SlideShare a Scribd company logo
NATIONAL INSTITUTE OF TRANSPORT
DEPARTMENT OF COMPUTING AND COMMUNICATION TECHNOLOGY
(CCT)
Individual Assignment 1
On the course Information System Security (ITU 08104)
Done by:
NIT/BSCIT/2013/06
Konzo, Eliya W.
Submitted to:
Mr. Lott, Champs.
1. Explaining SSH, Telnet and Proxy
SSH
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI
Model to allow remote login and other network services to operate securely over an unsecured
network.
SSH provides a secure channel over an unsecured network in a client-server architecture, connecting
an SSH client application with an SSH server. Common applications include remote command-line
login and remote command execution, but any network service can be secured with SSH
Telnet
Telnet is a client-server protocol, based on a reliable connection-oriented transport. Typically, this
protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23,
where a Telnet server application (telnetd) is listening. Telnet, however, predates TCP/IP and was
originally run over Network Control Program (NCP) protocols.
Proxy
“Proxy” is a general term that means “to act on behalf of a user in an authorized capacity.” A web
proxy server intercepts client connections and obtains the requested content from an origin server,
the owner of the content on behalf of the client.
A typical web proxy accepts connections from clients, makes decisions as to whether the clients are
permitted to use the proxy or access the requested resources, and then completes connections on
behalf of the clients to the various origin servers. In this manner, the web proxy acts as both a server
as well as a client of the requested resource.
The two basic types of web proxy server are: a forward proxy and a reverse proxy
i. Forward Proxy Scenario
A Forward proxy provides internal clients access through a firewall to resources on the
Internet. This service is often provided as part of a larger intranet security strategy. Forward
proxying allows clients to access resources outside of the firewall without compromising the
integrity of the private network.
A forward proxy can be configured to keep copies of content within their local cache.
Subsequent requests for that content can then be serviced from the local cache rather than
obtaining the content from the origin server. Caching increases performance by decreasing the
time involved in traversing the network.
Most proxy servers have the capability to filter requests from users. Administrators can
choose to limit access to certain resources that might not be appropriate for the workplace and
therefore deny such access.
In a forward proxy scenario, the client is aware of the proxy server and is configured to use
it for various requests. The firewall can then be configured to allow only certain traffic from the
proxy server rather than permitting such access to all internal clients.
ii. Reverse Proxy Scenario
A proxy server can also provide external clients with access to internal resources the reside
behind the corporate firewall. When a proxy server is used to handle connections into a private
network, the process is called reverse proxying. The term “reverse” refers to the fact that traffic
flows in the opposite direction from normal proxy traffic flow.
A forward proxy is best used to filter content, increase performance, and log user accesses.
A reverse proxy provides these benefits and more. You can use a reverse proxy to load balance
across multiple servers, provide failover capabilities, and provide access to corporate resources
in a safe and secure manner.
In a reverse proxy scenario, the client is not even aware that it is using a proxy server. This
transparency is one of the key differences between a forward and reverse proxy server scenario.
2. Provide a valid command which ca be used to switch from account A to account B using SSH.
To switch user on SSH the following command is used
[A@server]$ ssh B@server
The window will then prompt for password of user B
3. A valid command which ca be used to copy file named Data from account A to account B
To copy a file named data from account A to account B the following command might be used
A@server:~$ sudo cp /home/A/data /home/B/
Sudo was used to gain access to B’s Account
4. Write a Linux command to set the following permission to a file
i. -rwxrwxr-x 1 juan student 0 Sep 26 12:25 test
ii. –rwxrw-r-x 1 juan student 0 Sep 26 12:25 test
To change permission, the following commands can be used
i. To change file permission to -rwxrwxr-x, we use.
:$ chmod 775 test
to change owner to juan and owner-group to student
:$ chown juan:student test
ii. To change file permission to -rwxrw-r-x, we use.
:$ chmod 765 test
to change owner to juan and owner-group to student
:$ chown juan:student test

More Related Content

What's hot

Renegotiating Tls
Renegotiating TlsRenegotiating Tls
Renegotiating Tls
Linda Cadigan
 
Web Security
Web SecurityWeb Security
Web Security
Ram Dutt Shukla
 
Network Security Practices-IP Security
Network Security Practices-IP SecurityNetwork Security Practices-IP Security
Network Security Practices-IP Security
Gayathridevi120
 
Tunneling
TunnelingTunneling
Tunneling
Ilan Mindel
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
IJERA Editor
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Ports and services
Ports and servicesPorts and services
Ports and services
Ilan Mindel
 
Web Security
Web SecurityWeb Security
Web Security
Dipika Bambhaniya
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer ssl
STUDENT
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
Internet protocols
Internet protocolsInternet protocols
Internet protocolsReilen
 
Internet protocols
Internet protocolsInternet protocols
Internet protocolsReilen
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And RloginSourav Roy
 
Network security
Network securityNetwork security
Network security
Venkat Karanam
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
InfoSec Girls
 

