SlideShare a Scribd company logo
1 of 19
 FTP refers to the File Transfer Protocol, one of the
protocols within the TCP/IP protocol suite used on the
Internet. The File Transfer Protocol makes it possible to
transfer files from one computer (or host) on the
Internet to another.
 A user of an FTP program must log in to both hosts in
order to transfer a file from one to the other.
 To promote sharing of files (computer
programs and/or data)
 To encourage indirect or implicit use of remote
computers (via programs)
 To shield a user from variations in file storage
systems among hosts
 To transfer data reliably and efficiently
 Manual File Transfer
 File Transfer via e-mail
 File Transfer via HTTP
 File Transfer via Anonymous/WU-FTP
 File Transfer via SFTP / SCP
 Through Floppy Disk.
 Through CD/DVD
 Through Tape
 Through Zip Drive
 Through USB Drives
 Through Hard disk.
 Incompatibility of Media
 Limited capacity of Media
 If the media is lost, misplaced or damaged the
data is gone. If lost or misplaced, the data could
be readily accessible to the finder.
 Physical Access of source and destination
systems are required.
 Even though it is an old method of file transfer it is
very secure through the trustees.
 Since the data is not transferred through the wire there
is no possibility of cyber attack like (Packet sniffing,
Man in the middle, hijacking, eavesdropping on the
network, etc.)
 This can be very useful for top secret data transfer.
 Mostly insecure unless the data is specifically encrypted.
 Requires third party mail server where copy of information is
stored.
 Very high probability of delivery to unintended recipients or
getting lost on the network.
 No control over destination directory. Require user intervention to
store the document to a specific folder
 Highly vulnerable to man in the middle attack or session hijacking
attack.
 Extremely common and preferred method of spreading viruses.
 Severe limitation on the size and number of files being
transferred.
 Very easy and economical way to transfer files. Even
non technical users can easily transfer files.
 Files can be sent in an encrypted manner if needed.
 As compared to manual method of file transfer this
method is extremely fast.
 If the data is not confidential then this is the best way
to transfer between personal users.
 Anonymous FTP is a means by which archive sites
allow general access to their archives of information.
 These sites create a special account called "anonymous“
or “ftp”.
 User "anonymous" has limited access rights to the
archive host, as well as some operating restrictions.
 Generally, the only operations allowed are logging in
using FTP, accessing and listing the contents of a
limited set of directories, storing and retrieving files.
 The user name and password are universally known.
 When connecting to the FTP server the sent data can be
’kidnapped’ to a foreign computer with the result that
they will never arrive at the specified target computer.
 From the foreign computer data can be transferred to
the actual computer as well as existing data can be
viewed and edited. This can be a great danger for
companies transferring inhouse information!
 This method satisfies the diverse needs of a
large population of users with a simple, and
easily implemented protocol design.
 Anonymous FTP can be a valuable service if
correctly configured and administered.
 Login Authorization : The basic FTP protocol
does not have a concept of authentication.
 Data Channel Encapsulation : Data transferred
is directly visible.
 More affectionately known as WU-FTPD ,
Developed by Washington University.
 WU-FTPD is the most popular ftp daemon on
the Internet, used on many anonymous ftp sites
all around the world.
 The username and password are still sent in
clear text and it is easy to steal the password.
 Data is also transmitted in clear text and highly
vulnerable to man in the middle attack.
 Allows user authentication through distinct
user name and password.
 You can define the role of the user on a
particular folder of a particular server / host.
 SFTP stands for ‘Secure File Transfer Protocol’.
The Secure File Transfer Protocol provides
secure file transfer functionality over any
reliable data stream. It uses SSH.
 SFTP protocol runs on secure channel.
 Encrypts all traffic (including passwords) to
effectively.
 Provides variety of authentication methods.
 It can be automated by public and private key
authentication.
 SFTP protocol is designed to provide primarily
file transfer, but it also provides general file
system access on the remote server - in a secure
manner.
 Can be intentionally misused

More Related Content

What's hot

Activity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesActivity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesKendrick Villanueva
 
Internet and services by Jaspinder Singh
Internet and services by Jaspinder SinghInternet and services by Jaspinder Singh
Internet and services by Jaspinder Singhsekhonkittu
 
Computer and application
Computer and applicationComputer and application
Computer and applicationGHASPHUS
 
web technology and soical networking
web technology and soical networking web technology and soical networking
web technology and soical networking Vijay Bansal
 
Different Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarDifferent Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarSivakumar R D .
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definationstangemjoy
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)AxelXrest
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPoojaWalia6
 
Semester 5 - Network Protocol
Semester 5 - Network ProtocolSemester 5 - Network Protocol
Semester 5 - Network ProtocolNur Aisyah Khor
 
Lecture no 2 resource sharing
Lecture no 2 resource sharingLecture no 2 resource sharing
Lecture no 2 resource sharingGokuldhev mony
 

What's hot (19)

Protocol
ProtocolProtocol
Protocol
 
Activity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesActivity 11 Common Online Terminologoies
Activity 11 Common Online Terminologoies
 
Internet technologies
Internet technologies Internet technologies
Internet technologies
 
