Free Essay

Information

In:

Submitted By nalapatkarthik
Words 1400
Pages 6
Information Assurance and Security Nick Rosasco

Karthikreddy Nalapatla
3884252

What is a Port Number A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. For the transmission control protocol and the user Datagram protocol, a port number is a 16 bit integer that is put the header appended to a message unit. This port number is passed logically between the client and the server transport layers and physically between the transport layer and the Internet Protocol layer and it will forward it on to the other layers. For an example, a request from a client to a server on the internet may request a file to transfer from the host File Transport Protocol (FTP) server. In order to pass that request which is passed by us to the FTP in the remote server, the Transmission Control Protocol (TCP) identifies the port number which is of 16 bit length, then that port will forward the request to the FTP Server.
FTP and the FTP Port Number The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to the other host over a TCP – based network, for an example Internet. FTP is a Client – server architecture and uses a separate control and the data connections between the client and the server. The model of the FTP is shown below.

Fig 1: File Transport Protocol Model Executing an FTP port connection through a client is two – stage process requiring the use of two different ports. Once the user enter the name of the server and the login details in the authorization fields of the Client FTP, the FTP connection will be established and the FTP control port will get opened, by default the FTP uses the Port number 21 for sending the commands and then the second connection to the server will be made by the client, which will be followed by the FTP server from the port for sending of the data, by default for the sending of the data FTP uses the port number 20.
Functionality of Port 20 and Port 21 TCP and IP are the two major protocols on which the internet runs very smoothly. Where the TCP manages data to Transfer and while the IP directs the traffic to the internet address. FTP is an underling of the TCP and the shuttles files back and forth between the FTP Server and the FTP Client. Because FTP requires two ports 20 and port 21 to be open to exchange the large files of the information. As the clients make a TCP control connection to the FTP server port 21 which will be remained opened during the transport process. The FTP server opens a second connection that is the data connection from the server port 20 to the client system. If a client encounters a problem when connecting to the FTP server, the first thing we need to check is the FTP data transfer mode. Depending on certain network configuration, this mode should be either active or passive.
Active Mode of FTP Among the two modes of FTP, the active mode when the user connects from a random port on the FTP client to port 21 on the server, it sends the PORT command, specifying what the client – side port of the server should be connected too and this port will be used later on for the data channel. And now the server connects from the port 20 to the client port and designated for the data channel. Once the connection is established, file transfers are then the made through the client and the server ports.

Fig 2: Active Mode of the FTP Channel
Passive Mode of FTP In the passive mode client connects from a random port 21 on the server and issues the PASV command. The server replies and indicates that port it has opened for the data transfer. And now the client connects from the random port to the random port which has been specified in the server’s response. Once the connection is established, the data transfer is made through this client and the server ports. The better understanding of the passive port can be know from the following fig.

Fig 3: Passive Mode of the FTP
Security Issues with the FTP There is no doubt that FTP is an Simple and easy to understand but it has its own concerns when it comes to the Security issues, most of the Hackers thinks that it’s very easy to get into the FTP models. The some issues with the FTP is as follows. * Packet Capture
The data transfer with the FTP is in the clear text, any of the sensitive information such as usernames and the passwords can be easily read in the network packet capture techniques such as packet sniffing. A packet sniffing is like a computer program which can capture the transmitted data packets and decodes the packets data and exposes what is contained in the various fields of the packets. * Port Stealing
When the operating system assign a dynamic port numbers in the particular order or in the pattern, the attackers can easily decode the pattern and identify the next port number which will used. And the attacker have an illegal access into the ports and its port numbers.
Impact on the services in the term of CIANA * Integrity : For every service which transfer the data, integrity plays a major role in the sending the data between the client server and the host server, but the security issue with the FTP port 20 and port 21 gives an serious impact on the service, because of its failure to secure the Firewall. Which is a serious security concern of the FTP. The best way of providing the integrity to the FTP is to provide some serious Firewall settings which prevents the other ports to connect into the network. * Availability: FTP is very easy to configure and understand the process of the transmitting the data from client end to the host end. There are many private and public sector companies still using the FTP ports for transmitting the data, but the security issue of the TROJANS are showing the serious impact on the availability. The traojan can be used to escalate privileged and cause some major security issues like Blade runner, EvilFTP and the FORE, Larva. * Confidentiality: In any of the model the confidentiality is important but there is a serious concern on the confidentiality when we use an FTP PORT 20 and 21, by using an packet capture are by using the port stealing an attacker can steal the data of the user and can access the data illegally, so there is no confidentiality in the network. We can overcome this confidentiality by updating the FTP to the MFT which provides more security to the system, as it carry out the ad hoc file transfer and we can monitor the file transfer process in the real time. Which gives a lot of confidentiality to the system and the end user can feel secure about the information which the user is getting.

