• DocumentCode
    983301
  • Title

    Enterprise Security for Web 2.0

  • Author

    Davidson, Mary Ann ; Yoran, Elad

  • Volume
    40
  • Issue
    11
  • fYear
    2007
  • Firstpage
    117
  • Lastpage
    119
  • Abstract
    Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It\´s also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who\´ve gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they\´ve experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it\´s doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What\´s needed, in short, is Security 2.0.
  • Keywords
    Internet; data privacy; telecommunication security; IT construct; Internet phenomenon; Web 2.0; enterprise security; information dissemination; privacy; Business; Cellular phones; Collaboration; Companies; Computer networks; Computer security; Data security; Pervasive computing; Smart phones; Web services; IT systems perspectives; Security 2.0; Web 2.0; enterprise security;
  • fLanguage
    English
  • Journal_Title
    Computer
  • Publisher
    ieee
  • ISSN
    0018-9162
  • Type

    jour

  • DOI
    10.1109/MC.2007.383
  • Filename
    4385273