or statistical models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0018", + "title": "N/A", + "text": "Skill in creating policies that reflect system security objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0019", + "title": "N/A", + "text": "Skill in creating programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0020", + "title": "N/A", + "text": "Skill in developing and deploying signatures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0021", + "title": "N/A", + "text": "Skill in designing a data analysis structure (i.e., the types of data a test must generate and how to analyze that data).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0022", + "title": "N/A", + "text": "Skill in designing countermeasures to identified security risks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0023", + "title": "N/A", + "text": "Skill in designing security controls based on cybersecurity principles and tenets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0024", + "title": "N/A", + "text": "Skill in designing the integration of hardware and software solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0025", + "title": "N/A", + "text": "Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0026", + "title": "N/A", + "text": "Skill in determining an appropriate level of test rigor for a given system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0027", + "title": "N/A", + "text": "Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0028", + "title": "N/A", + "text": "Skill in developing data dictionaries.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0029", + "title": "N/A", + "text": "Skill in developing data models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0030", + "title": "N/A", + "text": "Skill in developing operations-based testing scenarios.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0031", + "title": "N/A", + "text": "Skill in developing and applying security system access controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0032", + "title": "N/A", + "text": "Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0033", + "title": "N/A", + "text": "Skill in diagnosing connectivity problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0034", + "title": "N/A", + "text": "Skill in discerning the protection needs (i.e., security controls) of information systems and networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0035", + "title": "N/A", + "text": "Skill in establishing a routing schema.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0036", + "title": "N/A", + "text": "Skill in evaluating the adequacy of security designs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0037", + "title": "N/A", + "text": "Skill in generating queries and reports.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0038", + "title": "N/A", + "text": "Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0039", + "title": "N/A", + "text": "Skill in identifying possible causes of degradation of system performance or availability and initiating actions needed to mitigate this degradation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0040", + "title": "N/A", + "text": "Skill in implementing, maintaining, and improving established network security practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0041", + "title": "N/A", + "text": "Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0042", + "title": "N/A", + "text": "Skill in maintaining databases. (i.e., backup, restore, delete data, transaction log files, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0043", + "title": "N/A", + "text": "Skill in maintaining directory services. (e.g., Microsoft Active Directory, LDAP, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0044", + "title": "N/A", + "text": "Skill in mimicking threat behaviors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0045", + "title": "N/A", + "text": "Skill in optimizing database performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0046", + "title": "N/A", + "text": "Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0047", + "title": "N/A", + "text": "Skill in preserving evidence integrity according to standard operating procedures or national standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0048", + "title": "N/A", + "text": "Skill in systems integration testing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0049", + "title": "N/A", + "text": "Skill in the measuring and reporting of intellectual capital.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0050", + "title": "N/A", + "text": "Skill in design modeling and building use cases (e.g., unified modeling language).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0051", + "title": "N/A", + "text": "Skill in the use of penetration testing tools and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0052", + "title": "N/A", + "text": "Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0053", + "title": "N/A", + "text": "Skill in tuning sensors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0054", + "title": "N/A", + "text": "Skill in using incident handling methodologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0055", + "title": "N/A", + "text": "Skill in using knowledge management technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0056", + "title": "N/A", + "text": "Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0057", + "title": "N/A", + "text": "Skill in using protocol analyzers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0058", + "title": "N/A", + "text": "Skill in using the appropriate tools for repairing software, hardware, and peripheral equipment of a system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0059", + "title": "N/A", + "text": "Skill in using Virtual Private Network (VPN) devices and encryption.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0060", + "title": "N/A", + "text": "Skill in writing code in a currently supported programming language (e.g., Java, C++).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0061", + "title": "N/A", + "text": "Skill in writing test plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0062", + "title": "N/A", + "text": "Skill in analyzing memory dumps to extract information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0063", + "title": "N/A", + "text": "Skill in collecting data from a variety of cyber defense resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0064", + "title": "N/A", + "text": "Skill in developing and executing technical training programs and curricula.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0065", + "title": "N/A", + "text": "Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0066", + "title": "N/A", + "text": "Skill in identifying gaps in technical capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0067", + "title": "N/A", + "text": "Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0068", + "title": "N/A", + "text": "Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0069", + "title": "N/A", + "text": "Skill in setting up a forensic workstation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0070", + "title": "N/A", + "text": "Skill in talking to others to convey information effectively.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0071", + "title": "N/A", + "text": "Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0072", + "title": "N/A", + "text": "Skill in using scientific rules and methods to solve problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0073", + "title": "N/A", + "text": "Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0074", + "title": "N/A", + "text": "Skill in physically disassembling PCs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0075", + "title": "N/A", + "text": "Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0076", + "title": "N/A", + "text": "Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0077", + "title": "N/A", + "text": "Skill in securing network communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0078", + "title": "N/A", + "text": "Skill in recognizing and categorizing types of vulnerabilities and associated attacks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0079", + "title": "N/A", + "text": "Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0080", + "title": "N/A", + "text": "Skill in performing damage assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0081", + "title": "N/A", + "text": "Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0082", + "title": "N/A", + "text": "Skill in evaluating test plans for applicability and completeness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0083", + "title": "N/A", + "text": "Skill in integrating black box security testing tools into quality assurance process of software releases.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0084", + "title": "N/A", + "text": "Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0085", + "title": "N/A", + "text": "Skill in conducting audits or reviews of technical systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0086", + "title": "N/A", + "text": "Skill in evaluating the trustworthiness of the supplier and/or product.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0087", + "title": "N/A", + "text": "Skill in deep analysis of captured malicious code (e.g., malware forensics).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0088", + "title": "N/A", + "text": "Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0089", + "title": "N/A", + "text": "Skill in one-way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0090", + "title": "N/A", + "text": "Skill in analyzing anomalous code as malicious or benign.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0091", + "title": "N/A", + "text": "Skill in analyzing volatile data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0092", + "title": "N/A", + "text": "Skill in identifying obfuscation techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0093", + "title": "N/A", + "text": "Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0094", + "title": "N/A", + "text": "Skill in reading Hexadecimal data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0095", + "title": "N/A", + "text": "Skill in identifying common encoding techniques (e.g., Exclusive Disjunction [XOR], American Standard Code for Information Interchange [ASCII], Unicode, Base64, Uuencode, Uniform Resource Locator [URL] encode).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0096", + "title": "N/A", + "text": "Skill in reading and interpreting signatures (e.g., snort).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0097", + "title": "N/A", + "text": "Skill in applying security controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0098", + "title": "N/A", + "text": "WITHDRAWN: Skill in detecting host and network based intrusions via intrusion detection technologies. (See S0025)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0099", + "title": "N/A", + "text": "WITHDRAWN: Skill in determining how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes. (See S0027)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0100", + "title": "N/A", + "text": "Skill in utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0101", + "title": "N/A", + "text": "Skill in utilizing technologies (e.g., SmartBoards, websites, computers, projectors) for instructional purposes. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0102", + "title": "N/A", + "text": "Skill in applying technical delivery capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0103", + "title": "N/A", + "text": "Skill in assessing the predictive power and subsequent generalizability of a model.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0104", + "title": "N/A", + "text": "Skill in conducting Test Readiness Reviews.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0105", + "title": "N/A", + "text": "WITHDRAWN: Skill in data mining techniques. (See S0202)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0106", + "title": "N/A", + "text": "Skill in data pre-processing (e.g., imputation, dimensionality reduction, normalization, transformation, extraction, filtering, smoothing).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0107", + "title": "N/A", + "text": "Skill in designing and documenting overall program Test & Evaluation strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0108", + "title": "N/A", + "text": "Skill in developing workforce and position qualification standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0109", + "title": "N/A", + "text": "Skill in identifying hidden patterns or relationships.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0110", + "title": "N/A", + "text": "Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0111", + "title": "N/A", + "text": "Skill in interfacing with customers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0112", + "title": "N/A", + "text": "Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0113", + "title": "N/A", + "text": "Skill in performing format conversions to create a standard representation of the data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0114", + "title": "N/A", + "text": "Skill in performing sensitivity analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0115", + "title": "N/A", + "text": "Skill in preparing Test & Evaluation reports.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0116", + "title": "N/A", + "text": "Skill in designing multi-level security/cross domain solutions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0117", + "title": "N/A", + "text": "Skill in providing Test & Evaluation resource estimate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0118", + "title": "N/A", + "text": "Skill in developing machine understandable semantic ontologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0119", + "title": "N/A", + "text": "Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0120", + "title": "N/A", + "text": "Skill in reviewing logs to identify evidence of past intrusions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0121", + "title": "N/A", + "text": "Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0122", + "title": "N/A", + "text": "Skill in the use of design methods. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0123", + "title": "N/A", + "text": "Skill in transformation analytics (e.g., aggregation, enrichment, processing).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0124", + "title": "N/A", + "text": "Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0125", + "title": "N/A", + "text": "Skill in using basic descriptive statistics and techniques (e.g., normality, model distribution, scatter plots).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0126", + "title": "N/A", + "text": "Skill in using data analysis tools (e.g., Excel, STATA SAS, SPSS).