Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Potential security breaches in IS. How to stay on a safe side?

Posted on 2014-03-14
3
Medium Priority
?
464 Views
Last Modified: 2014-03-30
Dear All,

We do a review of applications installed on employee's personal computers and found that one of employees uses Pando Media Booster. We learned that it might be using file sharing protocol (BitTorrent) that can compromise information security in our organization.

http://en.wikipedia.org/wiki/Pando_(application)

1. Is our conclusion correct?
2. Is there any proved method to classify spyware?
3. Is there any proved knowledge base that clearly states what software can be potential security breach?

Thanks in advance
0
Comment
Question by:ITm1010
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 525 total points
ID: 39928884
It has its own purposes, like with any other file transfer facility (including web browser) sure it can leak any information user has access to.
No you cannot clasify all implementations of bittorrent protocol as spyware because it is not.
Ask your AV vendor on how to make a custom signature that does this misclasification...
0
 
LVL 27

Assisted Solution

by:skullnobrains
skullnobrains earned 525 total points
ID: 39931506
1) like gheist said, no, or rather not more than allowing ftp, email, or roughly any protocol that can transfer a file not speaking about cds, usb keys and other removable media

if i read the wikipedia link, it seems you should be much more afraid of the virus that is supposed to have been bundled with updates for months, and the bandwidth cost of such tools.

2) yeah plenty : they all prooved to be inefficient at best

3) yes : any software that you don't need and explicitly allow should be considered as a threat.

you'll find lists of "safe" software to be useful, but trying to list dangerous software exhaustively is foolish at best. any script kiddie can generate a new version of a dangerous software with minor differences and a different name automatically a zillion time per day. morphing viruses do so automatically.
0
 
LVL 62

Expert Comment

by:gheist
ID: 39932250
Hey (3) - the owner who BYOD-s needs the software and enjoys it...
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question