Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Hi, I need help with essay on Software Technology Evaluation. Paper must be at least 1250 words. Please, no plagiarized work!Download file to see previous pages... More specifically, organizations are
Hi, I need help with essay on Software Technology Evaluation. Paper must be at least 1250 words. Please, no plagiarized work!
Download file to see previous pages...More specifically, organizations are becoming aware of the threats that peer-to-peer software poses to their networks and users who download or upload files. With regard to the request the client made, it is reasonable to have concern over users who install file sharing software without receiving the authority to do so. This is because there are many threats that target files sharing software, which can harm computer users and the corporate resources, as well. While peer-to-peer file sharing software is popular, their mechanisms of operations offer significant opportunities for hackers to perform exploits that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can also help hackers carry out intrusion into host computers where they can steal data. Unauthorized installation of file sharing software can expose the host computers to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that exploit the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). ...
In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unauthorized installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin &. Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can introduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of information on the user of the system. This means that a spyware can monitor the use of an infected computer and share the information with the developer of the spyware. Through this approach, the organization can lose valuable information that could be used against it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network.