Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.

Slides:



Advertisements
Similar presentations
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Mr C Johnston ICT Teacher
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Security+ Guide to Network Security Fundamentals
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security Fundamentals
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Security Risks of Instant Messaging in the Workplace Imtiaz Paniwala Instructor: Dr. Yang Date: March 24, 2004.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Lecture 24 Wireless Network Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Week I Security and Mobile Devices. Overview Purpose of Security Application to Mobile Devices Threats to Mobile Devices Security and the Blackberry Threats.
Ingredients of Security
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Instant Messaging. Magnitude of the Problem Radicati reports that 85% of enterprises today use IM. Furthermore, Radicati predicts IM usage increases will.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Precautions Computing Science.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Introduction to Barracuda IM Firewall
Securing Network Servers
Information and documentation media systems.
Working at a Small-to-Medium Business or ISP – Chapter 8
Network Security (the Internet Security)
Secure Software Confidentiality Integrity Data Security Authentication
Business Risks of Insecure Networks
Security in Networking
Chapter 27: System Security
Operating System Security
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Computer Security By: Muhammed Anwar.
Cloud Security AWS as an example.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Cloud Security AWS as an example.
Test 3 review FTP & Cybersecurity
Mohammad Alauthman Computer Security Mohammad Alauthman
Session 1 – Introduction to Information Security
Presentation transcript:

Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS

Outline Instant Messaging Problems with IM in corporate environments General threats to IM Implementing security policies in IM Design details and problems Summary References

Instant Messaging Instant Messaging (IM) is the online chat medium that allows people to connect and collaborate in real-time. Based on IP protocols 10 million enterprise users in 2002 Expected to explode up to 180 million users by 2007

Problems with Free IM in corporate environments Privacy concerns Security Concerns No central administration No integration with corporate IT Security and firewall problems Dependence on external infrastructure providers

General threats to IM Worms Bypasses most anti-virus scanners Can resend itself to all on the buddy list Backdoor Trojan Horses Utilize IM app to send information about user Can modify configuration settings to make whole HDD available for file sharing

General threats to IM Contd Hijacking and Impersonation Account information can be stolen and misused Man-in-the-middle attacks Denial of Service Flood attacks

Implementing security policies in IM Why? Most enterprise IMs provide only primitive control A more fine-grained approach required Common breaches of security Transfer of confidential files to unauthorized users Unauthorized attendees in confidential conferences Messages containing confidential information

Required features in corporate IMs Secure log-in Chatting Internal, application based External, web based Conferencing File sharing

Basic IM Service architecture Central Messaging Server Internal Network No external IP Protected against internal DOS attacks Client(s) Authentication Access Control Certificate handling Authentication Encryption DMZ Web Server Web based IM

Security Clearance hierarchy Mgmt Level 1 Mgmt Level 2. Regular Employee. Customer Support. External

Log-in Essential because it determines security clearance Password-locked certificates Problems Weak passwords Vulnerable to software cracking and social engineering Biometric keys Integration of IM login with terminal login

Chatting Rules External chat only with employees with Ls >= l k, a predetermined level If Ls(S1) >= Ls(S2), S1 can chat unchecked with S2, but messages from S2 to S1 are monitored All chat messages are encrypted using mutually negotiated session keys, except for ones with externals.

Chatting contd. Chat monitoring and logging All chat activity is monitored and logged to log files that are accessible only to any non-sysadmin users Suspect word list to raise alerts Problems Words split up, capitalized Sentences in unrecognized languages spelt in a recognized language IM activity at unusual times could raise alerts

Conferences Collaborative chatting with ability to record conversation by attendees as minutes Rules Each conference has security level assigned to level l If Ls(Employee) <= l, employee can read/write Custom invitations to conferences also possible Downgrading of conference level after starting possible, but is logged and all messages generated by users with higher security clearances will be hidden to less secure users

File Sharing All files that are shared are assumed to be at the senders security level Levels can be changed by the system administrator If Lo >= Ls, the file can be transferred All manuals and public documents are tagged in a central repository by the sys-admin with Lo >= Ls(External) so that customer service can transfer documents or parts of it to clients

Summary Conflict between restrictions imposed by security policies and ease of use built into IM services No security policy is a match for human ingenuity. Further research is required and perhaps a new model for enterprise IM services Unified messaging, currently getting popular, requires a extremely vast and diverse security policy.

References Computer Security – Art and Science by Matt Bishop