Analysis of Instant Messenger Programs Celia Hung and Nathan Miller ECE 478/578 Department of Electrical Engineering Oregon State University.

Slides:



Advertisements
Similar presentations
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Advertisements

April 2005: Ariba workstations hacked with 11,600 SSNs President Jischke and VPIT Jim Bottum meeting Academic Officers meeting Business Services memo.
Instant Messaging Internet Technologies and Applications.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University,
1 Enabling Secure Internet Access with ISA Server.
1 Computer Security: Protect your PC and Protect Yourself.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Instant Messaging Nil Lakavivat Stanislav Goryachev Calle Spång.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Risks of Instant Messaging in the Workplace Imtiaz Paniwala Instructor: Dr. Yang Date: March 24, 2004.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
Malware in Popular Networks Dmitry O. Gryaznov. The Big Change ► Mostly viruses, few trojans ► Obvious destructive or annoying payload ► Mischief and.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Managing Information in a Global World
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
How do you IM? CLA 2006 Jill Patterson, Moderator (Orange County Public Library) The Experts Lisa Bartle (Pfau Library/CSU San Bernardino) Tom Bickley.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Tracking Changes in MS Word. Track Changes Allows you to keep track of the changes you make to a document Extremely helpful when more than one person.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
A Case Study: UIM The Universal Instant Messenger Babak Esfandiari Carleton University SYSC 5800 Winter 2003.
Security fundamentals Topic 9 Securing internet messaging.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
External Messaging Services. Page 2 External Messaging: Extends the power of Presence and Instant Messaging outside corporate Network Provided only to.
Instant Messaging. Magnitude of the Problem Radicati reports that 85% of enterprises today use IM. Furthermore, Radicati predicts IM usage increases will.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Network Security and Security in Industry Paul Curtis.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Network Security Research Presentation
Tara Smith April 8, 2003 I385T - KMS
COMPUTER MEDIATED COMMUNICATION
Introduction to Networks
Internet.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Security Insights: Secure Messaging
Presentation transcript:

Analysis of Instant Messenger Programs Celia Hung and Nathan Miller ECE 478/578 Department of Electrical Engineering Oregon State University

Introduction What is it?? Features –Instant Messaging –IM Images –Voice/Video Chat –Game Request –File Transfer –Application Sharing/Remote Access

AOL Instant Messenger (AIM) 43.6 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing FLAP and OSCAR –Authentication Protocol

.NET Messenger 18.5 Million Users Features Instant Messaging Voice/Video Chat Application Sharing File Transfer Remote Assistance MSNP –Authentication Protocol

ICQ (I Seek You) 7.2 Million Users Features Instant Messaging Voice/Video Chat File Transfer File Sharing FLAP and OSCAR –Authentication Protocol

Yahoo! Messenger 11.9 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing YMSG –Authentication Protocol

Existing Security Blocking –Ignoring –Firewall –Company Policy Warning Software

Vulnerabilities Worms Trojan Horses Hijacking Denial of Service Disclosure

Solutions Eliminate IM Stronger Cryptography/Software Trillian

References [1]“Cyber-attacks Batter Web Heavyweights.” February [2]“Risk Eposure Through Instant Messaging and Peer-to-Peer (P2P) Networks.” Internet Security Systems. April [3]“SecureIM.” [4]Dalton, Curtis E. and Kannengeisser, William. “Instant Headache.” Info Security Magazine. August [5]Gaudin, Sharon. “Norton Antivirus Attacks Instant Messaging.” August [6]Grimes, Roger A. "IM Security Primer." May [7]Hindocha, Neal. “Instant Insecurity: Security Issues of Instant Messaging.” January [8]Hindocha, Neal. “Threats to Instant Messaging.” Symantec Security Response. January [9]Hu, Jim. “Worms Find Fertile Ground in IM.” August [10]Shinder, Thomas. “How to Block Dangerous Instant Messengers Using ISA Server.” July [11]Thorsberg, Frank. “Is IM a Sieve for Corporate Secrets?” July [12]Varnosi, Robert. “The Problem with Instant Messaging Apps at Work.” August 2002www.cnet.com