Collaboration with Cloud Computing

Book description

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:

  • The evolving nature of information security
  • The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
  • Social media and security risks in the enterprise
  • The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
  • Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions
  • Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies
  • Explores the risks associated with the use of social media to the enterprise network
  • Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements

Table of contents

  1. Cover image
  2. Title page
  3. Copyright
  4. Dedication
  5. Preface
    1. Intended audience
    2. Organization of this book
  6. Acknowledgements
  7. Chapter 1. The Evolving Nature of Information Security
    1. Information Included in This Chapter
    2. Introduction
    3. History of the Internet
    4. Significant security events
    5. Evolution of services
    6. Today’s risks (in a Nutshell)
    7. Collaboration
    8. Conclusion
    9. Summary
  8. Chapter 2. Cloud Computing
    1. Information Included in This Chapter
    2. Introduction
    3. The protocols that made it possible
    4. The cloud
    5. Unified communication as a service
    6. Public, private, or hybrid
    7. Conclusion
    8. Summary
  9. Chapter 3. Software as a Service
    1. Information Included in This Chapter
    2. Introduction
    3. Contact lists
    4. Documents on the go
    5. Advantages
    6. Security considerations
    7. Conclusion
    8. Summary
  10. Chapter 4. Storage in the Cloud
    1. Information Included in This Chapter
    2. Introduction
    3. Uses of cloud storage
    4. Security
    5. Protecting yourself
    6. Conclusion
    7. Summary
    8. Further reading
  11. Chapter 5. Virtual Servers and Platform as a Service
    1. Information Included in This Chapter
    2. Introduction
    3. History of virtualization
    4. How virtualization works
    5. Platform as a service
    6. Security considerations
    7. Conclusion
    8. Summary
  12. Chapter 6. Social Media
    1. Information Included in This Chapter
    2. Introduction
    3. History and impact of social networking
    4. Social networking sites
    5. Crowdsourcing
    6. Gamification
    7. Human resources
    8. Security considerations
    9. Conclusion
    10. Summary
    11. Further reading
  13. Chapter 7. Mobile Computing
    1. Information Included in This Chapter
    2. Introduction
    3. Smartphones
    4. Providing mobile access
    5. Physical security
    6. Bring your own device
    7. Conclusion
    8. Summary
    9. Further reading
  14. Chapter 8. Unified Communications
    1. Information Included in This Chapter
    2. Introduction
    3. Signaling
    4. H.323
    5. Session initiation protocol
    6. Unified communications
    7. VoIP in the cloud
    8. Security considerations
    9. Conclusion
    10. Summary
  15. Chapter 9. Remote Workers
    1. Information Included in This Chapter
    2. Introduction
    3. Remote workers
    4. Pros and cons of telecommuting
    5. Asynchronous versus synchronous
    6. Security considerations
    7. Conclusion
    8. Summary
    9. Further reading
  16. Chapter 10. Risk Management and Policy Considerations
    1. Information Included in This Chapter
    2. Introduction
    3. Risk management
    4. Security policies
    5. Conclusion
    6. Summary
    7. Further reading
  17. Chapter 11. Future Technology
    1. Information Included in This Chapter
    2. Introduction
    3. Pushing into the cloud
    4. Ubiquitous broadband
    5. Wearable computing
    6. Interfaces
    7. HTML5
    8. Consumers as producers
    9. Conclusion
    10. Summary
    11. Further reading
  18. Chapter 12. Pulling It All Together
    1. Information Included in This Chapter
    2. Introduction
    3. Background
    4. Requirements
    5. Messaging
    6. Storage
    7. Project management
    8. Source control
    9. Customer relations
    10. Conclusion
    11. Summary
  19. Index

Product information

  • Title: Collaboration with Cloud Computing
  • Author(s): Ric Messier
  • Release date: April 2014
  • Publisher(s): Syngress
  • ISBN: 9780124171237