UCCS CS 6910 - Instant Messenger Security with a focus on implementing security policies in corporate IM services

Unformatted text preview:

Instant Messenger Security with a focus on implementing security policies in corporate IM servicesOutlineInstant MessagingProblems with Free IM in corporate environmentsGeneral threats to IMGeneral threats to IM ContdImplementing security policies in IMRequired features in corporate IMsBasic IM Service architectureSecurity Clearance hierarchyLog-inChattingChatting contd.ConferencesFile SharingSummaryReferencesInstant Messenger Security with a focus on implementing security policies in corporate IM servicesKaushal S ChandrashekarCS 691Dr. Edward ChowUCCSOutline• Instant Messaging•Problems with IM in corporate environments• General threats to IM• Implementing security policies in IM• Design details and problems• Summary• ReferencesInstant Messaging•Instant Messaging (IM) is the online chat medium that allows people to connect and collaborate in real-time. • Based on IP protocols• 10 million enterprise users in 2002• Expected to explode up to 180 million users by 2007Problems with Free IM in corporate environments•Privacy concerns•Security Concerns •No central administration •No integration with corporate IT •Security and firewall problems •Dependence on external infrastructure providersGeneral threats to IM •Worms• Bypasses most anti-virus scanners• Can resend itself to all on the buddy list•Backdoor Trojan Horses • Utilize IM app to send information about user• Can modify configuration settings to make whole HDD available for file sharingGeneral threats to IM Contd •Hijacking and Impersonation• Account information can be stolen and misused• Man-in-the-middle attacks •Denial of Service • Flood attacksImplementing security policies in IM• Why?• Most enterprise IMs provide only primitive control• A more fine-grained approach required• Common breaches of security• Transfer of confidential files to unauthorized users• Unauthorized attendees in confidential conferences• Messages containing confidential informationRequired features in corporate IMs• Secure log-in• Chatting• Internal, application based • External, web based• Conferencing• File sharingBasic IM Service architectureCentral MessagingServerInternal NetworkNo external IPProtected against internal DOS attacksClient(s)AuthenticationAccess ControlCertificate handlingAuthenticationEncryptionDMZWebServerWeb based IMSecurity Clearance hierarchyMgmt Level 1Mgmt Level 2..Regular Employee.Customer Support.ExternalLog-in• Essential because it determines security clearance• Password-locked certificates• Problems• Weak passwords• Vulnerable to software cracking and social engineering• Biometric keys• Integration of IM login with terminal loginChatting• Rules• External chat only with employees with Ls >= lk, a predetermined level• If Ls(S1) >= Ls(S2), S1 can chat unchecked with S2, but messages from S2 to S1 are monitored• All chat messages are encrypted using mutually negotiated session keys, except for ones with externals.Chatting contd.• Chat monitoring and logging• All chat activity is monitored and logged to log files that are accessible only to any non-sysadmin users • Suspect word list to raise alerts• Problems• Words split up, capitalized• Sentences in unrecognized languages spelt in a recognized language•IM activity at unusual times could raise alertsConferences• Collaborative chatting with ability to record conversation by attendees as minutes• Rules•Each conference has security level assigned to level l• If Ls(Employee) <= l, employee can read/write• Custom invitations to conferences also possible• Downgrading of conference level after starting possible, but is logged and all messages generated by users with higher security clearances will be hidden to less secure usersFile Sharing• All files that are shared are assumed to be at the sender’s security level• Levels can be changed by the system administrator• If Lo >= Ls, the file can be transferred• All manuals and public documents are tagged in a central repository by the sys-admin with Lo >= Ls(External) so that customer service can transfer documents or parts of it to clientsSummary• Conflict between restrictions imposed by security policies and ease of use built into IM services• No security policy is a match for human ingenuity. • Further research is required and perhaps a new model for enterprise IM services• Unified messaging, currently getting popular, requires a extremely vast and diverse security policy.Referenceshttp://www.symantec.com/avcenter/reference/secure.instant.messaging.pdfhttp://www.symantec.com/avcenter/reference/threats.to.instant.messaging.pdfhttp://www.go4teams.com/papers/enterprise_im.pdfhttp://www.jabber.com/download.php?dl=Extensible_IM_Essentials.pdfhttp://www.informationweek.com/story/IWK20030226S0009Computer Security – Art and Science by Matt


View Full Document

UCCS CS 6910 - Instant Messenger Security with a focus on implementing security policies in corporate IM services

Download Instant Messenger Security with a focus on implementing security policies in corporate IM services
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Instant Messenger Security with a focus on implementing security policies in corporate IM services and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Instant Messenger Security with a focus on implementing security policies in corporate IM services 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?