ITS315 module 2 discussion

.docx

School

Colorado State University, Global Campus *

*We aren’t endorsed by this school

Course

315

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by JudgeSnow11362

Greetings, class! When we talk about ports and port numbers, we are referring to Layer 4 of the OSI model, which is the transport layer. One of its functions is selecting the appropriate port number for effective communication between the application being used and the server. The types of ports companies use are crucial because confidential data is often transmitted through them. Using unsecured ports can expose the company to the risk of cyber-attacks and the leakage of sensitive information. Telnet is an old port created before the internet, in 1969 (PowerCert Animated Videos, 2020). Because of its age, the information transmitted through it is not encrypted and can be intercepted by cybercriminals. Imagine sending customers' personal information, such as their names, dates of birth, or social security numbers, through Telnet – that would constitute a serious data breach for a corporation. Secure Shell can perform all the functions of Telnet but provides encryption to protect sensitive data. Therefore, using Secure Shell would be a safer and more responsible way for corporations to communicate. References: CertBros. (2020, May 19). Port Numbers Explained | Cisco CCNA 200-301. YouTube. https://www.youtube.com/watch?v=RDotMcs0Erg PowerCert Animated Videos. (2020, March 12).Telnet vs SSH Explained. YouTube.https://www.youtube.com/watch?v=tZop-zjYkrU Hello Daniel, It is crucial for companies to have constant monitoring of TCP/IP ports to prevent unauthorized access into the system. Your point about port 22 being a common IP port that can be exploited by attackers to gain access to a vulnerable application or network is particularly noteworthy. Additionally, the risk of hackers leaking Secure Shell keys and credentials through port 22 emphasizes the need for companies to be aware of these vulnerabilities and take necessary precautions. Thank you for sharing your insights on this topic. Good Job!
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help