Term
|
Definition
collection of protocols that does both authenticating and encryption |
|
|
Term
|
Definition
securely log on to a host, execute commands on that host, and copy files to or from that host. Encrypts data throughout a session |
|
|
Term
|
Definition
SSH Communications Security and requires paying a license |
|
|
Term
|
Definition
top form a secure connection SSH must be running on both the client and server |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
SSH can be configured to perform port forwarding, which means it can redirect traffic that would normally use an insecure port (such as FTP) to an SSH secured port. |
|
|
Term
Functions of port forwarding |
|
Definition
allows to use SSH for more than simply logging onto a host and manipulating files, you could exchange HTTP traffic with a web server via a secured SSH connection. |
|
|
Term
|
Definition
method of encrypting TCP/IP transmissions-including web pages and data entered into Web forms-en route between the client and the server using public key encryption technology |
|
|
Term
|
Definition
cross platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system |
|
|