Conclusion Although the FTP system is very easy to understand and also which makes the life easier for the users to transfer the data, but there are some serious security concerns which one has to look at and we need to update the system. In my few by using the MFT we can overcome most of the security issues which are provided by the FTP and its ports.

References 1. Oh, S. (n.d.). File Transfer and Access. Retrieved February 23, 2015, from http://www.csun.edu/~jeffw/Semesters/2006Fall/COMP429/Presentations/Ch25-FTP.pdf 2. Egli, P. (n.d.). INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL. Retrieved February 23, 2015, from http://www.indigoo.com/dox/itdp/07_FTP-TFTP/FTP.pdf 3. Explanation of the FTP and SFTP protocols. (n.d.). Retrieved February 23, 2015, from http://www.wise-ftp.com/know-how/ftp_and_sftp.htm 4. Karrick, S. (n.d.). FTP PORT 21 1'FRIEND OR FOE" Retrieved February 23, 2015, from http://pen-testing.sans.org/resources/papers/gcih/ftp-port-21-friend-foe-support-cyber-defense-initiative-103422 “ I have neither given nor received nor I have tolerated others used of unauthorized aid”

Similar Documents

Free Essay

Information

...Health communication to important to ease anxiety of the patient, eliminate unneeded mistakes, and to allow everyone to know what is expected from them. Some major components of health communication include process, personal goals, independence, sensitivity, and shared meaning. When communication is defined as a process, it simply means that people are contributing to a constant effort to understand each other and the world around them. Analysts have noticed that clients address health encounters with a vicinity of goals and expectations. The leading goal of the caregivers is to care for or improve a person’s health, although most caregivers have other goals as well. Some of these goals include preserving time, avoiding frustration, and showing their comprehension. In addition, patients may have several goals including the need to express emotions, to be encouraged, to be forgiven, or even simply being recovered. In other words, how well participants feel their goals have been met is one measure of effective communication. Even though personal goals are important, the way others work together to arrange their goals and creating understandings is also important. By communicating in a friendly way, patients are more likely reveal scary or embarrassing worries. This can also lead others in a friendly direction. Office workers, family, and patients often influence health communication equally as doctors. Good communicators have the value of sensitivity. When being sensitive to other’s...

Words: 303 - Pages: 2

Premium Essay

Storing Information

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1219 - Pages: 5

Premium Essay

Using Information

...making takes place within the guidelines set by the strategic plan. Data and information Tactical information will be mostly internal with a few external sources being used. Internal information is likely to be function related: for example, how much ‘down time’ a production line must allocate for planned maintenance. Tactical information is used by middle management (employees) when managing or planning projects. The timescale is usually at least between 6 months and 5 years (depending on the scale of the strategic project). Circumstances vary but a small project may have a tactical timescale of between one and six months. Tactical plans have a medium level of detail and will be very specific; they deal with such matters as who is doing what and within what specific budgets and timescales. These plans have medium scope and will address details at the operational level. They will generally have specific objectives and be geared towards implementation by operational level employees. Operational information The lowest level is operational and operational planning takes place based on the tactical plans. The lowest level of management or workers in an organisation implements operational plans. These may be section leaders or foremen in a large organisation or workers such as shop assistants, waiting staff, and kitchen staff, etc., in smaller businesses where there is no supervisory layer. The timescale is usually very short, anything from immediately...

