header bg

Scan QR code or get instant email to install app

Question:

Kate's organization utilizes a File Transfer Protocol (FTP) for contractors to submit their work to her organization. These contractors handle sensitive customer information and use login credentials provided by Kate's company to access and transmit the data. If attackers were to capture the network traffic involved in this transfer, what kind of sensitive information could they obtain?

A Usernames, passwords, and file content.
explanation

While public server and client IP addresses are generally not considered sensitive, the contractors' usernames, passwords, and files that are being transferred are sensitive information. For this reason, Kate should consider transitioning her organization to a secure FTP or other secure file transfer services to safeguard both the organization's and its customers' sensitive data.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*