The Model for Assessing the Security Level of Instant Messaging Information Systems
Copyright (c) 2020 Annals of Disaster Risk Sciences
This work is licensed under a Creative Commons Attribution 4.0 International License.
The analysis of existing information systems for transmitting multimedia messages is carried out, a generalized conceptual definition for describing the architectures of such systems is proposed. The classification of messaging systems and their architectures is given. The key threats that should be considered when developing messaging systems in various application domains are identified. Based on the analysis of threats, a set of criteria has been determined for assessing the architectures of information systems for transmitting messages. A model which allows to make an assessment of parameters affecting the security of instant messaging information systems based on the characteristics of its elements is proposed.
- Aziz, K., Tarapiah, S., & Atalla, S. (2018). SIMSSP: Secure Instant Messaging System for Smart Phones. Lecture Notes in Networks and Systems., 647-657.
- Bogachev , D. (2018). Simulation model of the information exchange environment, including a mathematical model for reservation of resources of a packet data network with multiple access. The Eurasian Scientific Journal.
- Budi, Y., Eileen, H., Lusiana, D., & Timothy, A. (2015). Architecture and Implementation of Instant Messaging in Educational Institution. Procedia Computer Science, 5-13.
- Buss, A. (2001). Basic Event Graph Modeling. Simulation News Europe, Technical Notes.
- Endeley, R. (2018). End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger. Journal of Information Security, 95-99.
- Ermoshina, K., Musiani, F., & Halpin, H. (2016). End-to-End Encrypted Messaging Protocols: An Overview. Third International Conference, INSCI 2016 - Internet Science, (pp. 244-254). Florence.
- Newman, A., & Brownell, J. (2008). Applying communication technology: Introducing email and instant messaging in the hospitality curriculum. Retrieved from Cornell University School of Hotel Administration site: htp://scholarship.sha.cornell.edu/articles/1040
- Schollmeier, R. (2001). A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications. Proceedings First International Conference on Peer-to-Peer Computing, 101-102.
- Software Engineering Institute. (2013, September). Best Practices in Wireless Emergency. USA.
- Umesh, G. (2016). An overview on the architecture of What`s app. IJCSET.
- Unger, N., Dechand, S., Bonneau, J., Fahi, S., Perl, H., Golberg, I., & Smith, M. (2015). SoK: Secure Messaging. in Proc. IEEE Symp. Secur. Privacy, 232–249.
- White, K. P., & Ingalls, R. G. (2015). Introduction to Simulation. Proceedings of the 2015 Winter Simulation Conference, (pp. 1741-1755). Huntington Beach California.
- Yang, B., & Garcia-molina, H. (2001). Comparing Hybrid Peer-to-Peer Systems. Proceedings of the 27th International Conference on Very Large Data Bases (pp. 561-570). San Francisco: Morgan Kaufmann Publishers Inc.
- Yassine, A., Khalid, B., & Said, E. (2019). Supply Chain Modeling and Simulation using SIMAN ARENA a Case Study. International Journal of Advanced Computer Science and Applications Vol. 10 No. 3.