CASP/R A

From Wikibooks, open books for an open world
Jump to navigation Jump to search
[edit | edit source]

Perform on-going research

[edit | edit source]

Best practices

[edit | edit source]

New technologies

[edit | edit source]

New security systems and services

[edit | edit source]

Technology evolution (e.g. RFCs, ISO)

[edit | edit source]

Situational awareness

[edit | edit source]

Latest client-side attacks

[edit | edit source]

Threats

[edit | edit source]

Counter zero day

[edit | edit source]

Emergent issues

[edit | edit source]

Research security implications of new business tools

[edit | edit source]

Social media/networking

[edit | edit source]

Integration within the business (e.g. advising on the placement of company material for the general public)

[edit | edit source]

Global IA industry/community

[edit | edit source]

Conventions

[edit | edit source]

Attackers

[edit | edit source]

Emerging threat sources

[edit | edit source]

Research security requirements for contracts

[edit | edit source]

Request for Proposal (RFP)

[edit | edit source]

Request for Quote (RFQ)

[edit | edit source]

Request for Information (RFI)

[edit | edit source]

Agreements

[edit | edit source]

Carry out relevant analysis for the purpose of securing the enterprise

[edit | edit source]

Benchmark

[edit | edit source]

Prototype and test multiple solutions

[edit | edit source]

Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)

[edit | edit source]

Analyze and interpret trend data to anticipate cyber defense aids

[edit | edit source]

Review effectiveness of existing security

[edit | edit source]

Reverse engineer / deconstruct existing solutions

[edit | edit source]

Analyze security solutions to ensure they meet business needs

[edit | edit source]

Specify the performance

[edit | edit source]

Latency

[edit | edit source]

Scalability

[edit | edit source]

Capability

[edit | edit source]

Usability

[edit | edit source]

Maintainability

[edit | edit source]

Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)

[edit | edit source]

Conduct a lessons-learned / after-action review

[edit | edit source]

Use judgment to solve difficult problems that do not have a best solution

[edit | edit source]

Conduct network traffic analysis

[edit | edit source]