Beware P2P Networks With A Tunnel To Confidential Data, Study Warns - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Business & Finance

Beware P2P Networks With A Tunnel To Confidential Data, Study Warns

Many of the biggest breaches in recent years were inadvertent disclosures, Dartmouth business school researchers found.

Peer-to-peer networks could be more than a nuisance in the workplace, they might also be providing cyberthieves with a tunnel into your most confidential data. So says a new study of corporate data leaks released Tuesday by Dartmouth business school researchers.

"Many of the biggest breaches in recent years were inadvertent disclosures," says Eric Johnson, professor of operations management at Dartmouth's Tuck School of Business and director of the school's Glassmeyer/McNamee Center for Digital Strategies. Johnson co-authored the study along with Scott Dynes, a senior research fellow at Dartmouth's Institute for Security Technology Studies.

One of the major problems, they found, was that users were insufficiently protecting their files and data from peer-to-peer networks. "Like most people I talked to, I underestimated the scope of the problem," Johnson told InformationWeek. "The kinds of leaks coming out of these organizations would make their hair stand on end, in terms of both the amount and type of information leaked."

The Dartmouth study notes that there are an estimated 10 million users sharing music, video, software, and photos over peer-to-peer networks, up from about 4 million in 2003. This doesn't even include BitTorrent, a popular peer-to-peer application for video files that's difficult to monitor. Meanwhile, efforts by ISPs, corporations, and copyright holders to limit peer-to-peer through technology (such as site blocking, traffic filtering, and content poisoning) or through the courts (the most notable being the Recording Industry Association of America prosecution of individual users and file sharing firms) have prompted peer-to-peer developers to create decentralized, encrypted, anonymous networks that can find their way through corporate and residential firewalls.

"These networks are almost impossible to track, are designed to accommodate large numbers of clients, and are capable of transferring vast amounts of data," the study says.

And now the bad news. Criminals are actively searching peer-to-peer networks for any personal information they can use to commit identity theft. There are several ways for confidential data to find its way to a peer network, including instances where users accidentally share folders containing such data, users store music and other data in the same folder that is shared, or users download malware that exposes their file directories to the network. A lot of identity theft victims "don't realize that their son was on LimeWire last night sharing their financial information," Johnson says. "Much of this software has interface designs that are confusing and even deceptive in a way that gets people to share, without knowing it, their whole hard drive."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
News
Python Beats R and SAS in Analytics Tool Survey
Jessica Davis, Senior Editor, Enterprise Apps,  9/3/2019
Slideshows
IT Careers: 10 Places to Look for Great Developers
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/4/2019
Commentary
Cloud 2.0: A New Era for Public Cloud
Crystal Bedell, Technology Writer,  9/1/2019
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll