CASP/R A
From Wikibooks, open books for an open world
<
CASP
Jump to navigation
Jump to search
Contents
1
Analyze industry trends and outline potential impact to the enterprise
1.1
Perform on-going research
1.1.1
Best practices
1.1.2
New technologies
1.1.3
New security systems and services
1.1.4
Technology evolution (e.g. RFCs, ISO)
1.2
Situational awareness
1.2.1
Latest client-side attacks
1.2.2
Threats
1.2.3
Counter zero day
1.2.4
Emergent issues
1.3
Research security implications of new business tools
1.3.1
Social media/networking
1.3.2
Integration within the business (e.g. advising on the placement of company material for the general public)
1.4
Global IA industry/community
1.4.1
Conventions
1.4.2
Attackers
1.4.3
Emerging threat sources
1.5
Research security requirements for contracts
1.5.1
Request for Proposal (RFP)
1.5.2
Request for Quote (RFQ)
1.5.3
Request for Information (RFI)
1.5.4
Agreements
2
Carry out relevant analysis for the purpose of securing the enterprise
2.1
Benchmark
2.2
Prototype and test multiple solutions
2.3
Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)
2.4
Analyze and interpret trend data to anticipate cyber defense aids
2.5
Review effectiveness of existing security
2.6
Reverse engineer / deconstruct existing solutions
2.7
Analyze security solutions to ensure they meet business needs
2.7.1
Specify the performance
2.7.2
Latency
2.7.3
Scalability
2.7.4
Capability
2.7.5
Usability
2.7.6
Maintainability
2.7.7
Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)
2.8
Conduct a lessons-learned / after-action review
2.9
Use judgment to solve difficult problems that do not have a best solution
2.10
Conduct network traffic analysis
Analyze industry trends and outline potential impact to the enterprise
[
edit
|
edit source
]
Perform on-going research
[
edit
|
edit source
]
Best practices
[
edit
|
edit source
]
New technologies
[
edit
|
edit source
]
New security systems and services
[
edit
|
edit source
]
Technology evolution (e.g. RFCs, ISO)
[
edit
|
edit source
]
Situational awareness
[
edit
|
edit source
]
Latest client-side attacks
[
edit
|
edit source
]
Threats
[
edit
|
edit source
]
Counter zero day
[
edit
|
edit source
]
Emergent issues
[
edit
|
edit source
]
Research security implications of new business tools
[
edit
|
edit source
]
Social media/networking
[
edit
|
edit source
]
Integration within the business (e.g. advising on the placement of company material for the general public)
[
edit
|
edit source
]
Global IA industry/community
[
edit
|
edit source
]
Conventions
[
edit
|
edit source
]
Attackers
[
edit
|
edit source
]
Emerging threat sources
[
edit
|
edit source
]
Research security requirements for contracts
[
edit
|
edit source
]
Request for Proposal (RFP)
[
edit
|
edit source
]
Request for Quote (RFQ)
[
edit
|
edit source
]
Request for Information (RFI)
[
edit
|
edit source
]
Agreements
[
edit
|
edit source
]
Carry out relevant analysis for the purpose of securing the enterprise
[
edit
|
edit source
]
Benchmark
[
edit
|
edit source
]
Prototype and test multiple solutions
[
edit
|
edit source
]
Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)
[
edit
|
edit source
]
Analyze and interpret trend data to anticipate cyber defense aids
[
edit
|
edit source
]
Review effectiveness of existing security
[
edit
|
edit source
]
Reverse engineer / deconstruct existing solutions
[
edit
|
edit source
]
Analyze security solutions to ensure they meet business needs
[
edit
|
edit source
]
Specify the performance
[
edit
|
edit source
]
Latency
[
edit
|
edit source
]
Scalability
[
edit
|
edit source
]
Capability
[
edit
|
edit source
]
Usability
[
edit
|
edit source
]
Maintainability
[
edit
|
edit source
]
Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)
[
edit
|
edit source
]
Conduct a lessons-learned / after-action review
[
edit
|
edit source
]
Use judgment to solve difficult problems that do not have a best solution
[
edit
|
edit source
]
Conduct network traffic analysis
[
edit
|
edit source
]
Category
:
Book:CASP
Navigation menu
Personal tools
Not logged in
Discussion for this IP address
Contributions
Create account
Log in
Namespaces
Book
Discussion
English
Views
Read
Edit
Edit source
View history
More
Navigation
Main Page
Help
Browse
Cookbook
Wikijunior
Featured books
Recent changes
Donations
Random book
Using Wikibooks
Community
Reading room forum
Community portal
Bulletin Board
Help out!
Policies and guidelines
Contact us
Tools
What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Sister projects
Wikipedia
Wikiversity
Wiktionary
Wikiquote
Wikisource
Wikinews
Wikivoyage
Commons
Wikidata
MediaWiki
Meta-Wiki
Print/export
Create a collection
Download as PDF
Printable version
In other languages
Add links