Title:
Collaboration with cloud computing : security, social media, and unified communications
Personal Author:
Publication Information:
Amsterdam ; Boston : Syngress, 2014
Physical Description:
xix, 222 pages : illustrations ; 24 cm.
ISBN:
9780124170407
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 838073-3001 | XX(838073.1) | Book | Book | Searching... |
Searching... | 30000010343172 | QA76.9.A25 M475 2014 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:
The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise networkAuthor Notes
Ric Messier (CEH, GSEC, CISSP) has decades of IT experience in security and network, runs a small security consulting company, and teaches undergraduate and graduate courses at Brandeis University and Champlain College.
Table of Contents
Preface | p. xiii |
Acknowledgments | p. xix |
Chapter 1 The Evolving Nature of Information Security | p. 1 |
Introduction | p. 1 |
History of the Internet | p. 2 |
Significant Security events | p. 2 |
Evolution of services | p. 5 |
Today's risks (in a Nutshell) | p. 8 |
Collaboration | p. 12 |
Conclusion | p. 13 |
Summary | p. 13 |
Chapter 2 Cloud Computing | p. 15 |
OIntroduction | p. 15 |
The protocols that made it possible | p. 16 |
XTTP and HTML | p. 17 |
XML | p. 18 |
RESTful services | p. 19 |
The cloud | p. 21 |
Infrastructure as a service | p. 24 |
Platform as a service | p. 25 |
Software as a service | p. 27 |
Storage | p. 28 |
Unified communication as a service | p. 28 |
Public, private, or hybrid | p. 29 |
Conclusion | p. 30 |
Summay | p. 32 |
Chapter 3 Software as a Service | p. 33 |
Introduction | p. 33 |
Contact lists | p. 34 |
Documents on the go | p. 41 |
Real-time editing | p. 46 |
Geo-diverse teams | p. 47 |
Agendas | p. 47 |
Document sharing | p. 48 |
Advantages | p. 48 |
Security considerations | p. 51 |
Conclusion | p. 54 |
Summary | p. 55 |
Chapter 4 Storage in the Cloud | p. 57 |
Introduction | p. 57 |
Uses of cloud storage | p. 58 |
Collaboration | p. 58 |
Large file transfer | p. 59 |
Backups | p. 60 |
Synchronization | p. 60 |
Security | p. 61 |
Privacy concerns | p. 61 |
Data retention | p. 61 |
Data destruction | p. 68 |
Infrastructure | p. 68 |
Protecting yourself | p. 68 |
Encryption | p. 70 |
Data loss prevention | p. 72 |
Conclsion | p. 73 |
Summary | p. 73 |
Further reading | p. 75 |
Chapter 5 Virtual Servers and Platform as a Service | p. 77 |
Introduction | p. 77 |
History of virtualization | p. 78 |
How virtualization works | p. 81 |
Hypervisors | p. 82 |
Snapshots | p. 83 |
Platform as a serive | p. 84 |
Advantage of PaaS | p. 86 |
Building a business | p. 88 |
Security considerations | p. 89 |
Conclsuion | p. 90 |
Summary | p. 91 |
Chapter 6 Social Media | p. 93 |
Introduction | p. 93 |
History and impact of social networking | p. 94 |
Social networking sites | p. 97 |
Friendster | p. 98 |
My Space | p. 99 |
p. 99 | |
p. 103 | |
Google+ | p. 107 |
Crowdsourcing | p. 107 |
Gamification | p. 109 |
Human resources | p. 110 |
Security considerations | p. 111 |
Conclusion | p. 112 |
Summary | p. 113 |
Further reading | p. 113 |
Chapter 7 Mobile Computing | p. 115 |
Introduction | p. 115 |
Smartphones | p. 116 |
Apps | p. 119 |
Jailbreaking | p. 122 |
Providing mobile access | p. 124 |
Physical security | p. 125 |
Bring your own device | p. 129 |
Boundaries | p. 131 |
Conclusion | p. 132 |
Summary | p. 133 |
Further reading | p. 133 |
Chapter 8 Unified Communications | p. 135 |
Introduction | p. 135 |
Signaling | p. 137 |
H.323 | p. 139 |
Session initiation protocol | p. 144 |
Network address translation | p. 148 |
Unified communications | p. 149 |
VoIP in the cloud | p. 150 |
Security considerations | p. 152 |
Conclusion | p. 153 |
Summary | p. 154 |
Chapter 9 Remote Workers | p. 155 |
Introduction | p. 155 |
Remote workers | p. 156 |
Pros and of telecommuting | p. 159 |
Management concerns and productivity | p. 159 |
Antisocial behaviors | p. 160 |
Cost savings | p. 161 |
Communication challenges | p. 162 |
Human resources and remote hires | p. 163 |
Asynchronous versus synchronous | p. 164 |
Security consideration | p. 165 |
Conclusion | p. 167 |
Summary | p. 167 |
Further reading | p. 167 |
Chpater 10 Risk Management and Policy Considerations | p. 169 |
Introduction | p. 169 |
Risk management | p. 170 |
Quantitative analysis | p. 173 |
Return on investment | p. 175 |
Social return on investment | p. 176 |
Cost-benefit analysis | p. 177 |
Qualitative assessment | p. 178 |
Security policies | p. 179 |
Legal and regulatory requirements | p. 181 |
Controls | p. 182 |
Conclusion | p. 182 |
Summary | p. 183 |
Further reading | p. 184 |
Chapter 11 Future Technology | p. 185 |
Introduction | p. 185 |
Pushing into the cloud | p. 185 |
Ubiquitous broadband | p. 187 |
Wearable computing | p. 189 |
Interfaces | p. 193 |
HTML5 | p. 194 |
Consumers as producers | p. 196 |
Conclusion | p. 197 |
Summary | p. 198 |
Further reading | p. 198 |
Chapter 12 Pulling It All Together | p. 199 |
Introduction | p. 199 |
Background | p. 200 |
Requirements | p. 201 |
Messaging | p. 202 |
Telephony | p. 208 |
Storage | p. 210 |
Human resources | p. 212 |
Project management | p. 213 |
Source control | p. 214 |
Customer relations | p. 215 |
Conclusion | p. 215 |
Summary | p. 216 |
Index | p. 217 |