Words: 3073 - Pages: 13

Free Essay

Information Use

...Information Use It seems that information can make or break an organization. It can be sent through email, old fashioned paper documents or word of mouth. Information can produce important knowledge that can lead to responses that are necessary to realize whether a company is doing well or going down the drain. I hope to explain how information is used and how it flows through an organization well enough for you to understand within this paper. You can say that data and information do not have the same meaning although we use them interchangeably. When you receive data you have to put it through some steps in order for it to be considered information to be used by an organization or company. First you have to acquire the data. There are various ways to receive opinions of customers. This can be done by posting on social websites, emailing or having a customer respond to a survey after a telephone call with the corporation. After the data is received it has to be classified or identified. You can do this by choosing what types of data that needs to be classified such as account data, personal data or commercially valuable data. Another way to think of classifying data would be to have it broken into sections such as prohibited, restricted,00 confidential and unrestricted information. While classifying and identifying data it should meet certain confidentiality requirements. A plan must be put into place, maybe by a team, to sift through and find the desired data. The next...

Words: 846 - Pages: 4

Free Essay

Information Use

...Information Use Information Use Information can be used in a variety of ways in today’s world. Companies use it to track profits and losses others use it to see into future trends so they can make informed decisions about where their business should be in a certain market. According to Opara (2003) “Information is the life blood of modern organizations.” Without information organizations would be making decisions blind. Information in a modern organization flows in a circular motion. For an example of how a major car dealership uses information it gathers. A customer who is prospecting for a new vehicle enters a car dealership not sure of what kind of vehicle he or she may want. An associate greats the new customer and asks a few question to discover what the customer is looking for. This would be the input information that the associate will use to enter into an information system (IS) from this system the associate can help the customer choose what vehicle he or she may be looking for. The information is presented to the customer, after looking at the information the customer chooses a vehicle he or she wants to purchase. The associate inputs his or her personal information into an IS to qualify the customer for financing the vehicle. The information is used by the finance department to set up the financial obligation that the customer will have to pay. Once again the information is cycled back to the customer for his or her input. After the sale of the vehicle the information...

Words: 763 - Pages: 4

Premium Essay

Information Management

...the components of quality data? Answer1. The latest information technology dimensions has enabled to make diverse use of data and turning the raw data into meaningful information to extract the quality. Data can be referred to raw numbers, figures which are useless unless they are put into a form and converted into a useful information. A data is said to be effective when it is converted into useful form or rather can be used to provide some information. When the raw data which is numeric, figures is converted into meaningful information, it is said to be known as information which can be used to give the data a meaning. Data quality is defined by its usefulness. When the data offers accurate information regarding a person or an organization then it is said to be known as data quality. The components of data quality can be analyzed with the help of the following data elements: 1. Accuracy which defines how correct and precise is the data 2. Completeness, the comprehensiveness of data also defines the data quality 3. Timeliness, the timely updates on the data also ensures that the data is correct and free from any discrepancy 4. Relevancy, the data that is gathered should be relevant which defines the purpose and fulfills the use. It defines that the data gathered accomplish the purpose 5. The last element of data quality is its availability. It defines the availability of the data to have access to the information. The above five key elements ensures that the data...

Words: 955 - Pages: 4

Free Essay

Data Information

...Data and Information Summary HCI/520 11/18/2013 Data and Information Summary Today we live in a world where data is a critical resource. Information is also a critical resource and consists of data that is processed into meaningful information for the purpose of organizations and users. Collected data is stored into what is known as databases where it is organized into potentially valuable information. Data also known as Raw data is a stream of facts that are not organized or arranged into a form that people can understand or use (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008) . Raw Data are facts that have not yet been processed to reveal their meaning (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). For example when AT&T wireless ask their clients to participate in a survey about the products they have purchased or how was their customer service experience the data collected is useful but not until the raw data is organized by combining it with other similar data and analyzed into meaningful information. Information is the result of processing raw data to reveal its meaning (Coronel, Morris, & Rob, 2010). Data processing can be as simple as organizing data to reveal patterns or as complex as making forecasts or drawing inferences using statistical modeling (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). Both data and information are types of knowledge which share similarities...

