Secure Instant Messengers
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP
**

Posts: 604
Joined: Dec 2008
#1
14-08-2009, 03:57 PM


Abstract

Securing instant messaging in your corporationInstant messaging may soon become an indispensable business tool; however, the risks of using an unsecured IM platform in corporations are high. This section explores the security issues introduced with the use of corporate instant messaging and offers best practices that can help in deploying a secure IM platform.

Understanding Instant Messaging And Corporate Firewalls
Many corporate customers may wish to use their network firewall to block users from communicating over insecure instant messaging systems. Unfortunately, out-of-the-box firewall configurations are often not sufficient enough to block access to the latest generation of popular IM systems. These IM systems were designed with firewalls in mind and employ a number of techniques to sneak past corporate firewalls to reach their servers.

All IM clients are preconfigured with one or more TCP/IP network addresses that allow them to connect to their IM server(s). Once connected, the clients can exchange messages with other IM clients. Because many companies configure perimeter firewalls to block all Internet services except for a small critical set (e.g., SMTP email, HTTP Web surfing, and DNS), IM providers have designed their clients to tunnel over these commonly allowed Internet services, if required, and slip past the corporate firewall.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MINI PROJECT – FIRST REVIEW Lightning surge Protector with Instant remedy project girl 0 493 08-02-2013, 12:20 PM
Last Post: project girl
  A Biometric-Secure e-Voting System for Election Processes pdf project girl 0 440 05-02-2013, 11:33 AM
Last Post: project girl
  INSTANT SALINITY CHECKER REPORT project girl 0 362 03-11-2012, 02:30 PM
Last Post: project girl
  Low Power Consumption Solutions for Mobile Instant Messaging PPT seminar flower 0 732 13-09-2012, 03:14 PM
Last Post: seminar flower
  Secure and Policy-Compliant Source Routing electronics seminars 9 6,401 16-03-2012, 11:40 AM
Last Post: it.crusaderz
  SECURE ATM BY IMAGE PROCESSING seminar class 3 6,139 09-03-2012, 04:12 PM
Last Post: gnshydv11
  TEST PLATFORM FOR SECURE WIRELESS COMMUNICATION USING XTEA computer science crazy 3 4,250 05-03-2012, 10:36 AM
Last Post: seminar paper
  Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing seminar class 1 1,731 02-02-2012, 10:23 AM
Last Post: seminar addict
  SECURE WIRELESS SENSOR NETWORKS - ROBUST OF WSN ATTACKS AND SECURE LOCALIZATION smart paper boy 1 1,539 28-01-2012, 10:55 AM
Last Post: seminar addict
  SECURE WIRELESS DATA COMMUNICATION seminar class 1 3,743 26-01-2012, 10:47 AM
Last Post: seminar addict