introduction to ssh making connections donna bair-mundy

41
Introduction to Introduction to SSH SSH Making connections Making connections donna Bair-Mundy

Upload: brice-gaines

Post on 01-Jan-2016

232 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Introduction to SSH Making connections donna Bair-Mundy

Introduction to SSHIntroduction to SSH

Making connectionsMaking connections

donna Bair-Mundy

Page 2: Introduction to SSH Making connections donna Bair-Mundy

Library of CongressThomas Website (normal view)

Page 3: Introduction to SSH Making connections donna Bair-Mundy

Library of CongressThomas Website (2000)

Page 4: Introduction to SSH Making connections donna Bair-Mundy

Potential threats to university and library computers

Thieves who want personal data

Names and addresses

Telephone numbers

Social security numbers

Page 5: Introduction to SSH Making connections donna Bair-Mundy

Hamilton Library UH Warns Students, Faculty Of Potential ID TheftJune 17, 2005http://www.thehawaiichannel.com/news/4622931/detail.html?rss=hon&psp=news

HONOLULU -- Students and faculty who attended or worked at all 10 campuses of the University of Hawaii system are being encouraged to take steps to protect themselves against identity theft after a recent case involving a former library employee.

The warning is for all students and faculty at the campuses from 1999-2003. While there is no evidence she stole IDs from the university, everyone is being cautious.

Deborah Jenkins was employed at Manoa's Hamilton Library from 2001 until 2003. Right now, she is a fugitive.

Jenkins had access to more than 150,000 students, faculty, staff and patrons. Anyone who checked out materials at any UH campus library between 1999 and 2003 may be at risk. ...

Page 6: Introduction to SSH Making connections donna Bair-Mundy

Potential threats to university and library computers

Disgruntled patrons or employees

Page 7: Introduction to SSH Making connections donna Bair-Mundy

Potential threats to university and library computers

Hackers who use vulnerable computers to attack other sites

“Hacktivists” who want to spread a political message

Page 8: Introduction to SSH Making connections donna Bair-Mundy

Information security measures

Physical security—protect against theft and physical damage

Room with no windows and no public access

Door with combination lock

Page 9: Introduction to SSH Making connections donna Bair-Mundy

Information security measures

Anti-virus software

Anti-spyware program

Latest patches for all software

Page 10: Introduction to SSH Making connections donna Bair-Mundy

Information security measuresFirewalls—provide protection from external attacks

SSH

Firefox

SFTP115

22

115

1689

115

Page 11: Introduction to SSH Making connections donna Bair-Mundy

Information security measures

Access controls—control who can log onto the computer and which directories or files a person who logs on can access

Intrusion detection

Encryption—protect sensitive information and prevent session hijacking

know

have

are

passwordpassword

Page 12: Introduction to SSH Making connections donna Bair-Mundy

Why do we need encryption?

hub

server

packet sniffer

Page 13: Introduction to SSH Making connections donna Bair-Mundy

What is SSH?

Secure shell program

Encrypted transmissions

Telnet-like utility

Secure File Transfer Protocol

Page 14: Introduction to SSH Making connections donna Bair-Mundy

Secure shell client

%ls

%lsclient

serverfile1file2%

file1file2%

Page 15: Introduction to SSH Making connections donna Bair-Mundy

Encryption

Encryptionmethod

Encryptionkey

RSA, ECC, DES, AES…

ximop-qykam-lazyv…

Page 16: Introduction to SSH Making connections donna Bair-Mundy

Encryption methods

Public-keyencryption

Symmetric-keyencryption

Page 17: Introduction to SSH Making connections donna Bair-Mundy

Public-key encryption

client

server

publickey

(encodes)

privatekey

(decodes)

client

client client

Page 18: Introduction to SSH Making connections donna Bair-Mundy

Public-key encryption (cont'd)

client

server

lock unlock

server'spublic

key server's private

key

symmetric key

symmetric key

Page 19: Introduction to SSH Making connections donna Bair-Mundy

Symmetric-key encryption

client

server

symmetric key

symmetric key

message

Page 20: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

http://www.hawaii.edu/

Page 21: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

http://www.hawaii.edu/

Page 22: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 24: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 25: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 26: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 27: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 28: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Scrolldown

Page 29: Introduction to SSH Making connections donna Bair-Mundy

Downloading SSH

Page 30: Introduction to SSH Making connections donna Bair-Mundy

For Mac users - Fugu

Page 31: Introduction to SSH Making connections donna Bair-Mundy

Fugu

“Fugu 1.2 is not compatible with

Mac OS 10.7 (Lion).”

Page 32: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

Page 33: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

Page 34: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

uhunix.hawaii.edu

donnab

password

Page 35: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

Page 36: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

Page 37: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

*******

Page 38: Introduction to SSH Making connections donna Bair-Mundy

SSH Secure Shell Client

Welcome to uhunix.hawaii.edu================================================Unauthorized access is prohibited by law in accordance with Chapter 708, Hawaii Revised Statutes; all use is subject to University of HawaiiExecutive Policy E2.210.================================================ANNOUNCEMENTS:For Current Status and Alerts, see http://www.hawaii.edu/technews/

%

Page 39: Introduction to SSH Making connections donna Bair-Mundy

Transferring files

Fugu

For pc users

For Mac users

Page 40: Introduction to SSH Making connections donna Bair-Mundy

Secure File Transfer for pc users

Files and directories on your computer

Files and directories on

remote computer

Page 41: Introduction to SSH Making connections donna Bair-Mundy

Fugu for Mac users

Files and directories on your computer

Files and directories on

remote computer

Fugu