answersLogoWhite

0


Best Answer

Because the telnet session is in clear text and programs can capture the passwords to log in to telnet sessions.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why is using TELNET a security risk for an IP network infrastructure?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is transferred between computers using telnet?

Telnet is a protocol for transferring plain text over TCP .


Short note on telnet and remote login?

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. Historically, Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stack support a Telnet service for remote configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this purpose has waned in favor of SSH.


IFUsing telnet or ftp which is the highest layer you are using to transmit data?

Normally both using transport layer for communication but they are using tcp protocol which uses application layer so application layer is correct answer..


What is network segmentation and basic traffic management concepts?

Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products. Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products.


What facilities are available to user when using a network?

Putting this question on this site is one example of using a network. Any network will allow some things and block other things depending on which network you are using. That is why effectively all networks have a Network Administrator who has the job of making sure that people can use the network safely for the purpose the network was set up for

Related questions

What is the advantage of using telnet in router configuration?

The main advantage of using this is remote access on the network.


Because of security violation the router password must be changed what information can you learn from these configuration entries?

The entries specify four Telnet lines for remote access. Access will be permitted for Telnet using "c13c0" as the password


What are firewalls intended to accomplish?

Firewalls protect one computer (or network) from another computer (or network) by imposing limits on how those two computers (or networks) can interact. In one example, you might have several computers in your internal network. You can control them by using telnet. You could use a firewall between your internal network and an external network to prevent a computer in the external network from accessing a computer in the internal network using telnet. Since telnet can be a security risk, blocking external telnet like this is highly appropriate. In another example, you might have a private firewall on your computer. You use the computer to browse other computers using http. You firewall could be configured to ensure that only the processes iexplore.exe or firefox.exe were allowed to use http. This way, if some malicious program, for instance malware.exe, attempted to use http, it would be blocked. Blocking can also be applied to external sites by address. There are many possibilities... Most modern firewalls are extremely complex, because there are many different possible interactions. Some are good, and some are bad.


WhAT configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using a Telnet connection?

line vty


What is the function telnet protocol?

It stands for TELECOMMUNICATIONS NETWORK. You can remotely control web servers through Telnet. By using Telnet programs you can enter commands. By exchanging data over internet two programs can work cooperatively. With Telnet you can not only control their server but can also communicate with other servers on the network


Is there a free wireless network security provider?

There are several free wireless network security providers, including lucidlink, linksys, and auditmypc. Be aware of the risks and dangers of using free wireless network security providers before using the services.


Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using a Telnet connection?

VTY line mode


Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?

VTY line mode


What are advantages and disadvantages of wireless security?

The initial setup of a wireless connection infrastructure that implements security is not complicated as that of wired connections. The disadvantage of wireless security is that most of the encryption methods are common and have weaknesses.


What is anonymizing network in security?

Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Benefits of Network security Network Security is vital in protecting client data and information, keeping shared data secure and ensuring reliable access and network performance as well as protection from cyber threats.


What is transferred between computers using telnet?

Telnet is a protocol for transferring plain text over TCP .


Short note on telnet and remote login?

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. Historically, Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stack support a Telnet service for remote configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this purpose has waned in favor of SSH.