Saturday, February 2, 2019
Security in peer to peer networks Essay examples -- essays research pa
Thesis statement Users of Peer to Peer networks must be aware of the security and how to deal with the attacks.IntroductionTechnologies are getting much advance each day, in this assignment will be share and discuss ab appear the security in peer to peer networks. warrantor run an important role in every network applications because this is the ship where people and the schemes are all link up together and evict access each other info and also programs. According to Madron (1992) points out thatOne of the primary objectives of computer networks (and especially of local area networks) is to appropriate easy and convenient access to computer systems within an organizations, and it is that same expertness of use that can sometimes conflict with security needs. (p.3)This being the reason most of the peer to peer networks can remote the systems to access the nodes in the peer to peer network and programs are often transferred in the systems in remote locations and also because of the usefulness of the networking it really attracts people all roughly to use and at the same time problems of security happens. So it is authoritative for the users to ensure their security in the networking. The problems usually started from modification of messages in transit, self-discipline of services attacks and interception of messages, perhaps the most obvious active threat confront by a communication system is an attack that can disgrace or delay most or all messages (Madron, 1992, p.63). In enjoin to estimable the systems of peer to peer network there is three rudiments requirements of security, integrity and authentication, it seems evident that Data integrity ensures that data have non been altered or destroyed in an unauthorized manner. Both data integrity and authentication rely heavily on encryption as a primary security mechanism ( Madron, 1992, p.71). For this security the operating system level and application level is used. As to ensure the security f or every users, the helps support security needs to be posted to the peer to peer network and also to be specified.Requirements      Peer to peer (P2P) file sacramental manduction networks have become wildly popular. The first major file-sharing network poser was NASPSTER, which designed to allow music fans to share MP3 music files and so on. P2P real is all about sharing resources like files, storage or bear on time, with ev... ...In the end, the use of technology is probably the only way we can secure information. The investment in information that individuals and organizations have made, are making, and will bushel in the future is enormous, however, and security systems aid us in protect that investment. (p.235). Aware of the security and protection.     References1.     Durr, M., & Gibbs, M. (1989). interneting Personal Computers (3rd ed.). United States of the States Que Corporation.2.    &nb spMadron T.W. (1992). Network Security in the90s issues and solutions for managers. United States of America WPC.3.     Stallings, W. (1990). Local Networks (3rd ed.). United States of America Masmillan.4.     (2003). Retrieved May 2, 2003, http//www.business2.com/webguide/0,,26518,00.html5.     (2003). Retrieved April 20,2003, www.microsoft.com/myservices/services/faq.asp6.     (2002). Retrieved April 20, 2003,      www.rcsi.org/Newsletter/2002/Jul/Jul Aug02Monitor.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment