The ssh protocol

pankajPankaj11 171 views 7 slides Jun 28, 2020
Slide 1
Slide 1 of 7
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7

About This Presentation

SSH Protocol


Slide Content

THE SSH Protocol

SSH is a protocol, not a product. It is a specification of how to conduct secure communication over a network. The SSH protocol covers authentication, encryption, and the integrity of data transmitted over a network.

Authentication Reliably determines someone’s identity. If you try to log into an account on a remote computer, SSH asks for digital proof of your identity. If you pass the test, you may log in; otherwise SSH rejects the connection.

Encryption Scrambles data so it is unintelligible except to the intended recipients. This protects your data as it passes over the network.

Integrity Guarantees the data traveling over the network arrives unaltered. If a third party captures and modifies your data in transit, SSH detects this fact .

Authentication, Encryption & Integrity Authentication “I am me” “I am me too” Encryption Integrity SSH Client SSH Server

THANKS Pankaj.S