Free

Perform a Limited Risk Managment Study - Coursework Example

Comments (0) Cite this document
Summary
A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Perform a Limited Risk Managment Study
Read TextPreview

Extract of sample "Perform a Limited Risk Managment Study"

Risk Management Study Risk Management Study A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do not conform. This paper is going to discuss a risk management study of some of the security threats.
Risk Identification and Estimation
Malicious codes: when connected to P2P networks, or using P2P applications it is hard to identify the source of the files, and even the credibility of the sender. Attackers use this channel to transmit malicious codes such as virus worms or Trojan horses using the files (Kumar, 2009).
Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004).
Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the user’s computer by utilizing any susceptibilities that may exist in the P2P connection.
Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the user’s internet access or inhibit the availability of certain applications in the user’s computer.
Risk Mitigation
The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their computer.
References
Kumar, V. (2009, November 12). What do P2P Applications do and How to block Peer to Peer
Applications (P2P) using Symantec Endpoint Protection? Symantec.
Bidgoli, H. 2004). The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Perform a Limited Risk Managment Study Coursework - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study
(Perform a Limited Risk Managment Study Coursework - 1)
https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study.
“Perform a Limited Risk Managment Study Coursework - 1”, n.d. https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Perform a Limited Risk Managment Study

IT Risk managment

...?Assignment: I.T Risk Management Question Hot Site: Hot site is a disaster recovery service and facility that looks into the organization data bases setup. A hot site consists of all the equipment required by the enterprise for performing operations, that include office space, furniture, and other computer equipment. The enterprise carries all the data to hot site in case of inoperable functioning .Hot site is a backup and carbon copy with real time synchronization intact. In case of any disruption the hot site serves for relocation. Hot sites are more useful and widely in use in organizations dealing with financial handling, E-commerce facility providers. Cold Site: A cold site is a disaster recovery service that serves as backup... ...
3 Pages(750 words)Research Paper

Corprate risk managment

...which in turn aid in decision making. The costs incurred may be direct or indirect, and so are the benefits. Direct costs are those costs that can be directly attributable to the risk-management decisions. These costs are definite because if incurred, they can be identified. If a company is in the start-up stage, then these direct costs can be projected and estimated through studying past decisions of other companies that were at the same cross-roads (Freukel, Dufey, Hommel and Rudolf, 2005). The following illustrations depict some of the direct costs. If a company decides to quit the market, there would be no direct costs, however, the benefits are that the company will not have to face...
5 Pages(1250 words)Essay

RISK MANAGMENT FOR DIFFERENT CASES

...? RISKS IN PALM ISLANDS In Dubai, a combination of three islands (Palm Jumeirah, palm Deira as well as Palm Jebel Ali) forms the palms island (Khan, nd). Palm Deira is the newest among the three and work is in progress in developing the island and is estimated to be the largest among the three with an approximate area covering eighty square kilometers. Although the islands differ in hectare-age, common features in the three are that they carry the shape of palm and construction as well as engineering in all takes similar state of art procedures. Therefore, the study of risks and challenges experienced in constructing one such island would serve representatively for all others. Discussion...
4 Pages(1000 words)Case Study

Security and Risk Managment

...Should the news and politicians be believed the world of today is becoming a very dangerous environment due to the activities of international terrorists? Discuss the veracity of this statement and analyse the UK governments’ strategy at dealing with this issue and how the strategy relates to the four core strategies for dealing with the management and control of risk. Introduction: There is a popular view or, in fact, popular news in every channel or communication media that the international terrorist activities are on the rise; it is spoken about in the newspapers almost everyday. To add to this statement, a number of long speeches are delivered by the politicians in this regard alarming the people of...
14 Pages(3500 words)Essay

Risk managment

...of technological support as the parent company and its country, there is the risk of loss of reputation even for the parent company. Added to this risk are the opportunities that exist for fraud in the use of the Internet and technology enabled services such as financial transactions and violation of privacy. Hospitality industry needs to manage such risks with investments in manpower, systems and procedures. All these will add to the costs and reduce profitability but are unavoidable if the risk is to be managed and limited. 5.6 Environmental factors Euro Disney was the result of studies and...
10 Pages(2500 words)Essay

Risk managment and insurance

...Risk Management and Insurance Risk Management and Insurance What is meant by the term insurance regulation"? Lencsis (1997) describes insurance regulation as the set of laws and standards stipulated by insurance regulatory authorities to govern the conduct and operations of insurers. Lencsis notes that the laws and standards in this case are meant to protect the insured by requiring the insurance companies to be financially solvent and capable of meeting their obligations, pay claims promptly, and conform to certain market demands. The regulation of an insurance entity begins at the point of licensing. The licensing pertains to reviews of insurer’s finances, business...
2 Pages(500 words)Essay

Operation Managment case study

...TOWARDS ORGANIZATIONAL OPERATIONAL EXCELLENCE Introduction Attaining operational excellence is critical for any business as organisations cannot afford to have quality issues, high cost operations or even long market cycles (Oracle 3). Notably, one of the core advantages that businesses often attain to achieve is effective inventory management to not only ensure high quality fresh products but also lower costs. Optimal inventory management is vital for any business organisation. The core benefits of having a much leaner inventory includes reduction in operation costs, higher customer satisfaction, and increased sales. In deed Lee (1) points out that the key differentiator between poor performing and high performing companies... of...
13 Pages(3250 words)Case Study

Risk Managment Plan Component

.... Control statements 3.5.1 Businesses must implement the Company IRM minimum training requirements. Information Classification and Handling Objective Manage Flayton Electronics information effectively during its Lifecycle to reduce the risk of information loss, misuse, unauthorized change or disclosure (McNurlin, Sprague, & Bui, 2009) . Controls This section of the Company IRM plans, aims to set out the minimum baseline plans which apply to the classification and handling of information assets, in all formats or media, created or received by Flayton Electronics (or on its behalf) in the performance of business activities. Information Classification is the process of identifying and classifying information assets to ensure... ...
8 Pages(2000 words)Assignment

Project management

...as provided by (Nicholas & Steyn, 2012; Kerzner, 2011; Cooper, et al., 2004). Risk Identification Risks are identified by brainstorming for above two projects, and are categorized into five categories; technical, management, organizational, external, and project management. Technical Risks For both of the projects, the technical risk was very high, as both are based on IT projects. For ECourier, the innovative technology that requires the meaningful insights in the technical requirements of the project, but during the project implementation, the complexity was the main issue for the company. For Pharma, Inc. there was again the issue...
15 Pages(3750 words)Essay

Project management

...& Steyn, 2012; Kerzner, 2011; Cooper, et al., 2004). Risk Identification Risks are identified by brainstorming for above two projects, and are categorized into five categories; technical, management, organizational, external, and project management. Technical Risks For both of the projects, the technical risk was very high, as both are based on IT projects. For ECourier, the innovative technology that requires the meaningful insights in the technical requirements of the project, but during the project implementation, the complexity was the main issue for the company. For Pharma, Inc. there was again the issue of complexity and...
15 Pages(3750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Perform a Limited Risk Managment Study for FREE!

Contact Us