Nt1330 Unit 3

Great Essays
Secure Shell (SSH)

In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks.

SSH is a Cryptographic Network Protocol created to replace Telnet. Its purpose is to provide a secure connection between a client and server across a public network for data transfer or remote operation. When SSH is evoked, the client will begin the initial TCP handshake by distributing its public key with the server. Once received, the server will use that key to encrypt a session key that is then returned over the network. When the client receives this encrypted session key it uses its private key to decrypt it. Now the client and server both share the same session key
…show more content…
The first is the security that comes from establishing a session key, by regularly establishing new keys you lower the likely hood of an attacker gaining access to your network. Avoiding brute force attacks are mitigated by users becoming informed about not sharing their login credentials and generating stronger passwords. Another thing that combats this is having a honeypot to log attempted logins for all sessions. This implementation will flag administration by showing failed logins that could point to possible attacks in place. Another mitigation technique is to keep the SSH protocol at the latest stable version to fix previous problems. The vulnerability expressed earlier in [2] is fixed by a simple SSH update. Man in the middle attacks can be prevented by deploying some sort of certification mechanism to verify you the credentials of who you are in contact with

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 468 Words
    • 2 Pages

    The purpose of this lab was to analyze and examine periodic trends of the first 36 elements that are on the periodic table. Trends that were analyzed and examined are the atomic radius (AR) and the first ionization energy (IE) of the 36 elements. The hypothesis for this lab was that the elements that are in the groups that had the highest atomic radius would be in the same groups as those who have the the highest first ionization energy and the groups who have the lowest atomic radius would be in the same groups as those elements who have the lowest first ionization energy. In order for the lab to be completed, a chart that was split into four sections was made to collect all the necessary data that is needed to make the graphs. After the data has been collected, a graph that contains both trends was made on a piece of graph paper.…

    • 468 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5

    • 419 Words
    • 2 Pages

    Under the Provision and Use of Work Equipment Regulations 1998 (PUWER) an employer has a responsibility to maintain, in safe working order, all electrical equipment used in their business. All electrical items in school should have a portable appliance testing (PAT) done so everyone knows that they are safe to be used in school. The definition of portable equipment is that portable equipment consists of all equipment that is moveable and that when in use it is connected to an electricity source by means on flexible cable fitted with a plug. For example: • Office equipment like photocopiers, typewriters, personal computers, desk lamp and shredders. • Extension cables, transformers and battery chargers.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 634 Words
    • 3 Pages

    1. How do the various types of scores differ regarding the information they provide? Scores provide feedback to teachers and students and reflect how a student is learning, meeting objectives, and achievement level. Raw scores are actual scores calculated by the sum of total correct answers or percentage and provide criterion-referenced information about a student’s performance.…

    • 634 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1) Network traffic analysis shows that a single host is opening hundreds of SSH sessions to a single host every minute. a. The large number of attempted connections each minute suggests this is an attempted denial of service attack. This type of attack attempts to overload network resources with illegitimate traffic to deny service to legitimate users or business needs. IDS and IPS devices can detect all of this traffic, and the IPS can drop (or have border network devices such as firewalls drop) these packets to prevent the attack from succeeding.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 506 Words
    • 3 Pages

    1. can try to keep your child interested in his food longer by making mealtime as calm and uneventful as possible, without distractions from toys, television, or pets. 2. What are some strategies to use in getting children to try new foods? Let them try different foods on their own, Have kids pick off your plate, Amp up the fun factor, Mix up your child’s favorite dish by adding something new to it, simply have your child take five bites – and, if they don’t like it, have them politely say, “No, thank you.”…

    • 506 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing. IP addresses The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network.…

    • 1895 Words
    • 8 Pages
    Improved Essays