Download presentation
Presentation is loading. Please wait.
Published byBrice Gaines Modified over 9 years ago
1
Introduction to SSH Making connections donna Bair-Mundy
2
Library of Congress Thomas Website (normal view)
3
Library of Congress Thomas Website (2000)
4
Potential threats to university and library computers Thieves who want personal data Names and addresses Telephone numbers Social security numbers
5
Hamilton Library UH Warns Students, Faculty Of Potential ID Theft June 17, 2005 http://www.thehawaiichannel.com/news/4622931/detail.html?rss=hon&psp=news HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee. The warning is for all students and faculty at the campuses from 1999-2003. While there is no evidence she stole IDs from the university, everyone is being cautious. Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until 2003. Right now, she is a fugitive. Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk....
6
Potential threats to university and library computers Disgruntled patrons or employees
7
Potential threats to university and library computers Hackers who use vulnerable computers to attack other sites “Hacktivists” who want to spread a political message
8
Information security measures Physical security—protect against theft and physical damage Room with no windows and no public access Door with combination lock
9
Information security measures Anti-virus software Anti-spyware program Latest patches for all software
10
Information security measures Firewalls—provide protection from external attacks SSH Firefox SFTP 115 22 115 1689 115
11
Information security measures Access controls—control who can log onto the computer and which directories or files a person who logs on can access Intrusion detection Encryption—protect sensitive information and prevent session hijacking know have arepassword
12
Why do we need encryption? hub server packet sniffer
13
What is SSH? Secure shell program Encrypted transmissions Telnet-like utility Secure File Transfer Protocol
14
Secure shell client %ls %ls client server file1 file2 % file1 file2 %
15
Encryption method Encryption key RSA, ECC, DES, AES… ximop-qykam-lazyv…
16
Encryption methods Public-key encryption Symmetric-key encryption
17
Public-key encryption client server public key (encodes) private key (decodes) client
18
Public-key encryption (cont'd) client server lockunlock server's public key server's private key symmetric key
19
Symmetric-key encryption client server symmetric key message
20
Downloading SSH http://www.hawaii.edu/
21
Downloading SSH http://www.hawaii.edu/
22
Downloading SSH
23
http://www.hawaii.edu/technology/
24
Downloading SSH
28
Scroll down
29
Downloading SSH
30
For Mac users - Fugu
31
Fugu “Fugu 1.2 is not compatible with Mac OS 10.7 (Lion).”
32
SSH Secure Shell Client
34
uhunix.hawaii.edu donnab password
35
SSH Secure Shell Client
37
*******
38
Welcome to uhunix.hawaii.edu ================================================ Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of Hawaii Executive Policy E2.210. ================================================ ANNOUNCEMENTS: For Current Status and Alerts, see http://www.hawaii.edu/technews/ %
39
Transferring files Fugu For pc users For Mac users
40
Secure File Transfer for pc users Files and directories on your computer Files and directories on remote computer
41
Fugu for Mac users Files and directories on your computer Files and directories on remote computer Fugu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.