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0127", + "title": "N/A", + "text": "Skill in using data mapping tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0128", + "title": "N/A", + "text": "Skill in using manpower and personnel IT systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0129", + "title": "N/A", + "text": "Skill in using outlier identification and removal techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0130", + "title": "N/A", + "text": "Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0131", + "title": "N/A", + "text": "Skill in analyzing malware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0132", + "title": "N/A", + "text": "Skill in conducting bit-level analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0133", + "title": "N/A", + "text": "Skill in processing digital evidence, to include protecting and making legally sound copies of evidence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0134", + "title": "N/A", + "text": "Skill in conducting reviews of systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0135", + "title": "N/A", + "text": "Skill in secure test plan design (e. g. unit, integration, system, acceptance).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0136", + "title": "N/A", + "text": "Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0137", + "title": "N/A", + "text": "Skill in conducting application vulnerability assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0138", + "title": "N/A", + "text": "Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0139", + "title": "N/A", + "text": "Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0140", + "title": "N/A", + "text": "Skill in applying the systems engineering process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0141", + "title": "N/A", + "text": "Skill in assessing security systems designs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0142", + "title": "N/A", + "text": "Skill in conducting research for troubleshooting novel client-level problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0143", + "title": "N/A", + "text": "Skill in conducting system/server planning, management, and maintenance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0144", + "title": "N/A", + "text": "Skill in correcting physical and technical problems that impact system/server performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0145", + "title": "N/A", + "text": "Skill in integrating and applying policies that meet system security objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0146", + "title": "N/A", + "text": "Skill in creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA's, CPU specifications).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0147", + "title": "N/A", + "text": "Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0148", + "title": "N/A", + "text": "Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0149", + "title": "N/A", + "text": "Skill in developing applications that can log and handle errors, exceptions, and application faults and logging.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0150", + "title": "N/A", + "text": "Skill in implementing and testing network infrastructure contingency and recovery plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0151", + "title": "N/A", + "text": "Skill in troubleshooting failed system components (i.e., servers)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0152", + "title": "N/A", + "text": "Skill in translating operational requirements into protection needs (i.e., security controls).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0153", + "title": "N/A", + "text": "Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0154", + "title": "N/A", + "text": "Skill in installing system and component upgrades. (i.e., servers, appliances, network devices).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0155", + "title": "N/A", + "text": "Skill in monitoring and optimizing system/server performance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0156", + "title": "N/A", + "text": "Skill in performing packet-level analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0157", + "title": "N/A", + "text": "Skill in recovering failed systems/servers. (e.g., recovery software, failover clusters, replication, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0158", + "title": "N/A", + "text": "Skill in operating system administration. (e.g., account maintenance, data backups, maintain system performance, install and configure new hardware/software).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0159", + "title": "N/A", + "text": "Skill in configuring and validating network workstations and peripherals in accordance with approved standards and/or specifications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0160", + "title": "N/A", + "text": "Skill in the use of design modeling (e.g., unified modeling language).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0161", + "title": "N/A", + "text": "WITHDRAWN: Integrated into S0160", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0162", + "title": "N/A", + "text": "Skill in applying various subnet techniques (e.g., CIDR)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0163", + "title": "N/A", + "text": "WITHDRAWN: Integrated into S0060", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0164", + "title": "N/A", + "text": "Skill in assessing the application of cryptographic standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0165", + "title": "N/A", + "text": "WITHDRAWN: Skill in collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. (See S0068)", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0166", + "title": "N/A", + "text": "Skill in identifying gaps in technical delivery capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0167", + "title": "N/A", + "text": "Skill in recognizing vulnerabilities in security systems. (e.g., vulnerability and compliance scanning).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0168", + "title": "N/A", + "text": "Skill in setting up physical or logical sub-networks that separate an internal local area network (LAN) from other untrusted networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0169", + "title": "N/A", + "text": "Skill in conducting trend analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0170", + "title": "N/A", + "text": "Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0171", + "title": "N/A", + "text": "Skill in performing impact/risk assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0172", + "title": "N/A", + "text": "Skill in applying secure coding techniques. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0173", + "title": "N/A", + "text": "Skill in using security event correlation tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0174", + "title": "N/A", + "text": "Skill in using code analysis tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0175", + "title": "N/A", + "text": "Skill in performing root cause analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0176", + "title": "N/A", + "text": "Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0177", + "title": "N/A", + "text": "Skill in analyzing a target's communication networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0178", + "title": "N/A", + "text": "Skill in analyzing essential network data (e.g., router configuration files, routing protocols).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0179", + "title": "N/A", + "text": "Skill in analyzing language processing tools to provide feedback to enhance tool development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0180", + "title": "N/A", + "text": "WITHDRAWN: Integrated into S0062", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0181", + "title": "N/A", + "text": "Skill in analyzing midpoint collection data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0182", + "title": "N/A", + "text": "Skill in analyzing target communications internals and externals collected from wireless LANs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0183", + "title": "N/A", + "text": "Skill in analyzing terminal or environment collection data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0184", + "title": "N/A", + "text": "Skill in analyzing traffic to identify network devices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0185", + "title": "N/A", + "text": "Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0186", + "title": "N/A", + "text": "Skill in applying crisis planning procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0187", + "title": "N/A", + "text": "Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0188", + "title": "N/A", + "text": "Skill in assessing a target's frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0189", + "title": "N/A", + "text": "Skill in assessing and/or estimating effects generated during and after cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0190", + "title": "N/A", + "text": "Skill in assessing current tools to identify needed improvements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0191", + "title": "N/A", + "text": "Skill in assessing the applicability of available analytical tools to various situations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0192", + "title": "N/A", + "text": "Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0193", + "title": "N/A", + "text": "Skill in complying with the legal restrictions for targeted information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0194", + "title": "N/A", + "text": "Skill in conducting non-attributable research.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0195", + "title": "N/A", + "text": "Skill in conducting research using all available sources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0196", + "title": "N/A", + "text": "Skill in conducting research using deep web.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0197", + "title": "N/A", + "text": "Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0198", + "title": "N/A", + "text": "Skill in conducting social network analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0199", + "title": "N/A", + "text": "Skill in creating and extracting important information from packet captures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0200", + "title": "N/A", + "text": "Skill in creating collection requirements in support of data acquisition activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0201", + "title": "N/A", + "text": "Skill in creating plans in support of remote operations. (i.e., hot/warm/cold/alternative sites, disaster recovery).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0202", + "title": "N/A", + "text": "Skill in data mining techniques (e.g., searching file systems) and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0203", + "title": "N/A", + "text": "Skill in defining and characterizing all pertinent aspects of the operational environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0204", + "title": "N/A", + "text": "Skill in depicting source or collateral data on a network map.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0205", + "title": "N/A", + "text": "Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0206", + "title": "N/A", + "text": "Skill in determining installed patches on various operating systems and identifying patch signatures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0207", + "title": "N/A", + "text": "Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0208", + "title": "N/A", + "text": "Skill in determining the physical location of network devices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0209", + "title": "N/A", + "text": "Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0210", + "title": "N/A", + "text": "Skill in developing intelligence reports.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0211", + "title": "N/A", + "text": "Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0212", + "title": "N/A", + "text": "Skill in disseminating items of highest intelligence value in a timely manner.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0213", + "title": "N/A", + "text": "Skill in documenting and communicating complex technical and programmatic information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0214", + "title": "N/A", + "text": "Skill in evaluating accesses for intelligence value.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0215", + "title": "N/A", + "text": "Skill in evaluating and interpreting metadata.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0216", + "title": "N/A", + "text": "Skill in evaluating available capabilities against desired effects to provide effective courses of action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0217", + "title": "N/A", + "text": "Skill in evaluating data sources for relevance, reliability, and objectivity.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0218", + "title": "N/A", + "text": "Skill in evaluating information for reliability, validity, and relevance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0219", + "title": "N/A", + "text": "Skill in evaluating information to recognize relevance, priority, etc.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0220", + "title": "N/A", + "text": "Skill in exploiting/querying organizational and/or partner collection databases.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0221", + "title": "N/A", + "text": "Skill in extracting information from packet captures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0222", + "title": "N/A", + "text": "Skill in fusion analysis ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0223", + "title": "N/A", + "text": "Skill in generating operation plans in support of mission and target requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0224", + "title": "N/A", + "text": "Skill in gisting target communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0225", + "title": "N/A", + "text": "Skill in identifying a target\u2019s communications networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0226", + "title": "N/A", + "text": "Skill in identifying a target's network characteristics. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0227", + "title": "N/A", + "text": "Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0228", + "title": "N/A", + "text": "Skill in identifying critical target elements, to include critical target elements for the cyber domain.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0229", + "title": "N/A", + "text": "Skill in identifying cyber threats which may jeopardize organization and/or partner interests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0230", + "title": "N/A", + "text": "WITHDRAWN: Integrated into S0066", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0231", + "title": "N/A", + "text": "Skill in identifying how a target communicates.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0232", + "title": "N/A", + "text": "Skill in identifying intelligence gaps and limitations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0233", + "title": "N/A", + "text": "Skill in identifying language issues that may have an impact on organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0234", + "title": "N/A", + "text": "Skill in identifying leads for target development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0235", + "title": "N/A", + "text": "Skill in identifying non-target regional languages and dialects", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0236", + "title": "N/A", + "text": "Skill in identifying the devices that work at each level of protocol models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0237", + "title": "N/A", + "text": "Skill in identifying, locating, and tracking targets via geospatial analysis techniques", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0238", + "title": "N/A", + "text": "Skill in information prioritization as it relates to operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0239", + "title": "N/A", + "text": "Skill in interpreting compiled and interpretive programming languages.