Words: 538 - Pages: 3

Free Essay

Information Technology

...Information Systems in the Social Sciences I. Abstract Brief explanation of essay on the evaluation of positivist philosophical concepts of information systems (IS). II. Information Systems in the Social Sciences Collins, J. (2001). Good to great: Why some companies make the leap…and others don’t. New York, NY: HarperCollins Publishers. Collins discusses the field of information systems from a perspective that can relate to the scope and familiarity of organizational information technology perceptions. McLaren, T. S., Head, M. M., Yuan, Y., & Chan, Y. E. (2011). A multilevel model for measuring fit between a firm's competitive strategies and information systems capabilities. MIS Quarterly, 35(4), 909-A10. Supporting documentation towards information systems in the social sciences. III. Philosophical concepts in Information Systems Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261-292. Bagozzi discusses different kinds of knowledge practitioners and researchers in IS. Collins, J. (2001). Good to great: Why some companies make the leap…and others don’t. New York, NY: HarperCollins Publishers. Collins discusses the influences on business decisions and influences on leadership decisions. IV. Philosophical assumptions DeLuca, D., & Kock, N. (2007). Publishing information systems...

Words: 389 - Pages: 2

Premium Essay

Transforming Data Into Information

...into Information What is Data? What is information? Data is facts; numbers; statistics; readings from a device or machine. It depends on what the context is. Data is what is used to make up information. Information could be considered to be the same characteristics I just described as data. In the context of transforming data into information, you could assume data is needed to produce information. So information there for is the meaningful translation of a set of or clusters of data that’s produces an output of meaningful information. So data is a bunch of meaningless pieces of information that needs to be composed; analyzed; formed; and so forth to form a meaningful piece of information. Transforming Data Let’s pick a context such as computer programming. You need pieces of data to be structured and formed into something that will result in an output of something; a message, a graph, or a process, in which a machine can perform some sort of action. Well now we could say that information is used to make a product, make a computer produce something, or present statistical information. That would be the output of that data. The data would be numbers, words, or symbols. The information would be a message, a graph, or a process, in which a machine can perform some sort of action. Information Information could be looked at as data as well. Let’s say we need a chart showing the cost of a business expenses in relation to employee salaries. The data for showing the information is...

Words: 315 - Pages: 2

Premium Essay

Ups Information System

...Case summary: UPS has created its own information system with Delivery Information Acquisition Device (DIAD) and Web-based Post-Sales Order Management System (OMS) globally by using developed information technology. These special systems help the company to reduce the cost of transaction greatly. By building its efficient order information management system, UPS can make optimal routing strategy, place orders online, and track shipments to meet customer needs. These information systems guarantee the possibility of two-day delivery nationwide as well as lower warehousing and inventory costs for the company. Questions: 1. What are the inputs, processing and outputs of UPS’s package tracking system? Inputs: the inputs include package information, customer signatures, pickups, delivery and timecard information, and locations on each route. Processing: in the process of transactions, the data is transmitted to the information center and stored for retrieval. During the whole process, the data of shipped packages is available to be checked by drivers and tracked by customers. Outputs: mostly the same data as the inputs, including pickups, delivery times, locations of routes and package recipients. In addition, the outputs also include calculations of shipping rates to enable UPS customers to embed UPS functions, such as cost calculations, to their own websites. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? Technologies include...

Words: 494 - Pages: 2

Premium Essay

Managing Information

...MANAGING INFORMATION – CRITICAL EVALUATION OF RELEVANT ISSUES MODULE: MANAGING INFORMATION Table of Contents Sr. no. Contents Page no. 1. Introduction............................................................................................3 2. Definition of Information Systems...........................................................3 3. Information System as an Organizational and Management Solution.........3 4. Information Manager and Information System..........................................4 5. Environmental and Industrial Analysis.....................................................4 6. Recommended Information Systems for a Medium Sized Accountancy and Management Consultancy Firm........................................................5 6.1. Management Information System.............................................................5 6.2. Decision Support System..........................................................................6 6.3. Knowledge Management System..............................................................6 6.4. Transaction Support System.....................................................................6 6. Evaluation of Organizational, Technical and Management Aspects of the Information Systems Used.................................

