Network security protocols db response

  

Please answer the below students discussion Board response, you will act as the network administrator.  Suggest some other network security protocols that will be used to protect data on the network and explain why they would work better.

 Telnet is not secure. It’s advised to be used at least alongside Secure Shell, otherwise known as SSH (Arias, 2016). “Telnet data is sent in plain text in contrast to SSH, which encrypts the data” (Arias, 2016). Telnet does not offer a “secure connection from the host to the router” (Arias, 2016). This means that all the data could be easily read and is not protected. “Anyone with access to the TCP/IP packet flow between the communicating hosts can reconstruct the data that flows between the endpoints and read the messaging, including the user names and passwords that are used to log in to the remote machine” (SSH.com, n.d.). It is very dangerous for a company to have no security, especially when it comes to passwords and log in credentials. One of the worst parts about this is that this kind of attack “requires very little expertise and can be performed with network debugging tools that are readily available” (SSH.com, n.d.). It would be easy for someone to attempt this kind of network attack, and easy for them to get information because Telnet is that insecure on its own. It should at least be supported by SSH which will give it some encryption and security. Being able to remotely access network equipment is crucial to managing network devices (Arias, 2016). It’s also important because it supports “daily operational tasks” (Arias, 2016), including “creating and removing VLANs” (Arias, 2016) and “shutting down or enabling interfaces” (Arias, 2016). 

Get 20% Discount on This Paper
Pages (550 words)
Approximate price: -

Try it now!

Get 20% Discount on This Paper

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Australia Assessments has gained an international reputation of being the leading website in custom assignment writing services. Once you give us the instructions of your paper through the order form, we will complete the rest.

Essays

Essay Writing Services

As we work towards providing the best custom assignment services, our company provides assignment services for any type of academic essay. We will help you develop professionally written essays that are rich in content and free from plagiarism.

Admissions

Admission and Business Papers

Our skilled team of professional writers will ensure that we help you craft a remarkable admission essay for your desired Master's program in your institution of choice. We won't stop there. Once you enter the job market, we will be available to secure you a position at your desired worksite by creating an outstanding portfolio or resume.

Editing

Editing and Proofreading

Our editorial team is always available for all editing and proofreading services. They check completed papers by our writers and also provide professional opinions to papers completed by our clients.

Coursework

Technical papers

We harbor professional academic writers with different qualifications in diverse academic fields. As such, we are capable of handling both simple and technical papers. Ensure that you provide us with correct and complete instructions in the order form.