Jump to content

CASP/Integration

From Wikibooks, open books for an open world

Integrate enterprise disciplines to achieve secure solutions

[edit | edit source]

Interpreting security requirements and goals to communicate with other disciplines

[edit | edit source]

Programmers

[edit | edit source]

Network engineers

[edit | edit source]

Sales staff

[edit | edit source]

Provide guidance and recommendations to staff and senior management on security processes and controls

[edit | edit source]

Establish effective collaboration within teams to implement secure solutions

[edit | edit source]

Disciplines

[edit | edit source]

Programmer

[edit | edit source]

Database administrator

[edit | edit source]

Network administrator

[edit | edit source]

Management

[edit | edit source]

Stake holders

[edit | edit source]

Financial

[edit | edit source]

HR- Human Resources

[edit | edit source]

Emergency response team

[edit | edit source]

Facilities manager

[edit | edit source]

Physical security manager

[edit | edit source]

Explain the security impact of inter-organizational change

[edit | edit source]

Security concerns of interconnecting multiple industries

[edit | edit source]

Rules, policies and regulations

[edit | edit source]

Design considerations during mergers, acquisitions and de-mergers

[edit | edit source]

Assuring third party products - only introduce acceptable risk

[edit | edit source]

Custom developed

[edit | edit source]

COTS – Commercial Off The Shelf Software

[edit | edit source]

Network secure segmentation and delegation

[edit | edit source]

Integration of products and services

[edit | edit source]

Select and distinguish the appropriate security controls with regard to communications and collaboration

[edit | edit source]

Unified communication security

[edit | edit source]

Web conferencing

[edit | edit source]

Video conferencing

[edit | edit source]

Instant messaging

[edit | edit source]

Desktop sharing

[edit | edit source]

Remote assistance

[edit | edit source]

Presence

[edit | edit source]

Email

[edit | edit source]

Telephony

[edit | edit source]

VoIP security

[edit | edit source]

VoIP implementation

[edit | edit source]

Remote access

[edit | edit source]

Enterprise configuration management of mobile devices

[edit | edit source]

Secure external communications

[edit | edit source]

Secure implementation of collaboration platforms

[edit | edit source]

Prioritizing traffic (QoS- Quality of Service)

[edit | edit source]

Mobile devices

[edit | edit source]

Smart phones, IP cameras, laptops, IP based devices

[edit | edit source]

Explain advanced authentication tools, techniques and concepts

[edit | edit source]

Federated identity management (SAML--Security Assertions Markup Language)

[edit | edit source]

XACML- eXtensible Access Control Markup Language

[edit | edit source]

SOAP-Simple Object Access Protocol

[edit | edit source]

Single sign on

[edit | edit source]

SPML- Service Provisioning Markup Language

[edit | edit source]

Certificate based authentication

[edit | edit source]

Attestation

[edit | edit source]

Carry out security activities across the technology life cycle

[edit | edit source]

End to end solution ownership

[edit | edit source]

Understanding results of solutions in advance

[edit | edit source]

Operational activities

[edit | edit source]

Maintenance

[edit | edit source]

Decommissioning

[edit | edit source]

General change management

[edit | edit source]

Systems Development Life Cycle

[edit | edit source]

Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)

[edit | edit source]

Security Requirements Traceability Matrix (SRTM)

[edit | edit source]
[edit | edit source]

Validate system designs

[edit | edit source]