RichardPresents.com 
P2P Sharing of Files
 What's a Firewall
Avoid Infection
We're infected!
Spam and Spyware
Disaster Recovery

Articles & Reports

HELP! I think we have a Virus.

       How to Protect your privacy when using File-Sharing Technology

 

 US-CERT Tips (United States Computer Emergency Readiness Team, National Cyber Alert System, Carnegie Mellon University) publishes many quality articles about online "cyber security". Here's one for your library.... Richard

                     Risks of File-Sharing Technology

File-sharing technology is a popular way for users to exchange, or "share," files. However, using this technology makes you susceptible to risks such as infection, attack, or exposure of personal information.

                                        What is file sharing?
 
File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may put your information or your computer in jeopardy.
 
           What risks does file-sharing technology introduce?
 
* Installation of malicious code - When you use P2P applications, it is difficult, if not impossible, to verify that the source of the files is trustworthy.
These applications are often used by attackers to transmit malicious code.
 
 Attackers may incorporate spyware, viruses, Trojan horses, or worms into the files. When you download the files, your computer becomes infected (see Recognizing and Avoiding Spyware and Recovering from Viruses, Worms, and Trojan Horses for more information -at US-CERT).
 
* Exposure of sensitive or personal information -
By using P2P applications, you may be giving other users access to personal information. Whether it's because certain directories are accessible or because you provide personal information to what you believe to be a trusted person or organization, unauthorized people may be able to access your financial or medical data, personal documents, sensitive corporate information, or other personal information.
 
Once information has been exposed to unauthorized people, it's difficult to know how many people have accessed it. The availability of this information may increase your risk of identity theft (see Protecting Your Privacy and Avoiding Social Engineering and Phishing Attacks for more information - at US-CERT).
 
* Susceptibility to attack -
Some P2P applications may ask you to open certain ports on your firewall to transmit the files. However, opening some of these ports may give attackers access to your computer or enable them to attack your computer by taking advantage of any vulnerabilities that may exist in the P2P application.

* Denial of service - Downloading files causes a significant amount of traffic over the network and relies on certain processes on your computer. This activity may reduce the availability of certain programs on your computer or may limit your access to the internet.

* Prosecution -
Files shared through P2P applications may include pirated software, copyrighted material, or pornography.
If you download these, even unknowingly, you may be faced with fines or other legal action. If your computer is on a company network and exposes customer information, both you and your company may be liable.
 
                      How can you minimize these risks?
 
The best way to eliminate these risks is to avoid using P2P applications. However, if you choose to use this technology, you can follow some good security practices to minimize your risk:
 
* use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses. However, attackers are continually writing new viruses, so it is important to keep your anti-virus software current (see Understanding Anti-Virus Software for more information).
 
* install or enable a firewall - Firewalls may be able to prevent some types of infection by blocking malicious traffic before it can enter your computer (see Understanding Firewalls for more information). Some operating systems actually include a firewall, but you need to make sure it is enabled.
 
       Author: Mindi McDowell. Some content contributed by Brent Wrisley and
                  Will Dormann. © Copyright 2005 Carnegie Mellon University.


                 ==========
Terms of use ==========
Copyright Permission
You are permitted to reproduce and distribute this document in whole or in part, without changing the text you use, provided that you include this copyright statement and use the document for noncommercial or internal purposes. For commercial use or translations, send your email request to permission@sei.cmu.edu.

No Warranty
Any material furnished by Carnegie Mellon University is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.
 

                                Return to Articles and Reports >>                                      

Subscribe to our
 Security Alerts News Reporter
for periodic updates on the latest events and
 issues affecting your personal security

We Value Your Privacy
Get your FREE report
"23 Critical Security Alerts"
from the subscription signup page.


Click Button to Read a recent issue and subscribe

                                  ------------------------------------
            
    Follow these links for information, advice, and protective tools
              
| To Top | Avoiding Infection | Infected? | Recovery |Glossary |
               |
Virus Hoaxes |
Cookies & PopUps | Popups | SPAM & Spyware |
                 |
Identity Theft | Keyloggers | Articles & Reports | HOME/Firewalls|
            
|Family Safety | Site Map |Survey | Trojan Horse | Blog | Virus Removal Tips|

                            Maintaining your Computer System health is our Goal
   
 Help Spread the word about our 'Computer Security Awareness Campaign"
                                        www.Firewalls-and-virus-protection.com

         
  Latest Virus Threats
 


Click Our Seal for More Information

Editor's Comments

       If you want to
     download music,
   movie, DVD, Games
       and other files,
                you
  DON'T NEED TO USE
                P2P!
 
   This is the safe file
   download service
    I use regularly.


   ♪ It's Not P2P
   ♪ It's Legal
   ♪ It's Secure
   ♪ Huge Download
        DataBase

   ♪ Full Time Access
  $ It's Inexpensive!

   Safe file down loading - NOT P2P!


              .... Richard


.Check Out the
 Security Alert BLOG
 Add your comments to ours


Copyright © 2004-2006 , by RichardPresents.com. All rights reserved | Home | Contact | Privacy Policy
|