Shadow IT

Shadow IT

djilpmh pi
This is a sample of the book's content.Buy on Leanpub

Table of Contents

Shadow IT

  • 0. Disclaimer
    • 0.1 How to Use / Read This Book
  • 1. Shadow IT: An Introduction
    • 1.1 What You Know For Sure That Ain't So
    • 1.2 Applicability
    • 1.3 Types of Shadow IT
    • 1.4 Hire Competent People
    • 1.5 Whitelist your security
    • 1.6 Training, education and "good security practices" are still necessary
    • 1.7 End of Scolding
    • 1.8 No Secrets Here
  • 2. Local Tunnels
    • 2.1 What is it, how does it work, and what's the danger?
    • 2.2 How does it work?
    • 2.3 How to detect and stop
    • 2.4 The Irony of Security Education
    • 2.5 Observation
  • 3. Zero Knowledge services
    • 3.1 What is it, how does it work, and what's the danger?
    • 3.2 How Is This Different from File Sharing in the Clouds?
    • 3.3 How to detect and stop
  • 4. Use of Nonstandard Service Ports
    • 4.1 What is it, how does it work, and what's the danger?
    • 4.2 How to Detect and Stop
    • 4.3 Similarity to Anti-Censorship Strategies
  • 5. SSL VPNs
    • 5.1 What is it, how does it work, and what's the danger?
    • 5.2 How to detect and stop
    • 5.3 Observation
    • 5.4 (Web) Application Proxies
  • 6. Misused Online Conferencing Tools
    • 6.1 What is it, how does it work, and what's the danger?
    • 6.2 How to detect and stop
    • 6.3 Examples of Browser Plugin Based and Application Based Conferencing Services
  • 7. Encrypted File Transfer in Browser
    • 7.1 What is it, how does it work, and what's the danger?
    • 7.2 How to detect and stop
  • 8. Cloud Services
    • 8.1 Almost anyone with a credit card can start a cloud based server
    • 8.2 How to detect and stop
    • 8.3 Observation
  • 9. File Sync Danger
    • 9.1 What is it
    • 9.2 How to detect and stop
    • 9.3 Observation
  • 10. Portable Apps
    • 10.1 What is it, how does it work, and what's the danger?
    • 10.2 How to detect and stop
    • 10.3 Observation
  • 11. Desktop Virtualization
    • 11.1 What is it
    • 11.2 How to block
    • 11.3 Observation
    • 11.4 Observation 2
  • 12. Desktop Virtualization and TOR
    • 12.1 What is it, how does it work, and what's the danger?
    • 12.2 How to detect and stop
  • 13. Unblocked TOR Access
    • 13.1 Unblocked TOR access
    • 13.2 How to detect and stop
    • 13.3 Many Networks Do Not Block TOR
    • 13.4 Observation
  • 14. Anti-Censorship Services
    • 14.1 What is it, how does it work, and what's the danger?
    • 14.2 How to detect and stop
  • 15. Summary and looking forward
    • 15.1 The Need for Leadership With Vision
Shadow IT/overview

Shadow IT

course_overview

Shadow IT bypasses IT and security controls - find out how it's being done.

count_chapters
begin_reading
download
p_implied_book_part_name

Shadow IT16 chapters

Begin ›
  1. 0. Disclaimer

  2. 1. Shadow IT: An Introduction

  3. 2. Local Tunnels

  4. 3. Zero Knowledge services

  5. 4. Use of Nonstandard Service Ports

  6. 5. SSL VPNs

  7. 6. Misused Online Conferencing Tools

  8. 7. Encrypted File Transfer in Browser

  9. 8. Cloud Services

  10. 9. File Sync Danger

  11. 10. Portable Apps

  12. 11. Desktop Virtualization

  13. 12. Desktop Virtualization and TOR

  14. 13. Unblocked TOR Access

  15. 14. Anti-Censorship Services

  16. 15. Summary and looking forward