Internet and services by Jaspinder Singh
Internet and services by Jaspinder SinghInternet and services by Jaspinder Singh
Internet and services by Jaspinder Singh
 
Giuzio angela
Giuzio angelaGiuzio angela
Giuzio angela
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Computer and application
Computer and applicationComputer and application
Computer and application
 
web technology and soical networking
web technology and soical networking web technology and soical networking
web technology and soical networking
 
INTERNET
INTERNETINTERNET
INTERNET
 
Different Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarDifferent Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.Sivakumar
 
Internet
InternetInternet
Internet
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Lecture+01
Lecture+01Lecture+01
Lecture+01
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet
InternetInternet
Internet
 
Semester 5 - Network Protocol
Semester 5 - Network ProtocolSemester 5 - Network Protocol
Semester 5 - Network Protocol
 
Web
Web Web
Web
 
Lecture no 2 resource sharing
Lecture no 2 resource sharingLecture no 2 resource sharing
Lecture no 2 resource sharing
 

Viewers also liked (20)

Getting started with AppArmor
Getting started with AppArmorGetting started with AppArmor
Getting started with AppArmor
 
Restful api modeling language
Restful api modeling languageRestful api modeling language
Restful api modeling language
 
Soap service
Soap serviceSoap service
Soap service
 
Bpm
BpmBpm
Bpm
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Jdbc drivers
Jdbc driversJdbc drivers
Jdbc drivers
 
EXtensible Markup Language
EXtensible Markup LanguageEXtensible Markup Language
EXtensible Markup Language
 
Multiplatform
MultiplatformMultiplatform
Multiplatform
 
Presentation of Tax
Presentation of Tax Presentation of Tax
Presentation of Tax
 
Seo
SeoSeo
Seo
 
Buissness model analysis
Buissness model analysisBuissness model analysis
Buissness model analysis
 
Soap
SoapSoap
Soap
 
Mule anypoint platform
Mule anypoint platformMule anypoint platform
Mule anypoint platform
 
Jsp
JspJsp
Jsp
 
Oracle real application_cluster
Oracle real application_clusterOracle real application_cluster
Oracle real application_cluster
 
Rest
RestRest
Rest
 
Leadership today
Leadership todayLeadership today
Leadership today
 
Health triangle
Health triangleHealth triangle
Health triangle
 
Mule fundamentals
Mule fundamentalsMule fundamentals
Mule fundamentals
 

Similar to File transfer methods

Respond to the statement below.One of the best protocols today for.pdf
Respond to the statement below.One of the best protocols today for.pdfRespond to the statement below.One of the best protocols today for.pdf
Respond to the statement below.One of the best protocols today for.pdfrufohudsonak74125
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolAmandeep Kaur
 
香港六合彩
香港六合彩香港六合彩
香港六合彩csukxnr
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideSharemvtqyygx
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideSharedqxjlhfc
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩qiohms
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShareyqtvdsbl
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideSharemmfirkhw
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharecxrcpdu
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩skpkcd
 
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptx
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptxPros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptx
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptxanbesa1
 
Pre Week14
Pre Week14Pre Week14
Pre Week14Ryosuke
 
FTP File Transfer Protocol secure ftp services
FTP File Transfer Protocol secure ftp servicesFTP File Transfer Protocol secure ftp services
FTP File Transfer Protocol secure ftp servicesftp wordwide
 
transfer4all – send big files fluidly
transfer4all –  send big files fluidly transfer4all –  send big files fluidly
transfer4all – send big files fluidly transfer4all ltd
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTPMahfuzRahman94
 
Using an FTP client - Client server computing
Using an FTP client -  Client server computingUsing an FTP client -  Client server computing
Using an FTP client - Client server computinglordmwesh
 

Similar to File transfer methods (20)

Respond to the statement below.One of the best protocols today for.pdf
Respond to the statement below.One of the best protocols today for.pdfRespond to the statement below.One of the best protocols today for.pdf
Respond to the statement below.One of the best protocols today for.pdf
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideShare
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩
 
application layer
application layerapplication layer
application layer
 
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptx
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptxPros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptx
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptx
 
Pre Week14
Pre Week14Pre Week14
Pre Week14
 
FTP File Transfer Protocol secure ftp services
FTP File Transfer Protocol secure ftp servicesFTP File Transfer Protocol secure ftp services
FTP File Transfer Protocol secure ftp services
 
FTP
FTPFTP
FTP
 
internet protocol
internet protocolinternet protocol
internet protocol
 
transfer4all – send big files fluidly
transfer4all –  send big files fluidly transfer4all –  send big files fluidly
transfer4all – send big files fluidly
 
internet protocol
internet protocolinternet protocol
internet protocol
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
Using an FTP client - Client server computing
Using an FTP client -  Client server computingUsing an FTP client -  Client server computing
Using an FTP client - Client server computing
 

More from Prabhat gangwar

More from Prabhat gangwar (20)

Middleware
MiddlewareMiddleware
Middleware
 
Pseudolocalization
PseudolocalizationPseudolocalization
Pseudolocalization
 
Mule anypoint studio
Mule anypoint studioMule anypoint studio
Mule anypoint studio
 
