EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Peer-To-Peer Software (p2p) and Internet Security

Page 1 of 17

Team Research Report Project:

Peer-to-Peer Software (P2P) and Internet Security

Abstract

        The purpose of this research report is to brief Balutan Island’s Legislature public safety committee.  Within this report, we will explain what happened in Balutan Island (located in the Pacific Ocean) and what is being done to control the fallout of Peer-to-Peer software (P2P).  Furthermore, we will explain how P2P can be correlated to Internet Security and what can be done to prevent future problems regarding the software.

        Our methods for approaching Case 1 and resolving its issues first included brainstorming.  Our group analyzed this case and discussed the possible factors that could have attributed to the initial problem of P2P.  Furthermore, we discussed whether or not the presented issue was a policy or technical problem; from there, we planned how we could remedy the problem and prevent future issues related to P2P.

Within this report, we have utilized Dr. Mark Ciampa’s Security Awareness: Applying Practical Security in Your World (4th ed.) textbook in order to maximize our understanding of P2P and its correlation to Internet Security.  Moreover, we have researched articles regarding information about Peer-to-Peer Software (i.e. how it work, what it is, and why it is useful).  Throughout this research report, we will cover the latter aspects of P2P is, what Case 1 is about, and how the implementation of our acquired knowledge may benefit Balutan Island.  Henceforth, we will explain some plausible solutions for this case and what our course of action is.

Table of Contents

Abstract …………..………………………………………………………….…………… Pg. 1

Table of Contents ………………………………………………………………………… Pg. 2

Introduction …………….…………….…………….…………….…………….……...… Pg. 3-4

Background

  • History of P2P software ……………………………………………………….. Pg. 5-6
  • Content of P2P software ……………………………………………………..... Pg. 6-7

Case

  • Case Summary …………………………………………………………….…... Pg. 8-9
  • Potential Causes ……………………………………………………………… Pg. 9-10
  • Current Studies ……………………………………………………………......... Pg. 10
  • Plausible Solutions ………………………………………………………..…. Pg. 10-11
  • Course of Action …....………………………..……………………….………… Pg. 11

Discussion

  • How to Reduce Impact/Frequency of Similar Crisis …....…………….…... Pg. 12-13
  • Would Police Benefit from P2P ………………………………………...…… Pg. 13-14
  • Alternative Solutions ………………………………………………………......... Pg. 14
  • Policy or Technical Problem ……………………………………………........ Pg. 14-15
  • What should be changed immediately/long term………………….……….. Pg. 15-16

Conclusion ………….…………….…………….…………….…………….…………… Pg. 17

Work Cited …………………………………………….…………….…………….….… Pg. 18

Introduction:

        In today’s modern society, it has become increasingly easy to share files across the internet.  Additionally, Peer-to-Peer software (P2P) has made it so much more convenient for this to be done, but has also proved to be a nightmare for internet security and protection.  According to Bradley Mitchell, P2P refers to networks that allows computer hardware and software to communicate without the need for a server.  “P2P file sharing further refers to the distribution of digital media or files over a P2P network, in which files are located on individual’s computers and are shared with other members of the network, rather than on a centralized server.”  (Lifewire, 2017)

Within our case, Balutan Island’s police department struggled specifically with a privacy breach.  In essence, police officers installed P2P software onto their precinct’s computers in order to easily share case files with other officers and precincts.  However, in a few weeks notice, the precinct was notified that confidential files were found posted via web.

In consideration of this case, our team was delegated to be the crisis team.  In order to remedy this situation, we will be briefing the Legislature’s public safety committee and upon meeting, we will be answer several questions.  Throughout this report, we will discuss what is being done to control the fall out by satisfying the following concerns: 1) What P2P software is and how it impacts individuals, society, education, the government, and businesses, 2) What the potential causes for the data leakage are, and 3) What our course of action to address the problem is, 4) How we can reduce impact and frequency of similar crisis.  Henceforth, we will discuss  5) Whether or not police benefit from using P2P and if there are any alternative solutions, 6) Whether this is policy or technical problem, and 7) What should the company change immediately and long term regarding this case.  By answering the given, our team aims to provide efficient and effective solutions for Case 1.

Download as (for upgraded members)
txt
pdf