Cover image for Collaboration with cloud computing : security, social media, and unified communications
Title:
Collaboration with cloud computing : security, social media, and unified communications
Personal Author:
Publication Information:
Amsterdam ; Boston : Syngress, 2014
Physical Description:
xix, 222 pages : illustrations ; 24 cm.
ISBN:
9780124170407
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
838073-3001 XX(838073.1) Book Book
Searching...
Searching...
30000010343172 QA76.9.A25 M475 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:

The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network


Author Notes

Ric Messier (CEH, GSEC, CISSP) has decades of IT experience in security and network, runs a small security consulting company, and teaches undergraduate and graduate courses at Brandeis University and Champlain College.


Table of Contents

Prefacep. xiii
Acknowledgmentsp. xix
Chapter 1 The Evolving Nature of Information Securityp. 1
Introductionp. 1
History of the Internetp. 2
Significant Security eventsp. 2
Evolution of servicesp. 5
Today's risks (in a Nutshell)p. 8
Collaborationp. 12
Conclusionp. 13
Summaryp. 13
Chapter 2 Cloud Computingp. 15
OIntroductionp. 15
The protocols that made it possiblep. 16
XTTP and HTMLp. 17
XMLp. 18
RESTful servicesp. 19
The cloudp. 21
Infrastructure as a servicep. 24
Platform as a servicep. 25
Software as a servicep. 27
Storagep. 28
Unified communication as a servicep. 28
Public, private, or hybridp. 29
Conclusionp. 30
Summayp. 32
Chapter 3 Software as a Servicep. 33
Introductionp. 33
Contact listsp. 34
Documents on the gop. 41
Real-time editingp. 46
Geo-diverse teamsp. 47
Agendasp. 47
Document sharingp. 48
Advantagesp. 48
Security considerationsp. 51
Conclusionp. 54
Summaryp. 55
Chapter 4 Storage in the Cloudp. 57
Introductionp. 57
Uses of cloud storagep. 58
Collaborationp. 58
Large file transferp. 59
Backupsp. 60
Synchronizationp. 60
Securityp. 61
Privacy concernsp. 61
Data retentionp. 61
Data destructionp. 68
Infrastructurep. 68
Protecting yourselfp. 68
Encryptionp. 70
Data loss preventionp. 72
Conclsionp. 73
Summaryp. 73
Further readingp. 75
Chapter 5 Virtual Servers and Platform as a Servicep. 77
Introductionp. 77
History of virtualizationp. 78
How virtualization worksp. 81
Hypervisorsp. 82
Snapshotsp. 83
Platform as a serivep. 84
Advantage of PaaSp. 86
Building a businessp. 88
Security considerationsp. 89
Conclsuionp. 90
Summaryp. 91
Chapter 6 Social Mediap. 93
Introductionp. 93
History and impact of social networkingp. 94
Social networking sitesp. 97
Friendsterp. 98
My Spacep. 99
Facebookp. 99
Twitterp. 103
Google+p. 107
Crowdsourcingp. 107
Gamificationp. 109
Human resourcesp. 110
Security considerationsp. 111
Conclusionp. 112
Summaryp. 113
Further readingp. 113
Chapter 7 Mobile Computingp. 115
Introductionp. 115
Smartphonesp. 116
Appsp. 119
Jailbreakingp. 122
Providing mobile accessp. 124
Physical securityp. 125
Bring your own devicep. 129
Boundariesp. 131
Conclusionp. 132
Summaryp. 133
Further readingp. 133
Chapter 8 Unified Communicationsp. 135
Introductionp. 135
Signalingp. 137
H.323p. 139
Session initiation protocolp. 144
Network address translationp. 148
Unified communicationsp. 149
VoIP in the cloudp. 150
Security considerationsp. 152
Conclusionp. 153
Summaryp. 154
Chapter 9 Remote Workersp. 155
Introductionp. 155
Remote workersp. 156
Pros and of telecommutingp. 159
Management concerns and productivityp. 159
Antisocial behaviorsp. 160
Cost savingsp. 161
Communication challengesp. 162
Human resources and remote hiresp. 163
Asynchronous versus synchronousp. 164
Security considerationp. 165
Conclusionp. 167
Summaryp. 167
Further readingp. 167
Chpater 10 Risk Management and Policy Considerationsp. 169
Introductionp. 169
Risk managementp. 170
Quantitative analysisp. 173
Return on investmentp. 175
Social return on investmentp. 176
Cost-benefit analysisp. 177
Qualitative assessmentp. 178
Security policiesp. 179
Legal and regulatory requirementsp. 181
Controlsp. 182
Conclusionp. 182
Summaryp. 183
Further readingp. 184
Chapter 11 Future Technologyp. 185
Introductionp. 185
Pushing into the cloudp. 185
Ubiquitous broadbandp. 187
Wearable computingp. 189
Interfacesp. 193
HTML5p. 194
Consumers as producersp. 196
Conclusionp. 197
Summaryp. 198
Further readingp. 198
Chapter 12 Pulling It All Togetherp. 199
Introductionp. 199
Backgroundp. 200
Requirementsp. 201
Messagingp. 202
Telephonyp. 208
Storagep. 210
Human resourcesp. 212
Project managementp. 213
Source controlp. 214
Customer relationsp. 215
Conclusionp. 215
Summaryp. 216
Indexp. 217