Monday, June 10, 2019

Software Technology Evaluation Research Paper Example | Topics and Well Written Essays - 1250 words

Software Technology Evaluation - Research Paper ExampleMore specifically, organizations are becoming aware of the threats that peer-to-peer software poses to their networks and users who download or upload archives. With regard to the request the client made, it is reasonable to have concern over users who install file sacramental manduction software without receiving the authority to do so. This is because there are many threats that tar pretend files sharing software, which fucking harm computer users and the corporate resources, as well. charm peer-to-peer file sharing software is popular, their mechanisms of trading operations offer significant opportunities for hackers to perform endeavors that can harm its users. More specifically, such software like uTorrent, Bit Torrent and other popular files sharing softwares can allow propagation of malicious codes such as worms, and spyware. File sharing software can also help hackers carry out intrusion into army computers where t hey can steal data. Unauthorized installation of file sharing software can expose the host computers to peer-to-peer worms that can affect the users of the network. Over years, file sharing community has been facing the problem of peer-to-peer worms that try the vulnerability of hosts in the peer-to-peer network (Salomon, 2010). ... In most cases, peer-to-peer networks have scanning worms, which can use the peer-to-peer software to exploit network vulnerability. Indiscriminate and unauthorized installation of file sharing software can introduce spyware into the corporate network. It is has been argued that users install spyware software unknowingly because some get installed along free software or files sharing applications (Baskin & Piltzecker, 2006). More often than not, developers of spyware use free software as a way of distributing their spyware programs that hope to exploit unsuspecting users. Because of this approach, unauthorized installation of file sharing software can i ntroduce spyware into the corporate computers such as desktops and laptops (Appleman, 2004). The problem of spyware entails monitoring and sharing of knowledge on the user of the system. This means that a spyware can monitor the use of an infected computer and share the information with the developer of the spyware. Through this approach, the organization can recede valuable information that could be used a crystalisest it by its competitors or hackers for criminal acts. While there other ways that spyware can penetrate the corporate network, unauthorized installation of files sharing network is the most covert way of installing spyware on any computer, whether a desktop or laptop computer. Installation of file sharing software on a corporate network can allow hackers to penetrate the network and execute other functions that harm computers connected to the network. While computers users can install new file sharing software to use for distributing materials on the internet, there are high chances that hackers can use the software to gain access to the network resources such as servers or desktop

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.