Tuesday, May 5, 2020
Security in peer to peer networks Essay Example For Students
Security in peer to peer networks Essay Thesis statement: Users of Peer to Peer networks must be aware of the security and how to deal with the attacks. Introduction Technologies are getting more advance each day, in this assignment will be sharing and discuss about the Security in peer to peer networks Essay. Security run an important role in every network applications because this is the place where people and the systems are all link up together and can access each other data and also programs. According to Madron (1992) points out that: One of the primary objectives of computer networks (and especially of local area networks) is to provide easy and convenient access to computer systems within an organizations, and it is that same ease of use that can sometimes conflict with security needs. (p. 3) This being the case most of the peer to peer networks can remote the systems to access the nodes in the peer to peer network and programs are often transferred in the systems in remote locations and also because of the usefulness of the networking it really attracts people all around to use and at the same time problems of security happens. So it is crucial for the users to ensure their security in the networking. The problems usually started from modification of messages in transit, denial of services attacks and interception of messages, perhaps the most obvious active threat faced by a communication system is an attack that can destroy or delay most or all messages (Madron, 1992, p.63). In order to secure the systems of peer to peer network there is three basics requirements of security, integrity and authentication, it seems evident that Data integrity ensures that data have not been altered or destroyed in an unauthorized manner. Both data integrity and authentication rely heavi ly on encryption as a primary security mechanism ( Madron, 1992, p. 71). For this security the operating system level and application level is used. As to ensure the security for every users, the helps support security needs to be posted to the peer to peer network and also to be specified. Requirements Peer to peer (P2P) file sharing networks have become wildly popular. The first major file-sharing network example was NASPSTER, which designed to allow music fans to share MP3 music files and so on. P2P actually is all about sharing resources like files, storage or processing time, with every other computer in the peer network. The peer network usually consists of authorized peers in a corporate setup. When everyone is accessible to remote peers, the host becomes more open for all kinds of attacks. In addition, as clients, peers may download different forms of files or get their process executed by different remote systems, which may prove to be hostile. The best things to do to prevent all this things to happen, is to stay out from peer to peer network. But with this kind of solution will depose us of all P2P computing or network privileges. P2P systems example like Gnutella, Wired:P2P pages and Groove Networks are here to stay. Gnutella A free software application using peer-to-peer technology for sharing MP3 and video files. Wired: P2P Pages This global file-sharing guide lists 240-plus downloads, services, and information resources most of them free designed for experienced P2Pers and novices alike. Technical specs are provided for software developers to build many of these services. Groove Networks Develops Internet-based software for people to collaborate with one another. ( http://www.business2. com/webguide/0,,26518,00.html ) If P2P are going to be used widely or commercially, the requirements of security of the hosts should make their transactions secure and applications endanger the security of the host. .ub0b68878715d796f3507fb42111d6513 , .ub0b68878715d796f3507fb42111d6513 .postImageUrl , .ub0b68878715d796f3507fb42111d6513 .centered-text-area { min-height: 80px; position: relative; } .ub0b68878715d796f3507fb42111d6513 , .ub0b68878715d796f3507fb42111d6513:hover , .ub0b68878715d796f3507fb42111d6513:visited , .ub0b68878715d796f3507fb42111d6513:active { border:0!important; } .ub0b68878715d796f3507fb42111d6513 .clearfix:after { content: ""; display: table; clear: both; } .ub0b68878715d796f3507fb42111d6513 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub0b68878715d796f3507fb42111d6513:active , .ub0b68878715d796f3507fb42111d6513:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub0b68878715d796f3507fb42111d6513 .centered-text-area { width: 100%; position: relative ; } .ub0b68878715d796f3507fb42111d6513 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub0b68878715d796f3507fb42111d6513 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub0b68878715d796f3507fb42111d6513 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub0b68878715d796f3507fb42111d6513:hover .ctaButton { background-color: #34495E!important; } .ub0b68878715d796f3507fb42111d6513 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub0b68878715d796f3507fb42111d6513 .ub0b68878715d796f3507fb42111d6513-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub0b68878715d796f3507fb42111d6513:after { content: ""; display: block; clear: both; } READ: Business Law1 EssayThe Peer-to-Peer networks threat Peer-to-peer networks software or files are available for free in the network itself, because of this there are threats in P2P networks. During transferring files or loading files, viruses could be sent along with the files that are transmitted. For example, according to much of the information in industry literature we might well be led to believe that worms and viruses are the primary threats with which we should be concerned (Madron, 1992, p.8). An example of a network being targeted by virus which is Gnutella networks and the virus is Gnuman worm. This Gnuman worm (Virus) will increase the amount .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.