NATIONAL INSTITUTE OF TRANSPORT
DEPARTMENT OF COMPUTING AND COMMUNICATION TECHNOLOGY
(CCT)
Individual Assignment 1
On the course Information System Security (ITU 08104)
Done by:
NIT/BSCIT/2013/06
Konzo, Eliya W.
Submitted to:
Mr. Lott, Champs.
1. Explaining SSH, Telnet and Proxy
SSH
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI
Model to allow remote login and other network services to operate securely over an unsecured
network.
SSH provides a secure channel over an unsecured network in a client-server architecture, connecting
an SSH client application with an SSH server. Common applications include remote command-line
login and remote command execution, but any network service can be secured with SSH
Telnet
Telnet is a client-server protocol, based on a reliable connection-oriented transport. Typically, this
protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23,
where a Telnet server application (telnetd) is listening. Telnet, however, predates TCP/IP and was
originally run over Network Control Program (NCP) protocols.
Proxy
“Proxy” is a general term that means “to act on behalf of a user in an authorized capacity.” A web
proxy server intercepts client connections and obtains the requested content from an origin server,
the owner of the content on behalf of the client.
A typical web proxy accepts connections from clients, makes decisions as to whether the clients are
permitted to use the proxy or access the requested resources, and then completes connections on
behalf of the clients to the various origin servers. In this manner, the web proxy acts as both a server
as well as a client of the requested resource.
The two basic types of web proxy server are: a forward proxy and a reverse proxy
i. Forward Proxy Scenario
A Forward proxy provides internal clients access through a firewall to resources on the
Internet. This service is often provided as part of a larger intranet security strategy. Forward
proxying allows clients to access resources outside of the firewall without compromising the
integrity of the private network.
A forward proxy can be configured to keep copies of content within their local cache.
Subsequent requests for that content can then be serviced from the local cache rather than
obtaining the content from the origin server. Caching increases performance by decreasing the
time involved in traversing the network.
Most proxy servers have the capability to filter requests from users. Administrators can
choose to limit access to certain resources that might not be appropriate for the workplace and
therefore deny such access.
In a forward proxy scenario, the client is aware of the proxy server and is configured to use
it for various requests. The firewall can then be configured to allow only certain traffic from the
proxy server rather than permitting such access to all internal clients.
ii. Reverse Proxy Scenario
A proxy server can also provide external clients with access to internal resources the reside
behind the corporate firewall. When a proxy server is used to handle connections into a private
network, the process is called reverse proxying. The term “reverse” refers to the fact that traffic
flows in the opposite direction from normal proxy traffic flow.
A forward proxy is best used to filter content, increase performance, and log user accesses.
A reverse proxy provides these benefits and more. You can use a reverse proxy to load balance
across multiple servers, provide failover capabilities, and provide access to corporate resources
in a safe and secure manner.
In a reverse proxy scenario, the client is not even aware that it is using a proxy server. This
transparency is one of the key differences between a forward and reverse proxy server scenario.
2. Provide a valid command which ca be used to switch from account A to account B using SSH.
To switch user on SSH the following command is used
[A@server]$ ssh B@server
The window will then prompt for password of user B
3. A valid command which ca be used to copy file named Data from account A to account B
To copy a file named data from account A to account B the following command might be used
A@server:~$ sudo cp /home/A/data /home/B/
Sudo was used to gain access to B’s Account
4. Write a Linux command to set the following permission to a file
i. -rwxrwxr-x 1 juan student 0 Sep 26 12:25 test
ii. –rwxrw-r-x 1 juan student 0 Sep 26 12:25 test
To change permission, the following commands can be used
i. To change file permission to -rwxrwxr-x, we use.
:$ chmod 775 test
to change owner to juan and owner-group to student
:$ chown juan:student test
ii. To change file permission to -rwxrw-r-x, we use.
:$ chmod 765 test
to change owner to juan and owner-group to student
:$ chown juan:student test

More Related Content

PDF
Firewall traversals
PPTX
Denial of-service (do s) attack
PPT
2 secure systems design
PPT
Secure shell ppt
PDF
Transport Layer Security
ODP
Https presentation
PDF
Let's go HTTPS
DOCX
S/MIME
Firewall traversals
Denial of-service (do s) attack
2 secure systems design
Secure shell ppt
Transport Layer Security
Https presentation
Let's go HTTPS
S/MIME

