Security Risks of Instant Messaging in the Workplace Imtiaz Paniwala Instructor: Dr. Yang Date: March 24, 2004.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
PC Client Training Customer Name © 2010 CYPRESS COMMUNICATIONS, INC. 1.
Thank you to IT Training at Indiana University Computer Malware.
Mr C Johnston ICT Teacher
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Security+ Guide to Network Security Fundamentals
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
Web server security Dr Jim Briggs WEBP security1.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 Computer Security: Protect your PC and Protect Yourself.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Norman SecureSurf Protect your users when surfing the Internet.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Internet safety By Lydia Snowden.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Honeypot and Intrusion Detection System
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Module 11: Designing Security for Network Perimeters.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
NetTech Solutions Protecting the Computer Lesson 10.
Solutions for Unified Enterprise IP Communication Steven J. Johnson President, Ingate Systems Inc.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Introduction to Barracuda IM Firewall
Firewalls.
Security in Networking
Today’s Risk. Today’s Solutions. Cyber security and
Test 3 review FTP & Cybersecurity
Presentation transcript:

Security Risks of Instant Messaging in the Workplace Imtiaz Paniwala Instructor: Dr. Yang Date: March 24, 2004

Introduction Instant messaging is an Internet service that allows the user to communicate in real time with other users who have the same instant messaging application. EIM is an abbreviation for "enterprise instant messaging." Instant messaging applications are generally categorized as either being public or enterprise. AOL's instant messenger (AIM), Yahoo Messenger and Microsoft.NET Messenger are examples of public IM services. Anyone on the Internet can sign up, download the software and begin messaging. Sun ONE Instant Messaging, IBM Lotus Instant Messaging & Web Conferencing (formerly called Sametime) and Microsoft Office Live Communications Server 2003 (formerly called Greenwich) are examples of enterprise IM services. Access to the IM server is restricted and security precautions, such as encryption, are put in place to protect the enterprise network.

Who is using instant messaging? 90% of businesses will use IM by end of (Gartner IM Trends) Corporate IM is expected to replace 65% of usage by (Information Week) 65 million workers are already using instant messaging, and that number is expected to grow to 350 million by (IDC Research) Corporate IM usage is expected to account for nearly 60% of all online traffic by 2005.(Ferris Research) As more IT departments become convinced of the value of IM as a business communications tool and begin looking for ways to exert control, implement security measures and integrate instant messaging with other groupware components, unmanaged IM use in the enterprise is likely to become a thing of the past.

What's Hot, What's Not ? AIM (AOL Instant Messenger) million users ICQ million users Messenger million users Yahoo! Messenger million users Source: comScore Media Metrix

Did you know? IM worms do not need to scan the internet for the IP addresses of vulnerable systems, a process that greatly slows the spread of traditional worms. Instead, IM worms simply use the infected user's buddy list to find new targets. Even with a scenario in which the buddy lists of infected and target machines were identical except for just one IM user, an IM worm could infect 500,000 machines in just 31 seconds. The packet sniffing software 'dsniff' (available at is able to decipher AIM passwords on the fly. One or two “clicks” in.net messenger allows a remote user to control your computer Yahoo! Messenger has the weakest security features of the major messaging platforms. Its protocol does not encrypt usernames and passwords, making it risky to even log into the system. ICQ has been the target of many DoS bugs and at least one remote buffer overflow.

Common threats 1. Weakened security settings. During installation, instant messaging software may change browser security settings, placing the computer at risk. 2. Readability by intruders. Instant messaging sessions are conducted in plain, unencrypted text, and are an open book to a reasonably skilled intruder. 3. Intrusion on privacy. By design, instant messaging software runs continuously as a background task and broadcasts the computer's presence online even if the interface is closed. (A separate "exit" action is needed to stop it.) In addition, instant messaging software may store the content of an instant messaging session in a log-file that could be read by others. 4. Hijacking and impersonation. Instant messaging accounts are vulnerable to hijacking or spoofing, allowing an intruder to impersonate someone in conversations with others.

Common threats contd. 5. Malicious code. Instant messaging establishes an open communications channel to the computer that can be exploited by malicious code such as worms, viruses, and Trojan horses. 6. Unauthorized access. Instant messaging users can potentially access each others hard drives and files during a session, placing the computer at the disposal of would-be hackers. 7. Poor password security. Instant messaging software typically stores passwords in a manner that is highly vulnerable to hackers. 8. No virus protection. Instant messaging sessions are not virus protected and can freely spread virus-ridden files.

INSTANT MESSAGING BEST PRACTICES Establish a corporate instant messaging usage policy Properly configure corporate perimeter firewalls Deploy desktop antivirus software Employ personal firewalls to ensure policy compliance Deploy corporate instant messaging servers Install all instant messaging patches as soon as possible Use vulnerability management solutions to ensure policy compliance

Recommended instant messaging client settings If a corporation chooses to use an external instant messaging system— one whose servers are operated by the instant messaging provider—the following security practices should be kept in mind: For the best security, do not use any external IM system that does not employ a certified encryption system. Configure all IM clients so that they will accept chat requests only from users specified in employees’ buddy lists. This prevents attackers from connecting to computers on the network and sending malicious code. Only those users explicitly specified by employees should be able to contact them. Configure the IM system to either block file transfers or allow such transfers only from users specified on the buddy list. If this is not feasible, configure the IM software to prompt the employee before all file transfers. Configure the IM system to use antivirus software to scan file transfers, if supported. Configure IM accounts so they are not listed on public servers. This further prevents unsolicited chat requests.

Some security products Top Secret Messenger :Top Secret Messenger (TSM) is product developed by Encryption Software, Inc. It provides a powerful public-key encryption platform, TSM provides integrated add-on for popular instant messengers thus integrating the new IM technology with existing system applications Vayusphere Managed IM Gateway : Vayusphere MiG provides controlled employee access to Public IM. It uses relational database to store public IM conversation. This feature allows enterprises to archive and search thereby satisfying the document retention and compliance requirements. Vayusphere MIG supports all major public IM networks. Vayursphere MIG allows creation of usage and traffic reports to dynamically track IM usage12. A.I.M. Frame :A.I.M. Frame runs on top of AOL’s AIM. A.I.M. Frame records and logs all conversations with date/time stamp. IM logs can be integrated into enterprise databases via ODBC connection. A.I.M Frame also supports encrypted instant messaging to other A.I.M. Frame users.

Conclusion Due to the efficiency and convenience of their communications, instant messaging systems are rapidly becoming very important tools within corporations. Unfortunately, many of the current instant messaging systems are inadequately secured and in turn are exposing some enterprises to serious security and economic breaches. Ideally, corporations looking to leverage instant messaging should deploy a secure, corporate-focused IM solution within the company network, and then layer suitable security systems on top of this solution (firewalls, vulnerability management, antivirus, etc.) However, many companies continue to permit employees to use popular free IM services. These organizations need to understand the associated security risks and plan accordingly. Clearly, the growth of instant messaging systems will bring greater efficiencies to the global workplace. Only by appropriately securing these systems will businesses be able to reap their full economic benefits.

Thank you !!! The intent is not to persuade you NOT to use IM. Just be aware of how you use it.