L19 - T19A - S4 - Secure Shell

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:12 AM on 4/23/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

8 Terms

1
New cards

Secure Shell (SSH)

  • Remote access protocol that connects to a command interpreter

  • Uses TCP port 22 by default

  • Uses encryption to protect each session

  • Has many commercial + open-source versions for all major OSs

2
New cards
  • Pair

  • Fingerprint

  • Each SSH server is configured with a public/private encryption key ___1___ identified by a host key __2___

  • Clients use the host key ____2____ to verify that they are attempting to connect to a trusted server

    • This mitigates risk of on-path attacks

3
New cards

True

  • Alternatively there are various enterprise software products designed for SSH key management

True or False: A mapping of host names to SSH server keys can be kept manually by each SSH client

4
New cards
  • Key

  • Securely

The server’s host ___ pair is used to set up an encrypted channel so that the client can submit authentication credentials _____

5
New cards

2 common methods SSH allows for client authentication to the server

  • Password authentication

  • Public key authentication

Extra

  • These methods can be enabled or disabled as required on the server

6
New cards

Password Authentication — SSH Client-Server Authentication

The client submits a username and password that are verified by the SSH server either

  • Against a local user database

  • Using an authentication server

    • e.g. a RADIUS Server or TACACS+

7
New cards
<p>Public Key Authentication — SSH Client-Server Authentication</p>

Public Key Authentication — SSH Client-Server Authentication

The server is configured with a list of the public keys of authorized user account

  • The client requests authentication using one of these keys,

  • The server generates a challenge with the user’s public key

  • The client must use the matching private key it holds to decrypt the challenge

    • This completes the authentication process

8
New cards
  • Critical

  • SSH

  • Monitoring for and removing compromised client public keys is a ____ security task

  • Many recent attacks on web servers have exploited poor _____ key management

Explore top notes

note
Cyber Security
Updated 617d ago
0.0(0)
note
FYP April Oral Exam
Updated 1075d ago
0.0(0)
note
Biology 1 - Mod 3 Cell Discovery
Updated 1207d ago
0.0(0)
note
3 | Electron Configuration
Updated 1006d ago
0.0(0)
note
[Knowt] AP world history prep
Updated 1276d ago
0.0(0)
note
Cyber Security
Updated 617d ago
0.0(0)
note
FYP April Oral Exam
Updated 1075d ago
0.0(0)
note
Biology 1 - Mod 3 Cell Discovery
Updated 1207d ago
0.0(0)
note
3 | Electron Configuration
Updated 1006d ago
0.0(0)
note
[Knowt] AP world history prep
Updated 1276d ago
0.0(0)

Explore top flashcards

flashcards
Urinalysis - Sediment ID Test
39
Updated 200d ago
0.0(0)
flashcards
Unité 4 - Mes vacances
76
Updated 1188d ago
0.0(0)
flashcards
Ions Quiz
67
Updated 936d ago
0.0(0)
flashcards
Childhood Vocabulary
50
Updated 155d ago
0.0(0)
flashcards
AP Lit Literary Terms
50
Updated 1069d ago
0.0(0)
flashcards
Modern Architecture Exam 1
66
Updated 1074d ago
0.0(0)
flashcards
AP Lang "B-H"
41
Updated 1194d ago
0.0(0)
flashcards
Urinalysis - Sediment ID Test
39
Updated 200d ago
0.0(0)
flashcards
Unité 4 - Mes vacances
76
Updated 1188d ago
0.0(0)
flashcards
Ions Quiz
67
Updated 936d ago
0.0(0)
flashcards
Childhood Vocabulary
50
Updated 155d ago
0.0(0)
flashcards
AP Lit Literary Terms
50
Updated 1069d ago
0.0(0)
flashcards
Modern Architecture Exam 1
66
Updated 1074d ago
0.0(0)
flashcards
AP Lang "B-H"
41
Updated 1194d ago
0.0(0)