PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2005

SSHv2: Safe & Secure

BITS & BOLTS The overhauled encryption protocol helps harden networks. SSH is a powerful suite of programs that enable enterprises to harness the power of encryption to protect data in transit. Some security managers shy away from encryption because it can be difficult and costly to implement. But SSHv2, a completely overhauled version of the protocol and often included free with Linux distributions, is a practical option that gives skilled practitioners a versatile tool to enhance confidentiality, integrity, authentication and nonrepudiation. SSH was created for two fundamental purposes: as a replacement for Telnet and as an encryption tunnel for protecting other protocols. This basic functionality can be leveraged to secure your network in many of the areas in which it's most vulnerable. SSHv2 is more secure and functional than the original protocol, although SSHv1 is still in widespread use. Applications like Telnet and FTP, which were fine for remote access and file transfers not that long ago, are now security nightmares. ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Security: Measuring Up

    by  Pete Lindstrom

    Metrics are the key to measuring security. Learn how to gather data and calculate the answers you need.

  • On the Job

    12 lessons they don't teach you in security school about being a CISO.

Columns in this issue