Free Essay

Ftp- File Transfer Protocol

In: Computers and Technology

Submitted By Tisaiah
Words 738
Pages 3
SE571
Principles of Information Security and Privacy
Course Project
FTP- File Transfer Protocol

12/02/2011

Company Overview MedAssets provides technology solutions and consulting services to cover the full spectrum of providers’ revenue cycle needs from patient access to claims denials. In addition, MedAssets’ decision support suite integrates financial, clinical and administrative information, and then distributes that data enterprise wide for timely analysis and decision making to positively impact future performance. All of these solutions help ensure your facility gets paid fairly, in a timely manner, for services rendered; which could potentially improve your net patient revenue 1-3%.
Revenue Capture Solutions/ Value proposition MedAssets’ revenue capture solutions help establish and sustain revenue integrity by identifying missed charges, improving clinical documentation and providing tools for case management, all working to transform the revenue cycle and yield increases in the bottom line. Whether working with a large integrated delivery network or a small rural hospital, as a knowledgeable strategic business partner, MedAssets can replace multiple vendors and build a customized, multi-year program, using technology and know-how to help your facility achieve your financial and operational goals.
File Transfer Protocol The File Transfer Protocol (FTP) allows clients to access remote file servers, list remote directories, and move files to or from remote hosts. FTP understands basic file formats and can transfer files in ASCII character or binary format. Defined in STD 9/RFC 959, FTP provides a standard UNIX-like user interface, regardless of the actual underlying operating system. FTP allows a client to upload a file to a remote host, download a file from a remote host, or move files between two remote hosts. FTP was defined to allow file transfers between two systems without giving the user all of the capabilities that a Telnet session would (e.g., the ability to execute programs at the remote host). In some ways, FTP is more complex than Telnet. FTP maintains separate TCP connections for control and data transfer. FTP commands and responses are exchanged on the control connection, and a new data connection is established by the server for each directory listing or file transfer.

MedAssets FTP/sFTP Initial Account Setup Request and Notification Implementation Managers are responsible for initiating and confirming the initial FTP/sFTP account setup from the MDAS FTP Support group. The Implementation Manager will subsequently be responsible for notifying the project’s assigned Technical Implementation Analyst upon data receipt. Finally, at the end of the Implementation, during the Transition to Client Services, data receipt notification should be requested to be turned off.

Login FTP login utilizes a normal username/password scheme for granting access. The username is sent to the server using the USER command, and the password is sent using the PASS command. If the information provided by the client is accepted by the server, the server will send a greeting to the client and the session will be open. If the server supports it, clients may log in without providing login credentials. The server will also limit access for that session based on what the user is authorized.
Client File Submission Methodology

Account Name:
Password:

Secure FTP
All data is sent to MedAssets via Secure FTP using one of the following secure methods. PHI (Patient Health Information) data does not need to be encrypted when using Secure FTP. * Connect to sftp.medassets.com using one of the following protocols: * Implicit FTPS (SSL) on port 990 * PASV Mode connections allowed on ports 28000 – 28050 * SFTP (SSH2) on port 22 * Authentication options: * Username + password * Username + public key (public key provided by hospital)

Standard FTP * NOTE: Standard FTP is ONLY to be used in the rare instance when the organization is limited in some unique way from being able to send via Secure FTP. * NOTE: All PHI data must be encrypted if sending via Standard FTP. * Port 21 using Standard FTP client to connect to ftp.medassets.com

Security
FTP was not designed to be a secure protocol—especially by today's standards—and has many security weaknesses.
Bounce attacks
Spoof attacks
Brute force attacks
Packet capture (sniffing)
Username protection
Port stealing FTP was not designed to encrypt its traffic; all transmissions are in clear text, and user names, passwords, commands and data can be easily read by anyone able to perform packet capture (sniffing) on the network. Below is a link from you tube about FTP for additional information http://www.youtube.com/watch?v=hiQrYptlZ08…...

Similar Documents

Free Essay

Ftp & Sftp

...is transferring file between computers to share information between people, but computers which run different operating systems need a common language between them to understand each other and this language is called protocols (Washburn et al., 1996). FTP (File Transfer Protocol) is a protocol to transfer files that described for the first time in the early seventies and standardized in 1982 (Matthews, 2005). SFTP (SSH File Transfer Protocol) is another file transfer protocol, but the first RFC describing SFTP was released in 2001 (Ylonen et al. 2001). Organizations have to provide file transfer services to their customers, and they should choose the secure file transfer protocol which will secure their costumers files. In this essay, a comparison between FTP and SFTP would be making from three aspects. Firstly, I will illustrate the differences between FTP and SFTP in starting communication methods, and how they maintain the connection and the ports used by them. Secondly, I will focus on security vulnerabilities of FTP and SFTP and their effects on users and files security. Finally, I will compare the speed of files transferring in FTP and SFTP for different files with different sizes. * ------------------------------------------------- Communication Approach: * ------------------------------------------------- System architecture identifies the system hardware and software requirements, and it has effects on system performance and throughput. FTP and SFTP are......

