Está en la página 1de 2

Reflection:

Secure Shell (SSH) is a cryptographic network protocol for operating network services
securely over an unsecured network. The best known example application is for remote login to
computer systems by users. SSH provides a secure channel over an unsecured network in a
client-server architecture, connecting an SSH client application with an SSH server. Common
applications include remote command-line login and remote command execution, but any network
service can be secured with SSH. The logic is that there are a lot more combinations of SSH keys
than passwords so it is a lot harder to guess. Using SSH keys also allows you to disable password
authentication meaning that most of the automated attacks going round the internet will be
useless.
As for my understanding, with regard to physical security there's no difference between
saving a password and having an unencrypted SSH key on your device if it gets lost or stolen.
With regards to this activity, it was relatively easy to complete because the instructions were clear
enough to follow. As a result, the activity was done in a short amount of time.

También podría gustarte