8. Conclusion
The SSH protocol is a powerful and practical approach to protecting communications on a computer network. Through its authentication mechanism, SSH enables remote connections, file transfers and other important functions such as tunneling and port forwarding to be carried out in a secure tunnel. The latter two have made SSH the most transparent security protocol for applications. Indeed, an unsecured application can benefit from all SSH's security services without any changes or additions to its code or kernel. SSH alone will maintain the security of application data, authentication of communicating entities, encryption and data integrity control.
However, even if SSH has been able to circumvent many network-related security threats, its specification is still more a software design than a true security protocol. Even though SSH version 2 has become more modular...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
References
Books
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference