Mobile IoT Authors: Pat Romanski, Elizabeth White, Liz McMillan, Rostyslav Demush, Mauro Carniel

Related Topics: Mobile IoT

Mobile IoT: Article

IM at Work

IM at Work

IM (instant messaging) for the enterprise is being touted as something new. Don't you believe it. I recall using ICQ Corporate at an ISP in Cleveland in 1998. Is it news because Wall Street is starting to take it seriously? You bet!

Today, serious broadband speeds are omnipresent in the enterprise. Broadband delivers "instant," and everybody loves instant, not just the enterprise (anyone notice the markets that sprouted from TV dinners?). Instantaneous data delivery facilitates the most desirable instant of all ­ instant communication, or IM.

Instant communication ­ everywhere, all the time ­ is a definite advantage for an ever more mobile workforce. But then comes the rub, er, hack. Peer-to-peer applications like IM are prone to security issues. Veteran IM provider Yahoo! recently discovered a buffer overflow vulnerability in both its IM and chat programs. We've seen holes by the same name patched repeatedly in other software only to see them reappear. Suddenly we realize that we're in for the same ride with IM client software.

Swimming Upstream
Intrusion detection experience with IM is hard to come by. State-of-the-art security measures provide a foundation of protection. Enterprises implementing IM need to build on that foundation by targeting IM's port 5190 with intrusion detection so that they can quickly gain that experience.

Like 802.11 hotspots, IM "proliferates in homes and offices faster than it can be secured," says Gary Morse, president, Razorpoint Security Technologies. When you leave port 5190 closed you don't expect trouble (see sidebar). When you open it to IM traffic, unless you analyze and secure this traffic, you have opened a door to hackers, whose computers are often set up to perform automated scans of IP address ranges in search of ports to exploit. Until we have experience analyzing port 5190 like we do port 80 (Web surfing), we will be learning as we go, perhaps the hard way, upon being the victims of intrusions ourselves.

Crippling Clients
IM is exploited by taking advantage of holes in proprietary IM client software, examples being AOL IM, MSN IM, and Yahoo! IM. If there are holes in the software, such as Yahoo!'s recently reported buffer overflow, these can be exploited at length until they are discovered and patched. "There is also a DoS attack on the network component," says Morse. "If there is a DoS on those Internet IM servers, no one using the IM service can contact anyone else. If a company is relying on that IM service, I just took down the ability for that company to use it."

As with other holes, once access is attained, hackers can reach other systems, set up accounts, and ransack the company's data. How do you protect IM traffic? "Application intelligence products [intrusion detection] look deeper into the traffic before it goes through the specified port numbers to see if it really is instant messaging," says Morse.

Other Recommendations
Razorpoint recommends "comprehensive attack penetration tests" for networks. This will immediately determine success or failure in gaining unauthorized access through IM or anywhere else.

"One of the things we recommend is to either limit the use of IM with a product that keeps most of the traffic inside your network [good!], or to install and maintain one of the application intelligence systems that looks more closely at the packets going through to ensure it is only IM traffic and not next quarter's financial reports," says Morse.

Razorpoint also recommends security design reviews before rolling out massive new systems like IM. This includes assistance with the actual architectural design of the system.

Proliferation Speed = Exploitation Ease
IM is easier to set up than 802.11x. This makes users instant targets. "One of the attacks that we've heard about is where an attacker can run software on your machine from outside. They can do it even if your IM client isn't running. So if you installed it but it's just sitting there, not connected, they can send you a carefully crafted e-mail, and when you get that e-mail, that e-mail will invoke a component in your IM client and make you vulnerable without you knowing," says Morse.

Wireless IM
"If you're going to have people do remote access, then you're talking about firewall protection for the remote user and a VPN-type solution," says Morse. The products are here today to afford cellphones VPN and firewall protection. But..."You can give me the greatest firewall and the greatest network today, and three weeks from now there could be new vulnerabilities and you're going to have to re-secure it," says Morse.

What Would Razorpoint Have Done for Yahoo!?
"I think it could be as simple as testing. There are tools and techniques you can use to look for these buffer overflows, back doors, and DoS attacks. I know Yahoo! is doing that. But even if you have a large budget and this is your core competency in the company, you can still miss things [case in point]," says Morse.

The traffic analysis is going to be the same for IM as for any other port or service. It's just the traffic that may be different because you're dealing with a different port and different traffic, which we don't have as much experience monitoring. "You're also now going from IM for your friends to IM for business purposes. This has to be looked at as a business solution and maintained and managed as such. Just because someone in an office can download free software and start using it doesn't mean the company doesn't need to have a policy like they do for everything else about technology ­ a policy for IM and how they monitor it," says Morse. If it's on their phones, companies are going to have to own the phones or otherwise have control over them even though employees may be taking them home with them every day (a whole other question).

IM Security ­ Direct, Simple Solutions
I have been talking with Ira Winkler, chief security strategist at Hewlett-Packard, about security issues of late. Here are Ira's thoughts on IM security:

"While IM is a great convenience, it can be a security nightmare. At the very least, companies have to make sure that IM doesn't go in or out of the firewall. IM allows for everything security efforts try to plug up. It allows file transfers in and out. It compromises personal privacy by letting people know where they are in theory.

Companies interested in using IM should purchase a more secure version of the software if they believe the benefits of IM outweigh the security issues. If companies don't want to pay for a commercial version, then they clearly don't think there will be a strong enough benefit."

If you don't want it bad enough to pay for it, you don't really want it. That makes sense. Even more quick, slick, and sensible is the solution that doesn't poke holes in your firewall. Pay for secure IM and keep it on the network, inside the firewall, and you don't need to open ports, perform intrusion detection on those ports, study the traffic, or anything like that. ­ DG

More Stories By David Geer

David Geer is a contributing writer to WBT, a journalist, and a computer technician. He graduated from Lake Erie College in 1993 with a BA in psychology and has worked in the computer industry and in the media since 1998.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...