Security Analyses for Enterprise Instant Messaging (EIM) Systems
نویسندگان
چکیده
onsumer instant messaging (CIM) services (aka public IM) such as AOL Messenger, Yahoo! Messenger, and MSN Messenger have achieved critical mass appeal and usage as a convenient and informal method of communication supporting real-time messaging and presence awareness.1,2 Unfortunately, these services are highly vulnerable from a security standpoint. Some of these security problems include threats from viruses and worms, Trojan horses, identity theft, impersonation, eavesdropping, data loss, and denial-of-service attacks. The increasing use of instant messaging in the workplace has increased concerns about security related to its use. Recently, AOL and Yahoo! announced that they will be pulling back from their EIM (enterprise instant messaging) businesses because of the concerns that enterprise IT managers have about IM management, including security vulnerabilities.3,4 Additional requirements of corporate instant messaging include protection of internally communicated information from unauthorized disclosure, protection from corporate espionage, governmentmandated logging requirements, etc. To service these additional requirements, many companies have developed enterprise-grade instant messaging software solutions that promise more secure instant messaging environments. These solutions, collectively known as enterprise instant messaging (EIM) solutions, increase security by enabling greater local centralized control and by supporting additional security features such as encryption or digital certificates. This article focuses on security issues related to instant messaging, first examining the threats and available countermeasures present in existing CIM services. These include viruses and worms, Trojan horses, identity theft, impersonation, eavesdropping, data loss, and denial-of-service attacks. This article then examines the variety of EIM solutions available. At present, four architectural models exist for EIM: (1 ) Ga t eway Po l i cy En fo rcemen t , (2) Internally Deployed EIM, (3) a Hybrid Solution, and (4) Managed Centralized EIM. Following this market analysis, the article considers these four classes of solutions in terms of their access control, authentication, messaging sessions supported, message routing, encryption, client software, interoperability with CIM, performance, and points of C M U N I C A T I O N S , N E T W O R K , A N D I N T E R N E T S E C U R I T Y
منابع مشابه
Highlighting the Gaps in Enterprise Systems Models by Interoperating CGs and FCA
Enterprises arise from creative human endeavours, articulated through business concepts encoded in enterprise information systems through a modular Enterprise Information Model (EIM). The EIM thus brings the productivity of computers to bear. Essentially, the EIM represents conceptual structures, which align the computer’s structured way of working with the human’s conceptual way of thinking. U...
متن کاملResearch and Implementation of dynamic DNS-based Enterprise Instant Messaging System
Instant messaging (IM) has infiltrated the enterprise in a big way. It is a fast and inexpensive way to communicate with people who are located elsewhere in the enterprise. There are two dominant standards (SIP/SIMPLE and Jabber/XMPP) and various proprietary IM solutions (MSN, Yahoo, AOL, etc). In this paper the existing standards and peripheral protocols are introduced and studied, and then sp...
متن کاملManaging enterprise information: meeting performance and conformance objectives in a changing information environment
This paper presents the findings of an in-depth survey to examine the current status of enterprise information management (EIM) in organizations. The survey explores five key areas: drivers and capabilities of EIM; current status of EIM strategies; EIM content and technologies; EIM and compliance; and the changing role of the information professional. The survey reveals that the drivers for EIM...
متن کاملSprint Enterprise Instant Messaging Security
Instant Messaging is today’s killer application. Millions of consumer users are exploring the implications of real-time text messaging and finding that it is a perfect supplement to and, in some cases, substitute for voice communications. The enterprise market has only recently begun considering applications to business collaboration, and has found that consumer products are not generally suita...
متن کاملA posteriori error bounds for the empirical interpolation method
We present rigorous a posteriori error bounds for the Empirical Interpolation Method (EIM). The essential ingredients are (i) analytical upper bounds for the parametric derivatives of the function to be approximated, (ii) the EIM “Lebesgue constant,” and (iii) information concerning the EIM approximation error at a finite set of points in parameter space. The bound is computed “offline” and is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2005