Monday, November 18, 2019

Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words

Software Technology Evaluation - Research Paper Example More specifically, organizations are becoming aware of the threats that peer-to-peer software poses to their networks and users who download or upload files. With regard to the request the client made, it is reasonable to have concern over users who install file sharing software without receiving the authority to do so. This is because there are many threats that target files sharing software, which can harm computer users and the corporate resources, as well. While peer-to-peer file sharing software is popular, their mechanisms of operations offer significant opportunities for hackers to perform exploits that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can also help hackers carry out intrusion into host computers where they can steal data. Unauthorized installation of file sharing software can expose the host compute rs to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that exploit the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). ... In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unauthorized installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin & Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can introduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of information on the user of the system. This means that a spyware can monitor the use of an infected computer and share the information with the developer of the spyware. Through this appro ach, the organization can lose valuable information that could be used against it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network. While computers users can install new file sharing software to use for distributing materials on the internet, there are high chances that hackers can use the software to gain access to the network resources such as servers or desktop

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.