CASP/Integration
From Wikibooks, open books for an open world
<
CASP
Jump to navigation
Jump to search
Contents
1
Integrate enterprise disciplines to achieve secure solutions
1.1
Interpreting security requirements and goals to communicate with other disciplines
1.1.1
Programmers
1.1.2
Network engineers
1.1.3
Sales staff
1.2
Provide guidance and recommendations to staff and senior management on security processes and controls
1.3
Establish effective collaboration within teams to implement secure solutions
1.4
Disciplines
1.4.1
Programmer
1.4.2
Database administrator
1.4.3
Network administrator
1.4.4
Management
1.4.5
Stake holders
1.4.6
Financial
1.4.7
HR- Human Resources
1.4.8
Emergency response team
1.4.9
Facilities manager
1.4.10
Physical security manager
2
Explain the security impact of inter-organizational change
2.1
Security concerns of interconnecting multiple industries
2.1.1
Rules, policies and regulations
2.2
Design considerations during mergers, acquisitions and de-mergers
2.3
Assuring third party products - only introduce acceptable risk
2.3.1
Custom developed
2.3.2
COTS – Commercial Off The Shelf Software
2.4
Network secure segmentation and delegation
2.5
Integration of products and services
3
Select and distinguish the appropriate security controls with regard to communications and collaboration
3.1
Unified communication security
3.1.1
Web conferencing
3.1.2
Video conferencing
3.1.3
Instant messaging
3.1.4
Desktop sharing
3.1.5
Remote assistance
3.1.6
Presence
3.1.7
Email
3.1.8
Telephony
3.2
VoIP security
3.3
VoIP implementation
3.4
Remote access
3.5
Enterprise configuration management of mobile devices
3.6
Secure external communications
3.7
Secure implementation of collaboration platforms
3.8
Prioritizing traffic (QoS- Quality of Service)
3.9
Mobile devices
3.9.1
Smart phones, IP cameras, laptops, IP based devices
4
Explain advanced authentication tools, techniques and concepts
4.1
Federated identity management (SAML--Security Assertions Markup Language)
4.2
XACML- eXtensible Access Control Markup Language
4.3
SOAP-Simple Object Access Protocol
4.4
Single sign on
4.5
SPML- Service Provisioning Markup Language
4.6
Certificate based authentication
4.7
Attestation
5
Carry out security activities across the technology life cycle
5.1
End to end solution ownership
5.2
Understanding results of solutions in advance
5.2.1
Operational activities
5.2.2
Maintenance
5.2.3
Decommissioning
5.2.4
General change management
5.3
Systems Development Life Cycle
5.3.1
Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)
5.3.2
Security Requirements Traceability Matrix (SRTM)
5.4
Adapt solutions to address emerging threats and security trends
5.5
Validate system designs
Integrate enterprise disciplines to achieve secure solutions
[
edit
|
edit source
]
Interpreting security requirements and goals to communicate with other disciplines
[
edit
|
edit source
]
Programmers
[
edit
|
edit source
]
Network engineers
[
edit
|
edit source
]
Sales staff
[
edit
|
edit source
]
Provide guidance and recommendations to staff and senior management on security processes and controls
[
edit
|
edit source
]
Establish effective collaboration within teams to implement secure solutions
[
edit
|
edit source
]
Disciplines
[
edit
|
edit source
]
Programmer
[
edit
|
edit source
]
Database administrator
[
edit
|
edit source
]
Network administrator
[
edit
|
edit source
]
Management
[
edit
|
edit source
]
Stake holders
[
edit
|
edit source
]
Financial
[
edit
|
edit source
]
HR- Human Resources
[
edit
|
edit source
]
Emergency response team
[
edit
|
edit source
]
Facilities manager
[
edit
|
edit source
]
Physical security manager
[
edit
|
edit source
]
Explain the security impact of inter-organizational change
[
edit
|
edit source
]
Security concerns of interconnecting multiple industries
[
edit
|
edit source
]
Rules, policies and regulations
[
edit
|
edit source
]
Design considerations during mergers, acquisitions and de-mergers
[
edit
|
edit source
]
Assuring third party products - only introduce acceptable risk
[
edit
|
edit source
]
Custom developed
[
edit
|
edit source
]
COTS – Commercial Off The Shelf Software
[
edit
|
edit source
]
Network secure segmentation and delegation
[
edit
|
edit source
]
Integration of products and services
[
edit
|
edit source
]
Select and distinguish the appropriate security controls with regard to communications and collaboration
[
edit
|
edit source
]
Unified communication security
[
edit
|
edit source
]
Web conferencing
[
edit
|
edit source
]
Video conferencing
[
edit
|
edit source
]
Instant messaging
[
edit
|
edit source
]
Desktop sharing
[
edit
|
edit source
]
Remote assistance
[
edit
|
edit source
]
Presence
[
edit
|
edit source
]
Email
[
edit
|
edit source
]
Telephony
[
edit
|
edit source
]
VoIP security
[
edit
|
edit source
]
VoIP implementation
[
edit
|
edit source
]
Remote access
[
edit
|
edit source
]
Enterprise configuration management of mobile devices
[
edit
|
edit source
]
Secure external communications
[
edit
|
edit source
]
Secure implementation of collaboration platforms
[
edit
|
edit source
]
Prioritizing traffic (QoS- Quality of Service)
[
edit
|
edit source
]
Mobile devices
[
edit
|
edit source
]
Smart phones, IP cameras, laptops, IP based devices
[
edit
|
edit source
]
Explain advanced authentication tools, techniques and concepts
[
edit
|
edit source
]
Federated identity management (SAML--Security Assertions Markup Language)
[
edit
|
edit source
]
XACML- eXtensible Access Control Markup Language
[
edit
|
edit source
]
SOAP-Simple Object Access Protocol
[
edit
|
edit source
]
Single sign on
[
edit
|
edit source
]
SPML- Service Provisioning Markup Language
[
edit
|
edit source
]
Certificate based authentication
[
edit
|
edit source
]
Attestation
[
edit
|
edit source
]
Carry out security activities across the technology life cycle
[
edit
|
edit source
]
End to end solution ownership
[
edit
|
edit source
]
Understanding results of solutions in advance
[
edit
|
edit source
]
Operational activities
[
edit
|
edit source
]
Maintenance
[
edit
|
edit source
]
Decommissioning
[
edit
|
edit source
]
General change management
[
edit
|
edit source
]
Systems Development Life Cycle
[
edit
|
edit source
]
Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)
[
edit
|
edit source
]
Security Requirements Traceability Matrix (SRTM)
[
edit
|
edit source
]
Adapt solutions to address emerging threats and security trends
[
edit
|
edit source
]
Validate system designs
[
edit
|
edit source
]
Category
:
Book:CASP
Navigation menu
Personal tools
Not logged in
Discussion for this IP address
Contributions
Create account
Log in
Namespaces
Book
Discussion
English
Views
Read
Edit
Edit source
View history
More
Navigation
Main Page
Help
Browse
Cookbook
Wikijunior
Featured books
Recent changes
Donations
Random book
Using Wikibooks
Community
Reading room forum
Community portal
Bulletin Board
Help out!
Policies and guidelines
Contact us
Tools
What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Sister projects
Wikipedia
Wikiversity
Wiktionary
Wikiquote
Wikisource
Wikinews
Wikivoyage
Commons
Wikidata
MediaWiki
Meta-Wiki
Print/export
Create a collection
Download as PDF
Printable version
In other languages
Add links