Please answer the below students discussion Board response, you will act as the network administrator. Suggest some other network security protocols that will be used to protect data on the network and explain why they would work better. Telnet is not secure. It’s advised to be used at least alongside Secure Shell, otherwise known as SSH (Arias, 2016). “Telnet data is sent in plain text in contrast to SSH, which encrypts the data” (Arias, 2016). Telnet does not offer a “secure connection from the host to the router” (Arias, 2016). This means that all the data could be easily read and is not protected. “Anyone with access to the TCP/IP packet flow between the communicating hosts can reconstruct the data that flows between the endpoints and read the messaging, including the user names and passwords that are used to log in to the remote machine” (SSH.com, n.d.). It is very dangerous for a company to have no security, especially when it comes to passwords and log in credentials. One of the worst parts about this is that this kind of attack “requires very little expertise and can be performed with network debugging tools that are readily available” (SSH.com, n.d.). It would be easy for someone to attempt this kind of network attack, and easy for them to get information because Telnet is that insecure on its own. It should at least be supported by SSH which will give it some encryption and security. Being able to remotely access network equipment is crucial to managing network devices (Arias, 2016). It’s also important because it supports “daily operational tasks” (Arias, 2016), including “creating and removing VLANs” (Arias, 2016) and “shutting down or enabling interfaces” (Arias, 2016).
Approximate price: $22
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
network security protocols DB response
Never use plagiarized sources. Get Your Original Essay on
network security protocols DB response
Hire Professionals Just from $11/Page