Peer-to-peer – time to lock the door

Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ…

Contents

1. INTRODUCTION
1.1. BACKGROUND
1.2. DEFINITIONS
1.3. CONTRIBUTION, PURPOSE AND GOAL
1.4. TARGET GROUPS
1.5. LIMITATIONS
1.6. PROBLEM DESCRIPTION
1.7. LITERATURE STUDY AND DATA COLLECTION
1.8. HYPOTHESIS
1.9. METHODS
2. BASIC PEER-TO-PEER – LITERATURE RESEARCH
2.1. DEFINITION
2.2. THE MAIN AREAS OF PEER-TO-PEER
2.3. BACKGROUND TO SECURITY ISSUES
2.4. PROBLEMS CONCERNING PEER-TO-PEER
2.5. SECURITY POLICY
2.6. SUMMARY – LITERATURE RESEARCH
3. SURVEY
3.1. DATA ANALYSIS
3.2. SUMMARY – SURVEY
4. CASE STUDY
4.1. DATA ANALYSIS – SURVEY
4.2. DATA ANALYSIS – NETWORK SCAN
4.3. SUMMARY – CASE STUDY
5. LABORATORY TEST
5.1. DESIGN AND IMPLEMENTATION
5.2. DATA ANALYSIS…

………

Author: Linus Petersson

Source: Blekinge Institute of Technology

Download URL 2: Visit Now

Keywords: Project Reports, Dissertation, Thesis

Leave a Comment