From Wikibooks, open books for an open world
Jump to navigation
Jump to search
Analyze industry trends and outline potential impact to the enterprise[edit | edit source]
New security systems and services[edit | edit source]
Technology evolution (e.g. RFCs, ISO)[edit | edit source]
Latest client-side attacks[edit | edit source]
Research security implications of new business tools[edit | edit source]
Integration within the business (e.g. advising on the placement of company material for the general public)[edit | edit source]
Research security requirements for contracts[edit | edit source]
Request for Proposal (RFP)[edit | edit source]
Request for Information (RFI)[edit | edit source]
Carry out relevant analysis for the purpose of securing the enterprise[edit | edit source]
Prototype and test multiple solutions[edit | edit source]
Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)[edit | edit source]
Analyze and interpret trend data to anticipate cyber defense aids[edit | edit source]
Review effectiveness of existing security[edit | edit source]
Reverse engineer / deconstruct existing solutions[edit | edit source]
Analyze security solutions to ensure they meet business needs[edit | edit source]
Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)[edit | edit source]
Conduct a lessons-learned / after-action review[edit | edit source]
Use judgment to solve difficult problems that do not have a best solution[edit | edit source]
Conduct network traffic analysis[edit | edit source]