Words: 3918 - Pages: 16

Premium Essay

Information Systems

...Information Systems and Software Applications Jessica Carson BIS/219 September 13, 2010 Julie Johnston Information Systems and Software Applications Many operational departments work with information systems and software applications on a daily basis. Software applications make the organization of data for many departments more readily available. The accounting department for instance has accounting software applications that help to perform everyday accounting also organizing the company’s accounting information in a readily accessible form (Pearlson & Saunders, 2006). In the management department, the operational mangers can use a number of applications for many different tasks like organization, scheduling, or production of the department (Pearlson & Saunders, 2006). The human resources department uses information systems to keep employee file confidential and software applications to maintain the employee files. The application systems allow the department to organize employee files which enable the department to track employee training, hiring, as well as termination (Pearlson & Saunders, 2006). The accounting department uses the software applications to help in preparing payroll, accounts payable, account receivable, and providing customer invoicing. The applications used in the accounting department have to communicate with each other to keep the information accurate. The applications also have to share information with other information systems throughout...

Words: 445 - Pages: 2

Premium Essay

Information in Business

...Information in Business Darrin L Palmer University of Phoenix CIS/207 - Erickson In business word wide the use of information technology systems is what keeps a business functioning properly. Every business holds a substantial amount of information that they must learn to sort, utilize and store efficiently. Everything a business does in their day to day operations requires the use of both information and technology. Payments, employee information, records, client information, all of this must be processed, stored, organized and analyzed for later use in the business. For example, at the end of a year businesses will need to pull old records and reports so that they can make predictions for future profit and pay their taxes to the government. Records may be pulled to set new sales goals and pay employees accordingly. Technology and information management is the back bone of any business. At my place of work, Nextiva, a VoIP provider we use various information technology systems to process, organize, store and analyze the information we use on a day to day basis. The first system used is our intranet, called NextOS. The NextOS Intranet portal is an internal network in which employees can find information needed to run the day to day operations, and also houses the configuration side of our customers accounts, as well as the customers user settings and devices on their side also. Then we have the screen connect client, which is used to remote into our clients and...

Words: 713 - Pages: 3

Free Essay

The Information Systems

...Information systems collects, processes, stores, analyzes, and disseminate information for a specific purpose. A computer-based information system (CBIS) is an information system that uses computer technology to perform some or all of its intended tasks. Not all information systems are computerized, but these days most are. The information technology (IT) architecture and IT infrastructure provide the basis for all information systems in the organization. The components of information systems are as follows; hardware is a device such as a processor, monitor, keyboard, and printer which they accept data and information, process them and then display them. Next is software program or collection of programs that enables the hardware to process the information. Then the database is a collection of related files or tables containing data. Finally, a network is a connecting system (wireless or wireline) that allows different computers to share resources. Two organizational departments in a business are business intelligence (BI) systems and transaction processing system (TPS). Business intelligence (BI) systems provide computer-based support for complex, non-routine decisions, primarily for middle managers and knowledge workers. (They also support lower-level managers, though to a lesser extent.) These systems are used with a data warehouse and allow users to perform their own data analysis (Wiley-Rainer). A transaction processing system (TPS) supports the monitoring, collection...

Words: 320 - Pages: 2

Premium Essay

Information Flows in Organization

...Information Flows in Organizations In today technological era, information technology (IT) applications have taken over the communications of business collaborations, industry operations, and customer connection. Corporate data are essential to organization's survival rate since these are decisive factors in maintaining their competitiveness on the market. Even for companies in non-Internet industries, they still need assistance from network capabilities for communication and collaboration. Information flow determined the daily operation flow within a company. Depending on the field that the organization falls into, these data can be internal, external, or both. By digitalized most of the physical documents, it is also important to enforce necessary security in order to protect essential information of the organizations and their clients. Due to the enormous amount of information collected on a daily basis, organizations tend to struggle to manage the high volume of physical documents without the help of IS database storage. Databases reduce the amount of physical documents by storing the information in a systematic way. The Information are collected from marketing, sales, customer connectivity, supply chain inventory and external data. These information provides a closer look at the status of the business's standing. The information comes in huge clumps. In order to crunch through the huge datasets, we rely on huge data management vendors whom are working as database warehouse...

Words: 1040 - Pages: 5