CASP/Integration

From Wikibooks, open books for an open world
Jump to navigation Jump to search

Integrate enterprise disciplines to achieve secure solutions[edit | edit source]

Interpreting security requirements and goals to communicate with other disciplines[edit | edit source]

Programmers[edit | edit source]

Network engineers[edit | edit source]

Sales staff[edit | edit source]

Provide guidance and recommendations to staff and senior management on security processes and controls[edit | edit source]

Establish effective collaboration within teams to implement secure solutions[edit | edit source]

Disciplines[edit | edit source]

Programmer[edit | edit source]

Database administrator[edit | edit source]

Network administrator[edit | edit source]

Management[edit | edit source]

Stake holders[edit | edit source]

Financial[edit | edit source]

HR- Human Resources[edit | edit source]

Emergency response team[edit | edit source]

Facilities manager[edit | edit source]

Physical security manager[edit | edit source]

Explain the security impact of inter-organizational change[edit | edit source]

Security concerns of interconnecting multiple industries[edit | edit source]

Rules, policies and regulations[edit | edit source]

Design considerations during mergers, acquisitions and de-mergers[edit | edit source]

Assuring third party products - only introduce acceptable risk[edit | edit source]

Custom developed[edit | edit source]

COTS – Commercial Off The Shelf Software[edit | edit source]

Network secure segmentation and delegation[edit | edit source]

Integration of products and services[edit | edit source]

Select and distinguish the appropriate security controls with regard to communications and collaboration[edit | edit source]

Unified communication security[edit | edit source]

Web conferencing[edit | edit source]

Video conferencing[edit | edit source]

Instant messaging[edit | edit source]

Desktop sharing[edit | edit source]

Remote assistance[edit | edit source]

Presence[edit | edit source]

Email[edit | edit source]

Telephony[edit | edit source]

VoIP security[edit | edit source]

VoIP implementation[edit | edit source]

Remote access[edit | edit source]

Enterprise configuration management of mobile devices[edit | edit source]

Secure external communications[edit | edit source]

Secure implementation of collaboration platforms[edit | edit source]

Prioritizing traffic (QoS- Quality of Service)[edit | edit source]

Mobile devices[edit | edit source]

Smart phones, IP cameras, laptops, IP based devices[edit | edit source]

Explain advanced authentication tools, techniques and concepts[edit | edit source]

Federated identity management (SAML--Security Assertions Markup Language)[edit | edit source]

XACML- eXtensible Access Control Markup Language[edit | edit source]

SOAP-Simple Object Access Protocol[edit | edit source]

Single sign on[edit | edit source]

SPML- Service Provisioning Markup Language[edit | edit source]

Certificate based authentication[edit | edit source]

Attestation[edit | edit source]

Carry out security activities across the technology life cycle[edit | edit source]

End to end solution ownership[edit | edit source]

Understanding results of solutions in advance[edit | edit source]

Operational activities[edit | edit source]

Maintenance[edit | edit source]

Decommissioning[edit | edit source]

General change management[edit | edit source]

Systems Development Life Cycle[edit | edit source]

Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)[edit | edit source]

Security Requirements Traceability Matrix (SRTM)[edit | edit source]

Adapt solutions to address emerging threats and security trends[edit | edit source]

Validate system designs[edit | edit source]