DocumentCode
983301
Title
Enterprise Security for Web 2.0
Author
Davidson, Mary Ann ; Yoran, Elad
Volume
40
Issue
11
fYear
2007
Firstpage
117
Lastpage
119
Abstract
Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It\´s also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who\´ve gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they\´ve experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it\´s doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What\´s needed, in short, is Security 2.0.
Keywords
Internet; data privacy; telecommunication security; IT construct; Internet phenomenon; Web 2.0; enterprise security; information dissemination; privacy; Business; Cellular phones; Collaboration; Companies; Computer networks; Computer security; Data security; Pervasive computing; Smart phones; Web services; IT systems perspectives; Security 2.0; Web 2.0; enterprise security;
fLanguage
English
Journal_Title
Computer
Publisher
ieee
ISSN
0018-9162
Type
jour
DOI
10.1109/MC.2007.383
Filename
4385273
Link To Document