1. National Institute of Standards and Technology (NIST)
Special Publication 800-53 Revision 5
Security and Privacy Controls for Information Systems and Organizations
September 2020. In control family SC (System and Communications Protection)
control SC-8(1) "Cryptographic Protection" mandates the use of validated cryptography for data in transit. Protocols like Telnet and FTP do not meet this requirement as they transmit data in cleartext. (See control SC-8
Page 229).
2. Internet Engineering Task Force (IETF)
RFC 4217
Securing FTP with TLS
October 2005. The introduction (Section 1
Page 2) explicitly states
"The File Transfer Protocol [FTP] ... is weak with respect to security as it sends all passwords and data in the clear." This highlights the inherent insecurity of the standard FTP protocol.
3. Purdue University
CS 42600: Computer Security Courseware
"Lecture 18: Network Security". This and similar university course materials consistently identify Telnet and FTP as canonical examples of insecure protocols that operate in cleartext and should be replaced by secure alternatives like SSH and SFTP. (Specific lecture notes often detail the packet structure showing cleartext credentials).