StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software Technology Evaluation - Research Paper Example

Cite this document
Summary
"Software Technology Evaluation" paper examines the strengths and weaknesses of the technologies, implementing a firewall and Demilitarized Zone is the best solution because it can secure the computers within and block any unauthorized users from connecting to the network. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Software Technology Evaluation
Read Text Preview

Extract of sample "Software Technology Evaluation"

? Software Technology Evaluation James Moravec Software Technology Evaluation Executive summary Peer-to-peer file sharing has gained significant momentum because it allows people to share files easily and at a low cost. In recent years, peer-to-peer file sharing has become popular among organizations that need to distribute files to other users across the Internet. This technology has been of interest to many users since it derives its effectiveness from the power of the client computers rather than a centralized server. Despite the many benefits of peer-to-peer networks and files sharing softwares, there has been increased concern on the security of users who utilize this technology. More specifically, organizations are becoming aware of the threats that peer-to-peer software poses to their networks and users who download or upload files. With regard to the request the client made, it is reasonable to have concern over users who install file sharing software without receiving the authority to do so. This is because there are many threats that target files sharing software, which can harm computer users and the corporate resources, as well. While peer-to-peer file sharing software is popular, their mechanisms of operations offer significant opportunities for hackers to perform exploits that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can also help hackers carry out intrusion into host computers where they can steal data. Unauthorized installation of file sharing software can expose the host computers to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that exploit the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). This means that authorized installation of peer-to-peer software can expose the corporate network to worm infection that can create significant network problems. In an organization where users install files sharing software without the necessary authority, it is impossible to track the number of worms in the network, which means that the entire network might be at risk. In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unauthorized installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin & Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can introduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of information on the user of the system. This means that a spyware can monitor the use of an infected computer and share the information with the developer of the spyware. Through this approach, the organization can lose valuable information that could be used against it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network. While computers users can install new file sharing software to use for distributing materials on the internet, there are high chances that hackers can use the software to gain access to the network resources such as servers or desktop computers. According to Grimes (2001), rogue hackers often know open ports that they could exploit to access a secure network. During the installation of file sharing software, the computer often allows the software client to access outside network via a port. By probing open ports, a hacker can access internal resources within a network and perform malicious operation. For instance, a hacker can access a folder where files are shared and download copyrighted material that could be within the same folder (Engebretson & Broad, 2011). This situation is made worse when many users install file sharing software on the computers without the administrator’s knowledge. The implication of network intrusion can be of significant impact to the organization that can lose the control of the network to hackers. In a case where network users install file sharing software on their computers, it is possible that hackers can access the network and tamper with the company’s network resources. Despite the dangers of users installing authorized instances of file sharing software, there are several technologies that can help reduce the impact of the above risks. First, the client can install and configure a firewall for the company’s network. The firewall is cheap, and effective in creating a barrier that prevents external connections. The firewall and associated Demilitarized Zone secure other network resources, as well (Malik, 2003). However, some users can add exception on the firewall to allow file sharing software to pass files. Another technology is installing an antivirus or antispyware. This software can scan inbound and outbound files for malicious codes such as viruses or spyware. However, the software must be updated continuously. Using encryption software can help limit users who access the files. However, this technology requires more time to decrypting files. Given the strengths and weaknesses of these technologies, implementing a firewall and Demilitarized Zone is the best solution because it can secure the computers within and block any unauthorized users from connecting to the network. In addition, this technology will not cost the firm a lot of money because it is cheap to implement. MATRIX: SOFTWARE SOLUTION 1. What is the Risk or Vulnerability? What needs to be protected? (e.g. passwords, data, file backups, system registry) Candidate technology solution How the technology solution works? Effectiveness (High, Medium, Low) Peer-to-peer worm that can infiltrate the network and infect other computers Data, file backup and the system registry Antivirus software such as Norton Antivirus or Symantec Endpoint Protection An antivirus software scan files and process to detect virus signatures of known viruses or worms. Medium MATRIX: SOFTWARE SOLUTION 2. What is the Risk or Vulnerability? What needs to be protected? (e.g. passwords, data, file backups, system registry) Candidate technology solution How the technology solution works? Effectiveness (High, Medium, Low) Intrusion from hackers using open ports exposed by peer-to-peer software Passwords, data, system registry Firewall and DMZ A firewall listens to connections and allows legitimate connection to pass through. Administrators can restrict connections from certain ports. High MATRIX: SOFTWARE SOLUTION 3. What is the Risk or Vulnerability? What needs to be protected? (e.g. passwords, data, file backups, system registry) Candidate technology solution How the technology solution works? Effectiveness (High, Medium, Low) Spyware monitoring computer use Data and file backups Encryption software This technology secures data using a cipher and requires users decrypt the data before use. Medium References Appleman, D. (2004). Always use protection: A teen's guide to safe computing. Berkeley, calif: Apress. Baskin, B., & Piltzecker, T. (2006). Combating spyware in the enterprise. Rockland, MA: Syngress. Engebretson, P., & Broad, J. (2011). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy. Waltham, MA: Syngress. Grimes, R. A. (2001). Malicious mobile code: Virus protection for Windows: internet computer security. Beijing: O'Reilly. Salomon, D. (2010). Elements of computer security. New York: Springer-Verlag. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1457561-software-technology-evaluation
(Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 Words)
Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1457561-software-technology-evaluation.
“Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1457561-software-technology-evaluation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software Technology Evaluation

