Friday, September 27, 2019
Perform a Limited Risk Managment Study Coursework - 1
Perform a Limited Risk Managment Study - Coursework Example Privacy invasion: Using P2P networks or applications may give unauthorized users access to personal data either, by accessing personal directories or users give private information to whom they believe to be a trusted source or organization. When Medical or financial information, sensitive individual or corporate data is compromised, users are vulnerable to identity theft (Bidgoli, 2004). Vulnerability: Several P2P networks and applications ask users to open certain ports on the computers firewall to share files. Opening this ports provide attackers with channels to attack the userââ¬â¢s computer by utilizing any susceptibilities that may exist in the P2P connection. Service Denial: Downloading media files raise the capacity of traffic across the network. This may restrain the userââ¬â¢s internet access or inhibit the availability of certain applications in the userââ¬â¢s computer. The best ways to avoid these risks is by refraining from P2P networks and applications, but if a user insists on using them, they should have a proper and up to date antivirus program and they should have installed and enabled a firewall on their
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.