security awareness 9-10-09 v5 peer to peer
Post on 05-Dec-2014
427 Views
Preview:
DESCRIPTION
TRANSCRIPT
its.unc.edu 1
Version Oct 2009 v3
An ITS Security Training Module
CLICK “FULL” TO VIEW SLIDE IN FULL
SCREEN.
its.unc.edu 2
P2P file-sharing programs frequently contain spyware and infect computers with malware.
Examples include Lime Wire, e-Donkey, and BitTorrent.
Peer to Peer (P2P)Peer to Peer (P2P)
its.unc.edu 3
The Dangers of Peer to Peer (P2P)
The Dangers of Peer to Peer (P2P)
often used to download illegal copies
of copyrighted materials
a wrong configuration of the file-
sharing program can put Sensitive
Information on your computer at risk
use of P2P programs on the University
network is prohibited in some
departmentsCheck with your IT support office or contact the ITS Help Desk at(919.962. HELP) to make sure your information is not at risk.
Section: Peer to Peer
its.unc.edu 4
Learning Point # 13Learning Point # 13
You recently installed BitTorrent on your computer to download some open source software. You leave BitTorrent running on your computer since you did
nothing illegal and it poses no danger. Right?
Wrong! While it is true that BitTorrent is a legal
software, running BitTorrent after you are done downloading legal material could allow other users to access Sensitive Information on your computer. Any
filesharing software should always be turned off when the download is
complete.
Section: Peer to Peer
its.unc.edu 5
Learning Point # 14Learning Point # 14
A friend, who shares my love of classic James Bond movies, recommends a Web site
for downloading “Goldfinger”. If I am not certain about whether downloading “Goldfinger” on to
my personal laptop is legal, I can always call 919.962.HELP and find out. Right?
Right! Everyone affiliated with
UNC-Chapel Hill can always call 919.962.HELP
with any questions regarding computer use.
Section: Peer to Peer
top related