Words: 1768 - Pages: 8

Premium Essay

Internet Protocols

...How Internet Protocols Work Kyra Pettit CIT/278 April 18, 2013 Richard Sleeper How Internet Protocols Work In the 1970s Internet Protocols were developed. Before this computer networks did not have a way to communicate with other networks. Protocols allowed computers on different networks to communicate or talk to each other. This let computers to communicate and exchange packets of data with each other. This essay will explain the different protocols and the responsibility of each protocol. Transfer Control Protocol\Internet Protocols (TCP\IP) Transfer Control Protocol/Internet Protocol (TCP/IP) was established. The TCP\IP enables packets to be routed by containing address information and control information. This protocol is the primary and heart of the Internet protocols. It makes sure all the information sent is transferred reliably and quickly. If any packet is lost the information is not re-routed back through again. It only sends what is missing out of the packet back again. File Retrieval Protocols This was an earlier Protocol for retrieving information from the Internet. This protocol had no type of graphics or no description of the file. The person putting in the info had to keep files on paper about the information are it would have been lost. File Transfer Protocol (FTP) The FTP helped move files from one computer to another. Using this user can log on to a computer, and look through the files, download or upload the files (usg). No......

Words: 554 - Pages: 3

Free Essay

Ftp Commands

...Common FTP Commands ? | to request help or information about the FTP commands | ascii | to set the mode of file transfer to ASCII  (this is the default and transmits seven bits per character) | binary | to set the mode of file transfer to binary  (the binary mode transmits all eight bits per byte and thus provides less chance of a transmission error and must be used to transmit files other than ASCII files) | bye | to exit the FTP environment (same as quit) | cd | to change directory on the remote machine | close | to terminate a connection with another computer |   | close brubeck | closes the current FTP connection with brubeck,    but still leaves you within the FTP environment. | delete | to delete (remove) a file in the current remote directory (same as rm in UNIX) | get | to copy one file from the remote machine to the local machine |   | get ABC DEF | copies file ABC in the current remote directory to (or on top of) a file named DEF in your current local directory. |   | get ABC | copies file ABC in the current remote directory to (or on top of) a file with the same name, ABC, in your current local directory. | help | to request a list of all available FTP commands | lcd | to change directory on your local machine (same as UNIX cd) | ls | to list the names of the files in the current remote directory | mkdir | to make a new directory within the current remote directory | mget | to copy multiple files from the remote machine to the......

Words: 402 - Pages: 2

Premium Essay

File Server

...What is a file server? Essentially, a file server is a computer that stores files, is attached to a network, and provides shared access of those files to multiple workstation computers.  File servers do not perform computational tasks - that is, they do not run programs for client machines.  Furthermore, they do not provide dynamic content like a web server.  Still further, file servers are not like database servers in that the former do not provide access to a shared database whereas the latter do.  File servers provide access to static files via a local intranet through Windows or Unix protocols as well as over the internet through file transfer or hypertext transfer protocols (FTP and HTTP).  What can you do with a file server? The primary function of a file server is storage.  For the home user, one central storage location can increase overall computing efficiency and reduce overall computing cost.  By placing all of your important files in a single location, you do not need to worry about different versions of files you're actively working on, wasting disk space by having multiple copies of less-than-important files scattered on different systems, backing up the right files onto the right backup storage medium from the right computer, making sure every PC in your home has access to the appropriate files, and so on.  From a system builder's perspective, a file server can also liberate your various workstation computers from having to accommodate multiple hard......

Words: 1163 - Pages: 5

Free Essay

The Modified Parallelized File Transfer Protocol for

...The Modified Parallelized File Transfer Protocol for Multi-users Wei-Chen Lin Jiun-Jian Liaw Chiung-Ta Wu Department of Information and Communication Engineering Chaoyang University of Technology Taiwan(R.O.C.), Taichung s9930615@cyut.edu.tw, jjliaw@cyut.edu.tw Abstract—File Transfer Protocol is the most popular file transfer standard. This FTP can let a computer system connect to the internet via a communication network, and it can also access the system resources from the internet. File server is being downloaded now by TCP/IP protocol, while before it was downloaded by signal server. Due to the limited flow control, the old method could not use download time efficiently. In order to solve the flow control problem, some researchers came up with a distributed file transfer method that can share the document with other users, thus allowing the shortest transfer time using neighboring servers. Although the distributed file transfer can reduce the file transfer time, it was not concerned with the quality of the transfer between two servers, and was inappropriate for file segmentation and transfer, so the file transfer could not attain the optimal transfer efficacy. Based on our research, we propose a new method called Distributed Parallelized File Transfer Protocol (DPFTP). This method is based on Parallelized File Transfer Protocol (P-FTP) and is beneficial to multi-users, as it utilizes server loading and reduces the download time. Keywords—FTP; P-FTP; DPFTP ;......