What's hot (18)

Renegotiating Tls
Renegotiating TlsRenegotiating Tls
Renegotiating Tls
 
Web Security
Web SecurityWeb Security
Web Security
 
Network Security Practices-IP Security
Network Security Practices-IP SecurityNetwork Security Practices-IP Security
Network Security Practices-IP Security
 
Tunneling
TunnelingTunneling
Tunneling
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Web Security
Web SecurityWeb Security
Web Security
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
ssl
sslssl
ssl
 
Web Security
Web SecurityWeb Security
Web Security
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer ssl
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security
Network securityNetwork security
Network security
 
Unit 6
Unit 6Unit 6
Unit 6
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 

Viewers also liked

Prediksi swansea city vs arsenal
Prediksi swansea city vs arsenalPrediksi swansea city vs arsenal
Prediksi swansea city vs arsenaldunsul
 
Prediksi atletico madrid vs almeria
Prediksi atletico madrid vs almeriaPrediksi atletico madrid vs almeria
Prediksi atletico madrid vs almeriadunsul
 
Prediksi milan vs udinese
Prediksi milan vs udinesePrediksi milan vs udinese
Prediksi milan vs udinesedunsul
 
Prediksi nice vs monaco
Prediksi nice vs monacoPrediksi nice vs monaco
Prediksi nice vs monacodunsul
 
Prediksi nurnberg vs bayern munchen
Prediksi nurnberg vs bayern munchenPrediksi nurnberg vs bayern munchen
Prediksi nurnberg vs bayern munchendunsul
 
Prediksi stoke city vs manchester united (capital one cup)
Prediksi stoke city vs manchester united (capital one cup)Prediksi stoke city vs manchester united (capital one cup)
Prediksi stoke city vs manchester united (capital one cup)dunsul
 
Prediksi osasuna vs barcelona
Prediksi osasuna vs barcelonaPrediksi osasuna vs barcelona
Prediksi osasuna vs barcelonadunsul
 
Prediksi bologna vs
Prediksi bologna vsPrediksi bologna vs
Prediksi bologna vsdunsul
 
Prediksi manchester city vs barcelona
Prediksi manchester city vs barcelonaPrediksi manchester city vs barcelona
Prediksi manchester city vs barcelonadunsul
 
Prediksi ajax vs barcelona
Prediksi ajax vs barcelonaPrediksi ajax vs barcelona
Prediksi ajax vs barcelonadunsul
 
Prediksi chelsea vs schalke 04
Prediksi chelsea vs schalke 04Prediksi chelsea vs schalke 04
Prediksi chelsea vs schalke 04dunsul
 
Prediksi trabzonspor v lazio
Prediksi trabzonspor v lazioPrediksi trabzonspor v lazio
Prediksi trabzonspor v laziodunsul
 
Prediksi newcastle united vs manchester city
Prediksi newcastle united vs manchester cityPrediksi newcastle united vs manchester city
Prediksi newcastle united vs manchester citydunsul
 
Prediksi borussia dortmund vs arsenal
Prediksi borussia dortmund vs arsenalPrediksi borussia dortmund vs arsenal
Prediksi borussia dortmund vs arsenaldunsul
 

Viewers also liked (14)

Prediksi swansea city vs arsenal
Prediksi swansea city vs arsenalPrediksi swansea city vs arsenal
Prediksi swansea city vs arsenal
 
Prediksi atletico madrid vs almeria
Prediksi atletico madrid vs almeriaPrediksi atletico madrid vs almeria
Prediksi atletico madrid vs almeria
 
Prediksi milan vs udinese
Prediksi milan vs udinesePrediksi milan vs udinese
Prediksi milan vs udinese
 
Prediksi nice vs monaco
Prediksi nice vs monacoPrediksi nice vs monaco
Prediksi nice vs monaco
 
Prediksi nurnberg vs bayern munchen
Prediksi nurnberg vs bayern munchenPrediksi nurnberg vs bayern munchen
Prediksi nurnberg vs bayern munchen
 
Prediksi stoke city vs manchester united (capital one cup)
Prediksi stoke city vs manchester united (capital one cup)Prediksi stoke city vs manchester united (capital one cup)
Prediksi stoke city vs manchester united (capital one cup)
 
Prediksi osasuna vs barcelona
Prediksi osasuna vs barcelonaPrediksi osasuna vs barcelona
Prediksi osasuna vs barcelona
 
Prediksi bologna vs
Prediksi bologna vsPrediksi bologna vs
Prediksi bologna vs
 
Prediksi manchester city vs barcelona
Prediksi manchester city vs barcelonaPrediksi manchester city vs barcelona
Prediksi manchester city vs barcelona
 
Prediksi ajax vs barcelona
Prediksi ajax vs barcelonaPrediksi ajax vs barcelona
Prediksi ajax vs barcelona
 
Prediksi chelsea vs schalke 04
Prediksi chelsea vs schalke 04Prediksi chelsea vs schalke 04
Prediksi chelsea vs schalke 04
 
