Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Peer-to-peer: time to lock the door
Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
2002 (English)Independent thesis Basic level (degree of Bachelor)Student thesis
Abstract [en]

Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is very important to really know what is going on in your network and which applications is doing what and with whom. If not, there are high possibilities that your system will be used for more or less malicious purposes. Therefore it is interesting to find out if p2p applications have found their way behind company walls. A policy can prevent the issues discussed either by banning employees from using p2p applications or by regulate the use of these applications in a very detailed manner. The implementation of a policy makes the usage controlled and easily supervised by the company security staff. Implementing a policy that regulates the use of p2p applications can prevent possible attacks on the company/organisation network.

Place, publisher, year, edition, pages
2002. , 25 p.
Keyword [en]
peer-to-peer, p2p, network security, security policy
National Category
Computer Science
Identifiers
URN: urn:nbn:se:bth-1724Local ID: oai:bth.se:arkivex187E906674102ED2C1256CB1003C0F8EOAI: oai:DiVA.org:bth-1724DiVA: diva2:828974
Uppsok
Technology
Supervisors
Available from: 2015-05-11 Created: 2003-01-17 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(319 kB)44 downloads
File information
File name FULLTEXT01.pdfFile size 319 kBChecksum SHA-512
7745db506fb82c302908ecd076c7f28372a8e7754112a45ee1ca0af26a4e8162135e97f8a748c2a31101547683f40b4dae95e0bd445b2a6a67be2ffe03b0df6c
Type fulltextMimetype application/pdf

By organisation
Department of Software Engineering and Computer Science
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 44 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 50 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf