Encyclopedia

A

ACTEDS

ACTEDS (Army Civilian Training, Education and Development System): Historical/Legacy system for managing Army civilian training...

ATO

ATO (Authority to Operate): Official management decision to authorize operation of an information system and...

Authority to Operate

ATO (Authority to Operate): Official management decision to authorize operation of an information system and...

C

CAP

CAP (Cybersecurity Apprenticeship Program): A structured training program that combines on-the-job learning with technical instruction...

CAWF

CAWF (Cyber Workforce Framework): A common foundation to organize and describe cybersecurity work. Provides a...

CBT

CBT (Computer-Based Training): Original delivery method for cyber workforce training before WBT became standard. 

CEH

Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity...

CEMAP

CEMAP (Cyber Exchange Management Assignment Program): Early rotation program for developing cyber workforce expertise. 

Certification Management

The process of tracking, maintaining, and updating professional certifications for cybersecurity personnel. 

Chief Information Officer

CIO (Chief Information Officer): Senior executive responsible for information technology strategy and systems, including cybersecurity...

CIO

CIO (Chief Information Officer): Senior executive responsible for information technology strategy and systems, including cybersecurity...

CISSP

CISSP (Certified Information Systems Security Professional): A globally recognized certification for information security professionals, covering...

CMMC

CMMC (Cybersecurity Maturity Model Certification): A unified standard for implementing cybersecurity across the Defense Industrial...

CND-SP

CND-SP (Computer Network Defense Service Provider): Legacy category for specialized defensive cyberspace operations roles under...

Compliance Tracking

Monitoring and documenting adherence to regulatory requirements and security standards. 

CompTIA

CompTIA: Computing Technology Industry Association - Organization that issues professional certifications for the IT industry,...

CompTIA Security+

Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity...

Computing Environment Certification

Legacy Requirement Early requirement focusing on specific computing environment expertise (Windows, Unix/Linux, etc.). 

CSWF

CSWF (Cyber Security Workforce Framework): Early iteration of the cyber workforce framework that bridged between...

Cyber Range

A virtual environment used for cybersecurity training and skills development through simulated scenarios and attacks. 

Cyber Workforce Framework

CAWF (Cyber Workforce Framework): A common foundation to organize and describe cybersecurity work. Provides a...

Cybersecurity Apprenticeship Program

CAP (Cybersecurity Apprenticeship Program): A structured training program that combines on-the-job learning with technical instruction...

D

DCPDS

DCPDS (Defense Civilian Personnel Data System): Legacy system for managing civilian personnel data before modern...

DCWF

DCWF (DOD Cyber Workforce Framework): Framework that defines and codes cyber work roles and tasks...

DCWS

DCWS (Defense Civilian Workforce System): System for managing civilian workforce personnel actions and data, including...

Defense Civilian Workforce System

DCWS (Defense Civilian Workforce System): System for managing civilian workforce personnel actions and data, including...

DISA Baseline

DISA Baseline Certifications: Original certification requirements established by Defense Information Systems Agency. 

DoD Cyber Workforce Framework

DCWF (DOD Cyber Workforce Framework): Framework that defines and codes cyber work roles and tasks...

DoDI

DoDI (Department of Defense Instruction): Issuances that implement DOD policy established in DOD directives. Provides...

F

FIPS

FIPS (Federal Information Processing Standards): Standards developed by NIST for federal computer systems, including security...

FISMA

FISMA (Federal Information Security Management Act): Law that defines cybersecurity framework for federal information systems,...

G

Gap Analysis

Assessment of the difference between current workforce capabilities and required competencies. 

GSEC

Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity...

I

IAM Level

IAM Levels I-III: Legacy Categories Original management categories under 8570.01 for Information Assurance Management positions,...

IASAE Level

IASAE Levels I-III:Legacy Categories System Architecture and Engineering categories under 8570.01, focusing on system security...

IASS

IASS (Information Assurance Scholarship Program): Legacy Program Early DOD initiative established by the National Defense...

IAT Level

IAT Levels I-III: Legacy Categories Original technical categories under 8570.01 that defined certification requirements for...

Information Assurance Internship Program

Predecessor to modern cyber workforce development programs. 

Information Assurance Training

Legacy term for cybersecurity training programs under 8570. 

Information Assurance Workforce

Term used before "cybersecurity workforce" became 8140: DOD Directive 8140 establishes policies and responsibilities for...

ISSM

Information Systems Security Manager (ISSM): Predecessor to modern cybersecurity management roles. 

ISSO

Information Systems Security Officer (ISSO): Historical role that evolved into various specialized cybersecurity positions. 

IT Workforce Development

Original program focusing on general IT skills before the specialization into cybersecurity roles. 

J

Joint Qualification Standards

Early attempts to standardize cyber workforce requirements across military branches. 

K

KSA

KSA (Knowledge, Skills, and Abilities): Specific competencies required for cyber workforce positions. Used in job...

KSAs

KSAs (Knowledge, Skills, and Abilities): Specific competencies required for cyber workforce positions. Used in job...

L

Legacy Position Coding

Original system for coding cyber positions before current DCWF codes. 

Legacy Role Mapping

Process of converting positions from old IA categories to new cyber workforce categories.

M

Manual Tracking Systems

Early methods of tracking workforce certifications and qualifications before automated systems.

Manual Waiver

Manual Waiver Process: Historical process for requesting exceptions to certification requirements. 

MCIT

DOD Mission Critical Information Technology (MCIT): Transitional Framework Early classification system for identifying critical IT...

ML

ML (Machine Learning See Also: Artificial Intelligence. Machine Learning (ML) and Artificial Intelligence (AI)- Advanced computing...

N

Network Security Administrator

Network Security Administrator: Early designation for roles now split into multiple specialized network security positions. 

NICE

NICE (National Initiative for Cybersecurity Education): Framework for cybersecurity education, training, and workforce development. Provides...

NICE 1.0

NICE 1.0 Framework (2012): Transitional Framework Initial version of the NICE Framework that helped standardize...

NICE 2.0

NICE 2.0 Framework (2014): Transitional Framework Updated version that introduced the concept of work roles...

NIST

NIST (National Institute of Standards and Technology): Federal agency that develops cybersecurity standards and guidelines,...

O

Original Compliance Reporting

Initial methods for tracking and reporting workforce certification status. 

P

Position Management

The process of creating, modifying, and tracking position descriptions and requirements within an organization. 

Q

Qualification Standards

Original standards used to evaluate cyber workforce candidates before current KSA-based evaluation. 

R

Risk Management Framework

RMF (Risk Management Framework): Framework for managing organizational risk related to information systems. Includes six...

RMF

RMF (Risk Management Framework): Framework for managing organizational risk related to information systems. Includes six...

S

Security Operations Center

SOC (Security Operations Center): Facility where information security issues are monitored and addressed. Central point...

Skill Matrix

A visual tool that maps employees' skills against required competencies for different cyber work roles. 

SOC

SOC (Security Operations Center): Facility where information security issues are monitored and addressed. Central point...

T

Talent Pipeline

A pool of candidates being developed for current and future cybersecurity positions through training and...

Training Management System

Software platform for administering, documenting, tracking, and reporting educational courses and programs. 

W

WBT

WBT (Web-Based Training): Training delivered through web browsers and internet technologies. Enables flexible, self-paced learning...

Work Role

A specific grouping of cyber work and requirements for a position. Defines the tasks, knowledge,...

Workforce Analytics

The analysis of workforce data to improve human resource management, including skills gap analysis, training...

Workforce Development

Strategic approach to improving employees' capabilities through training, education, and career development opportunities. 

Workforce Management

The integrated set of processes organizations use to optimize employee productivity, including time tracking, scheduling,...

Z

Zero Trust

Security concept that requires strict identity verification for every person and device trying to access...

Zero-Trust

Security concept that requires strict identity verification for every person and device trying to access...