StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Perform a Limited Risk Managment Study - Coursework Example

Cite this document
Summary
A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Perform a Limited Risk Managment Study
Read Text Preview

Extract of sample "Perform a Limited Risk Managment Study"

Risk Management Study Risk Management Study A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do not conform. This paper is going to discuss a risk management study of some of the security threats.Risk Identification and EstimationMalicious codes: when connected to P2P networks, or using P2P applications it is hard to identify the source of the files, and even the credibility of the sender.

Attackers use this channel to transmit malicious codes such as virus worms or Trojan horses using the files (Kumar, 2009).Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004).

Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the user’s computer by utilizing any susceptibilities that may exist in the P2P connection. Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the user’s internet access or inhibit the availability of certain applications in the user’s computer. Risk Mitigation The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their computer.

ReferencesKumar, V. (2009, November 12). What do P2P Applications do and How to block Peer to Peer Applications (P2P) using Symantec Endpoint Protection? Symantec. Bidgoli, H. 2004). The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Perform a Limited Risk Managment Study Coursework - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study
(Perform a Limited Risk Managment Study Coursework - 1)
https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study.
“Perform a Limited Risk Managment Study Coursework - 1”, n.d. https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Perform a Limited Risk Managment Study

The Management of Sylvia's Bar

The bar in the initial stages focused mainly on the bank owners offering them wine and cocktail and earned a lot of reputation in a limited period from its starting thereby also gained on profits.... The paper herein would tend to study in-depth the causes of the bar's downfall and thereby render some positive recommendations to revive its past stature.... Such activities are considered in helping people to get duly motivated to perform more productively....
7 Pages (1750 words) Case Study

Baseline Project Plan

The Staff identifies various problems: (1) rush of employees who wants to check in or check out at the start and end of the shift which results to slow service delivery, (2) difficulty in processing various types of employee notices, (3) difficulty in the check-in of equipments from fired employees, (4) difficulty in the notification of employees with pending equipment needs, (5) tedium of identification of a returned equipment and matching it up with the check-in and check-out records, (6) difficulty in identification of employees who have the most damage and most lost equipments, and (7) difficulty in obtaining reports and information to perform one's jobs....
9 Pages (2250 words) Case Study

Intangible Specialisation and Product Mix Optimisation in Fiats

In this case study "Intangible Specialisation and Product Mix Optimisation in Fiat's", Fia has been used to demonstrate the importance of understanding operations management from a systems approach in withstanding market conditions.... In this study, Fiat's case study has been used to demonstrate the importance of understanding operations management from a systems approach in withstanding market conditions....
7 Pages (1750 words) Case Study

Managing, Evaluating and Developing Human Resources

The case study looks into performance management, an aspect of Human Resources that aims at ensuring employees are aware of the strategic direction of the organization and are equipped with skills and resources to help them achieve their individual goals as contribution to the… Money4U Finance Limited is an Australian company that deals with offering mortgage brokering services in addition to individual and business loans....
4 Pages (1000 words) Case Study

The Risk Management Process Business Strategy and Tactics at Marston Lodge

The paper presents the risk management process business strategy and tactics at Marston Lodge.... Competition is the norm in the 21st century; a company that is not staying competitive in the current business world risks the chance of being kicked out of the market.... hellip; Quality goods and services will attract customers to the company and ensure its continued thrive in the market....
9 Pages (2250 words) Case Study

The Impact of the Global Credit Crisis On Northern Rock of the UK

This paper "The Impact of the Global Credit Crisis On Northern Rock of UK" focuses on the fact that on Sept.... 14, 2007, Euroweek reported that Northern Rock, a major UK mortgage lender, had arranged for the use of the emergency lending facility of the Bank of England (BoE).... nbsp;… The BoE agreed, in cooperation with the Financial Services Authority (FSA) and the UK Treasury, to act as lender of last resort to Northern Rock; the bank's sources of funding in the capital markets have suffered from the tight liquidity squeeze, and private sector banks, as well as other lenders, are unwilling to extend it sufficient credit....
10 Pages (2500 words) Case Study

The Success of Flayton Electronics

owell (2010) defined critical success factors as a limited number of conditions in a business that directly impact the effectiveness and efficiency of a project.... According to the case study, the critical success factors in Flayton Electronics firm were to ensure that the security of the customer's data, attract and satisfy new customers, and to create successful relationships with the customers.... As stated in the case study, Laurie, who was responsible for security, was not sure of all the information she was supposed to know about the breach....
5 Pages (1250 words) Case Study

The Information Technology Strategic Plan of Perisher Blue Pty Limited

This case study "The Information Technology Strategic Plan of Perisher Blue Pty Limited" presents Information technology (IT) as increasingly momentous and is continually making tremendous transformations in the way organizations take their business decisions.... External Analysis consists of (a) Customer analysis where the different motivations for the purchase of a product are studied along with the unfulfilled needs; (b) Competitor analysis where the rivals are analyzed on the parameters of their performance, image, culture, cost structure, strengths, and weaknesses; (c) Market analysis markets are evaluated on their size, potential growth, profitability, entry barriers, etc; and (d) Environmental analysis which is a study of technological, government, economic, cultural, demographic scenarios....
4 Pages (1000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us