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0240", + "title": "N/A", + "text": "Skill in interpreting metadata and content as applied by collection systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0241", + "title": "N/A", + "text": "Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0242", + "title": "N/A", + "text": "Skill in interpreting vulnerability scanner results to identify vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0243", + "title": "N/A", + "text": "Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0244", + "title": "N/A", + "text": "Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0245", + "title": "N/A", + "text": "Skill in navigating network visualization software.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0246", + "title": "N/A", + "text": "Skill in number normalization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0247", + "title": "N/A", + "text": "Skill in performing data fusion from existing intelligence for enabling new and continued collection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0248", + "title": "N/A", + "text": "Skill in performing target system analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0249", + "title": "N/A", + "text": "Skill in preparing and presenting briefings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0250", + "title": "N/A", + "text": "Skill in preparing plans and related correspondence.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0251", + "title": "N/A", + "text": "Skill in prioritizing target language material.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0252", + "title": "N/A", + "text": "Skill in processing collected data for follow-on analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0253", + "title": "N/A", + "text": "Skill in providing analysis on target-related matters (e.g., language, cultural, communications).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0254", + "title": "N/A", + "text": "Skill in providing analysis to aid writing phased after action reports.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0255", + "title": "N/A", + "text": "Skill in providing real-time, actionable geolocation information utilizing target infrastructures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0256", + "title": "N/A", + "text": "Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0257", + "title": "N/A", + "text": "Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0258", + "title": "N/A", + "text": "Skill in recognizing and interpreting malicious network activity in traffic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0259", + "title": "N/A", + "text": "Skill in recognizing denial and deception techniques of the target.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0260", + "title": "N/A", + "text": "Skill in recognizing midpoint opportunities and essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0261", + "title": "N/A", + "text": "Skill in recognizing relevance of information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0262", + "title": "N/A", + "text": "Skill in recognizing significant changes in a target\u2019s communication patterns.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0263", + "title": "N/A", + "text": "Skill in recognizing technical information that may be used for leads for metadata analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0264", + "title": "N/A", + "text": "Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0265", + "title": "N/A", + "text": "Skill in recognizing technical information that may be used for target development including intelligence development. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0266", + "title": "N/A", + "text": "Skill in relevant programming languages (e.g., C++, Python, etc.). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0267", + "title": "N/A", + "text": "Skill in remote command line and Graphic User Interface (GUI) tool usage.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0268", + "title": "N/A", + "text": "Skill in researching essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0269", + "title": "N/A", + "text": "Skill in researching vulnerabilities and exploits utilized in traffic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0270", + "title": "N/A", + "text": "Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0271", + "title": "N/A", + "text": "Skill in reviewing and editing assessment products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0272", + "title": "N/A", + "text": "Skill in reviewing and editing intelligence products from various sources for cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0273", + "title": "N/A", + "text": "Skill in reviewing and editing plans.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0274", + "title": "N/A", + "text": "Skill in reviewing and editing target materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0275", + "title": "N/A", + "text": "Skill in server administration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0276", + "title": "N/A", + "text": "Skill in survey, collection, and analysis of wireless LAN metadata.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0277", + "title": "N/A", + "text": "Skill in synthesizing, analyzing, and prioritizing meaning across data sets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0278", + "title": "N/A", + "text": "Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0279", + "title": "N/A", + "text": "Skill in target development in direct support of collection operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0280", + "title": "N/A", + "text": "Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0281", + "title": "N/A", + "text": "Skill in technical writing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0282", + "title": "N/A", + "text": "Skill in testing and evaluating tools for implementation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0283", + "title": "N/A", + "text": "Skill in transcribing target language communications.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0284", + "title": "N/A", + "text": "Skill in translating target graphic and/or voice language materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0285", + "title": "N/A", + "text": "Skill in using Boolean operators to construct simple and complex queries.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0286", + "title": "N/A", + "text": "Skill in using databases to identify target-relevant information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0287", + "title": "N/A", + "text": "Skill in using geospatial data and applying geospatial resources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0288", + "title": "N/A", + "text": "Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst\u2019s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0289", + "title": "N/A", + "text": "Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0290", + "title": "N/A", + "text": "Skill in using non-attributable networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0291", + "title": "N/A", + "text": "Skill in using research methods including multiple, different sources to reconstruct a target network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0292", + "title": "N/A", + "text": "Skill in using targeting databases and software packages.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0293", + "title": "N/A", + "text": "Skill in using tools, techniques, and procedures to remotely exploit and establish persistence on a target.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0294", + "title": "N/A", + "text": "Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0295", + "title": "N/A", + "text": "Skill in using various open source data collection tools (online trade, DNS, mail, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0296", + "title": "N/A", + "text": "Skill in utilizing feedback to improve processes, products, and services.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0297", + "title": "N/A", + "text": "Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0298", + "title": "N/A", + "text": "Skill in verifying the integrity of all files. (e.g., checksums, Exclusive OR, secure hashes, check constraints, etc.).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0299", + "title": "N/A", + "text": "Skill in wireless network target analysis, templating, and geolocation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0300", + "title": "N/A", + "text": "Skill in writing (and submitting) requirements to meet gaps in technical capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0301", + "title": "N/A", + "text": "Skill in writing about facts and ideas in a clear, convincing, and organized manner.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0302", + "title": "N/A", + "text": "Skill in writing effectiveness reports.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0303", + "title": "N/A", + "text": "Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0304", + "title": "N/A", + "text": "Skill to access information on current assets available, usage.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0305", + "title": "N/A", + "text": "Skill to access the databases where plans/directives/guidance are maintained.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0306", + "title": "N/A", + "text": "Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0307", + "title": "N/A", + "text": "Skill to analyze target or threat sources of strength and morale.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0308", + "title": "N/A", + "text": "Skill to anticipate intelligence capability employment requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0309", + "title": "N/A", + "text": "Skill to anticipate key target or threat activities which are likely to prompt a leadership decision.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0310", + "title": "N/A", + "text": "Skill to apply analytical standards to evaluate intelligence products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0311", + "title": "N/A", + "text": "Skill to apply the capabilities, limitations and tasking methodologies of available platforms, sensors, architectures and apparatus as they apply to organization objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0312", + "title": "N/A", + "text": "Skill to apply the process used to assess the performance and impact of cyber operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0313", + "title": "N/A", + "text": "Skill to articulate a needs statement/requirement and integrate new and emerging collection capabilities, accesses and/or processes into collection operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0314", + "title": "N/A", + "text": "Skill to articulate intelligence capabilities available to support execution of the plan.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0315", + "title": "N/A", + "text": "Skill to articulate the needs of joint planners to all-source analysts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0316", + "title": "N/A", + "text": "Skill to associate Intelligence gaps to priority information requirements and observables.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0317", + "title": "N/A", + "text": "Skill to compare indicators/observables with requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0318", + "title": "N/A", + "text": "Skill to conceptualize the entirety of the intelligence process in the multiple domains and dimensions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0319", + "title": "N/A", + "text": "Skill to convert intelligence requirements into intelligence production tasks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0320", + "title": "N/A", + "text": "Skill to coordinate the development of tailored intelligence products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0321", + "title": "N/A", + "text": "Skill to correlate intelligence priorities to the allocation of intelligence resources/assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0322", + "title": "N/A", + "text": "Skill to craft indicators of operational progress/success.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0323", + "title": "N/A", + "text": "Skill to create and maintain up-to-date planning documents and tracking of services/production.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0324", + "title": "N/A", + "text": "Skill to determine feasibility of collection.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0325", + "title": "N/A", + "text": "Skill to develop a collection plan that clearly shows the discipline that can be used to collect the information needed.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0326", + "title": "N/A", + "text": "Skill to distinguish between notional and actual resources and their applicability to the plan under development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0327", + "title": "N/A", + "text": "Skill to ensure that the collection strategy leverages all available resources. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0328", + "title": "N/A", + "text": "Skill to evaluate factors of the operational environment to objectives, and information requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0329", + "title": "N/A", + "text": "Skill to evaluate requests for information to determine if response information exists.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0330", + "title": "N/A", + "text": "Skill to evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0331", + "title": "N/A", + "text": "Skill to express orally and in writing the relationship between intelligence capability limitations and decision-making risk and impacts on the overall operation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0332", + "title": "N/A", + "text": "Skill to extract information from available tools and applications associated with collection requirements and collection operations management.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0333", + "title": "N/A", + "text": "Skill to graphically depict decision support materials containing intelligence and partner capability estimates.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0334", + "title": "N/A", + "text": "Skill to identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0335", + "title": "N/A", + "text": "Skill to identify Intelligence gaps.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0336", + "title": "N/A", + "text": "Skill to identify when priority information requirements are satisfied.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0337", + "title": "N/A", + "text": "Skill to implement established procedures for evaluating collection management and operations activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0338", + "title": "N/A", + "text": "Skill to interpret planning guidance to discern level of analytical support required.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0339", + "title": "N/A", + "text": "Skill to interpret readiness reporting, its operational relevance and intelligence collection impact.