Changes

Jump to: navigation, search

Security+ - An Overview of Communications Security

1,035 bytes added, 20:42, 18 February 2008
Secure Shell (SSH)
== Secure Shell (SSH) ==
 
Many years ago, before we started having to worry about network and internet security a tool called ''telnet'' was used to gain remote command-line access to systems. The big problem with telnet is that it sends both the authentication information and all subsequent data in plain text making it extremely easy for the session to be compromised.
 
Secure Shell (SSH) is a secure alternative which is now used almost exclusively in place of telnet. SSH establishes a secure, authenticated and encrypted connection between the cleint and the server using asymmetric public keys using Rivest-Shamir-Adleman cyrptography. Data encryption is achived using IDEA, Blowfish or DES encryption.
 
Unlike telnet which consisted of a single tool, SSH is actually a suite of tools consisting of the
following utilities:
 
- '''slogin/ssh''' - The ''Secure Login'' tools. Both of these tools enable a user to establish a secure connection with a remote system.
 
- '''scp''' - A ''Secure Copy'' tool. Used to securely transfer files between systems.

Navigation menu