Instant Messaging And Its Associated Security Risks
Instant Messaging (IM) is proving increasingly popular as a tool for communicating
over the Internet - it is a real-time addition to, and a replacement for, e-mailing. It allows two-way instant communication in real-time, and because of this the majority of its users feel it is a more effective and efficient way of communicating. But how does it work and what threat does it pose to the security of a company's IT infrastructure?
IM consists of clients and servers; the providing vendor could be AOL, ICQ, Yahoo or MSN (different protocols dictate the chosen vendors' interoperability with other IMs). IM allows not only the transfer of text, but also documents/files - this is potentially a backdoor for Trojan Horses. Hackers can use IM to gain backdoor access to PCs without opening a port, this circumnavigates desktop and perimeter firewalls. A hacker won't need to scan unknown IP-addresses but simply trawl through a book full of trusted 'buddy lists'. The implication of this is that all the files on a PC can be shared using the IM client, which in turn could lead to the spread of files that are infected with a virus or other malware.
Companies will have to look at the threat from worms, and the rise of IM worms has been steadily increasing. And what about Trojan Horses, Denial of Service attacks and Information Disclosure? There are vendors out there who have reacted, but the threat remains that the IM network as a whole is at risk.
IM is unlikely to exceed email as the primary cause of infection, but companies should not disregard the threat.
ARM specialise in IT Security recruitment and IT Telecoms recruitment solutions. Contact them today for more about their technical recruitment capability.
by: Lauren Christoph
Protecting Your Social Security Number from Fraud Is Video Security The Right Choice For You? Why Buy Wireless Security Systems Hard Gun Cases: How They Provide Ultimate Security to Your Gun? How to Remove/Uninstall Advanced Security Tool 2010 Virus Easily? Locksmith Tools - Advanced Tools for Superior Security Systems What is Security Suite Pro - How to Remove Security Suite Pro Completely Remove Advanced Security Tool 2010 - How to Remove Advanced Security Tool 2010 Quickly How Do I Remove My Security Shield Instantly? How Do I Remove Advanced Security Tool 2010 Instantly? Remove Security Shield 2010 - How to Remove Security Shield 2010 Completely How Do I Remove Security Suite Instantly? GPS Perimeter security – Guaranteed high-tech security solutions!
www.yloan.com
guest:
register
|
login
|
search
IP(216.73.216.35) California / Anaheim
Processed in 0.016737 second(s), 7 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 10 , 1801, 221,