Abstract

The analysis of existing information systems for transmitting multimedia messages is carried out, a generalized conceptual definition for describing the architectures of such systems is proposed. The classification of messaging systems and their architectures is given. The key threats that should be considered when developing messaging systems in various application domains are identified. Based on the analysis of threats, a set of criteria has been determined for assessing the architectures of information systems for transmitting messages. A model which allows to make an assessment of parameters affecting the security of instant messaging information systems based on the characteristics of its elements is proposed.

Highlights

  • Information systems for transmitting messages have thoroughly entered our everyday lives

  • Systems for transmitting messages have found their place in other aspects of our lives such as medicine (Newman & Brownell, 2008), education (Budi, Eileen, Lusiana, & Timothy, 2015) and many others

  • Of particular note are emergency alert systems as a notification from such a system may be the difference between life and death for some people (Software Engineering Institute, 2013)

Read more

Summary

Introduction

Information systems for transmitting messages have thoroughly entered our everyday lives. Various threats should be considered when developing systems for transmitting messages, for example, the transmission or its contents may be compromised or changed in some way, the messages may be lost or blocked during the transmission, etc. A focus on a certain number of threats is required when developing systems for transmitting messages. It should be noted that such experiments are only possible in the later stages of the development when the cost of a mistake is significantly higher than early on. As such a model which allows determining whether the proposed architecture fits the safety requirements is of particular interest. This article is concerned with the development of such a model

Definitions
Classification
Threats
Practical application
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call