Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Please answer the below students discussion Board response, you will act as the network administrator. Suggest some other network security protocols that will be used to protect data on the network
Please answer the below students discussion Board response, you will act as the network administrator. Suggest some other network security protocols that will be used to protect data on the network and explain why they would work better.
Telnet is not secure. It’s advised to be used at least alongside Secure Shell, otherwise known as SSH (Arias, 2016). “Telnet data is sent in plain text in contrast to SSH, which encrypts the data” (Arias, 2016). Telnet does not offer a “secure connection from the host to the router” (Arias, 2016). This means that all the data could be easily read and is not protected. “Anyone with access to the TCP/IP packet flow between the communicating hosts can reconstruct the data that flows between the endpoints and read the messaging, including the user names and passwords that are used to log in to the remote machine” (SSH.com, n.d.). It is very dangerous for a company to have no security, especially when it comes to passwords and log in credentials. One of the worst parts about this is that this kind of attack “requires very little expertise and can be performed with network debugging tools that are readily available” (SSH.com, n.d.). It would be easy for someone to attempt this kind of network attack, and easy for them to get information because Telnet is that insecure on its own. It should at least be supported by SSH which will give it some encryption and security. Being able to remotely access network equipment is crucial to managing network devices (Arias, 2016). It’s also important because it supports “daily operational tasks” (Arias, 2016), including “creating and removing VLANs” (Arias, 2016) and “shutting down or enabling interfaces” (Arias, 2016).