What's hot (18)

PDF
Renegotiating Tls
PPT
Web Security
PPTX
Network Security Practices-IP Security
PPTX
Tunneling
PDF
Aw36294299
PDF
Web Security
PPTX
Ports and services
PPTX
PPTX
Web Security
PPT
security in transport layer ssl
PDF
Vulnerabilities of the SSL/TLS Protocol
PPTX
Internet protocols
PPTX
Internet protocols
PPT
Ssh And Rlogin
PPT
Web Security
PPTX
Network security
PPTX
Session for InfoSecGirls - New age threat management vol 1
Renegotiating Tls
Web Security
Network Security Practices-IP Security
Tunneling
Aw36294299
Web Security
Ports and services
Web Security
security in transport layer ssl
Vulnerabilities of the SSL/TLS Protocol
Internet protocols
Internet protocols
Ssh And Rlogin
Web Security
Network security
Session for InfoSecGirls - New age threat management vol 1
Ad

Viewers also liked (14)

DOCX
Prediksi swansea city vs arsenal
DOCX
Prediksi atletico madrid vs almeria
DOCX
Prediksi milan vs udinese
DOCX
Prediksi nice vs monaco
DOCX
Prediksi nurnberg vs bayern munchen
DOCX
Prediksi stoke city vs manchester united (capital one cup)
DOCX
Prediksi osasuna vs barcelona
DOCX
Prediksi bologna vs
DOCX
Prediksi manchester city vs barcelona
DOCX
Prediksi ajax vs barcelona
DOCX
Prediksi chelsea vs schalke 04
DOCX
Prediksi trabzonspor v lazio
DOCX
Prediksi newcastle united vs manchester city
DOCX
Prediksi borussia dortmund vs arsenal
Prediksi swansea city vs arsenal
Prediksi atletico madrid vs almeria
Prediksi milan vs udinese
Prediksi nice vs monaco
Prediksi nurnberg vs bayern munchen
Prediksi stoke city vs manchester united (capital one cup)
Prediksi osasuna vs barcelona
Prediksi bologna vs
Prediksi manchester city vs barcelona
Prediksi ajax vs barcelona
Prediksi chelsea vs schalke 04
Prediksi trabzonspor v lazio
Prediksi newcastle united vs manchester city
Prediksi borussia dortmund vs arsenal
Ad

Similar to Information System Security (20)

PPTX
Firewall vpn proxy
PPT
Squid server
PDF
Proxy Server
PPTX
Remote Accesserver, Introduction(Part1).pptx
PPTX
CN. Presentation for submitting project term pptx
PPTX
Firewalls
PPTX
PDF
Pre Week13
PDF
Pre Week14
PDF
Cloud Computing Assignment 3
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
RAZORPOINT SECURITY GLOSSARY
PPT
Web Proxy Server
DOCX
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
PPTX
Infrastructure security & Incident Management
PPT
Chapter_Five[1].ppt
PPT
SECURITY PROTOCOLS.ppt
PPT
Securing RESTful API
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
Firewall vpn proxy
Squid server
Proxy Server
Remote Accesserver, Introduction(Part1).pptx
CN. Presentation for submitting project term pptx
Firewalls
Pre Week13
Pre Week14
Cloud Computing Assignment 3
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
RAZORPOINT SECURITY GLOSSARY
Web Proxy Server
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
Infrastructure security & Incident Management
Chapter_Five[1].ppt
SECURITY PROTOCOLS.ppt
Securing RESTful API
Welcome to International Journal of Engineering Research and Development (IJERD)

Recently uploaded (20)

