Chapter 1. Introducing the Secure Protocols
The network has never been safe. As your data travels the network, it can be monitored, copied, or silently changed without your knowledge. Rogue users can hijack the connection to your mail server and read your corporate secrets. Physical console access is not practical when data centers are outsourced or when system administrators are on a separate continent. Thus, secure network connections are a business requirement for globally interconnected systems. Remote-access, cryptographic-protocol-based tools, such as Secure Shell or virtual private networks, were developed to defend against network security threats and to provide secure access.
Security History and Protocols
In the beginning, there was Telnet, ...
Get Secure Shell in the Enterprise now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.