What is cluster analysis
What is cluster analysisWhat is cluster analysis
What is cluster analysis
 
clustering and load balancing
clustering and load balancingclustering and load balancing
clustering and load balancing
 
Middleware systems overview and introduction
Middleware systems overview and introductionMiddleware systems overview and introduction
Middleware systems overview and introduction
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Oracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-featuresOracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-features
 
Introducing adf business components
Introducing adf business componentsIntroducing adf business components
Introducing adf business components
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Global warming
Global warmingGlobal warming
Global warming
 
Vedic mathmetics
Vedic mathmeticsVedic mathmetics
Vedic mathmetics
 
Trends
TrendsTrends
Trends
 
E commerce buissness-model
E commerce buissness-modelE commerce buissness-model
E commerce buissness-model
 
Effective communication skills
Effective communication skillsEffective communication skills
Effective communication skills
 
Office politics
Office politicsOffice politics
Office politics
 
Introduction to xamarin
Introduction to xamarinIntroduction to xamarin
Introduction to xamarin
 
Add to the path on mac os x
Add to the path on mac os xAdd to the path on mac os x
Add to the path on mac os x
 
Cross platform mobile application devlopment
Cross platform mobile application devlopmentCross platform mobile application devlopment
Cross platform mobile application devlopment
 
Database security
Database securityDatabase security
Database security
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

File transfer methods

  • 1.
  • 2.  FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol suite used on the Internet. The File Transfer Protocol makes it possible to transfer files from one computer (or host) on the Internet to another.  A user of an FTP program must log in to both hosts in order to transfer a file from one to the other.
  • 3.  To promote sharing of files (computer programs and/or data)  To encourage indirect or implicit use of remote computers (via programs)  To shield a user from variations in file storage systems among hosts  To transfer data reliably and efficiently
  • 4.  Manual File Transfer  File Transfer via e-mail  File Transfer via HTTP  File Transfer via Anonymous/WU-FTP  File Transfer via SFTP / SCP
  • 5.  Through Floppy Disk.  Through CD/DVD  Through Tape  Through Zip Drive  Through USB Drives  Through Hard disk.
  • 6.  Incompatibility of Media  Limited capacity of Media  If the media is lost, misplaced or damaged the data is gone. If lost or misplaced, the data could be readily accessible to the finder.  Physical Access of source and destination systems are required.
  • 7.  Even though it is an old method of file transfer it is very secure through the trustees.  Since the data is not transferred through the wire there is no possibility of cyber attack like (Packet sniffing, Man in the middle, hijacking, eavesdropping on the network, etc.)  This can be very useful for top secret data transfer.
  • 8.  Mostly insecure unless the data is specifically encrypted.  Requires third party mail server where copy of information is stored.  Very high probability of delivery to unintended recipients or getting lost on the network.  No control over destination directory. Require user intervention to store the document to a specific folder  Highly vulnerable to man in the middle attack or session hijacking attack.  Extremely common and preferred method of spreading viruses.  Severe limitation on the size and number of files being transferred.
  • 9.  Very easy and economical way to transfer files. Even non technical users can easily transfer files.  Files can be sent in an encrypted manner if needed.  As compared to manual method of file transfer this method is extremely fast.  If the data is not confidential then this is the best way to transfer between personal users.
  • 10.  Anonymous FTP is a means by which archive sites allow general access to their archives of information.  These sites create a special account called "anonymous“ or “ftp”.  User "anonymous" has limited access rights to the archive host, as well as some operating restrictions.  Generally, the only operations allowed are logging in using FTP, accessing and listing the contents of a limited set of directories, storing and retrieving files.
  • 11.  The user name and password are universally known.  When connecting to the FTP server the sent data can be ’kidnapped’ to a foreign computer with the result that they will never arrive at the specified target computer.  From the foreign computer data can be transferred to the actual computer as well as existing data can be viewed and edited. This can be a great danger for companies transferring inhouse information!
  • 12.  This method satisfies the diverse needs of a large population of users with a simple, and easily implemented protocol design.  Anonymous FTP can be a valuable service if correctly configured and administered.
  • 13.  Login Authorization : The basic FTP protocol does not have a concept of authentication.  Data Channel Encapsulation : Data transferred is directly visible.
  • 14.  More affectionately known as WU-FTPD , Developed by Washington University.  WU-FTPD is the most popular ftp daemon on the Internet, used on many anonymous ftp sites all around the world.
  • 15.  The username and password are still sent in clear text and it is easy to steal the password.  Data is also transmitted in clear text and highly vulnerable to man in the middle attack.
  • 16.  Allows user authentication through distinct user name and password.  You can define the role of the user on a particular folder of a particular server / host.
  • 17.  SFTP stands for ‘Secure File Transfer Protocol’. The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream. It uses SSH.
  • 18.  SFTP protocol runs on secure channel.  Encrypts all traffic (including passwords) to effectively.  Provides variety of authentication methods.  It can be automated by public and private key authentication.
  • 19.  SFTP protocol is designed to provide primarily file transfer, but it also provides general file system access on the remote server - in a secure manner.  Can be intentionally misused