Chapter 41

Instant-Messaging Security

Samuel J.J. Curry,    RSA

Instant messaging (IM) has been through several phases in the technology roller-coaster from exciting, cutting edge technology used by the socially avant-garde to a solid tool in the productivity toolkit of the most conservative organization. You would have to practically live under a rock (or at least not own a computer, personal digital assistant [PDA], or cell phone) to not have used it, much less to not know what it is. Luddites1 notwithstanding, most people who use IM and even many people in information technology (IT) do not know how it works, why it is here, and what it means. In many deployments, IM can be a valuable contributor to business infrastructure, but it shouldn’t ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.