Page 27 - CA_165_V2.0_Flipbook
P. 27
To connect or login to a networked computer, modem and remote access software are connected to
the network. The remote access software dials in directly to the network server.
SSH Protocol
The SSH (Secure Shell) protocol establishes secured remote login and secured transfer of data. It provides
strong authentication and protects communication with strong encryption. It is a secured alternative
to the non-protected remote login protocols (such as telnet, rlogin) and insecure file transfer protocol
(such as FTP).
SFTP
SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol. It inherits
the complete security and authentication functionality of SSH.
SFTP has replaced FTP as it proves to be more secure and reliable protocol which can also be easily
configured. SFTP also protects against password sniffing. It protects the integrity of the data with
the help of different encryption techniques. Some of the differences between HTTP and HTTPS are
as follows:
FTP SFTP
File Transfer Protocol, often called ‘Plain FTP’. SSH File Transfer Protocol, often called ‘Secure FTP’.
Clear-text password sent over the network. Password and Data Transfer is encrypted.
Typically runs over TCP port 21. Typically runs over TCP port 22.
SCP
Secure Copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a
local host to a remote host. It works on the Secure Shell (SSH) protocol technique. The term ‘Secure Copy’
refers to either the SCP protocol or the SCP program. The SCP protocol has been mostly superseded by
the more comprehensive SFTP protocol.
Telnet
Telnet stands for Teletype Network. It is a networking protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote management but also
for initial device setup like network hardware. Telnet was conceptualised in 1969 and standardised as one
of the first Internet standards by the Internet Engineering Task Force (IETF). Telnet does not employ any
form of encryption as it was developed before the mainstream adaptation of the Internet.
SERVICES AVAILABLE ON THE INTERNET
There are various services on the Internet. Let us learn about some of them in detail.
Search Engine
A search engine is an information retrieval tool that helps to find any type of information that exists on
WWW/Internet.
Networking 25

