{"title":"P2P的问题","authors":"Ken Dunham","doi":"10.1201/1086.1065898X/46051.15.2.20060501/93403.2","DOIUrl":null,"url":null,"abstract":"Abstract Peer-to-peer (P2P) applications have been one of the hottest things on the market for users — both at home and at the office — in the past few years. Unfortunately, there are many security risks associated with P2P programs, such as Kazaa, eDonkey, and others. Even if a corporation has a policy against P2P applications, it is at an increased risk due to the popularity of such programs and abuse by employees and contractors. This article provides an overview of some of the common threats introduced by P2P applications.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Problem with P2P\",\"authors\":\"Ken Dunham\",\"doi\":\"10.1201/1086.1065898X/46051.15.2.20060501/93403.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Peer-to-peer (P2P) applications have been one of the hottest things on the market for users — both at home and at the office — in the past few years. Unfortunately, there are many security risks associated with P2P programs, such as Kazaa, eDonkey, and others. Even if a corporation has a policy against P2P applications, it is at an increased risk due to the popularity of such programs and abuse by employees and contractors. This article provides an overview of some of the common threats introduced by P2P applications.\",\"PeriodicalId\":36738,\"journal\":{\"name\":\"Journal of Information Systems Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Systems Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086.1065898X/46051.15.2.20060501/93403.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086.1065898X/46051.15.2.20060501/93403.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
Abstract Peer-to-peer (P2P) applications have been one of the hottest things on the market for users — both at home and at the office — in the past few years. Unfortunately, there are many security risks associated with P2P programs, such as Kazaa, eDonkey, and others. Even if a corporation has a policy against P2P applications, it is at an increased risk due to the popularity of such programs and abuse by employees and contractors. This article provides an overview of some of the common threats introduced by P2P applications.