TITLE

FTP: The Overlooked Achilles Heel

AUTHOR(S)
Johnson, Arne
PUB. DATE
March 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p108
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the risk in transporting or storing electronic data via File Transfer Protocol (FTP). FTP is described like a car without seatbelts, offering nothing beyond the basic transportation of the data. It demonstrates that it could be taken for granted and become subject to carelessness. Several scenarios depicting FTP data breaches are elaborated.
ACCESSION #
31203040

 

Related Articles

  • Transferring Files Securely. McElhearn, Kirk // Macworld;Oct2008, Vol. 25 Issue 10, p86 

    The article offers tips on how one can transfer confidential files securely while traveling. If one is traveling, there are many ways he or she can get it are e-mail, iDisks, and online file services such as SendThisFile or YouSendIt. But these file-transferring tools are not secure for...

  • FTP has security holes. Johnston, Margaret // Network World;04/16/2001, Vol. 18 Issue 16, p14 

    Reports on security flaws discovered in the File Transfer Protocol server software of three vendors. Serious failures attributed to the vulnerabilities; Initiatives of vendors to patch up the vulnerabilities of their server software.

  • Large File Transfer.  // International Journal of Micrographics & Optical Technology;2008, Vol. 26 Issue 1/2, p3 

    The article reports on the launching of the Proofpoint Secure File Transfer by the Proofpoint, Inc. in the U.S. The author stated that the Proofpoint Secure File Transfer enables end users to send large files quickly and easily, while minimizing the impact of large attachments on their...

  • External Data Feeds: The New Web Of Trust. Osmanoglu, T. Ertem; Schramm, John R.; Mitchell, Michael C. // Business Communications Review;Jun2002, Vol. 32 Issue 1, p55 

    Examines the capabilities and limitations of common data transfer alternatives available for companies to maximize their investment in data transmission. Discussion on encrypted media, such as tapes, compact discs, and cartridges; Objectives of file transfer protocol (FTP); Availability of FTP...

  • A Segment-Based SACK Scheme for TCP Over the Error-Prone Links. Cui, Lin; Cui, Xin; Lee, Woo // Wireless Personal Communications;Nov2011, Vol. 61 Issue 2, p383 

    The TCP Selective ACK (SACK) is used to notify information on the sequence space of the receiving buffer to the sender. By definition of RFC 2018, however, each SACK block has to be described by the two 32-bit unsigned integers, which may introduce significant extra load in the reverse ACK path...

  • Client secures file transfers. Sturdevant, Cameron // eWeek;7/28/2003, Vol. 20 Issue 30, p51 

    The article reports on features added to file transfer protocol (FTP) facility provided by Ipswitch Inc. Ipswitch continues to polish its FTP client, making it a reliable choice for IT managers and a more secure utility for users who routinely transfer files. The tests showed that this was a...

  • DOCSIS Configuration File.  // Network Dictionary;2007, p159 

    A definition of the term "DOCSIS Configuration File" in networking is presented. It refers to the file containing configuration parameters for a Data Over Cable Service Interface Specification (DOCSIS) cable modem. Using the Trivial File Transfer Protocol, the cable modem obtains DOCSIS...

  • Simple Mail Transfer Protocol.  // Network Dictionary;2007, p442 

    An encyclopedia entry for "Simple Mail Transfer Protocol" is presented. It refers to a protocol designed to transfer electronic mails reliably and efficiently. The mail service is modeled after the File Transfer Protocol file transfer service. The protocol has the ability to transfer mail...

  • The Design of File Transfer Protocol Based on R2UDP in Digital Radio Narrowband System. Juan Zhang; Zhiyu Zhao; Hesong Jiang // Advanced Materials Research;2014, Issue 926-930, p2598 

    Reliability is very important in digital radio point to point transmission system, especially for bulk data transfer in narrow band channel. Aiming at currently most applications are based on raw UDP service which does not guarantee the reliability, the article presents R2UDP(Reduced Reliable...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics