Introduction to SSH Making connections donna Bair-Mundy
Library of Congress Thomas Website (normal view)
Library of Congress Thomas Website (2000)
Potential threats to university and library computers Thieves who want personal data Names and addresses Telephone numbers Social security numbers
Hamilton Library UH Warns Students, Faculty Of Potential ID Theft June 17, HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee. The warning is for all students and faculty at the campuses from While there is no evidence she stole IDs from the university, everyone is being cautious. Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until Right now, she is a fugitive. Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk....
Potential threats to university and library computers Disgruntled patrons or employees
Potential threats to university and library computers Hackers who use vulnerable computers to attack other sites “Hacktivists” who want to spread a political message
Information security measures Physical security—protect against theft and physical damage Room with no windows and no public access Door with combination lock
Information security measures Anti-virus software Anti-spyware program Latest patches for all software
Information security measures Firewalls—provide protection from external attacks SSH Firefox SFTP
Information security measures Access controls—control who can log onto the computer and which directories or files a person who logs on can access Intrusion detection Encryption—protect sensitive information and prevent session hijacking know have arepassword
Why do we need encryption? hub server packet sniffer
What is SSH? Secure shell program Encrypted transmissions Telnet-like utility Secure File Transfer Protocol
Secure shell client %ls %ls client server file1 file2 % file1 file2 %
Encryption method Encryption key RSA, ECC, DES, AES… ximop-qykam-lazyv…
Encryption methods Public-key encryption Symmetric-key encryption
Public-key encryption client server public key (encodes) private key (decodes) client
Public-key encryption (cont'd) client server lockunlock server's public key server's private key symmetric key
Symmetric-key encryption client server symmetric key message
Downloading SSH
Downloading SSH
Downloading SSH
Downloading SSH
Scroll down
Downloading SSH
For Mac users - Fugu
Fugu “Fugu 1.2 is not compatible with Mac OS 10.7 (Lion).”
SSH Secure Shell Client
uhunix.hawaii.edu donnab password
SSH Secure Shell Client
*******
Welcome to uhunix.hawaii.edu ================================================ Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of Hawaii Executive Policy E ================================================ ANNOUNCEMENTS: For Current Status and Alerts, see %
Transferring files Fugu For pc users For Mac users
Secure File Transfer for pc users Files and directories on your computer Files and directories on remote computer
Fugu for Mac users Files and directories on your computer Files and directories on remote computer Fugu