Instant Messenger Programs

3719 Words8 Pages

Analysis of Instant Messenger Programs

From telegrams to telephones, to emails and faxes, people have had a strong desire to be connected to one another. The onset of the information age has only increased that desire - to the point that people are seeking a constant connection. The introduction of instant messenger programs has allowed people to be connected and communicate in real-time. Instant messaging not only provides transfer of text messages, but peer-to-peer file sharing as well. While file transfer provides the user with increased convenience, it also increases the odds of transferring viruses, worms, and other malware.

This paper will discuss the major instant messenger programs: AOL IM, .NET Messenger, ICQ, and Yahoo! Messenger. In particular it will explore the threats and security risks involved in both personal and professional use of instant messenger programs.

Introduction

As the name suggests, instant messaging, or IM, is the real-time delivery of a message from one user to another. Communication between any computing stations can occur as long as the appropriate version of the program is installed. Users must also be concurrently running an IM client (program) as well as be on the same IM network [7]. A conversation that occurs between two or more users is known as a session (or channel). A session can either be public, where any and all users can participate, or private, where users must be invited to participate in the session. Buddy lists, also known as contact lists, allow users to maintain communication with specific users of the same IM client and network.

While each instant messaging program is unique, they all employ similar client-server architecture to send and receive m...

... middle of paper ...

...
[5] Gaudin, Sharon. “Norton Antivirus Attacks Instant Messaging.” www.instant-messaging.com. August 2002.

[6] Grimes, Roger A. "IM Security Primer." www.secadministrator.com. May 2002.

[7] Hindocha, Neal. “Instant Insecurity: Security Issues of Instant Messaging.” www.securityfocus.com. January 2003.

[8] Hindocha, Neal. “Threats to Instant Messaging.” Symantec Security Response. January 2003.

[9] Hu, Jim. “Worms Find Fertile Ground in IM.” www.cnetnews.com. August 2001.

[10] Shinder, Thomas. “How to Block Dangerous Instant Messengers Using ISA Server.” www.windowssecurity.com. July 2002.

[11] Thorsberg, Frank. “Is IM a Sieve for Corporate Secrets?” www.pcworld.com July 2002.

[12] Varnosi, Robert. “The Problem with Instant Messaging Apps at Work.” www.cnet.com. August 2002

More about Instant Messenger Programs

Open Document