PPTX
Python is a high-level, interpreted programming language
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
Microsoft Office 365 Crack Download Free
PDF
CapCut PRO for PC Crack New Download (Fully Activated 2025)
PPTX
Computer Software - Technology and Livelihood Education
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
HackYourBrain__UtrechtJUG__11092025.pptx
PPTX
Presentation by Samna Perveen And Subhan Afzal.pptx
PPTX
Matchmaking for JVMs: How to Pick the Perfect GC Partner
PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PDF
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
PDF
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
PDF
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
Guide to Food Delivery App Development.pdf
PPTX
Cybersecurity: Protecting the Digital World
PPTX
Lecture 5 Software Requirement Engineering
PPTX
Download Adobe Photoshop Crack 2025 Free
Python is a high-level, interpreted programming language
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
Microsoft Office 365 Crack Download Free
CapCut PRO for PC Crack New Download (Fully Activated 2025)
Computer Software - Technology and Livelihood Education
CCleaner 6.39.11548 Crack 2025 License Key
HackYourBrain__UtrechtJUG__11092025.pptx
Presentation by Samna Perveen And Subhan Afzal.pptx
Matchmaking for JVMs: How to Pick the Perfect GC Partner
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
Airline CRS | Airline CRS Systems | CRS System
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Guide to Food Delivery App Development.pdf
Cybersecurity: Protecting the Digital World
Lecture 5 Software Requirement Engineering
Download Adobe Photoshop Crack 2025 Free

Information System Security

  • 1. NATIONAL INSTITUTE OF TRANSPORT DEPARTMENT OF COMPUTING AND COMMUNICATION TECHNOLOGY (CCT) Individual Assignment 1 On the course Information System Security (ITU 08104) Done by: NIT/BSCIT/2013/06 Konzo, Eliya W. Submitted to: Mr. Lott, Champs.
  • 2. 1. Explaining SSH, Telnet and Proxy SSH Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH Telnet Telnet is a client-server protocol, based on a reliable connection-oriented transport. Typically, this protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening. Telnet, however, predates TCP/IP and was originally run over Network Control Program (NCP) protocols. Proxy “Proxy” is a general term that means “to act on behalf of a user in an authorized capacity.” A web proxy server intercepts client connections and obtains the requested content from an origin server, the owner of the content on behalf of the client. A typical web proxy accepts connections from clients, makes decisions as to whether the clients are permitted to use the proxy or access the requested resources, and then completes connections on behalf of the clients to the various origin servers. In this manner, the web proxy acts as both a server as well as a client of the requested resource. The two basic types of web proxy server are: a forward proxy and a reverse proxy i. Forward Proxy Scenario A Forward proxy provides internal clients access through a firewall to resources on the Internet. This service is often provided as part of a larger intranet security strategy. Forward proxying allows clients to access resources outside of the firewall without compromising the integrity of the private network. A forward proxy can be configured to keep copies of content within their local cache. Subsequent requests for that content can then be serviced from the local cache rather than obtaining the content from the origin server. Caching increases performance by decreasing the time involved in traversing the network. Most proxy servers have the capability to filter requests from users. Administrators can choose to limit access to certain resources that might not be appropriate for the workplace and therefore deny such access.
  • 3. In a forward proxy scenario, the client is aware of the proxy server and is configured to use it for various requests. The firewall can then be configured to allow only certain traffic from the proxy server rather than permitting such access to all internal clients. ii. Reverse Proxy Scenario A proxy server can also provide external clients with access to internal resources the reside behind the corporate firewall. When a proxy server is used to handle connections into a private network, the process is called reverse proxying. The term “reverse” refers to the fact that traffic flows in the opposite direction from normal proxy traffic flow. A forward proxy is best used to filter content, increase performance, and log user accesses. A reverse proxy provides these benefits and more. You can use a reverse proxy to load balance across multiple servers, provide failover capabilities, and provide access to corporate resources in a safe and secure manner. In a reverse proxy scenario, the client is not even aware that it is using a proxy server. This transparency is one of the key differences between a forward and reverse proxy server scenario. 2. Provide a valid command which ca be used to switch from account A to account B using SSH. To switch user on SSH the following command is used [A@server]$ ssh B@server The window will then prompt for password of user B 3. A valid command which ca be used to copy file named Data from account A to account B To copy a file named data from account A to account B the following command might be used A@server:~$ sudo cp /home/A/data /home/B/ Sudo was used to gain access to B’s Account 4. Write a Linux command to set the following permission to a file i. -rwxrwxr-x 1 juan student 0 Sep 26 12:25 test ii. –rwxrw-r-x 1 juan student 0 Sep 26 12:25 test To change permission, the following commands can be used i. To change file permission to -rwxrwxr-x, we use. :$ chmod 775 test to change owner to juan and owner-group to student :$ chown juan:student test
  • 4. ii. To change file permission to -rwxrw-r-x, we use. :$ chmod 765 test to change owner to juan and owner-group to student :$ chown juan:student test