SANS Institute - ssh: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Updated description via script)
Tag: Reverted
(Updated via script)
Tag: Manual revert
 
Line 1: Line 1:
=Description=<br>
=Description=
SSH (Secure Shell) is a cryptographic network protocol for secure data communication, remote shell services or command execution and file transfer between two networked computers. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. It provides secure encrypted communications by using a combination of a private (secret) key and a public key. The private key is known only to the user, while the public key is freely distributed.=More Information=
<br>
SSH (Secure Shell) is a cryptographic network protocol for secure data communication, remote shell services or command execution and file transfer between two networked computers. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. It provides secure encrypted communications by using a combination of a private (secret) key and a public key. The private key is known only to the user, while the public key is freely distributed.
 
SSH
<br>
=More Information=
<br>
<br>
https://en.wikipedia.org/wiki/Secure_Shell
https://en.wikipedia.org/wiki/Secure_Shell
[[Category:Incident Reporting & Recovery]]
[[Category:Incident Reporting & Recovery]]
[[Category:Configuration Management]]
[[Category:Configuration Management]]

Latest revision as of 05:03, 23 April 2024

Description


SSH (Secure Shell) is a cryptographic network protocol for secure data communication, remote shell services or command execution and file transfer between two networked computers. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. It provides secure encrypted communications by using a combination of a private (secret) key and a public key. The private key is known only to the user, while the public key is freely distributed.

SSH

More Information


https://en.wikipedia.org/wiki/Secure_Shell