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0340", + "title": "N/A", + "text": "Skill to monitor target or threat situation and environmental factors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0341", + "title": "N/A", + "text": "Skill to monitor threat effects to partner capabilities and maintain a running estimate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0342", + "title": "N/A", + "text": "Skill to optimize collection system performance through repeated adjustment, testing, and re-adjustment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0343", + "title": "N/A", + "text": "Skill to orchestrate intelligence planning teams, coordinate collection and production support, and monitor status.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0344", + "title": "N/A", + "text": "Skill to prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0345", + "title": "N/A", + "text": "Skill to relate intelligence resources/assets to anticipated intelligence requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0346", + "title": "N/A", + "text": "Skill to resolve conflicting collection requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0347", + "title": "N/A", + "text": "Skill to review performance specifications and historical information about collection assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0348", + "title": "N/A", + "text": "Skill to specify collections and/or taskings that must be conducted in the near term.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0349", + "title": "N/A", + "text": "Skill to synchronize operational assessment procedures with the critical information requirement process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0350", + "title": "N/A", + "text": "Skill to synchronize planning activities and required intelligence support.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0351", + "title": "N/A", + "text": "Skill to translate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0352", + "title": "N/A", + "text": "Skill to use collaborative tools and environments for collection operations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0353", + "title": "N/A", + "text": "Skill to use systems and/or tools to track collection requirements and determine if they are satisfied.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0354", + "title": "N/A", + "text": "Skill in creating policies that reflect the business\u2019s core privacy objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0355", + "title": "N/A", + "text": "Skill in negotiating vendor agreements and evaluating vendor privacy practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0356", + "title": "N/A", + "text": "Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0357", + "title": "N/A", + "text": "Skill to anticipate new security threats.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0358", + "title": "N/A", + "text": "Skill to remain aware of evolving technical infrastructures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0359", + "title": "N/A", + "text": "Skill to use critical thinking to analyze organizational patterns and relationships.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0360", + "title": "N/A", + "text": "Skill to analyze and assess internal and external partner cyber operations capabilities and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0361", + "title": "N/A", + "text": "Skill to analyze and assess internal and external partner intelligence processes and the development of information requirements and essential information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0362", + "title": "N/A", + "text": "Skill to analyze and assess internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0363", + "title": "N/A", + "text": "Skill to analyze and assess internal and external partner reporting.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0364", + "title": "N/A", + "text": "Skill to develop insights about the context of an organization\u2019s threat environment", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0365", + "title": "N/A", + "text": "Skill to design incident response for cloud service models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0366", + "title": "N/A", + "text": "Skill to identify successful capabilities to find solutions to less common and more complex system problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0367", + "title": "N/A", + "text": "Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0368", + "title": "N/A", + "text": "Skill to use risk scoring to inform performance-based and cost-effective approaches to help organizations to identify, assess, and manage cybersecurity risk.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0369", + "title": "N/A", + "text": "Skill to identify sources, characteristics, and uses of the organization\u2019s data assets.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0370", + "title": "N/A", + "text": "Skill to use cyber defense Service Provider reporting structure and processes within one\u2019s own organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0371", + "title": "N/A", + "text": "Skill to respond and take local actions in response to threat sharing alerts from service providers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0372", + "title": "N/A", + "text": "Skill to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0373", + "title": "N/A", + "text": "Skill to ensure that accountability information is collected for information system and information and communications technology supply chain infrastructure components.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "skill", + "element_identifier": "S0374", + "title": "N/A", + "text": "Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0001", + "title": "N/A", + "text": "Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0002", + "title": "N/A", + "text": "Ability to match the appropriate knowledge repository technology for a given application or environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0003", + "title": "N/A", + "text": "Ability to determine the validity of technology trend data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0004", + "title": "N/A", + "text": "Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0005", + "title": "N/A", + "text": "Ability to decrypt digital data collections.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0006", + "title": "N/A", + "text": "Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0007", + "title": "N/A", + "text": "Ability to tailor code analysis for application-specific concerns.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0008", + "title": "N/A", + "text": "Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0009", + "title": "N/A", + "text": "Ability to apply supply chain risk management standards.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0010", + "title": "N/A", + "text": "Ability to analyze malware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0011", + "title": "N/A", + "text": "Ability to answer questions in a clear and concise manner.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0012", + "title": "N/A", + "text": "Ability to ask clarifying questions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0013", + "title": "N/A", + "text": "Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0014", + "title": "N/A", + "text": "Ability to communicate effectively when writing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0015", + "title": "N/A", + "text": "Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0016", + "title": "N/A", + "text": "Ability to facilitate small group discussions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0017", + "title": "N/A", + "text": "Ability to gauge learner understanding and knowledge level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0018", + "title": "N/A", + "text": "Ability to prepare and present briefings.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0019", + "title": "N/A", + "text": "Ability to produce technical documentation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0020", + "title": "N/A", + "text": "Ability to provide effective feedback to students for improving learning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0021", + "title": "N/A", + "text": "Ability to use and understand complex mathematical concepts (e.g., discrete math).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0022", + "title": "N/A", + "text": "Ability to apply principles of adult learning.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0023", + "title": "N/A", + "text": "Ability to design valid and reliable assessments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0024", + "title": "N/A", + "text": "Ability to develop clear directions and instructional materials.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0025", + "title": "N/A", + "text": "Ability to accurately define incidents, problems, and events in the trouble ticketing system.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0026", + "title": "N/A", + "text": "Ability to analyze test data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0027", + "title": "N/A", + "text": "Ability to apply an organization's goals and objectives to develop and maintain architecture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0028", + "title": "N/A", + "text": "Ability to assess and forecast manpower requirements to meet organizational objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0029", + "title": "N/A", + "text": "Ability to build complex data structures and high-level programming languages.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0030", + "title": "N/A", + "text": "Ability to collect, verify, and validate test data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0031", + "title": "N/A", + "text": "Ability to conduct and implement market research to understand government and industry capabilities and appropriate pricing.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0032", + "title": "N/A", + "text": "Ability to develop curriculum for use within a virtual environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0033", + "title": "N/A", + "text": "Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0034", + "title": "N/A", + "text": "Ability to develop, update, and/or maintain standard operating procedures (SOPs).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0035", + "title": "N/A", + "text": "Ability to dissect a problem and examine the interrelationships between data that may appear unrelated.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0036", + "title": "N/A", + "text": "Ability to identify basic common coding flaws at a high level.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0037", + "title": "N/A", + "text": "Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0038", + "title": "N/A", + "text": "Ability to optimize systems to meet enterprise performance requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0039", + "title": "N/A", + "text": "Ability to oversee the development and update of the life cycle cost estimate.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0040", + "title": "N/A", + "text": "Ability to translate data and test results into evaluative conclusions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0041", + "title": "N/A", + "text": "Ability to use data visualization tools (e.g., Flare, HighCharts, AmCharts, D3.js, Processing, Google Visualization API, Tableau, Raphael.js).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0042", + "title": "N/A", + "text": "Ability to develop career path opportunities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0043", + "title": "N/A", + "text": "Ability to conduct forensic analyses in and for both Windows and Unix/Linux environments.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0044", + "title": "N/A", + "text": "Ability to apply programming language structures (e.g., source code review) and logic.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0045", + "title": "N/A", + "text": "Ability to evaluate/ensure the trustworthiness of the supplier and/or product.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0046", + "title": "N/A", + "text": "Ability to monitor and assess the potential impact of emerging technologies on laws, regulations, and/or policies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0047", + "title": "N/A", + "text": "Ability to develop secure software according to secure software deployment methodologies, tools, and practices.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0048", + "title": "N/A", + "text": "Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0049", + "title": "N/A", + "text": "Ability to apply secure system design tools, methods and techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0050", + "title": "N/A", + "text": "Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0051", + "title": "N/A", + "text": "Ability to execute technology integration processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0052", + "title": "N/A", + "text": "Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0053", + "title": "N/A", + "text": "Ability to determine the validity of workforce trend data.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0054", + "title": "N/A", + "text": "Ability to apply the Instructional System Design (ISD) methodology.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0055", + "title": "N/A", + "text": "Ability to operate common network tools (e.g., ping, traceroute, nslookup).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0056", + "title": "N/A", + "text": "Ability to ensure security practices are followed throughout the acquisition process.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0057", + "title": "N/A", + "text": "Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0058", + "title": "N/A", + "text": "Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0059", + "title": "N/A", + "text": "Ability to operate the organization's LAN/WAN pathways.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0060", + "title": "N/A", + "text": "Ability to build architectures and frameworks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0061", + "title": "N/A", + "text": "Ability to design architectures and frameworks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0062", + "title": "N/A", + "text": "Ability to monitor measures or indicators of system performance and availability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0063", + "title": "N/A", + "text": "Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0064", + "title": "N/A", + "text": "Ability to interpret and translate customer requirements into operational capabilities. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0065", + "title": "N/A", + "text": "Ability to monitor traffic flows across the network.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0066", + "title": "N/A", + "text": "Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0067", + "title": "N/A", + "text": "Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0068", + "title": "N/A", + "text": "Ability to apply approved planning development and staffing processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0069", + "title": "N/A", + "text": "Ability to apply collaborative skills and strategies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0070", + "title": "N/A", + "text": "Ability to apply critical reading/thinking skills.