You are on page 1of 6

Brainware University

Topic: Telnet
Name: Titas Mandal
Student Code: BWU/BNC/23/123
Department: Cyber Science & Technology
Section: B
Course: Bsc. Ancs

I
Course Code: BNC10101
What Is Telnet:
Brainware University
Telnet is a network protocol that enables remote access to another computer or server
over a network. It allows a user to log in and operate a remote system as if they were
physically present at that location. While it facilitates remote communication, it lacks the
encryption features found in more secure alternatives like SSH.

Purpose:

Telnet allows users to connect to and communicate with remote computers or servers
Topic: Telnet
via a network, allowing for tasks such as remote administration and troubleshooting.
However,
Name: TitasitMandal
lacks encryption capabilities, which could expose sensitive data to security
threats.
Student Code: BWU/BNC/23/123
Department: Cyber Science & Technology
Section: B

II
Course: Bsc. Ancs
I

Course Code: BNC10101


What Is Telnet:
TelnetItis Works:
How a network protocol that enables remote access to another computer or server
over a network. It allows a user to log in and operate a remote system as if they were
physically present at that location. While it facilitates remote communication, it lacks the
1. Connection:
encryption featuresInitiate connection
found in toalternatives
more secure remote server.
like SSH.
2. Handshake: Establish communication parameters.
3. Login: Enter credentials for remote access.
Purpose:
4. Execution: Execute commands on the remote machine.
5. Transmission: Transmit data, including commands and outputs.
Telnet
6. Termination: Endtothe
allows users session
connect when
to and finished. with remote computers or servers
communicate
via a network, allowing for tasks such as remote administration and troubleshooting.
However, it lacks encryption capabilities, which could expose sensitive data to security
threats.

III
II
I
Advantages And Disadvantages:
How It Works:
Advantages:

1.1. Connection:
Simplicity Initiate connection to remote server.
2. Compatibility
2. Handshake: Establish communication parameters.
3. Login: Enter credentials for remote access.
4.Disadvantages:
Execution: Execute commands on the remote machine.
5. Transmission: Transmit data, including commands and outputs.
6.3. Termination:
Security RisksEnd the session when finished.
4. Low Encryption

IV
III
II
I
Advantages And Disadvantages:
Conclution:
Advantages:

1. Simplicity
2.
Telnet's ease of use and interoperability make it suitable for distant
Compatibility
operations, but its major downside is the lack of encryption, which exposes
sensitive data to possible security concerns. Protocols such as SSH, which
prioritize data security in distant connections, should be evaluated as a
Disadvantages:
more secure option.
3. Security Risks
4. Low Encryption
IV
III
II
I
Conclution:
Telnet's
Thank You
ease of use and interoperability make it suitable for distant
operations, but its major downside is the lack of encryption, which exposes
sensitive data to possible security concerns. Protocols such as SSH, which
prioritize data security in distant connections, should be evaluated as a
VI

more secure option.


V
IV
III
II
I

You might also like