Billy Ripple Dr. Oblitey COSC 316-002.  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
WAQAR KHOKHAR IS 373 Todd Christopher Will Introduction 2. Governing Standards Body 3. History 4. Specifications 5. Privacy and Security 6. Interoperability.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Company/Product Overview. You have lots of files all over the place.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Cloud Computing الحوسبة السحابية. subject History of Cloud Before the cloud Cloud Conditions Definition of Cloud Computing Cloud Anatomy Type of Cloud.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
For more notes and topics visit:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter 1 An Introduction to Networking
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Computer Applications Unit D Remote Desktop, Cloud Storage, Dropbox.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Chapter 8 The Internet: A Resource for All of Us.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Network Operating Systems versus Operating Systems Computer Networks.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Course ILT Basic networking concepts Unit objectives Compare various types of networks Discuss types of servers Discuss LAN topologies Discuss planning.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Communications & Networks National 4 & 5 Computing Science.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
CEG 2400 FALL 2012 Chapter 1 An Introduction to Networking 1.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
Section 2.1 Section 2.2 Identify hardware
Sharing and Synching files
Computer Networks Part 1
Cloud Computing I hear this question often. It is not easy to explain, because it means different things depending on who you talk to. Today’s Webinar.
Store, Share, Sync and Collaborate
Cloud Storage Services
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Client/Server and Peer to Peer
Presentation transcript:

Billy Ripple Dr. Oblitey COSC

 File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited

 File Sharing ◦ The practice of transmitting files from one computer to another ◦ Data can be transferred(shared) from computer to computer through many different processes ◦ The topic of file-sharing can be very controversial ◦ Originally created to help people move data across computer networks at amazing speeds

 To conveniently share files with friends, family, and even customers  To create virtual back-ups of important files  Saves on disk space  To allow multiple people to work on one project  To allow a large number of users to access a file as though it were on their local machine  And much more!

 The very beginning of file-sharing consisted of punched tape, punched cards, magnetic tape, and cassette tapes  The early days that started to make file-sharing more popular was the sharing of floppy disks that had a 79.7 kB storage capacity in the early 1970s  In the 1990s file-sharing through file transfer protocols took off and of course the World Wide Web

 The mid-to late 90s were ruled by instant messaging and  The late 1990s was when Napster, a file- sharing software that used a peer-to-peer network to share strictly music, took off  In 2001 BitTorrent was created. This used a peer-to-peer connection but allowed the sharing of many different types of files  File-sharing through cloud storage has recently became popular

 Physical Sharing  P2P (Peer-to-Peer)  FTP (File Transfer Protocol)  LAN (Local Area Networks)   Cloud storage  Social Media  Etc.

 Storage Devices ◦ USB flash drives, CD’s, Floppy Disks, etc.  Physically plugging a storage device into a computer to allow the files on that storage device to be shared with your computer  Most likely to have fastest download speeds

 This includes BitTorrent, uTorrent, LimeWire, Instant Messaging Programs  Most popular method for swapping large files on the internet, also most controversial  Most P2P file sharing systems do not use any central servers, but allow all computers on the network to function as a client and a server

 This includes several applications that can be downloaded via the internet (filezilla, efssoft, etc.)  FTP is an older method to share files. It is a standard internet protocol for transmitting files between computers on the internet  A FTP server holds all the files to be shared while remote computers running an FTP client can log into the server and obtain copies of the files

 Most Operating Systems contain built-in features for file-sharing (Windows, Mac OS, Linux)  A LAN supplies networking capability to a group of computers within a close proximity of each other  LAN is often used to share a file with several computers on the network without much effort

 This includes any client(Hotmail, Gmail, Yahoo, etc.)  systems use a client/server like FTP  A sender sends a file to a recipient  EX. Bob is the sender of an and Mary is the receiver  Bob sends an to Mary using his client, the must first go to Bob’s server, then to Mary’s server, then finally to Mary’s client where she will be able to view the message

 Storing data in “virtualized pools” of storage which are hosted by third parties (Google Drive, SkyDrive, DropBox, etc.)  Users upload their files to their “cloud drive” then users can share files on their drive with other members of their cloud storage providers  Information in “the cloud” is often kept in large datacenters

 A virtual community where people can interact (Facebook, Twitter, Myspace, etc.)  Any file uploaded to a social media website that is visible to the public is considered file- sharing  This is another controversial method of file- sharing

 No file-sharing method is 100% safe  Although file-sharing has many advantages, it also has many disadvantages and dangers that come with it  Most of the time users do not recognize when their machine has been compromised

 Physical Sharing ◦ A USB Storage device can contain malicious software that can be downloaded simply by inserting the device into your machine  FTP ◦ When using an FTP connection, the data being transferred could “stray” to a remote computer and the remote, third-party computer, could download the data to their own computer  Social Media ◦ Social Media accounts run the risk exposing you to malicious attachments and downloads ◦ Also, whatever you upload to social media is there for ever and sensitive data might lead to possible threats

 LAN ◦ When you allow for your computers files to be shared, anybody on the same network as you can have access to your files  ◦ Certain attachments that are shared via can spread viruses or other malware ◦ s can be compromised without the knowledge of the user  Cloud Storage ◦ This poses three big dangers, Data Security, Data Loss, and inappropriate access by unauthorized users ◦ You are essentially giving somebody else control of the safety of your data

 P2P ◦ This is the most dangerous file sharing method ◦ Promotes little or no control over shared content ◦ All content in shared directories is available for download, including personal or private data ◦ P2P software often comes bundled with spyware ◦ Not only does it expose your computer to many security threats, it also exposes the user to possible legal issues  Allows users to share files that may be copyrighted  Users can download new music, movies, and more for free

 Nicole Bucci, daughter of Kathy and Tony Bucci, liked to download music using a common P2P software  The Bucci’s always saved a copy of their tax returns in the “My Documents” section of their computer  Using a search of “tax return” on a simple file-sharing website, their tax returns and their social security numbers could be found  Their tax return refund was stolen and wired to a different account

 P2P is the most dangerous type of file- sharing  Users MUST be cautious when sharing files  It is very easy to share sensitive data without knowing  Also, it is very easy to expose yourself to malicious items that are being shared with you  Only share and accept files with trusted users

 ish/file-sharing ish/file-sharing  /a/file_sharing.htm /a/file_sharing.htm     file-sharing/ file-sharing/