An Assessment of IT Students' Awareness in the Field of Instant Messengers Security
Instant Messengers, though being around for decades, only in recent years they have managed to gain much more popularity. Today, they are the most common way of communicating, especially among young people. However, where information is being transferred there is a potential risk of it being intercepted, manipulated or disrupted. Thus, Security of Instant Messengers became a matter of high importance comprising of not only protecting the users’ sensitive information but also privacy. Also important is the awareness of the users. Are they aware of the dangers that come with directing sensitive information in this manner? Are they taking the necessary steps to shield themselves from breach attempts? This article was written to present and evaluate the awareness of IT students in the field of instant messengers security.
communication; security; instant messengers
 Holt T., Freilich J., Chermak S., ,,Exploring the Subculture of Ideologically Motivated Cyber-Attackers”, 2017,
 Mitnick K., Simon W., Wozniak S., ,,Sztuka podstępu. Łamałem ludzi, nie hasła.”, 2001, Wydawnictwo Helion,
 Karbowski M. „Podstawy Kryptografii.”, 2006, Wydawnictwo Helion,
 Erickson J., ,,Hacking: The Art Of Exploitation, 2nd Edition”, 2008, No Starch Press,US,
 Stallings W., Brown L., ,,Computer Security: Principles and Practice, Global Edition”, 2018, Pearson Education Limited,
 Easttom W., ,,Computer Security Fundamentals”, 2016, Pearson Education (US),
 Goodrich M., Tamassia R., ,,Introduction to Computer Security: Pearson New International Edition”, 2013, Pearson Education Limited,
 Gunasekera S., ,,Android Apps Security”, 2012. Apress,
 Szeliga M., Mendrala D., ,,Bezpieczeństwo Twojego komputera”, 2004 , Wydawnictwo Helion.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.