Unformatted text preview:

SSH - Secure ShellWhat is SSH?Slide 3Why Use SSH?VulnerabilitiesResourcesSSH - Secure ShellCecilia FlyCSIS 4490 Linux System AdministrationWhat is SSH?SSH, or Secure Shell, is a program that allows you to securely login to a remote computer over a networkFunctionally similar to telnet, it was designed to replace the traditional rsh, rlogin, rcpUses strong authentication, public key encryption, and various ciphers to insure integrityWhat is SSH?There are currently two versions of SSH available: SSH1 and SSH2, with advantages and disadvantages to each version.SSH can provide secure channels for ftp and telnet through tunneling Provides secure X Windows SessionsAvailable for UNIX/Linux, Windows, Macintosh, and some browser-based clientsWhy Use SSH?The transmission of data over a connection with a remote computer is not a straight path – it travels through several other machines on its way.Data is sent in clear text and is easily intercepted SSH defends your machine and communicationsVulnerabilitiesMan-in-the-middle attackOtherwise Compromised systemsResourcesSSH Communications Security :http://www.ssh.fi/index.cfmOhio State University: http://www.math.ohio-state.edu/support/ssh/Written by Thomas Koenig: http://www.uni-karlsruhe.de/~ig25/ssh-faq/index.html University of Illinois: http://www.aae.uiuc.edu/systems/ssh.htmlby Kimmo Suominen: http://www.tac.nyc.ny.us/kim/ssh/Ohio State University: http://wks.uts.ohio-state.edu/unix_course/intro-55.html#HEADING55-0Indiana University: http://www.cs.indiana.edu/docproject/zen/zen-1.0_7.htmlRSA Security:


View Full Document

KSU CSIS 4490 - Secure Shell

Download Secure Shell
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Shell and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Shell 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?