Prediksi trabzonspor v lazio
Prediksi trabzonspor v lazioPrediksi trabzonspor v lazio
Prediksi trabzonspor v lazio
 
Prediksi newcastle united vs manchester city
Prediksi newcastle united vs manchester cityPrediksi newcastle united vs manchester city
Prediksi newcastle united vs manchester city
 
Prediksi borussia dortmund vs arsenal
Prediksi borussia dortmund vs arsenalPrediksi borussia dortmund vs arsenal
Prediksi borussia dortmund vs arsenal
 

Similar to Information System Security

Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Squid server
Squid serverSquid server
Squid server
Rohit Phulsunge
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Squid
SquidSquid
Pre Week14
Pre Week14Pre Week14
Pre Week14Ryosuke
 
Pre Week13
Pre Week13Pre Week13
Pre Week13Ryosuke
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
Gurpreet singh
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
Razorpoint Security
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
vickeryr87
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
nullowaspmumbai
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
DimpyJindal4
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
Muhammad Zbeedat
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
MithilDoshi1
 

Similar to Information System Security (20)

Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Squid server
Squid serverSquid server
Squid server
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
Squid
SquidSquid
Squid
 
Pre Week14
Pre Week14Pre Week14
Pre Week14
 
Pre Week13
Pre Week13Pre Week13
Pre Week13
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 

Recently uploaded

RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 

Recently uploaded (20)

RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 

Information System Security

  • 1. NATIONAL INSTITUTE OF TRANSPORT DEPARTMENT OF COMPUTING AND COMMUNICATION TECHNOLOGY (CCT) Individual Assignment 1 On the course Information System Security (ITU 08104) Done by: NIT/BSCIT/2013/06 Konzo, Eliya W. Submitted to: Mr. Lott, Champs.
  • 2. 1. Explaining SSH, Telnet and Proxy SSH Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH Telnet Telnet is a client-server protocol, based on a reliable connection-oriented transport. Typically, this protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening. Telnet, however, predates TCP/IP and was originally run over Network Control Program (NCP) protocols. Proxy “Proxy” is a general term that means “to act on behalf of a user in an authorized capacity.” A web proxy server intercepts client connections and obtains the requested content from an origin server, the owner of the content on behalf of the client. A typical web proxy accepts connections from clients, makes decisions as to whether the clients are permitted to use the proxy or access the requested resources, and then completes connections on behalf of the clients to the various origin servers. In this manner, the web proxy acts as both a server as well as a client of the requested resource. The two basic types of web proxy server are: a forward proxy and a reverse proxy i. Forward Proxy Scenario A Forward proxy provides internal clients access through a firewall to resources on the Internet. This service is often provided as part of a larger intranet security strategy. Forward proxying allows clients to access resources outside of the firewall without compromising the integrity of the private network. A forward proxy can be configured to keep copies of content within their local cache. Subsequent requests for that content can then be serviced from the local cache rather than obtaining the content from the origin server. Caching increases performance by decreasing the time involved in traversing the network. Most proxy servers have the capability to filter requests from users. Administrators can choose to limit access to certain resources that might not be appropriate for the workplace and therefore deny such access.
  • 3. In a forward proxy scenario, the client is aware of the proxy server and is configured to use it for various requests. The firewall can then be configured to allow only certain traffic from the proxy server rather than permitting such access to all internal clients. ii. Reverse Proxy Scenario A proxy server can also provide external clients with access to internal resources the reside behind the corporate firewall. When a proxy server is used to handle connections into a private network, the process is called reverse proxying. The term “reverse” refers to the fact that traffic flows in the opposite direction from normal proxy traffic flow. A forward proxy is best used to filter content, increase performance, and log user accesses. A reverse proxy provides these benefits and more. You can use a reverse proxy to load balance across multiple servers, provide failover capabilities, and provide access to corporate resources in a safe and secure manner. In a reverse proxy scenario, the client is not even aware that it is using a proxy server. This transparency is one of the key differences between a forward and reverse proxy server scenario. 2. Provide a valid command which ca be used to switch from account A to account B using SSH. To switch user on SSH the following command is used [A@server]$ ssh B@server The window will then prompt for password of user B 3. A valid command which ca be used to copy file named Data from account A to account B To copy a file named data from account A to account B the following command might be used A@server:~$ sudo cp /home/A/data /home/B/ Sudo was used to gain access to B’s Account 4. Write a Linux command to set the following permission to a file i. -rwxrwxr-x 1 juan student 0 Sep 26 12:25 test ii. –rwxrw-r-x 1 juan student 0 Sep 26 12:25 test To change permission, the following commands can be used i. To change file permission to -rwxrwxr-x, we use. :$ chmod 775 test to change owner to juan and owner-group to student :$ chown juan:student test
  • 4. ii. To change file permission to -rwxrw-r-x, we use. :$ chmod 765 test to change owner to juan and owner-group to student :$ chown juan:student test