SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
4


                                                                          September 2003). This is a serious problem when the computer
                                                                          being used contains confidential and proprietary corporate data.
                                                                            Port and vulnerability scanning is a required part of a security
            TOOLS & TECHNIQUES                                            assessment. Now with the ubiquitous use of P2P file sharing,
                                                                          checking to see if your corporate files are being shared should
                                                                          now be part of that assessment.
Using Kazaa to Test                                                         Using Kazaa as an example, do a search on your company
                                                                          name. Make sure to highlight the Auto Search More button.
Your Security Posture                                                     This gives Kazaa the ability continuously search for the file from
                                                                          more and more places, rather than a single search and stopping.
                                                                          Besides searching on your company name, the following key-
                                                                          words should be searched:
                                       Ben Rothke, CISSP
                                                                                ❏ Specialized project names
An effective corporate information security policy will com-                    ❏ Project codes
pletely ban the use of peer-to-peer (P2P) file sharing software,                ❏ Product names
such as Morpheus and Kazaa. Rightly so, as such software poses                  ❏ Manufacturing sites
numerous security and privacy risks. The fact that P2P software                 ❏ Employee ID numbers
are some of the most downloaded files on the Internet should                    ❏ Financial forms
give information security managers pause. As of October 15,                     ❏ Backups of entire email boxes
2003, Download.com reported that the Kazaa Media Desktop
has been downloaded over 285 million times.                               What can you expect to find? Anything that an employee can
  Since P2P networks open the shared computer to millions of              store on their hard drive can be uploaded via P2P. Companies
computers worldwide, even an inadvertent mistake can have                 that have done such P2P searches have often found treasure
huge repercussions.                                                       troves of information.
  Just some of the risks associate with P2P software include:               The danger is that information on P2P networks quickly mul-
                                                                          tiplies. If a file is loaded and its sharing commences, it can easily
❏ Spread of worms and viruses. There are scores of reported               be on a thousand hard drives within a few hours.
  cases of files downloaded being trojaned or virus-infected.
❏ Hogging of bandwidth. P2P networks are notorious for                    Countermeasures
  bringing networks to their knees.                                       If you don’t like what you find (or fear what you may find in
❏ Legal issues/copyright infringement. Copyright laws are of-             the future), you’re not without options. Some countermeasures
  ten violated on P2P networks.                                           include:
❏ Bypasses internal controls. Sharing files over P2P eliminates
  the file-size restrictions of many email systems                        Port blocking. For Kazaa, block TCP sessions on ports 1214,
❏ Spyware/Adware. P2P software is replete with Spyware and                1285, 1299, 1331, 1337, 3135, 3136 and 3137. This is not a in-
  Adware, which is software that reports back to a vendor site a          fallible method, but a start.
  user’s usage habits and patterns. Usually this information is
  used in an advertising context.                                         Policies and procedures. Let users know that they should not
❏ Misconfigured File Sharing. Users very often misconfigure               have P2P software on corporate computers. If they have corpo-
  their P2P software and end up sharing their entire hard drive.          rate data on their home computers, and are running P2P soft-
❏ Launching pads for social engineering attacks. Once an at-              ware, additional controls must be put in place.
  tacker has internal information, he or she can use that to their
  advantage in a social engineering attack, since internal infor-         Software monitoring. Software from Vericept and SilentRunner
  mation provides access to authentic-sounding corporate ver-             can be used to see exactly what users are doing on the network.
  nacular and nomenclature.
                                                                          In short, P2P programs are hugely popular and can’t be stopped.
Most users in your organizations know that P2P is great for get-          But by being aware of the real security and privacy issues, users
ting music, but are often completely unaware of the security risks        can be more vigilant in their use of such systems. Companies
with the software. The risks are huge, and all users need to be           that are not proactive with regard to P2P file sharing will find
made aware of them.                                                       that much of their supposed competitive advantage is quickly
   From an information security perspective, it can be quite valu-        shared with the masses and thereby lost.
able to use it yourself to see just how much of your proprietary
and confidential data is available on P2P networks. The reason
for this is that while the P2P software is meant to share music                Ben Rothke, CISSP is a New-York based security consultant
files, users often incorrectly configure their software and rather               with ThruPoint, Inc. McGraw-Hill has just published his
than sharing their My Music folder, they often share their entire           Computer Security: 20 Things Every Employee Should Know.
hard drive (for examples, see “Identity Theft Made Easy,” Alert                                He can be reached at brothke@thrupoint.net




     ATTENTION: COPYRIGHTED MATERIAL. It is unlawful to photocopy this page without express written permission of Computer Security ALERT.

