CHAPTER 35
SECURING P2P, IM, SMS, AND COLLABORATION TOOLS
Carl Ness
35.2 GENERAL CONCEPTS AND DEFINITIONS
35.3.1 Dangers to the Business
35.3.2 Prevention and Mitigation
35.4 SECURING INSTANT MESSAGING
35.4.1 Dangers to the Business
35.4.2 Prevention and Mitigation
35.5.1 Dangers to the Business
35.5.2 Prevention and Mitigation
35.6 SECURING COLLABORATION TOOLS
35.6.1 Security versus Openness
35.6.2 Dangers of Collaboration Tools
35.6.3 Prevention and Mitigation
35.1 INTRODUCTION.
Peer-to-peer (P2P) communications, instant messaging (IM), short message services (SMS), and collaboration tools must be directly addressed in any comprehensive security plan. The dangers are very real, as is the probability that at least one of these technologies is in use on almost every information system.
35.2 GENERAL CONCEPTS AND DEFINITIONS.
This chapter is designed to present enough information and resources to aid in integrating the defense of each function into the organization's security plan. A list of resources is provided at the end of the chapter to aid in further research.
35.2.1 Peer to Peer.
Peer-to-peer networking, also referred to as P2P, ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.