
- 336 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.- Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1. Solutions in this chapter:
- Why Is There a Need to Use SSH?
- What SSH Does and Does Not Do
- Comparison Between SSH and SSHv2
- What Are SCP and SFTP?
- SSH and the C-I-A Triad
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction
Why Is There a Need To Use SSH?
Are You Owned?
Data Loss, an Inside Job
Survey after survey shows that data loss and data exposure are most likely done by people inside the organization. Check out some of the statistics:
- 61% of respondents think data leakage is an insider's job. 23% believe those leaks are malicious.McAfee and Datamonitor's Data Loss Survey, 2007 (requires registration)
- 85% of organizations surveyed reported that they have had a data breach event.Scott and Scott LLP and Ponemon Institute LLC, May 15th, 2007
- One third of companies surveyed said a major security breach could put them out of business.McAfee and Datamonitor's Data Loss Survey, 2007 (requires registration)
- More than 90% of the breaches were in digital form.2006 Annual Study: The Cost of Data Breach. Ponemon Institute, LLC, 2007
These statistics can be found at: http://www.absolute.com/resources/computer-theft-statistics-details.asp
What SSH Does and Does Not Do
Notes from the Undergroundā¦
Types of Attacks
Throughout this book you will be introduced to a number of data attacks; these include man-in-the-middle, replay, packet capture, spoofing, and data manipulation. Each of these attacks can be stopped by adding encryption. This protects your data from view and manipulation, but only if the encryption is strong and implemented properly!
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright
- Lead Author and Technical Editor
- Contributing Authors
- Acknowledgments
- Chapter 1. IntroductionSolutions in this chapter:
- Chapter 2. OSI Model and Then SomeSolutions in this chapter:
- Chapter 3. An Introduction To CryptographySolutions in this chapter:
- Chapter 4. SSH FeaturesSolutions in this chapter:
- Chapter 5. SSH ShortcomingsSolutions in this chapter:
- Chapter 6. SSH Client BasicsSolutions in this chapter:
- Chapter 7. The SSH Server BasicsSolutions in this chapter:
- Chapter 8. SSH on WindowsSolutions in this chapter:
- Chapter 9. Linux SSHSolutions in this chapter:
- Chapter 10. Mac SSHSolutions in this chapter:
- Chapter 11. SSH Command Line and Advanced Client UseSolutions in this chapter:
- Chapter 12. SSH Server Advanced UseSolutions in this chapter:
- Chapter 13. SSH Port ForwardingSolutions in this chapter:
- Index