Northwestern Polytechnic University ?Instant Messaging in the Workplace Essay

Northwestern Polytechnic University

Question Description

I don’t understand this Health & Medical question and need help to study.

Written Assignment – Instant Messaging in the Workplace

Instant messaging (IM) use in enterprises has proliferated – despite the fact that frequently proper policies, controls, and security measures are not in place to prevent e-document and data loss. There are a variety of threats to IM use that enterprises must defend against to keep their information assets secure.

For this assignment, write a 5-6 page academic paper that first identifies the threats to IM use that the enterprise must defend against to keep their information assets secure. Then, taking into account the best practices for IM use and current technologies available to monitor IM activity, identify the policies, controls, and security measures that you would put into place if you were implementing an IM program for an organization to keep information assets secure and to prevent e-document and data loss.

You must support your work with at least four credible sources. Two of the four must be academic, peer-reviewed sources.

You must use proper APA formatting, which includes a cover page, abstract, and reference page.

5-6 pages excluding cover page, abstract & reference page.

**Critical ** Plagiarism will not be tolerated.

You must also ensure that you properly, paraphrase, cite and reference your sources following proper APA guidelines.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer



Instant Messaging in the Workplace
Student ID

Threats to the IM workplace.
Viruses due result of instant massaging.
Most of the viruses are used in the peer-to-peer or the applications of instant messaging.
Most of the sent files might bypass the gateway of the traditional security of the ant-virus. Instant
Messaging by Public to the clients also have vulnerabilities which are publicized. Here, flaws like
the overflows of buffer and condition boundary blunders have been abused to the infection spread
and refusal of the administration assaults.
Threats of Identity.
The systems of the public instant messaging let some of the individuals to create anonymous
identities. Therefore, they do not map to the addresses of the emails. Recognizable pieces of proof
can be made regardless of whether the individuals do not possess the IDs and the spaces. Tricking
creates a risk as a result of the IDs created and can be maliciously used outside the control of the
securities of the IT department (Hindocha, 2003).
Tunneling of the firewall
There are clients of instant messaging who find ways to tunnel through firewalls, therefore,
resulting in the creation of threat. Most of the services of the instant messaging come through ports
which are publicized like the Instant Messenger 5190 for AOL. The IM clients, therefore, can also
be able to misuse any port on the firewall, including those utilized by different applications like
the HTTP traffic and web. Some of the clients can make a connection vial a peer-to-peer
connection; hence, establishing networks on the negotiated ports randomly.
Leaks as a result of data security

Unmonitored content, therefore leaving the partnership without the information on the Information
Security office, presents a severe hazard that is legitimate. For example, the sending of private
CFO a spreadsheet using IM without a review of the trail. The exchange of documents by IM is a
fantastic method for sending data past the Information and innovation capacities of the following.
The absence of the separating of the substance and the filing makes it troublesome in the finding
of the potential strategy ruptures of the approach or further considering people responsible.
The logic of the instant Messaging states that 4 to 8 % of the IM traffic today is spam. Spam can
be more destructive is that it is more destructive than the Spam of the Email. This is due to the
spam being more intrusive and generally of a more sexual nature offensive. This can result in legal
risk and human resources.
Best practices for IM use.
Stare before connecting.
Links sent by people should not be assumed. The content sent might have malicious content.
Systems that are compromised in an enterprise might infect machines with the software, which is
In a way messages, any of the links are not to be clicked. Some programs are malicious and might
result in the addition of a link to an IM away message. An example is an enterprise, if anyone
might click on the link might compromise on the security of the computer.
For these cases, it is recommended that verification has to be made for the person first sending the
message that they meant in sending it (Licari, 2005).

File transfer, which isn’t expected, should not be accepted.
The possible consequences are that by accepting a malware can be downloaded, thus making a
system of the Enterprise to be unstable. Therefore, information can be easily stolen or even used
in attacking other enterprise systems.
Also, files sent by friends should not be assumed to be safe. This is because there is a person who
made an initiate for the file transfer. Most of the cases arise due to computer damage is due to the
spread of malware by the IM software on the computer system. The better assumption is that an
offer of file accepting, contact the sender of the file to make a download for it.
Personal sensitive information on IM should not be given out.
When charts are not Encrypted, IM conversations are unencrypted exclusively. Therefore, it means
that conversation is transferred over the network in a text, which is clear. Chats on transit, if viewed
by someone while in conversation, can be easily read. For instance, giving out a security number
to some of the personnel’s in the Enterprise while IM, a malicious user could intercept the
information. There is also surfing on the shoulder. While talking to an IM and divulge some
personal information, some personnel may be in public or semi-public, a place without knowledge.
If not too careful, an individual could walk and read conversation or information which is personal
in an enterprise. There is logging whereby personal and sensitive information may be sent may be
shared while in conversation. The information might be stored on the log file of the person’s
computer. Therefore, creating malicious access to these log files and hence, obtaining some
necessary information. In this case, it is best recommended that liberally giving out of the
information should not be anticipated. For an exception, while giving out confidential information,
it should be done securely. An alternative way of IM is making a call to the person.

Further IM recommendation to the client who accepts the IM, configure some of the options to
only allow messages to the known people only. Clients in an enterprise who allows for automatic
transfer of files, the option should be turned off.
Technologies used to monitor and IM activity.
OneSpy. This is a viper application that has enabled one to view the gallery as well as Viper IM
chat of a device that is targeted by the use of files of a multimedia monitoring feature and chat of
a viper spy to access each picture sending or sending activity (Danchev, 2003).
Spyzie- This as an Android software to track IM apps in android phones. The Spyzie can track
all the leading spying applications like WhatsApp, WeChat, Viper, and more. This is because it
has a crucial logger tool. The technology application runs in mode, which is stealth and does not
need any rooting.
Policies for implementing IM
Making adoption of the tools used by employees. Rather than starting from scratch with an IM
system in the workplace, organizations should put what employees know and like. For instance,
making an identification to the people what are currently using. Modifying to fit the needs and
making use of education in creating the use of risk-free factors.
Making an embrace on all kinds of the IM but setting up ground rules. Teams and slacks can,
at times, be destructive. For instance, they are used as a respiratory for employees for jokes and
debates. Also, using of outlets which are unintended for sharing of outfits like life in sex. The
benefits are that the interactions of digital are less likely to make people leave jobs.

Face facing communication promotion. There are some of the digital messages which are no
easy to interpret. Some of the messages of slack are, therefore, not easier to read regular interaction
with a manager can result in better understanding.
Controls of implementing IM
Make a record of the conversations from both sides. This includes the time of participants, IDs of
contacts and sentences, and characters as well. This will help in keeping track of IM (Heikes et al.,

Make support for IM mainstream, which means that making a SurveilStar makes a record of all
IM from sites like Skype, Google Talk, and some other tools of IM.

Control the sending...

EruditeTutor (5563)
Duke University

Solid work, thanks.

The tutor was great. I’m satisfied with the service.

Goes above and beyond expectations !

Similar Questions
Related Tags