Mais conteúdo relacionado

Mais procurados

Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
Kunal Sharma
 

Mais procurados (20)

ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminar
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Defining Cyber Crime
Defining Cyber CrimeDefining Cyber Crime
Defining Cyber Crime
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicro
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
Network security
Network securityNetwork security
Network security
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Network security
Network securityNetwork security
Network security
 
After The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeAfter The Crash Minimize Your Downtime
After The Crash Minimize Your Downtime
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 

Semelhante a Rothke Using Kazaa To Test Your Security Posture

Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Ravtach Solutions
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
Gluu
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
management 2
 

Semelhante a Rothke Using Kazaa To Test Your Security Posture (20)

Business Peer Peer File Sharing Guide
Business Peer Peer File Sharing GuideBusiness Peer Peer File Sharing Guide
Business Peer Peer File Sharing Guide
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
P2p
P2pP2p
P2p
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
What frameworks can do for you – and what not (IPC14 SE)
What frameworks can do for you – and what not (IPC14 SE)What frameworks can do for you – and what not (IPC14 SE)
What frameworks can do for you – and what not (IPC14 SE)
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Security technology
Security technologySecurity technology
Security technology
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Ransomware
RansomwareRansomware
Ransomware
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right Way
 

Mais de Ben Rothke

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
 

Mais de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Rothke Using Kazaa To Test Your Security Posture

  • 1. 4 September 2003). This is a serious problem when the computer being used contains confidential and proprietary corporate data. Port and vulnerability scanning is a required part of a security TOOLS & TECHNIQUES assessment. Now with the ubiquitous use of P2P file sharing, checking to see if your corporate files are being shared should now be part of that assessment. Using Kazaa to Test Using Kazaa as an example, do a search on your company name. Make sure to highlight the Auto Search More button. Your Security Posture This gives Kazaa the ability continuously search for the file from more and more places, rather than a single search and stopping. Besides searching on your company name, the following key- words should be searched: Ben Rothke, CISSP ❏ Specialized project names An effective corporate information security policy will com- ❏ Project codes pletely ban the use of peer-to-peer (P2P) file sharing software, ❏ Product names such as Morpheus and Kazaa. Rightly so, as such software poses ❏ Manufacturing sites numerous security and privacy risks. The fact that P2P software ❏ Employee ID numbers are some of the most downloaded files on the Internet should ❏ Financial forms give information security managers pause. As of October 15, ❏ Backups of entire email boxes 2003, Download.com reported that the Kazaa Media Desktop has been downloaded over 285 million times. What can you expect to find? Anything that an employee can Since P2P networks open the shared computer to millions of store on their hard drive can be uploaded via P2P. Companies computers worldwide, even an inadvertent mistake can have that have done such P2P searches have often found treasure huge repercussions. troves of information. Just some of the risks associate with P2P software include: The danger is that information on P2P networks quickly mul- tiplies. If a file is loaded and its sharing commences, it can easily ❏ Spread of worms and viruses. There are scores of reported be on a thousand hard drives within a few hours. cases of files downloaded being trojaned or virus-infected. ❏ Hogging of bandwidth. P2P networks are notorious for Countermeasures bringing networks to their knees. If you don’t like what you find (or fear what you may find in ❏ Legal issues/copyright infringement. Copyright laws are of- the future), you’re not without options. Some countermeasures ten violated on P2P networks. include: ❏ Bypasses internal controls. Sharing files over P2P eliminates the file-size restrictions of many email systems Port blocking. For Kazaa, block TCP sessions on ports 1214, ❏ Spyware/Adware. P2P software is replete with Spyware and 1285, 1299, 1331, 1337, 3135, 3136 and 3137. This is not a in- Adware, which is software that reports back to a vendor site a fallible method, but a start. user’s usage habits and patterns. Usually this information is used in an advertising context. Policies and procedures. Let users know that they should not ❏ Misconfigured File Sharing. Users very often misconfigure have P2P software on corporate computers. If they have corpo- their P2P software and end up sharing their entire hard drive. rate data on their home computers, and are running P2P soft- ❏ Launching pads for social engineering attacks. Once an at- ware, additional controls must be put in place. tacker has internal information, he or she can use that to their advantage in a social engineering attack, since internal infor- Software monitoring. Software from Vericept and SilentRunner mation provides access to authentic-sounding corporate ver- can be used to see exactly what users are doing on the network. nacular and nomenclature. In short, P2P programs are hugely popular and can’t be stopped. Most users in your organizations know that P2P is great for get- But by being aware of the real security and privacy issues, users ting music, but are often completely unaware of the security risks can be more vigilant in their use of such systems. Companies with the software. The risks are huge, and all users need to be that are not proactive with regard to P2P file sharing will find made aware of them. that much of their supposed competitive advantage is quickly From an information security perspective, it can be quite valu- shared with the masses and thereby lost. able to use it yourself to see just how much of your proprietary and confidential data is available on P2P networks. The reason for this is that while the P2P software is meant to share music Ben Rothke, CISSP is a New-York based security consultant files, users often incorrectly configure their software and rather with ThruPoint, Inc. McGraw-Hill has just published his than sharing their My Music folder, they often share their entire Computer Security: 20 Things Every Employee Should Know. hard drive (for examples, see “Identity Theft Made Easy,” Alert He can be reached at brothke@thrupoint.net ATTENTION: COPYRIGHTED MATERIAL. It is unlawful to photocopy this page without express written permission of Computer Security ALERT.