introduction to ssh making connections donna bair-mundy

Post on 01-Jan-2016

237 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Introduction to SSHIntroduction to SSH

Making connectionsMaking connections

donna Bair-Mundy

Library of CongressThomas Website (normal view)

Library of CongressThomas Website (2000)

Potential threats to university and library computers

Thieves who want personal data

Names and addresses

Telephone numbers

Social security numbers

Hamilton Library UH Warns Students, Faculty Of Potential ID TheftJune 17, 2005http://www.thehawaiichannel.com/news/4622931/detail.html?rss=hon&psp=news

HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee.

The warning is for all students and faculty at the campuses from 1999-2003. While there is no evidence she stole IDs from the university, everyone is being cautious.

Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until 2003. Right now, she is a fugitive.

Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk. ...

Potential threats to university and library computers

Disgruntled patrons or employees

Potential threats to university and library computers

Hackers who use vulnerable computers to attack other sites

“Hacktivists” who want to spread a political message

Information security measures

Physical security—protect against theft and physical damage

Room with no windows and no public access

Door with combination lock

Information security measures

Anti-virus software

Anti-spyware program

Latest patches for all software

Information security measuresFirewalls—provide protection from external attacks

SSH

Firefox

SFTP115

22

115

1689

115

Information security measures

Access controls—control who can log onto the computer and which directories or files a person who logs on can access

Intrusion detection

Encryption—protect sensitive information and prevent session hijacking

know

have

are

passwordpassword

Why do we need encryption?

hub

server

packet sniffer

What is SSH?

Secure shell program

Encrypted transmissions

Telnet-like utility

Secure File Transfer Protocol

Secure shell client

%ls

%lsclient

serverfile1file2%

file1file2%

Encryption

Encryptionmethod

Encryptionkey

RSA, ECC, DES, AES…

ximop-qykam-lazyv…

Encryption methods

Public-keyencryption

Symmetric-keyencryption

Public-key encryption

client

server

publickey

(encodes)

privatekey

(decodes)

client

client client

Public-key encryption (cont'd)

client

server

lock unlock

server'spublic

key server's private

key

symmetric key

symmetric key

Symmetric-key encryption

client

server

symmetric key

symmetric key

message

Downloading SSH

http://www.hawaii.edu/

Downloading SSH

http://www.hawaii.edu/

Downloading SSH

Downloading SSH

Downloading SSH

Downloading SSH

Downloading SSH

Downloading SSH

Scrolldown

Downloading SSH

For Mac users - Fugu

Fugu

“Fugu 1.2 is not compatible with

Mac OS 10.7 (Lion).”

SSH Secure Shell Client

SSH Secure Shell Client

SSH Secure Shell Client

uhunix.hawaii.edu

donnab

password

SSH Secure Shell Client

SSH Secure Shell Client

SSH Secure Shell Client

*******

SSH Secure Shell Client

Welcome to uhunix.hawaii.edu================================================Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of HawaiiExecutive Policy E2.210.================================================ANNOUNCEMENTS:For Current Status and Alerts, see http://www.hawaii.edu/technews/

%

Transferring files

Fugu

For pc users

For Mac users

Secure File Transfer for pc users

Files and directories on your computer

Files and directories on

remote computer

Fugu for Mac users

Files and directories on your computer

Files and directories on

remote computer

Fugu

top related