Title: Introduction to SSH
1Introduction to SSH
donna Bair-Mundy
2Potential threats to university and library
computers
Thieves who want personal data
Disgruntled patrons or employees
Hackers who use vulnerable computers to attack
other sites
Hacktivists who want to spread a political
message
3Information security measures (1)
Physical securityprotect against theft and
physical damage
Anti-virus software
Firewallsprovide protection from known external
attacks
4Information security measures (2)
Access controlscontrol who can log onto the
computer and which directories or files a person
who logs on can access
Intrusion detection
Encryptionprotect sensitive information and
prevent session hijacking
5Why do we need encryption?
server
hub
packet sniffer
6What is SSH?
Secure shell program
Encrypted transmissions
Telnet-like utility
Secure File Transfer Protocol
7Secure shell client
server
file1 file2
ls
client
file1 file2
ls
8Encryption
Encryption method
RSA, ECC, DES, AES
Encryption key
ximop-qykam-lazyv
9Encryption methods
Public-key encryption
Symmetric-key encryption
10Public-key encryption
server
public key (encodes)
client
private key (decodes)
client
client
client
11Public-key encryption (cont'd)
server
server'spublic key
server's private key
lock
unlock
symmetric key
symmetric key
client
12Symmetric-key encryption
server
message
symmetric key
symmetric key
client
13Downloading SSH (1)
http//www.hawaii.edu/
14Downloading SSH (2)
http//www.hawaii.edu/
15Downloading SSH (3)
16Downloading SSH (4)
http//www.hawaii.edu/technology/
17Downloading SSH (5)
18Downloading SSH (6)
19Downloading SSH (7)
20Downloading SSH (8)