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0071", + "title": "N/A", + "text": "Ability to apply language and cultural expertise to analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0072", + "title": "N/A", + "text": "Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0073", + "title": "N/A", + "text": "Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0074", + "title": "N/A", + "text": "Ability to collaborate effectively with others.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0075", + "title": "N/A", + "text": "WITHDRAWN: Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0076", + "title": "N/A", + "text": "Ability to coordinate and collaborate with analysts regarding surveillance requirements and essential information development.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0077", + "title": "N/A", + "text": "Ability to coordinate cyber operations with other organization functions or support activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0078", + "title": "N/A", + "text": "Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0079", + "title": "N/A", + "text": "Ability to correctly employ each organization or element into the collection plan and matrix.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0080", + "title": "N/A", + "text": "Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0081", + "title": "N/A", + "text": "Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0082", + "title": "N/A", + "text": "Ability to effectively collaborate via virtual teams.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0083", + "title": "N/A", + "text": "Ability to evaluate information for reliability, validity, and relevance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0084", + "title": "N/A", + "text": "Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0085", + "title": "N/A", + "text": "Ability to exercise judgment when policies are not well-defined.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0086", + "title": "N/A", + "text": "Ability to expand network access by conducting target analysis and collection to identify targets of interest.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0087", + "title": "N/A", + "text": "Ability to focus research efforts to meet the customer\u2019s decision-making needs.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0088", + "title": "N/A", + "text": "Ability to function effectively in a dynamic, fast-paced environment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0089", + "title": "N/A", + "text": "Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts\u2014both internal and external to the organization\u2014to leverage analytical and technical expertise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0090", + "title": "N/A", + "text": "Ability to identify external partners with common cyber operations interests.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0091", + "title": "N/A", + "text": "Ability to identify intelligence gaps.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0092", + "title": "N/A", + "text": "Ability to identify/describe target vulnerability.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0093", + "title": "N/A", + "text": "Ability to identify/describe techniques/methods for conducting technical exploitation of the target.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0094", + "title": "N/A", + "text": "Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0095", + "title": "N/A", + "text": "Ability to interpret and translate customer requirements into operational action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0096", + "title": "N/A", + "text": "Ability to interpret and understand complex and rapidly evolving concepts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0097", + "title": "N/A", + "text": "Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0098", + "title": "N/A", + "text": "Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0099", + "title": "N/A", + "text": "Ability to perform network collection tactics, techniques, and procedures to include decryption capabilities/tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0100", + "title": "N/A", + "text": "Ability to perform wireless collection procedures to include decryption capabilities/tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0101", + "title": "N/A", + "text": "Ability to recognize and mitigate cognitive biases which may affect analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0102", + "title": "N/A", + "text": "Ability to recognize and mitigate deception in reporting and analysis.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0103", + "title": "N/A", + "text": "Ability to review processed target language materials for accuracy and completeness.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0104", + "title": "N/A", + "text": "Ability to select the appropriate implant to achieve operational goals.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0105", + "title": "N/A", + "text": "Ability to tailor technical and planning information to a customer\u2019s level of understanding.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0106", + "title": "N/A", + "text": "Ability to think critically.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0107", + "title": "N/A", + "text": "Ability to think like threat actors.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0108", + "title": "N/A", + "text": "Ability to understand objectives and effects.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0109", + "title": "N/A", + "text": "Ability to utilize multiple intelligence sources across all intelligence disciplines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0110", + "title": "N/A", + "text": "Ability to monitor advancements in information privacy laws to ensure organizational adaptation and compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0111", + "title": "N/A", + "text": "Ability to work across departments and business units to implement organization\u2019s privacy principles and programs, and align privacy objectives with security objectives. ", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0112", + "title": "N/A", + "text": "Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0113", + "title": "N/A", + "text": "Ability to determine whether a security incident violates a privacy principle or legal standard requiring specific legal action.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0114", + "title": "N/A", + "text": "Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0115", + "title": "N/A", + "text": "Ability to work across departments and business units to implement organization\u2019s privacy principles and programs, and align privacy objectives with security objectives.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0116", + "title": "N/A", + "text": "Ability to prioritize and allocate cybersecurity resources correctly and efficiently.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0117", + "title": "N/A", + "text": "Ability to relate strategy, business, and technology in the context of organizational dynamics.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0118", + "title": "N/A", + "text": "Ability to understand technology, management, and leadership issues related to organization processes and problem solving.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0119", + "title": "N/A", + "text": "Ability to understand the basic concepts and issues related to cyber and its organizational impact.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0120", + "title": "N/A", + "text": "Ability to share meaningful insights about the context of an organization\u2019s threat environment that improve its risk management posture.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0121", + "title": "N/A", + "text": "Ability to design incident response for cloud service models.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0122", + "title": "N/A", + "text": "Ability to design capabilities to find solutions to less common and more complex system problems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0123", + "title": "N/A", + "text": "Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0124", + "title": "N/A", + "text": "Ability to establish and maintain automated security control assessments", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0125", + "title": "N/A", + "text": "Ability to author a privacy disclosure statement based on current laws.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0126", + "title": "N/A", + "text": "Ability to track the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0127", + "title": "N/A", + "text": "Ability to deploy continuous monitoring technologies and tools.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0128", + "title": "N/A", + "text": "Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0129", + "title": "N/A", + "text": "Ability to ensure information security management processes are integrated with strategic and operational planning processes.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0130", + "title": "N/A", + "text": "Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0131", + "title": "N/A", + "text": "Ability to ensure the organization has adequately trained personnel to assist in complying with security requirements in legislation, Executive Orders, policies, directives, instructions, standards, and guidelines.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0132", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to provide a comprehensive, organization-wide, holistic approach for addressing risk\u2014an approach that provides a greater understanding of the integrated operations of the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0133", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to develop a risk management strategy for the organization providing a strategic view of security-related risks for the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0134", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to facilitate the sharing of risk-related information among authorizing officials and other senior leaders within the organization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0135", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to provide oversight for all risk management-related activities across the organization to help ensure consistent and effective risk acceptance decisions.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0136", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to ensure that authorization decisions consider all factors necessary for mission and business success.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0137", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to provide an organization-wide forum to consider all sources of risk (including aggregated risk) to organizational operations and assets, individuals, other organizations, and the Nation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0138", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to promote cooperation and collaboration among authorizing officials to include authorization actions requiring shared responsibility.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0139", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to ensure that the shared responsibility for supporting organizational mission/business functions using external providers of systems, services, and applications receives the needed visibility and is elevated to the appropriate decision-making authorities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0140", + "title": "N/A", + "text": "Ability to coordinate with senior leadership of an organization to identify the organizational risk posture based on the aggregated risk from the operation and use of the systems for which the organization is responsible.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0141", + "title": "N/A", + "text": "Ability to work closely with authorizing officials and their designated representatives to help ensure that an organization-wide security program is effectively implemented resulting in adequate security for all organizational systems and environments of operation.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0142", + "title": "N/A", + "text": "Ability to work closely with authorizing officials and their designated representatives to help ensure that security considerations are integrated into programming/planning/budgeting cycles, enterprise architectures, and acquisition/system development life cycles.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0143", + "title": "N/A", + "text": "Ability to work closely with authorizing officials and their designated representatives to help ensure that organizational systems and common controls are covered by approved security plans and possess current authorizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0144", + "title": "N/A", + "text": "Ability to work closely with authorizing officials and their designated representatives to help ensure that security-related activities required across the organization are accomplished in an efficient, cost-effective, and timely manner.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0145", + "title": "N/A", + "text": "Ability to work closely with authorizing officials and their designated representatives to help ensure that there is centralized reporting of security-related activities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0146", + "title": "N/A", + "text": "Ability to establish the rules for appropriate use and protection of the information and retains that responsibility even when the information is shared with or provided to other organizations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0147", + "title": "N/A", + "text": "Ability to approve security plans, memorandums of agreement or understanding, plans of action and milestones, and determine whether significant changes in the systems or environments of operation require reauthorization.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0148", + "title": "N/A", + "text": "Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers on the allocation of security controls as system-specific, hybrid, or common controls.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0149", + "title": "N/A", + "text": "Ability, in close coordination with system security officers, advise authorizing officials, chief information officers, senior information security officers, and the senior accountable official for risk management/risk executive (function), on a range of security-related issues (e.g. establishing system boundaries; assessing the severity of weaknesses and deficiencies in the system; plans of action and milestones; risk mitigation approaches; security alerts; and potential adverse effects of identified vulnerabilities).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0150", + "title": "N/A", + "text": "Ability to conduct systems security engineering activities (NIST SP 800-16).