Submitted by: Submitted by Yfasheun
Views: 104
Words: 1332
Pages: 6
Category: Science and Technology
Date Submitted: 06/09/2014 08:25 AM
Technology Evaluation and Recommendation
Oseyemi Adeyemi
Course: CSIA 303
Professor Samuel Chun
December 15, 2013
Over the years, the use of peer-to-peer file sharing applications has continued to grow and has demonstrated to be extremely beneficial to organizations. For most companies, file sharing has become a part of everyday business and has helped to increase sales. However, there are dangers that lurk in the peer-to-peer file sharing. These dangers can pose a risk to software security and organization’s data. In this summary, we will and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops. As well as evaluate three technology-based solutions that could provide effective protection measures. Lastly, we’ll provide technology evaluation matrix to classify and assess risk related to unauthorized software.
Installing unauthorized peer-to-peer application software on a company computer can pose threats and vulnerabilities. It introduces a security risk that may compromise information. Unauthorized P2P applications leave the intranet widely accessible, making that computer susceptible to many threats and vulnerabilities (Dorman, McDowell, & Wrisely, 2013).
When using P2P application it’s difficult to determine if the source of the file is trustworthy. These applications are sometimes used by hackers trying to transmit malicious code by incorporating viruses, bots, Trojan horses, worms or spyware into the files. Peer-to-peer file sharing on a company computer may also expose sensitive or personal information unintentionally (Security Threats, 2009). Whether it’s because a user provided private information to what they believe to be a trusted organization or person or because certain directories are accessible, unauthorized individuals may be able to access sensitive company information (Dorman, McDowell, & Wrisely, 2013).
Some examples...