Tuesday, May 28, 2019

Instant Messenger Programs Essay -- Communication Computers Internet E

Analysis of strident Messenger Programs From telegrams to telephones, to emails and faxes, people have had a strong desire to be connected to one another. The onset of the information age has only increased that desire - to the point that people are seeking a constant connection. The founding of eye blink courier programs has allowed people to be connected and communicate in real-time. Instant pass not only provides transfer of text messages, but peer-to-peer institutionalise sharing as well. While file transfer provides the user with increased convenience, it also increases the odds of transferring viruses, worms, and other malware. This paper will discuss the major instant messenger programs AOL IM, .NET Messenger, ICQ, and Yahoo Messenger. In particular it will explore the threats and security risks involved in both personal and professional use of instant messenger programs. IntroductionAs the name suggests, instant messaging, or IM, is the real-time delivery of a mess age from one user to another. Communication between any calculate stations can occur as long as the appropriate version of the program is installed. Users must also be concurrently running an IM invitee (program) as well as be on the same IM network 7. A conversation that occurs between two or more users is known as a session (or channel). A session can either be public, where any and all users can participate, or private, where users must be invited to participate in the session. Buddy lists, also known as contact lists, allow users to maintain communication with specific users of the same IM client and network.While each instant messaging program is unique, they all employ similar client-server architecture to send and receive m... ...5 Gaudin, Sharon. Norton Antivirus Attacks Instant Messaging. www.instant-messaging.com. August 2002. 6 Grimes, Roger A. IM Security Primer. www.secadministrator.com. May 2002. 7 Hindocha, Neal. Instant Insecurity Security I ssues of Instant Messaging. www.securityfocus.com. January 2003. 8 Hindocha, Neal. Threats to Instant Messaging. Symantec Security Response. January 2003. 9 Hu, Jim. Worms Find Fertile Ground in IM. www.cnetnews.com. August 2001. 10 Shinder, Thomas. How to Block Dangerous Instant Messengers Using ISA Server. www.windowssecurity.com. July 2002. 11 Thorsberg, Frank. Is IM a Sieve for Corporate Secrets? www.pcworld.com July 2002. 12 Varnosi, Robert. The business with Instant Messaging Apps at Work. www.cnet.com. August 2002

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.