Technical information
Network Security White Paper ver. G.1.2
Page 4 of 72
Table of Contents:
1. Introduction ..................................................................................................................9
1-1 Port Based Network Services and Potential Security Issues ................................9
1-2 TELNET ..............................................................................................................10
1-2-1 Function Overview: ..................................................................................10
1-2-2 Potential Threats ......................................................................................10
1-2-3 Possibility of Acting as a Server for Relaying Viruses ..............................10
1-2-4 Theft of Username and Password............................................................10
1-2-5 Interception of network packets:............................................................... 11
1-2-6 Brute force password crack:..................................................................... 11
1-2-7 Possibility of Successful DoS (Denial of Service) Attacks ........................ 11
1-2-8 Recommended Precautions ..................................................................... 11
1-3 FTP .....................................................................................................................12
1-3-1 Function Overview ...................................................................................12
1-3-2 Potential Threats: .....................................................................................12
1-3-3 Recommended Precautions .....................................................................13
1-4 SFTP (SSH2) ......................................................................................................13
1-4-1 Function Overview ...................................................................................13
1-4-2 Destruction, Corruption and Modification of the File System or Kernel ....14
1-4-3 Possibility of Acting as a Server for Relaying Viruses ..............................14
1-4-4 Theft of Username, Password, and Device Information ...........................14
1-4-5 Brute force password crack:.....................................................................14
1-4-6 Theft of Print Data ....................................................................................14
1-4-7 Possibility of Successful DOS (Denial of Service) Attacks .......................14
1-4-8 Recommended Precaution.......................................................................14
1-5 HTTP ..................................................................................................................15
1-5-1 Function Overview ...................................................................................15
1-5-2 Destruction, Corruption and Modification of the File System....................15
1-5-3 Possibility of Acting as a Server for Relaying Viruses ..............................15
1-5-4 Theft of Username and Password............................................................15
1-5-5 Theft of Print Data ....................................................................................15