Words: 4505 - Pages: 19

Premium Essay

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

Premium Essay

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX,......

Words: 1041 - Pages: 5

Free Essay

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer......

Words: 278 - Pages: 2

Premium Essay

Web Sites - the Osi Model and Layer Protocols

...Web Sites - The OSI Model and Layer Protocols NTC/362 March 9, 2015 The building of a web site begins with considering the multilayered framework of the Open System Interconnection (OSI) model or the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Network models are designed to categorize all the required functionality around computer communications as well as explain the relationship and flow of information from layer to layer. These models can also be thought of as the structure for interfacing human and data networks. It is also important to think of these models existing on both ends of the networked data transmission. The end to end process can be viewed as a six step process. In step 1 people create the communication. Step 2 the application layer prepares human communication for transmission over the data network. Step 3 software and hardware convert communication to a digital format. Step 5 the application layer services initiate the data transfer. Step 5 model layers play a role in encapsulating data down the stack. Encapsulated data travels across the media to the destination. Model layers then unencapsulate the data up the stack. Lastly in step 6 the application layer receives the data from the network and prepares it for human use. The seven layers of the OSI model are 1-Physical, 2-Dat Link, 3-Network, 4-Transport, 5-Session, 6-Presentation, and 7-Application. The TCP/IP model is a four layer model. The layers of the TCP/IP......

Words: 1366 - Pages: 6

Free Essay

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications

...agreed upon guidelines or set of rules for communication is called a protocol. It’s extremely important to agree on some communication rules otherwise it will fail. Different protocols are needed for different systems to "talk" to each other or communicate. Protocols are used to communicate, authenticate and is also used for error detection and recovery. The protocol allows computers to talk to each other by setting the "ground rules". It allows for data to flow back and forth between the computers. TCP/IP is the most common protocol, and is actually two distinct protocols, married together (TCP (Transmission Control Protocol) and IP (Internet Protocol). Each protocol does a different "job". Others, such as FTP (File transfer protocol) are used for specific duties to be performed. Imagine two people talking on the phone....one talks the other listens, then they reverse, and the talker becomes the listener. That is a Protocol! What happens when they both talk? Neither hears what the other says. But what happens if they both listen, but not talk...no "data' is exchanged. Standards are totally different, although related.....they are ground rules set by a commission so that hardware is compatible amongst similar computers, and assures interoperability. This is done (usually) to ensure backwards compatibility and compatibility from vendor to vendor. For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive......

Words: 405 - Pages: 2

Free Essay

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Free Essay

What Is the Difference Between Web-Based Email Architecture and Simple Mail Transfer Protocol-Based Two-Tier Client-Server Architecture

...Data Networks Assignment #1 – Value 30 points Both parts of the assignment (A and B) should be included in one, single Word file. Please put your last name at the beginning of the name of that file (ex: ‘name Assignment 1.docx) Part A: Part A - Assignment Scenario: Read the scenario ‘Deals-R-Us Brokers (Part 2)’ on pages 66-67 of the text. Based on the scenario, create the deliverables listed below. Fred Jones, a distant relative of yours and president of Deals-R-Us Brokers (DRUB), has come to you for advice. DRUB is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional orders by phone or fax. DRUB has just decided to install a new email package. One vendor is offering an SMTP(Simple Mail Transfer Protocol).-based two-tier client-server architecture. The second vendor is offering a Web-based email architecture. Fred doesn’t understand either one but thinks the Web-based one should be better because, in his words, “The Web is the future.” a. Briefly explain to Fred, in layperson’s terms, the differences between the two. b. Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Part A - Assignment Deliverables: Client-server architectures attempt to balance the processing between the client and the server by having both do some of the logic. a) Write a memo to Fred that explains the differences between the two options. Be sure to......

Words: 539 - Pages: 3

Free Essay

File Transfer Protocol (Ftp)

...File Transfer Protocol (FTP) IT/220 Internet Concepts (AXIA) August 25, 2011 Joseph Sambuco File Transfer Protocol (FTP) If I were a web developer I would use File Transfer Protocol (FTP) to transfer files from one computer to another. There is two ways to use FTP. The first way is to upload files that create a web site from a local computer to a web server. The second way allows the users to download files, programs, and documents from a FTP server that has been already set up. There are Websites that provides links that allow visitors to download files to their computers via FTP. In order for users to download from these sites, they must know the login details. An example of these details could be the username and/or the user password. Once connected there are two ways to transfer the files, the binary mode or the ASCII mode. The binary mode is used for binary files, such as executable programs, music, images, and videos and the ASCII mode is used more for plain text files. Files created in Notepad are examples of the ASCII mode. There are two methods that allow Website developers to establish connections to the FTP server, active and passive. In the active method, the user initializes the connection that commands the port and the server initializes the connection that passes the data. In the passive method, the user initializes the connection for both the command port and passing data. The client and the server will communicate using two ports, one......

Words: 283 - Pages: 2