Monday, April 22, 2019
Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words
Softw atomic number 18 Technology Evaluation - Research Paper Example much specifically, organizations are becoming aware of the threats that peer-to-peer parcel poses to their networks and users who download or upload shows. With regard to the request the client made, it is reasonable to bring forth concern over users who install turn on manduction software without receiving the authority to do so. This is because there are many threats that tar conquer files sharing software, which whoremonger psychic trauma computer users and the merged resources, as well. spell peer-to-peer file sharing software is popular, their mechanisms of operations offer significant opportunities for hackers to perform exploits that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can too help hackers carry out intrusion into host com puters where they can steal data. Unauthorized installation of file sharing software can expose the host computers to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that exploit the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). ... In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unlicensed installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin & Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can introduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of teaching on the user of the system. This means that a spyware can monitor the use of an infected computer and luck the information with the developer of the spyware. Through this approach, the organization can lose valuable information that could be used against it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network. While computers users can install new file sharing software to use for distributing materials on the internet, th ere are high chances that hackers can use the software to gain access to the network resources such as servers or desktop
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.