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0151", + "title": "N/A", + "text": "Ability to capture and refine security requirements and ensure that the requirements are effectively integrated into the component products and systems through purposeful security architecting, design, development, and configuration.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0152", + "title": "N/A", + "text": "Ability to employ best practices when implementing security controls within a system including software engineering methodologies; system and security engineering principles; secure design, secure architecture, and secure coding techniques.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0153", + "title": "N/A", + "text": "Ability to coordinate their security-related activities with security architects, senior information security officers, system owners, common control providers, and system security officers.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0154", + "title": "N/A", + "text": "Ability to conduct a comprehensive assessment of the management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine the effectiveness of the controls (i.e., the extent to which the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0155", + "title": "N/A", + "text": "Ability to provide an assessment of the severity of weaknesses or deficiencies discovered in the system and its environment of operation and recommend corrective actions to address identified vulnerabilities.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0156", + "title": "N/A", + "text": "Ability to prepare the final security assessment report containing the results and findings from the assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0157", + "title": "N/A", + "text": "Ability to assesses a security plan to help ensure that the plan provides a set of security controls for the system that meet the stated security requirements.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0158", + "title": "N/A", + "text": "Ability to ensure that functional and security requirements are appropriately addressed in a contract and that the contractor meets the functional and security requirements as stated in the contract.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0159", + "title": "N/A", + "text": "Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0160", + "title": "N/A", + "text": "Ability to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0161", + "title": "N/A", + "text": "Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0162", + "title": "N/A", + "text": "Ability to ensure information system security, acquisition personnel, legal counsel, and other appropriate advisors and stakeholders are participating in decision making from system concept definition/review and are involved in, or approve of, each milestone decision through the entire system life cycle for systems.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0177", + "title": "N/A", + "text": "Ability to recognize the unique aspects of the Communications Security (COMSEC) environment and hierarchy.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0163", + "title": "N/A", + "text": "Ability to interpret Communications Security (COMSEC) terminology, guidelines and procedures.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0164", + "title": "N/A", + "text": "Ability to identify the roles and responsibilities for appointed Communications Security (COMSEC) personnel.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0165", + "title": "N/A", + "text": "Ability to manage Communications Security (COMSEC) material accounting, control and use procedure.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0166", + "title": "N/A", + "text": "Ability to identify types of Communications Security (COMSEC) Incidents and how they\u2019re reported.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0167", + "title": "N/A", + "text": "Ability to recognize the importance of auditing Communications Security (COMSEC) material and accounts.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0168", + "title": "N/A", + "text": "Ability to Identify the requirements of In-Process accounting for Communications Security (COMSEC).", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0170", + "title": "N/A", + "text": "Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0171", + "title": "N/A", + "text": "Ability to conduct training and education needs assessment.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0172", + "title": "N/A", + "text": "Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0173", + "title": "N/A", + "text": "Ability to recognize that changes to systems or environment can change residual risks in relation to risk appetite.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0174", + "title": "N/A", + "text": "Ability to find and navigate the dark web using the TOR network to locate markets and forums.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0175", + "title": "N/A", + "text": "Ability to examine digital media on multiple operating system platforms.", + "doc_identifier": "nicewf_2017" + }, + { + "element_type": "ability", + "element_identifier": "A0176", + "title": "N/A", + "text": "Ability to maintain databases. (i.e., backup, restore, delete data, transaction log files, etc.).", + "doc_identifier": "nicewf_2017" + } + ], + "relationships": [ + { + "source_element_identifier": "RSK", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-RSK-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "RSK", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-RSK-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "DEV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-DEV-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "DEV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-DEV-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ARC", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-ARC-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ARC", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-ARC-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TRD", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-TRD-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SRP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-SRP-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TST", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-TST-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SYS", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-SYS-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SYS", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SP-SYS-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "DTA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-DTA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "DTA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-DTA-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "KMG", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-KMG-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "STS", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-STS-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "NET", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-NET-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ADM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-ADM-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ANA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OM-ANA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "LGA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-LGA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "LGA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-LGA-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TEA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-TEA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TEA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-TEA-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "MGT", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-MGT-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "MGT", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-MGT-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SPP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-SPP-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SPP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-SPP-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "EXL", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-EXL-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PMA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-PMA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PMA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-PMA-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PMA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-PMA-003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PMA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-PMA-004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PMA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OV-PMA-005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CDA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "PR-CDA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "INF", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "PR-INF-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CIR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "PR-CIR-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "VAM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "PR-VAM-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TWA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-TWA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "EXP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-EXP-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ASA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-ASA-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "ASA", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-ASA-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TGT", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-TGT-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "TGT", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-TGT-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "LNG", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "AN-LNG-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CLO", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-CLO-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CLO", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-CLO-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OPL", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-OPL-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OPL", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-OPL-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OPL", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-OPL-003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OPS", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CO-OPS-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "INV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "IN-INV-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "FOR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "IN-FOR-001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "FOR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "IN-FOR-002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "RSK", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "DEV", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "ARC", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "TRD", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SRP", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "TST", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SYS", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "DTA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "KMG", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "STS", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "NET", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "ADM", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OM", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "ANA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "LGA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "TEA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "MGT", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "SPP", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "EXL", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "OV", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "PMA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CDA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "INF", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CIR", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "PR", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "VAM", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "AN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "TWA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "AN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "EXP", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "AN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "ASA", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "AN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "TGT", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "AN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "LNG", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CO", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "CLO", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CO", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OPL", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "CO", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "OPS", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "IN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "INV", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "IN", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "FOR", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0145", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0221", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0371", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0495", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0037", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0040", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0048", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0049", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0054", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0059", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0070", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0089", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0101", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0126", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0146", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0168", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0169", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0199", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0203", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0260", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0261", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0262", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0267", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0295", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0342", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