Mobile IoT Authors: Shelly Palmer, Yeshim Deniz, Liz McMillan, Ed Featherston, Carmen Gonzalez

Related Topics: Mobile IoT

Mobile IoT: Article

IM at Work

IM at Work

IM (instant messaging) for the enterprise is being touted as something new. Don't you believe it. I recall using ICQ Corporate at an ISP in Cleveland in 1998. Is it news because Wall Street is starting to take it seriously? You bet!

Today, serious broadband speeds are omnipresent in the enterprise. Broadband delivers "instant," and everybody loves instant, not just the enterprise (anyone notice the markets that sprouted from TV dinners?). Instantaneous data delivery facilitates the most desirable instant of all ­ instant communication, or IM.

Instant communication ­ everywhere, all the time ­ is a definite advantage for an ever more mobile workforce. But then comes the rub, er, hack. Peer-to-peer applications like IM are prone to security issues. Veteran IM provider Yahoo! recently discovered a buffer overflow vulnerability in both its IM and chat programs. We've seen holes by the same name patched repeatedly in other software only to see them reappear. Suddenly we realize that we're in for the same ride with IM client software.

Swimming Upstream
Intrusion detection experience with IM is hard to come by. State-of-the-art security measures provide a foundation of protection. Enterprises implementing IM need to build on that foundation by targeting IM's port 5190 with intrusion detection so that they can quickly gain that experience.

Like 802.11 hotspots, IM "proliferates in homes and offices faster than it can be secured," says Gary Morse, president, Razorpoint Security Technologies. When you leave port 5190 closed you don't expect trouble (see sidebar). When you open it to IM traffic, unless you analyze and secure this traffic, you have opened a door to hackers, whose computers are often set up to perform automated scans of IP address ranges in search of ports to exploit. Until we have experience analyzing port 5190 like we do port 80 (Web surfing), we will be learning as we go, perhaps the hard way, upon being the victims of intrusions ourselves.

Crippling Clients
IM is exploited by taking advantage of holes in proprietary IM client software, examples being AOL IM, MSN IM, and Yahoo! IM. If there are holes in the software, such as Yahoo!'s recently reported buffer overflow, these can be exploited at length until they are discovered and patched. "There is also a DoS attack on the network component," says Morse. "If there is a DoS on those Internet IM servers, no one using the IM service can contact anyone else. If a company is relying on that IM service, I just took down the ability for that company to use it."

As with other holes, once access is attained, hackers can reach other systems, set up accounts, and ransack the company's data. How do you protect IM traffic? "Application intelligence products [intrusion detection] look deeper into the traffic before it goes through the specified port numbers to see if it really is instant messaging," says Morse.

Other Recommendations
Razorpoint recommends "comprehensive attack penetration tests" for networks. This will immediately determine success or failure in gaining unauthorized access through IM or anywhere else.

"One of the things we recommend is to either limit the use of IM with a product that keeps most of the traffic inside your network [good!], or to install and maintain one of the application intelligence systems that looks more closely at the packets going through to ensure it is only IM traffic and not next quarter's financial reports," says Morse.

Razorpoint also recommends security design reviews before rolling out massive new systems like IM. This includes assistance with the actual architectural design of the system.

Proliferation Speed = Exploitation Ease
IM is easier to set up than 802.11x. This makes users instant targets. "One of the attacks that we've heard about is where an attacker can run software on your machine from outside. They can do it even if your IM client isn't running. So if you installed it but it's just sitting there, not connected, they can send you a carefully crafted e-mail, and when you get that e-mail, that e-mail will invoke a component in your IM client and make you vulnerable without you knowing," says Morse.

Wireless IM
"If you're going to have people do remote access, then you're talking about firewall protection for the remote user and a VPN-type solution," says Morse. The products are here today to afford cellphones VPN and firewall protection. But..."You can give me the greatest firewall and the greatest network today, and three weeks from now there could be new vulnerabilities and you're going to have to re-secure it," says Morse.

What Would Razorpoint Have Done for Yahoo!?
"I think it could be as simple as testing. There are tools and techniques you can use to look for these buffer overflows, back doors, and DoS attacks. I know Yahoo! is doing that. But even if you have a large budget and this is your core competency in the company, you can still miss things [case in point]," says Morse.

The traffic analysis is going to be the same for IM as for any other port or service. It's just the traffic that may be different because you're dealing with a different port and different traffic, which we don't have as much experience monitoring. "You're also now going from IM for your friends to IM for business purposes. This has to be looked at as a business solution and maintained and managed as such. Just because someone in an office can download free software and start using it doesn't mean the company doesn't need to have a policy like they do for everything else about technology ­ a policy for IM and how they monitor it," says Morse. If it's on their phones, companies are going to have to own the phones or otherwise have control over them even though employees may be taking them home with them every day (a whole other question).

IM Security ­ Direct, Simple Solutions
I have been talking with Ira Winkler, chief security strategist at Hewlett-Packard, about security issues of late. Here are Ira's thoughts on IM security:

"While IM is a great convenience, it can be a security nightmare. At the very least, companies have to make sure that IM doesn't go in or out of the firewall. IM allows for everything security efforts try to plug up. It allows file transfers in and out. It compromises personal privacy by letting people know where they are in theory.

Companies interested in using IM should purchase a more secure version of the software if they believe the benefits of IM outweigh the security issues. If companies don't want to pay for a commercial version, then they clearly don't think there will be a strong enough benefit."

If you don't want it bad enough to pay for it, you don't really want it. That makes sense. Even more quick, slick, and sensible is the solution that doesn't poke holes in your firewall. Pay for secure IM and keep it on the network, inside the firewall, and you don't need to open ports, perform intrusion detection on those ports, study the traffic, or anything like that. ­ DG

More Stories By David Geer

David Geer is a contributing writer to WBT, a journalist, and a computer technician. He graduated from Lake Erie College in 1993 with a BA in psychology and has worked in the computer industry and in the media since 1998.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that SourceForge has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SourceForge is the largest, most trusted destination for Open Source Software development, collaboration, discovery and download on the web serving over 32 million viewers, 150 million downloads and over 460,000 active development projects each and every month.
SYS-CON Events announced today that CHEETAH Training & Innovation will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CHEETAH Training & Innovation is a cloud consulting and IT training firm specializing in improving clients cloud strategies and infrastructures for medium to large companies.
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo and Big Data at Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. Learn how we can help you reach your marketing goals.
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organi...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and thei...
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
SYS-CON Events announced today that TechTarget has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...