Retrieved from https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study
https://studentshare.org/information-technology/1693245-perform-a-limited-risk-managment-study.
Risk Management Study Risk Management Study A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do not conform. This paper is going to discuss a risk management study of some of the security threats.Risk Identification and EstimationMalicious codes: when connected to P2P networks, or using P2P applications it is hard to identify the source of the files, and even the credibility of the sender.
Attackers use this channel to transmit malicious codes such as virus worms or Trojan horses using the files (Kumar, 2009).Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004).
Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the user’s computer by utilizing any susceptibilities that may exist in the P2P connection. Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the user’s internet access or inhibit the availability of certain applications in the user’s computer. Risk Mitigation The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their computer.
ReferencesKumar, V. (2009, November 12). What do P2P Applications do and How to block Peer to Peer Applications (P2P) using Symantec Endpoint Protection? Symantec. Bidgoli, H. 2004). The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons.
Read More