Title: Introduction to SSH
1Introduction to SSH
donna Bair-Mundy
2Information security measures (1)
Physical securityprotect against theft and
physical damage
Anti-virus software
Firewallsprovide protection from known external
attacks
3Information security measures (2)
Access controlscontrol who can log onto the
computer and which directories or files a person
who logs on can access
Intrusion detection
Encryptionprotect sensitive information and
prevent session hijacking
4Why do we need encryption?
server
hub
packet sniffer
5What is SSH?
Secure shell program
Encrypted transmissions
Telnet-like utility
Secure File Transfer Protocol
6Secure shell client
server
file1 file2
ls
client
file1 file2
ls
7Encryption
Encryption method
RSA, ECC, DES, AES
Encryption key
ximop-qykam-lazyv
8Encryption methods
Public-key encryption
Symmetric-key encryption
9Public-key encryption
server
public key (encodes)
client
private key (decodes)
client
client
client
10Public-key encryption (cont'd)
server
server'spublic key
server's private key
symmetric key
lock
unlock
symmetric key
client
11Symmetric-key encryption
server
message
symmetric key
symmetric key
client
12Downloading SSH (1)
http//www.hawaii.edu/
13Downloading SSH (2)
http//www.hawaii.edu/
14Downloading SSH (3)
http//www.hawaii.edu/technology
15Downloading SSH (4)
http//www.hawaii.edu/technology
16Downloading SSH (5)
http//www.hawaii.edu/help/software/
17Downloading SSH (6)
http//www.hawaii.edu/help/software/
18Downloading SSH (7)
http//www.hawaii.edu/help/software/supported.html
19Downloading SSH (8)
Windows
Mac
Fugu
SSH
http//www.hawaii.edu/help/software/supported.html