From Wikibooks, open books for an open world
Jump to navigation
Jump to search
Integrate enterprise disciplines to achieve secure solutions[edit | edit source]
Interpreting security requirements and goals to communicate with other disciplines[edit | edit source]
Provide guidance and recommendations to staff and senior management on security processes and controls[edit | edit source]
Establish effective collaboration within teams to implement secure solutions[edit | edit source]
Explain the security impact of inter-organizational change[edit | edit source]
Security concerns of interconnecting multiple industries[edit | edit source]
Rules, policies and regulations[edit | edit source]
Design considerations during mergers, acquisitions and de-mergers[edit | edit source]
Assuring third party products - only introduce acceptable risk[edit | edit source]
COTS – Commercial Off The Shelf Software[edit | edit source]
Network secure segmentation and delegation[edit | edit source]
Integration of products and services[edit | edit source]
Select and distinguish the appropriate security controls with regard to communications and collaboration[edit | edit source]
Unified communication security[edit | edit source]
Enterprise configuration management of mobile devices[edit | edit source]
Secure external communications[edit | edit source]
Secure implementation of collaboration platforms[edit | edit source]
Prioritizing traffic (QoS- Quality of Service)[edit | edit source]
Smart phones, IP cameras, laptops, IP based devices[edit | edit source]
Explain advanced authentication tools, techniques and concepts[edit | edit source]
Federated identity management (SAML--Security Assertions Markup Language)[edit | edit source]
XACML- eXtensible Access Control Markup Language[edit | edit source]
SOAP-Simple Object Access Protocol[edit | edit source]
SPML- Service Provisioning Markup Language[edit | edit source]
Certificate based authentication[edit | edit source]
Carry out security activities across the technology life cycle[edit | edit source]
End to end solution ownership[edit | edit source]
Understanding results of solutions in advance[edit | edit source]
Systems Development Life Cycle[edit | edit source]
Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)[edit | edit source]
Security Requirements Traceability Matrix (SRTM)[edit | edit source]
Adapt solutions to address emerging threats and security trends[edit | edit source]