- Greynet
:"An an alternate use of the term, see
network telescope "Within the context of corporate and organizational networks, a greynet is an elusive networked computer application that is downloaded and installed on
end user systems without express permission fromnetwork administrator s and often without awareness or cognition that it is deeply embedded in the organization’s network fabric. These applications may be of some marginal use to the user, but inevitably consume system and network resources. In addition, greynet applications often open the door for end use systems to become compromised by additional applications, security risks andmalware .Examples
* Public
instant messaging (AOL Instant Messenger ,Windows Live Messenger ,Yahoo! Messenger )
*Web conferencing (webcam, Voice Over IP (VoIP ) Telephony
* Peer-to-Peer (P2P) file sharing clients
*Data processing SETI@Home
*Adware “utilities”
* Commercialspyware
*Keystroke logging The Dynamics of Greynet Growth
As computer
workstations have become connected to theInternet , a variety of programs have proliferated that offer the ability to extend communications, gather and deliver information, and to serve the needs ofmarketing concerns. Among the first to emerge wereinstant messaging clients such asICQ ,AOL Instant Messenger and MSN Messenger. Developments in technology have added video capability throughwebcam units, all of which have worked together to take advantage of available bandwidth in single, small network, and corporate environments.The growth of greynets takes advantage of software and hardware developments. Informal networks are now appearing that provide a variety of streaming media and content that is supplied or modified by end users. An emerging category is "
podcast ing", in which users generate content for widespread download on portableMP3 players.Problems with Greynet Programs
The problem with greynet programs is fourfold. First, greynet programs create
network security risks by causing broad vectors formalware dissemination. Second, they create privacy issues for the network by opening large holes for information leakage. Third, greynet programs create compliance issues for a computer network by creating an invisibleparallel communications network. Fourth, they create issues on local machines through the consumption of local system resources and possibleoperating system or program stability concerns. All of these things increase network and IT administration time and costs.Added to this in the corporate work environment is the loss of meaningful production time due to non-work related distractions through these greynet applications. Individual network environment policies may vary from non-existent to a full lockdown of end user system privileges. See the "Risks and Liabilities" section of
Instant Messaging for a more detailed overview of threats, risks, and solutions to those problems for the most prevalent of the greynet programs, public IM.Dealing with the security aspects of greynets has led to the emergence of specific administrative software packages that monitor and control traffic, as well as the enhancement of
security suites andadware clients.Security and Monitoring
Among the first and most prevalent of the specific administrative software packages were products that secure networks against threats borne by IM and P2P networks. These products were first introduced in 2002, and now protect 10% to 15% of U.S. corporations.
References
*cite news
date= April 12, 2007
title = Instant messaging threats become more sophisticated
publisher = SearchVoIP.com
author = Dostart, Kate
url = http://searchvoip.techtarget.com/originalContent/0,289142,sid66_gci1251213,00.html
*cite news
date= November 10, 2006
title = Greynets Getting Greyer
publisher = internetnews.com
author = Kerner, Sean Michael
url = http://www.internetnews.com/ent-news/article.php/3643356
*cite news
date=August 2, 2005
title = Spyware Skyrockets on Greynet Fuel
publisher = internetnews.com
author = Joyce, Erin
url = http://www.internetnews.com/ent-news/article.php/3524541
Wikimedia Foundation. 2010.