0622", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0624", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0034", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0033", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0077", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0090", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0094", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0111", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0117", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0118", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0119", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0145", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0177", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0178", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0181", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0184", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0205", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0221", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0243", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0244", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0251", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0255", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0264", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0265", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0268", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0272", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0275", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0277", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0309", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0344", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0371", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0495", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0007", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0008", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0009", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0010", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0011", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0018", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0021", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0024", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0026", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0029", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0037", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0040", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0048", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0049", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0054", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0056", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0059", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0070", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0089", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0098", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0100", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0101", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0126", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0146", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0168", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0169", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0199", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0203", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0260", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0261", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0262", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0267", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0287", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0342", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0622", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0624", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0034", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0073", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0078", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0097", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0100", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0110", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0111", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0112", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0115", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0120", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0124", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0128", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0134", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0135", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0136", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0137", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0138", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0141", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0145", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0147", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0171", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0172", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0173", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0174", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0175", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0176", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0177", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0184", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0232", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0233", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0234", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0235", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0236", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0237", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0238", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0239", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0240", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0241", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0242", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0243", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0244", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0248", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0249", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0250", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0251", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0252", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0254", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0271", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0273", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0278", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0279", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0280", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0281", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0296", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0304", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0305", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0306", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0307", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0325", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0329", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0332", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0370", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0374", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0011", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0012", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0015", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0016", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0018", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0023", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0026", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0030", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0035", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0036", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0040", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0056", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0069", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0070", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0083", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0085", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0086", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0087", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0088", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0089", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0090", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0091", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0092", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0093", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0094", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0095", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0096", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0098", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0101", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0106", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0108", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0109", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0111", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0112", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0114", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0115", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0116", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0117", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0118", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0119", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-RSK-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0009", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0011", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0022", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0026", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0034", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0040", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0046", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0057", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0077", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0100", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0111", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0117", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0118", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0171", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0176", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0181", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0189", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0217", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0228", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0236", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0267", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0303", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0311", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0324", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0337", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0416", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0417", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0436", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0455", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0500", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0553", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0554", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0016", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0039", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0051", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0066", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0068", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0070", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0073", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0079", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0080", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0081", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0086", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0105", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0139", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0140", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0152", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0153", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0154", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0199", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0202", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0260", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0261", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0262", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0263", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0332", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0342", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0343", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0624", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0017", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0022", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0031", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0034", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0135", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0138", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0149", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0174", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0175", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0007", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0021", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0047", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0022", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0040", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0100", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0111", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0117", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0118", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0171", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0181", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0217", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0228", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0236", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0266", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0311", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0324", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0337", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0424", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0428", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0436", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0456", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0457", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0516", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0554", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0016", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0039", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0051", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0066", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0068", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0070", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0073", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0079", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0080", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0081", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0086", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0105", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0139", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0140", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0152", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0153", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0154", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0178", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0199", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0202", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0260", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0261", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0262", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0263", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0342", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0343", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0624", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0022", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0031", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0034", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0083", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0135", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0138", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0174", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0175", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0021", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-DEV-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0051", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0090", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0108", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0196", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0205", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0307", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0314", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0328", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0338", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0427", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0440", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0448", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0473", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0517", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0521", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0542", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0555", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0557", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0024", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0028", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0030", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0035", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0037", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0043", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0052", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0056", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0061", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0063", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0074", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0075", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0091", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0093", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0102", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0180", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0198", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0200", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0203", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0207", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0211", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0212", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0214", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0227", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0240", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0264", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0275", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0286", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0287", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0291", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0293", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0299", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0323", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0325", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0326", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0332", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0333", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0487", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0516", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0024", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0122", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0374", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0008", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0015", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0051", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0172", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0051", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0071", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0084", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0090", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0108", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0177", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0196", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0203", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0205", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0268", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0307", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0314", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0328", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0338", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0427", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0448", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0473", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0484", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0542", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0556", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0007", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0008", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0009", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0010", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0011", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0012", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0013", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0015", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0018", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0024", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0026", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0030", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0035", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0036", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0037", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0043", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0044", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0052", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0055", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0056", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0057", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0059", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0060", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0061", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0063", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0071", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0074", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0082", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0091", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0092", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0093", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0102", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0180", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0198", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0200", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0202", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0211", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0212", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0214", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0227", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0240", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0260", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0261", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0262", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0264", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0275", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0277", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0286", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0287", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0291", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0293", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0320", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0322", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0323", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0325", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0326", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0332", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0333", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0336", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0374", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0565", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0022", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0024", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0059", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0061", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0076", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0116", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0122", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0138", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0139", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0152", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0168", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0367", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0374", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0008", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0014", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0015", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0027", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0038", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0048", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0049", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0050", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0061", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0123", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0148", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0149", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-ARC-002", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "A0172", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0064", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0249", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0250", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0283", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0284", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0327", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0329", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0409", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0410", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0411", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0413", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "T0547", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0001", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0002", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0003", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0004", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0006", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0009", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0019", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0059", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0090", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0126", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0169", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0170", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0171", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0172", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0174", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0175", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0176", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0179", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0202", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0209", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0267", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0268", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0269", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0271", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0272", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0288", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0296", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0310", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0314", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0321", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0342", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "K0499", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0005", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0017", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0072", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, + { + "source_element_identifier": "SP-TRD-001", + "source_doc_identifier": "nicewf_2017", + "dest_element_identifier": "S0140", + "dest_doc_identifier": "nicewf_2017", + "relationship_identifier": "projection" + }, +