[go: up one dir, main page]

0% found this document useful (0 votes)
10 views3 pages

Cyber Exp 1

The document outlines various protocols including FTP, HTTP/HTTPS, SSH, Telnet, and TCP, detailing their advantages, disadvantages, and uses. FTP is simple but insecure, while HTTP is foundational but lacks security, which HTTPS addresses with encryption. SSH offers secure remote access, Telnet is outdated due to security flaws, and TCP ensures reliable data delivery but with higher overhead.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Cyber Exp 1

The document outlines various protocols including FTP, HTTP/HTTPS, SSH, Telnet, and TCP, detailing their advantages, disadvantages, and uses. FTP is simple but insecure, while HTTP is foundational but lacks security, which HTTPS addresses with encryption. SSH offers secure remote access, Telnet is outdated due to security flaws, and TCP ensures reliable data delivery but with higher overhead.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

EXPERIMENT - 1

VARIOUS PROTOCOLS WITH THEIR ADVANTAGES,


DISADVANTAGES AND USES

File Transfer Protocol (FTP)

Advantages:

Simple and widely supported for transferring files between systems.

Allows for bulk file transfers and directory operations.

Disadvantages:

Data, including usernames and passwords, is sent in plaintext, making it vulnerable to


interception and attacks.

Lacks built-in encryption, leading to significant security risks.

Uses:

Transferring files between computers on a network.

Used in web development for uploading website files to servers.

Often replaced by more secure alternatives like SFTP or FTPS for sensitive data transfers

Hypertext Transfer Protocol (HTTP) / HTTP Secure (HTTPS)

Advantages:

HTTP is the foundation of data communication for the World Wide Web.

HTTPS adds encryption (via SSL/TLS), protecting data in transit from eavesdropping and
tampering.

HTTPS is now the standard for secure web browsing.

Disadvantages:

HTTP alone is insecure, transmitting data in plaintext.


HTTPS requires certificate management and can introduce extra overhead.

Uses:

HTTP: Browsing websites, accessing web resources.

HTTPS: Secure web browsing, online banking, e-commerce, and any application requiring
confidentiality and integrity.

Secure Shell (SSH)

Advantages:

Provides encrypted, secure remote access to servers and network devices.

Supports secure file transfers (SCP, SFTP) and tunneling/port forwarding.

Strong authentication mechanisms.

Disadvantages:

Can be complex to configure and manage securely.

If credentials are compromised, attackers can gain deep system access.

Uses:

Remote server administration.

Secure automation of system tasks.

Secure file transfer and tunneling over untrusted networks.

Telnet

Advantages:

Simple protocol for remote command-line access.

Useful for basic network connectivity testing.

Disadvantages:

Transmits all data, including credentials, in plaintext.


Lacks encryption and is highly vulnerable to interception.

Mostly deprecated due to security weaknesses.

Uses:

Legacy systems requiring remote access.

Occasionally used for testing open ports or basic network troubleshooting, but not
recommended for production use.

Transmission Control Protocol (TCP)

Advantages:

Reliable, connection-oriented protocol ensuring data is delivered in order and without


errors.

Provides flow control and retransmits lost packets for robust communication.

Disadvantages:

Higher overhead and latency compared to connectionless protocols.

Not ideal for real-time applications where speed is more critical than reliability.

Uses:

Web browsing (HTTP/HTTPS), email (SMTP, IMAP, POP3), file transfers (FTP), and other
applications requiring reliable data delivery.

You might also like