CHAPTER 35

SECURING P2P, IM, SMS, AND COLLABORATION TOOLS

Carl Ness

35.1 INTRODUCTION

35.2 GENERAL CONCEPTS AND DEFINITIONS

35.2.1 Peer to Peer

35.2.2 Instant Messaging

35.2.3 Short Message Service

35.2.4 Collaboration Tools

35.3 PEER-TO-PEER NETWORKS

35.3.1 Dangers to the Business

35.3.2 Prevention and Mitigation

35.3.3 Response

35.3.4 Case Study

35.4 SECURING INSTANT MESSAGING

35.4.1 Dangers to the Business

35.4.2 Prevention and Mitigation

35.4.3 Response

35.4.4 Safe Messaging

35.5 SECURING SMS

35.5.1 Dangers to the Business

35.5.2 Prevention and Mitigation

35.5.3 Reaction and Response

35.6 SECURING COLLABORATION TOOLS

35.6.1 Security versus Openness

35.6.2 Dangers of Collaboration Tools

35.6.3 Prevention and Mitigation

35.6.4 Reaction and Response

35.7 CONCLUDING REMARKS

35.8 FURTHER READING

35.9 NOTES

35.1 INTRODUCTION.

Peer-to-peer (P2P) communications, instant messaging (IM), short message services (SMS), and collaboration tools must be directly addressed in any comprehensive security plan. The dangers are very real, as is the probability that at least one of these technologies is in use on almost every information system.

35.2 GENERAL CONCEPTS AND DEFINITIONS.

This chapter is designed to present enough information and resources to aid in integrating the defense of each function into the organization's security plan. A list of resources is provided at the end of the chapter to aid in further research.

35.2.1 Peer to Peer.

Peer-to-peer networking, also referred to as P2P, ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.