Technology Evaluation and Recommendation

Submitted by: Submitted by

Views: 104

Words: 1332

Pages: 6

Category: Science and Technology

Date Submitted: 06/09/2014 08:25 AM

Report This Essay

Technology Evaluation and Recommendation

Oseyemi Adeyemi

Course: CSIA 303

Professor Samuel Chun

December 15, 2013

Over the years, the use of peer-to-peer file sharing applications has continued to grow and has demonstrated to be extremely beneficial to organizations. For most companies, file sharing has become a part of everyday business and has helped to increase sales. However, there are dangers that lurk in the peer-to-peer file sharing. These dangers can pose a risk to software security and organization’s data. In this summary, we will and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops. As well as evaluate three technology-based solutions that could provide effective protection measures. Lastly, we’ll provide technology evaluation matrix to classify and assess risk related to unauthorized software.

Installing unauthorized peer-to-peer application software on a company computer can pose threats and vulnerabilities. It introduces a security risk that may compromise information. Unauthorized P2P applications leave the intranet widely accessible, making that computer susceptible to many threats and vulnerabilities (Dorman, McDowell, & Wrisely, 2013).

When using P2P application it’s difficult to determine if the source of the file is trustworthy. These applications are sometimes used by hackers trying to transmit malicious code by incorporating viruses, bots, Trojan horses, worms or spyware into the files. Peer-to-peer file sharing on a company computer may also expose sensitive or personal information unintentionally (Security Threats, 2009). Whether it’s because a user provided private information to what they believe to be a trusted organization or person or because certain directories are accessible, unauthorized individuals may be able to access sensitive company information (Dorman, McDowell, & Wrisely, 2013).

Some examples...