Table of Contents

Search

  1. Preface
  2. Informatica Managed File Transfer Welcome Overview
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

SFTP Service (FTP over SSH)

SFTP Service (FTP over SSH)

The traditional FTP protocol sends commands and data in “the clear” over the network/internet.  This FTP data could be intercepted by an attacker, which could then be viewed and altered before sending it onto the receiver. 
If you are sending sensitive data over the internet, then you may want to consider the SFTP (FTP over SSH) protocol for securing data.
SFTP creates an encrypted tunnel between two computer systems and will protect against the following attacks:
IP spoofing, where a remote host sends out packets which pretend to come from another, trusted host
IP source routing, where a host can pretend that an IP packet comes from another, trusted host.
DNS spoofing, where an attacker forges name server records
Interception of cleartext passwords and other data by intermediate hosts
Manipulation of data by attackers in control of intermediate hosts
SFTP uses a combination of
asymmetric
(public key) cryptology and
symmetric
cryptology to provide strong encryption and optimal performance.  
SFTP is supported by most commercial servers and many open source servers (for example, Linux).  SFTP is a good protocol to use for transmitting large files since it compresses the data stream prior to encryption.
Managed File Transfer
implements the most current SSH 2.0 protocol standard.

0 COMMENTS

We’d like to hear from you!