1,689
13
Coursework, 2 pages (300 words)

Perform a limited risk managment study

Risk Management Study Risk Management Study A lot of safety rules and measures have been established to ensure file sharing security on peer-to-peer (P2P) networks on the internet, but it still proves to be an insecure medium for sharing information at certain degree. Numerous networks follow security criteria but some do not conform. This paper is going to discuss a risk management study of some of the security threats.
Risk Identification and Estimation
Malicious codes: when connected to P2P networks, or using P2P applications it is hard to identify the source of the files, and even the credibility of the sender. Attackers use this channel to transmit malicious codes such as virus worms or Trojan horses using the files (Kumar, 2009).
Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004).
Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the user’s computer by utilizing any susceptibilities that may exist in the P2P connection.
Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the user’s internet access or inhibit the availability of certain applications in the user’s computer.
Risk Mitigation
The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their computer.
References
Kumar, V. (2009, November 12). What do P2P Applications do and How to block Peer to Peer
Applications (P2P) using Symantec Endpoint Protection? Symantec.
Bidgoli, H. 2004). The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons.

Thank's for Your Vote!
Perform a limited risk managment study. Page 1
Perform a limited risk managment study. Page 2
Perform a limited risk managment study. Page 3

This work, titled "Perform a limited risk managment study" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Coursework

References

AssignBuster. (2021) 'Perform a limited risk managment study'. 17 November.

Reference

AssignBuster. (2021, November 17). Perform a limited risk managment study. Retrieved from https://assignbuster.com/perform-a-limited-risk-managment-study/

References

AssignBuster. 2021. "Perform a limited risk managment study." November 17, 2021. https://assignbuster.com/perform-a-limited-risk-managment-study/.

1. AssignBuster. "Perform a limited risk managment study." November 17, 2021. https://assignbuster.com/perform-a-limited-risk-managment-study/.


Bibliography


AssignBuster. "Perform a limited risk managment study." November 17, 2021. https://assignbuster.com/perform-a-limited-risk-managment-study/.

Work Cited

"Perform a limited risk managment study." AssignBuster, 17 Nov. 2021, assignbuster.com/perform-a-limited-risk-managment-study/.

Get in Touch

Please, let us know if you have any ideas on improving Perform a limited risk managment study, or our service. We will be happy to hear what you think: [email protected]