In: Computer Science
The argument in the following scenario was invalid. Discuss the logical fallacies that apply to the reasoning and why they matter in light of the scenario
You are engaged in an intense discussion with your friend, Bill, who works in the IT department at your university. Bill complains that many students are using P2P (peer-to-peer) file-sharing applications on the university’s network to download excessive amounts of unauthorized copyrighted material. He also claims that the most effective solution to this problem would be to disable student access to all (existing) P2P sites and to prevent students at your institution from setting up their own P2P sites for any reason whatsoever (even to include noncopyrighted material). You convey to Bill your belief that this measure is too drastic. However, Bill argues that the only way to eliminate unauthorized file sharing among students at your institution is to disable access to all P2P software on the university’s network.
The points mentioned by Bill are very much valid as P2P networks are quite danger due to various reasons like,
Copyright infringement - P2P technology makes it possible to share files that are copyrighted. Law prohibits the reproduction, distribution, public display or public performance of copyrighted materials over the Internet without permission of the copyright holder.
Malicious software - Using P2P applications, it is difficult to verify that the sources of the files are trustworthy. Often, attackers use P2P to transmit malicious code such as spyware, malware, or viruses into the files.
Identity theft - Exposure of personal information is also possible when using P2P. P2P users may leave themselves wide open to identity theft by misconfiguring their computer settings.
But, there are many useful positives with P2P networks, like
Easy file sharing: An advanced P2P network can share files quickly over large distances.
Reduced costs: There is no need to invest in a separate computer for a server when setting up a P2P network.
Adaptability: P2P network extends to include new clients easily. This benefit makes these networks more flexible than client-server networks.
Reliability: Unlike a client-server network, which can fail if the central server malfunctions, a P2P network will likely remain functional even if the central server crashes.
High performance: While a client-server network performs less effectively when more clients join the network, a P2P network can improve its performance when more clients join it. This is due to the fact that each client in a P2P network is also a server that contributes resources to the network.
Efficiency: Emerging P2P networks enable collaboration between devices that have different resources that can benefit the whole network.
But, to eliminate unauthorized file sharing among students at your institution is to disable access to all P2P software on the university’s network is not the solution and it is drastic. But, there are ways by which we can University can wisely let students use P2P networks.
Secure your P2P network with network security solutions.
Develop an innovative policy that suits the decentralized architecture of the network to manage your data and applications.
Develop a cybersecurity policy and invest in network security to protect advanced networks that users create with P2P software as they can have software-based vulnerabilities. By taking these preventative actions, you can prevent remote exploits, which are attacks that take advantage of the vulnerabilities in electronic systems to deny services or spread malware.
Invest in high-quality P2P software which is more resilient to remote exploits to set up your network.
Check your network regularly for malware.
Hope it helps! :-)