Assessment and Evaluation Strategies Learning

The… In this session assessment and evaluation strategies for FlexNet new health staff orientation course will be discussed.... The first class that will happen in the class room will discuss the healthcare related confidentiality Assessment and evaluation Strategies Learning HANDOUT Introduction: This is a hybrid learning program that combines face-to-face and on-line interaction between the students and educators (McFarlin, 2008).... In this session assessment and evaluation strategies for FlexNet new health staff orientation course will be discussed....
2 Pages (500 words) Essay

Issues of Information Technology

This information should be known by both insiders and outsiders in order to make the evaluation of their decision easy to implement.... As Booz Allen Hamilton Company considers the off-the-shelf software development, the evaluation process will be vital.... The paper under the title 'Issues of Information technology' presents many companies that are faced with a dilemma when it comes to issues of Information technology.... One such dilemma may arise when an organization plans to develop software for internal use....
5 Pages (1250 words) Case Study

Evaluation of Information System

his comprises of information which is being fed into the system the invention of evaluation and the process of evaluation from which it follows any differentiation in terms of knowledge interests and evaluation process (Cronholm and Goldkuhl, 2003).... With the evaluation of IS special concerned has to be on the effectiveness as well as the efficiency of the system, the quality of information being keyed in and the impacts of the information to the individual or an organization....
12 Pages (3000 words) Essay

SOFTWARE USABILITY SLP

evaluation of usability of software is an important part of the system development… There is variety of methods and factors that help in the process.... evaluation of usability of software is an important part of the system development process.... A breakthrough in software usability evaluation came from Shackel (1991).... When the criteria of software usability are set, the approach supports the process of evaluation and the interpretation of results....
2 Pages (500 words) Essay

Software and Maintenance Change Control Plan

"software and Maintenance Change Control Plan" paper presents a detailed analysis of the plan for software maintenance and change control for McBride Financial.... The author presents the McBride Financial request in preparation for new software development in the organization.... hellip; The main purpose of this report is to prepare and indicate the plan for software maintenance and change control for McBride Financial.... To remain in the capacity of the software implementation for McBride Ltd....
4 Pages (1000 words) Case Study

Expert Choice Software with AHP

evaluation: When the project is found feasible in the primary studies, then it is subjected to detailed evaluation.... The detailed evaluation involves analyzing all aspects regarding the project in detail, the time for completion, the investment required, sources of funds, time of recouping of the investment.... This research paper describes Expert Choice software with AHP.... This paper outlines the role of it, selection criteria, choice of right project for business, factors of the choices, advantages of the Expert Choice Pro software....
8 Pages (2000 words) Research Paper

The Use of Software Technology in Learning

… The paper "The Use of software technology in Learning" is an excellent example of an essay on technology.... The paper "The Use of software technology in Learning" is an excellent example of an essay on technology.... The use of software technology in learning also complies with the PECs in preparation of materials, delivering course instructions, assessing learner progress and managing tasks.... Understanding the desired impact of the software would lead to an evaluation of its contribution to learning....
2 Pages (500 words) Essay

Software Evaluation Criteria

… Software evaluation CriteriaStudent's Name:Instructor's Name:Course Code & Name:Date of Submission:IntroductionThe need to improve of the competitiveness of organizations has led to the integration of technologies in their practices.... Among the Software evaluation CriteriaStudent's Name:Instructor's Name:Course Code & Name:Date of Submission:IntroductionThe need to improve of the competitiveness of organizations has led to the integration of technologies in their practices....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us