Introduction to SSH Making connections donna Bair-Mundy.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
For further information computersecurity.wlu.ca
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security+ Guide to Network Security Fundamentals
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Lecture 11 Reliability and Security in IT infrastructure.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Website Hardening HUIT IT Security | Sep
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Computer Security Sample security policy Dr Alexei Vernitski.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Creating an e-Portfolio Assignment: Part I Dr. Bair-Mundy.
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing Information Systems
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Security in mobile technologies
Presentation transcript:

Introduction to SSH Making connections donna Bair-Mundy

Library of Congress Thomas Website (normal view)

Library of Congress Thomas Website (2000)

Potential threats to university and library computers Thieves who want personal data Names and addresses Telephone numbers Social security numbers

Hamilton Library UH Warns Students, Faculty Of Potential ID Theft June 17, HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee. The warning is for all students and faculty at the campuses from While there is no evidence she stole IDs from the university, everyone is being cautious. Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until Right now, she is a fugitive. Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk....

Potential threats to university and library computers Disgruntled patrons or employees

Potential threats to university and library computers Hackers who use vulnerable computers to attack other sites “Hacktivists” who want to spread a political message

Information security measures Physical security—protect against theft and physical damage Room with no windows and no public access Door with combination lock

Information security measures Anti-virus software Anti-spyware program Latest patches for all software

Information security measures Firewalls—provide protection from external attacks SSH Firefox SFTP

Information security measures Access controls—control who can log onto the computer and which directories or files a person who logs on can access Intrusion detection Encryption—protect sensitive information and prevent session hijacking know have arepassword

Why do we need encryption? hub server packet sniffer

What is SSH? Secure shell program Encrypted transmissions Telnet-like utility Secure File Transfer Protocol

Secure shell client %ls %ls client server file1 file2 % file1 file2 %

Encryption method Encryption key RSA, ECC, DES, AES… ximop-qykam-lazyv…

Encryption methods Public-key encryption Symmetric-key encryption

Public-key encryption client server public key (encodes) private key (decodes) client

Public-key encryption (cont'd) client server lockunlock server's public key server's private key symmetric key

Symmetric-key encryption client server symmetric key message

Downloading SSH

Downloading SSH

Downloading SSH

Downloading SSH

Scroll down

Downloading SSH

For Mac users - Fugu

Fugu “Fugu 1.2 is not compatible with Mac OS 10.7 (Lion).”

SSH Secure Shell Client

uhunix.hawaii.edu donnab password

SSH Secure Shell Client

*******

Welcome to uhunix.hawaii.edu ================================================ Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of Hawaii Executive Policy E ================================================ ANNOUNCEMENTS: For Current Status and Alerts, see %

Transferring files Fugu For pc users For Mac users

Secure File Transfer for pc users Files and directories on your computer Files and directories on remote computer

Fugu for Mac users Files and directories on your computer Files and directories on remote computer Fugu