2. FTP refers to the File Transfer Protocol, one of the
protocols within the TCP/IP protocol suite used on the
Internet. The File Transfer Protocol makes it possible to
transfer files from one computer (or host) on the
Internet to another.
A user of an FTP program must log in to both hosts in
order to transfer a file from one to the other.
3. To promote sharing of files (computer
programs and/or data)
To encourage indirect or implicit use of remote
computers (via programs)
To shield a user from variations in file storage
systems among hosts
To transfer data reliably and efficiently
4. Manual File Transfer
File Transfer via e-mail
File Transfer via HTTP
File Transfer via Anonymous/WU-FTP
File Transfer via SFTP / SCP
5. Through Floppy Disk.
Through CD/DVD
Through Tape
Through Zip Drive
Through USB Drives
Through Hard disk.
6. Incompatibility of Media
Limited capacity of Media
If the media is lost, misplaced or damaged the
data is gone. If lost or misplaced, the data could
be readily accessible to the finder.
Physical Access of source and destination
systems are required.
7. Even though it is an old method of file transfer it is
very secure through the trustees.
Since the data is not transferred through the wire there
is no possibility of cyber attack like (Packet sniffing,
Man in the middle, hijacking, eavesdropping on the
network, etc.)
This can be very useful for top secret data transfer.
8. Mostly insecure unless the data is specifically encrypted.
Requires third party mail server where copy of information is
stored.
Very high probability of delivery to unintended recipients or
getting lost on the network.
No control over destination directory. Require user intervention to
store the document to a specific folder
Highly vulnerable to man in the middle attack or session hijacking
attack.
Extremely common and preferred method of spreading viruses.
Severe limitation on the size and number of files being
transferred.
9. Very easy and economical way to transfer files. Even
non technical users can easily transfer files.
Files can be sent in an encrypted manner if needed.
As compared to manual method of file transfer this
method is extremely fast.
If the data is not confidential then this is the best way
to transfer between personal users.
10. Anonymous FTP is a means by which archive sites
allow general access to their archives of information.
These sites create a special account called "anonymous“
or “ftp”.
User "anonymous" has limited access rights to the
archive host, as well as some operating restrictions.
Generally, the only operations allowed are logging in
using FTP, accessing and listing the contents of a
limited set of directories, storing and retrieving files.
11. The user name and password are universally known.
When connecting to the FTP server the sent data can be
’kidnapped’ to a foreign computer with the result that
they will never arrive at the specified target computer.
From the foreign computer data can be transferred to
the actual computer as well as existing data can be
viewed and edited. This can be a great danger for
companies transferring inhouse information!
12. This method satisfies the diverse needs of a
large population of users with a simple, and
easily implemented protocol design.
Anonymous FTP can be a valuable service if
correctly configured and administered.
13. Login Authorization : The basic FTP protocol
does not have a concept of authentication.
Data Channel Encapsulation : Data transferred
is directly visible.
14. More affectionately known as WU-FTPD ,
Developed by Washington University.
WU-FTPD is the most popular ftp daemon on
the Internet, used on many anonymous ftp sites
all around the world.
15. The username and password are still sent in
clear text and it is easy to steal the password.
Data is also transmitted in clear text and highly
vulnerable to man in the middle attack.
16. Allows user authentication through distinct
user name and password.
You can define the role of the user on a
particular folder of a particular server / host.
17. SFTP stands for ‘Secure File Transfer Protocol’.
The Secure File Transfer Protocol provides
secure file transfer functionality over any
reliable data stream. It uses SSH.
18. SFTP protocol runs on secure channel.
Encrypts all traffic (including passwords) to
effectively.
Provides variety of authentication methods.
It can be automated by public and private key
authentication.
19. SFTP protocol is designed to provide primarily
file transfer, but it also provides general file
system access on the remote server - in a secure
manner.
Can be intentionally misused