1 / 10

How SSH (Secure Socket Shell) Works

SSH (Secure Shell) is a network protocol used to establish a secure and encrypted connection between two computers over an unsecured network, such as the internet. It provides a secure channel for remote login, data transfer, and other network services.

Download Presentation

How SSH (Secure Socket Shell) Works

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UNDERSTANDING HOW SSH (SECURE SOCKET SHELL) WORKS SWIPE LEFT @infosectrain @infosectrain

  2. 2 JACK: What are you doing? JILL: I am sending an important file to my manager. www.infosectrain.com

  3. 3 JACK: Don’t you think it is risky? JILL: How? www.infosectrain.com

  4. 4 JACK: What if someone intercepts and reads your file without your permission? JILL: What is the safest way for me to send this file to my manager? www.infosectrain.com

  5. 5 JACK: Use SSH protocol JILL: ? What is SSH protocol? www.infosectrain.com

  6. 6 JACK: SSH is a network protocol that allows users to access and communicate with remote computers over an unsecured network. JILL: How will it protect ? my file? www.infosectrain.com

  7. 7 JACK: You attach your file in a message, secure it with a lock (encryption key) (now only you have the key), and send it to your manager. JILL: ? How will he know my key? www.infosectrain.com

  8. 8 JACK: Your manager doesn’t have your key. So he adds another lock to the file and returns it to you. JILL: X But he didn’t read my file yet. www.infosectrain.com

  9. 9 JACK: Now that your manager's lock is locked, you use your key to open that file and send it back to him. Then, without anyone being able to intercept it, he uses his key to unlock the file and reads it. www.infosectrain.com

  10. The SSH Protocol The SSH protocol transmits data between client and server using symmetric solid encryption, hashing, and public-key cryptography. THANK YOU

More Related