Thesis statement: Users of Peer to Peer networks must be aware of the security and how to deal with the attacks.
Introduction
Technologies are getting more advance each day, in this assignment will be sharing and discuss about the security in peer to peer networks. Security run an important role in every network applications because this is the place where people and the systems are all link up together and can access each other data and also programs. According to Madron (1992) points out that:
One of the primary objectives of computer networks (and especially of local area networks) is to provide easy and convenient access to computer systems within an organizations, and it is that same ease of use that can sometimes conflict with
…show more content…
When everyone is accessible to remote peers, the host becomes more open for all kinds of attacks. In addition, as clients, peers may download different forms of files or get their process executed by different remote systems, which may prove to be hostile. The best things to do to prevent all this things to happen, is to stay out from peer to peer network. But with this kind of solution will depose us of all P2P computing or network privileges. P2P systems example like Gnutella, Wired:P2P pages and Groove Networks are here to stay.
“Gnutella
A free software application using peer-to-peer technology for sharing MP3 and video files.
Wired: P2P Pages
This global file-sharing guide lists 240-plus downloads, services, and information resources - most of them free - designed for experienced P2Pers and novices alike. Technical specs are provided for software developers to build many of these services.
Groove Networks
Develops Internet-based software for people to collaborate with one another.”
( http://www.business2.com/webguide/0,,26518,00.html )
If P2P are going to be used widely or commercially, the requirements of security of the hosts should make their transactions secure and applications endanger the security of the host.
The Peer-to-Peer networks threat
Peer-to-peer networks software or files are available for free in the network itself, because of this there are threats in P2P networks. During transferring files or loading
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
2) P2P is more reliable as the failure of one peer doesn’t affect the functioning of
I am Professor Kirk Mooring and I will be your instructor for this class. In this class, you will learn the fundamental core theories of information and network security. In this course, you will learn and use technology skills that are in demand in today’s job market. With so many threats and vulnerabilities created daily that we have to learn to work as a team in order to protect our data with the appropriate security safeguards. You will study the concepts that will help you evaluate and mitigate risk by selecting the appropriate security controls and technologies.
P2P: P2P (Peer-to-peer) is a networking application that partitions tasks or workloads. P2P works once opening its application/app, once opened it will form a peer-to-peer network of modes. P2P violates copyright laws to reproduce and distribute copyrighted music, pictures, software, etc.
Not everyone thought this was such a great idea, however. Some objections cite legal or moral concerns. Other problems were technical. Many network providers, having set up their systems with the idea that users would spend most of their time downloading data from central servers, have economic objections to peer-to-peer models. A long-established fixture of computer networking that includes important peer-to-peer components is Usenet, which has been around since 1979. Usenet news implements a decentralized model of control that in some ways is the grandfather of today’s new peer-to-peer applications such as Gnutella* and Freenet*. Fundamentally, Usenet is a system that, using no central control, copies files between computers. So the bottom-line is that file-sharing has been around for a long time now and that its decentralized nature makes is hard to control besides holding each individual sharing files accountable. Peer-to-peer systems go hand-in-hand with decentralized systems. In a fully decentralized system, not only is every host an equal participant, but there are no hosts with special facilitating or administrative roles. In practice, building fully decentralized systems can be difficult, and many peer-to-peer applications take hybrid approaches to solving problems. [1]
Piracy also often introduces infrastructure and security concerns. The sites used for software and media piracy often leave visitors with malware, viruses and spyware, which can compromise private business data and
It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. This happens today more often than one would like to think and the consequences are astronomical for users, employees and customers of the companies. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect the network. When a security breach happens, there is usually a pretty simple reason why it has happened. This paper will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service that
File sharing allows users to use software that connects into a network to search for shared files from other users. You are allowed to download any of the content that is on the file sharing account. Peer to peer, P2P, is sharing that allows you to access files such as books, music, movies, and games. Bit torrent is a peer-to-peer file transfer protocol for sharing large amounts of data over the Internet. All of these resources are surprisingly not illegal and can be used by anyone.
While analyzing the network for vulnerabilities, risks, threats and ways to secure the network, the below information are my findings.
People that result in downloading or using file sharing sites, find using P2P sites because it is convenient for them, yes they are aware that it is wrong and not fair to the person that they are stealing from in most cases that read about the person does it because they don’t want to waste time or money purchasing a product and end up not liking it. An example of this that I heard is t an artist or a movie comes out and due the new age of social media the review hinders your decision whether to purchases the album or movie. So than you go to Best Buy and purchases that album or movie and the critics were right, it sucks. The person has just wasted on average of $14-$30 on an album or movie. Instead of wasting the money and their time the person will use the P2P site for free and never think again about the bad album or
The Internet has served as a medium for peers to share any kind of files, like pictures, videos, music, books, etc. However, in order for peers to be able to exchange files, a platform is needed. There are many platforms available that serve as a bridge technology so that peers can share files with other peers around the world. These platforms only serve as a connection devise and not as a piracy store. As a result of the existence of these types of platforms, industries became concerned that this practice is violating the copyrights of the copyright holders. These industries demand that these platforms are shut down. However, these sharing file platforms state that they are not
A peer-to-peer network is a group of interconnected computers in which all computers have equal privileges to share and access information in the network without the need of a consent or approval from a central authority. Each computer can communicate with every other computer (or peer) on the network directly without any restrictions. The access rights are completely governed by the individual computers and can be controlled by assigning passwords if required. Peers are both suppliers and consumers of information and are able to simultaneously function as both client and server. A client is someone who initiates the request and a server fulfils the request.
In response to peer to peer sharing, by placing censorship on these types of websites, we can protect up to 22 million users from harmful theft. Although peer to peer file sharing is important to many people, there are many other methods which can keep you protected and get the job done just as well. These include email, usb methods, and
In recent years, internet piracy or "file sharing" of copyrighted material has gained much popularity. It is a topic that has incessantly sparked debate and has even received global attention. Although on the surface the act of file sharing may seem harmless, it is far from it. Each year, film and record production companies as well as software and video game development companies suffer from billions of dollars in lost profits. This loss comes as a direct result of internet piracy. Many agree that file sharing is unethical and consider it to be no different than downright theft. On the other hand, there are those that support file sharing and claim that their actions are easily justified and ethical. This essay will provide a brief overview and history of file sharing, will consider the arguments of each side, and will offer my personal observations and stance on the issue.
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.