Advertisement

Information Security Research for Instant Messaging Service in Taiwan – Build a Private Instant Messaging

  • Weng Chia-ChengEmail author
  • Chen Ching-WenEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

Instant Messaging (IM) is a service for online communication over the Internet, providing communication between individuals and communities using text, stickers, files and videos. In the early days, Users in Taiwan use Instant messaging services such as MSN and Skype. But now a large number of users in Taiwan rely on the LINE. The use of LINE has expanded from individuals to government units and even military units. In September 2014, Korea strengthened its surveillance of Kakao Talk and LINE on the grounds to prevent the spread of anti-government speech on the Internet and accessing user’s private communication content. And so far, LINE has not yet planned to establish a dedicated computer server in Taiwan. In order to prevent the communication content of users who use LINE in Taiwan to cause other Countries who is not necessary to illegally obtain it by means of side recording, back door, Trojan horse, etc., but she can be monitored, read and analyzed by legal means to pose a threat to the Information security of Taiwan. In order to enhance the awareness of information security in military units in Taiwan. This study provides how to build a private Instant messaging service and database in her own computer room. Provide reference to the Information security strategy in Taiwan that use Instant messaging service on the premise of “Information security is National security”.

Keywords

Instant messaging LINE Information security is National security 

References

  1. 1.
    iThome. https://www.ithome.com.tw/news/124203. Accessed 26 June 2018
  2. 2.
    Liberty Times Net. https://news.ltn.com.tw/news/world/paper/821286. 14 Oct 2014
  3. 3.
    iThome. https://www.ithome.com.tw/news/129579. Accessed 25 Mar 2019
  4. 4.
    Tseng Po-Yuan, F., Hsieh Chih-Yuan, S.: Discussion on the influence of baoxin dream phenomenon on military security from the perspective of risk management. Army Bimonthly 53(551), 113–128 (2017)Google Scholar
  5. 5.
    National Security Council, F.: National Qualification Security Strategy Report - Information security is National security. 1st edn. National Security Council, Taiwan (2018)Google Scholar
  6. 6.
    Chen Liang-Chu, F., Fan Chung-Ping, S., Hsieh Chua-Jung, T.: The study on exploring the topics of cyber warfare security and management: using growing hierarchical self-organizing map. J. Inf. Manag. 54(557), 99–128 (2016)Google Scholar
  7. 7.
    Liu Ting-Chu, F.: Discussion on constructing key factors of information security protection of national Army Cloud Data Center. Army Bimonthly 53(551), 92–110 (2018)Google Scholar
  8. 8.
    Shaw Ruei-Siang, F., Tsao chin-Feng, S., Chang Hui-Hsin, T.: A study of interface integrated campus cloud service management systems. J. Inf. Manag. 22(4), 475–496 (2015)Google Scholar
  9. 9.
    National Information & Communication Security Taskforce. https://nicst.ey.gov.tw/Page/7CBD7E79D558D47C/45d1f417-ca0c-4b30-aafa-ffeb9070a257. Accessed 22 May 2014
  10. 10.
    Wang Chien-Min, F., Wu Li-Chun, S, Li Hung-Wei, T.: LINE instant messaging software protocol and security analysis. In: (CISC 2014) Cryptology and Information Security Conference (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.College of ManagementNational Kaohsiung University of Science and Technology (NKUST)KaohsiungTaiwan
  2. 2.Department of Information ManagementNational Kaohsiung University of Science and Technology (NKUST)KaohsiungTaiwan

Personalised recommendations