Greynet

Greynet

:"An an alternate use of the term, see network telescope‎"

Within the context of corporate and organizational networks, a greynet is an elusive networked computer application that is downloaded and installed on end user systems without express permission from network administrators and often without awareness or cognition that it is deeply embedded in the organization’s network fabric. These applications may be of some marginal use to the user, but inevitably consume system and network resources. In addition, greynet applications often open the door for end use systems to become compromised by additional applications, security risks and malware.

Examples

* Public instant messaging (AOL Instant Messenger, Windows Live Messenger, Yahoo! Messenger)
* Web conferencing (webcam, Voice Over IP (VoIP) Telephony
* Peer-to-Peer (P2P) file sharing clients
* Data processing SETI@Home
* Adware “utilities”
* Commercial spyware
* Keystroke logging

The Dynamics of Greynet Growth

As computer workstations have become connected to the Internet, a variety of programs have proliferated that offer the ability to extend communications, gather and deliver information, and to serve the needs of marketing concerns. Among the first to emerge were instant messaging clients such as ICQ, AOL Instant Messenger and MSN Messenger. Developments in technology have added video capability through webcam units, all of which have worked together to take advantage of available bandwidth in single, small network, and corporate environments.

The growth of greynets takes advantage of software and hardware developments. Informal networks are now appearing that provide a variety of streaming media and content that is supplied or modified by end users. An emerging category is "podcasting", in which users generate content for widespread download on portable MP3 players.

Problems with Greynet Programs

The problem with greynet programs is fourfold. First, greynet programs create network security risks by causing broad vectors for malware dissemination. Second, they create privacy issues for the network by opening large holes for information leakage. Third, greynet programs create compliance issues for a computer network by creating an invisible parallel communications network. Fourth, they create issues on local machines through the consumption of local system resources and possible operating system or program stability concerns. All of these things increase network and IT administration time and costs.

Added to this in the corporate work environment is the loss of meaningful production time due to non-work related distractions through these greynet applications. Individual network environment policies may vary from non-existent to a full lockdown of end user system privileges. See the "Risks and Liabilities" section of Instant Messaging for a more detailed overview of threats, risks, and solutions to those problems for the most prevalent of the greynet programs, public IM.

Dealing with the security aspects of greynets has led to the emergence of specific administrative software packages that monitor and control traffic, as well as the enhancement of security suites and adware clients.

Security and Monitoring

Among the first and most prevalent of the specific administrative software packages were products that secure networks against threats borne by IM and P2P networks. These products were first introduced in 2002, and now protect 10% to 15% of U.S. corporations.

References

*cite news
date= April 12, 2007
title = Instant messaging threats become more sophisticated
publisher = SearchVoIP.com
author = Dostart, Kate
url = http://searchvoip.techtarget.com/originalContent/0,289142,sid66_gci1251213,00.html

*cite news
date= November 10, 2006
title = Greynets Getting Greyer
publisher = internetnews.com
author = Kerner, Sean Michael
url = http://www.internetnews.com/ent-news/article.php/3643356

*cite news
date=August 2, 2005
title = Spyware Skyrockets on Greynet Fuel
publisher = internetnews.com
author = Joyce, Erin
url = http://www.internetnews.com/ent-news/article.php/3524541


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • OpenSIGLE — The OpenSIGLE repository provides open access to the bibliographic records of the former SIGLE database. The creation of the OpenSIGLE archive was decided by some major European STI centres, members of the former European network EAGLE for the… …   Wikipedia

  • Gray literature — (or grey literature) is a field in library and information science. The term is used variably by the intellectual community, librarians, and medical and research professionals to refer to a body of materials that cannot be found easily through… …   Wikipedia

  • Littérature grise — Sommaire 1 Définitions 1.1 Définition de l AFNOR 1.2 Définition de Luxembourg 2 Volumétrie …   Wikipédia en Français

  • Graue Presse — Als Graue Literatur bezeichnet man in der Bibliothekswissenschaft Bücher und andere Publikationen, die nicht über den Buchhandel vertrieben werden. Diese Veröffentlichungen werden häufig von Vereinen, Organisationen oder ähnlichem herausgegeben.… …   Deutsch Wikipedia

  • Litterature grise — Littérature grise La littérature grise est, selon l AFNOR, tout « document dactylographié ou imprimé, produit à l intention d un public restreint, en dehors des circuits commerciaux de l édition et de la diffusion et en marge des dispositifs …   Wikipédia en Français

  • Littérature Grise — La littérature grise est, selon l AFNOR, tout « document dactylographié ou imprimé, produit à l intention d un public restreint, en dehors des circuits commerciaux de l édition et de la diffusion et en marge des dispositifs de contrôle… …   Wikipédia en Français

  • Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… …   Wikipedia

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • List of amateur radio organizations — Amateur radio organizations have been important from the earliest days of radio communications. In the early days, there was a very pragmatic reason for this. Amateur radio stations did not have a very wide range, so messages would often have to… …   Wikipedia

  • Network telescope — A network telescope (also known as a darknet, Internet motion sensor or black hole[1]) is an Internet system that allows one to observe different large scale events taking place on the Internet. The basic idea is to observe traffic targeting the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”