introduction to ssh making connections donna bair-mundy
TRANSCRIPT
Introduction to SSHIntroduction to SSH
Making connectionsMaking connections
donna Bair-Mundy
Library of CongressThomas Website (normal view)
Library of CongressThomas Website (2000)
Potential threats to university and library computers
Thieves who want personal data
Names and addresses
Telephone numbers
Social security numbers
Hamilton Library UH Warns Students, Faculty Of Potential ID TheftJune 17, 2005http://www.thehawaiichannel.com/news/4622931/detail.html?rss=hon&psp=news
HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee.
The warning is for all students and faculty at the campuses from 1999-2003. While there is no evidence she stole IDs from the university, everyone is being cautious.
Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until 2003. Right now, she is a fugitive.
Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk. ...
Potential threats to university and library computers
Disgruntled patrons or employees
Potential threats to university and library computers
Hackers who use vulnerable computers to attack other sites
“Hacktivists” who want to spread a political message
Information security measures
Physical security—protect against theft and physical damage
Room with no windows and no public access
Door with combination lock
Information security measures
Anti-virus software
Anti-spyware program
Latest patches for all software
Information security measuresFirewalls—provide protection from external attacks
SSH
Firefox
SFTP115
22
115
1689
115
Information security measures
Access controls—control who can log onto the computer and which directories or files a person who logs on can access
Intrusion detection
Encryption—protect sensitive information and prevent session hijacking
know
have
are
passwordpassword
Why do we need encryption?
hub
server
packet sniffer
What is SSH?
Secure shell program
Encrypted transmissions
Telnet-like utility
Secure File Transfer Protocol
Secure shell client
%ls
%lsclient
serverfile1file2%
file1file2%
Encryption
Encryptionmethod
Encryptionkey
RSA, ECC, DES, AES…
ximop-qykam-lazyv…
Encryption methods
Public-keyencryption
Symmetric-keyencryption
Public-key encryption
client
server
publickey
(encodes)
privatekey
(decodes)
client
client client
Public-key encryption (cont'd)
client
server
lock unlock
server'spublic
key server's private
key
symmetric key
symmetric key
Symmetric-key encryption
client
server
symmetric key
symmetric key
message
Downloading SSH
http://www.hawaii.edu/
Downloading SSH
http://www.hawaii.edu/
Downloading SSH
Downloading SSH
http://www.hawaii.edu/technology/
Downloading SSH
Downloading SSH
Downloading SSH
Downloading SSH
Downloading SSH
Scrolldown
Downloading SSH
For Mac users - Fugu
Fugu
“Fugu 1.2 is not compatible with
Mac OS 10.7 (Lion).”
SSH Secure Shell Client
SSH Secure Shell Client
SSH Secure Shell Client
uhunix.hawaii.edu
donnab
password
SSH Secure Shell Client
SSH Secure Shell Client
SSH Secure Shell Client
*******
SSH Secure Shell Client
Welcome to uhunix.hawaii.edu================================================Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of HawaiiExecutive Policy E2.210.================================================ANNOUNCEMENTS:For Current Status and Alerts, see http://www.hawaii.edu/technews/
%
Transferring files
Fugu
For pc users
For Mac users
Secure File Transfer for pc users
Files and directories on your computer
Files and directories on
remote computer
Fugu for Mac users
Files and directories on your computer
Files and directories on
remote computer
Fugu