V-6357 | Medium | Peer to Peer clients or utilities are installed. | File-sharing utilities and clients can provide the ability to share files with other users (Peer-to-Peer Sharing). This type of utility is a security risk due to the potential risk of loss of... |
V-6356 | Medium | Public instant message clients are installed. | Instant Messaging or IM clients provide a way for a user to send a message to one or more other users in real time. Additional capabilities may include file transfer and support for distributed... |
V-6355 | Medium | An appropriate backup strategy does not exist for the data. | Data integrity and availability are key security objectives. Adequate data backup is one strategy that is crucial to meeting these objectives. Although users of desktop applications may not be... |
V-6879 | Medium | Open-restricted File Type Properties | For some file types, providing the user an opportunity to cancel the opening of the file provides adequate protection for most environments. Files that are opened with applications that include... |
V-6878 | Medium | Execution Restricted File Type Properties | For certain file types, it is necessary to take steps to ensure that the default method of opening the file does not allow mobile code to be executed. Two techniques to achieve this goal are... |