Friday, September 27, 2019

Perform a Limited Risk Managment Study Coursework - 1

Perform a Limited Risk Managment Study - Coursework Example Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004). Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the user’s computer by utilizing any susceptibilities that may exist in the P2P connection. Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the user’s internet access or inhibit the availability of certain applications in the user’s computer. The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.