SSH Proxy Tunneling Case Study

835 Words4 Pages

!!!What Is SSH Proxy Tunneling?

Imagine you are in a group of people sitting at a round table. Everyone speaks the same language English (open connections). Simultaneous conversations are going on across the table (__data transmissions__). Anything that is said could be overheard, listened to, repeated or stolen (__vulnerable__ data) from and by anyone present or in close proximity to the round table. Your conversation is not secure! You can decide to speak in another language hoping others do not understand(__encryption__). It is somewhat secure, but definitely not guaranteed. You go a step further and use a private telephone line (__secure tunnel__ ) and have a better secured private conversation across the table. With the telephone, even …show more content…

As much as the internet has become the giant that it is, for our communications, it is also a source of great peril because of its security risks. Communication transmissions are therefore done within various secure environments. One such environment is the SSH tunnel. SSH (Secure shell) __Proxy tunneling__ is an encrypted tunnel that is created to allow data transmissions through a secure SSH protocol between devices over a network. This means that traffic which is unencrypted (English conversation) is given a safe and secure passage (telephone connection) to its …show more content…

Therefore, there are many methods of securing these data transmissions. We will look at the following SSH applications.

!!Encrypted File Transfers

The internet provides the largest medium for file transfer. Internet connections facilitate file access transfers and file management as a whole. An e-learning establishment for example may have cause to frequently transit large files between students and tutors as work, notes and lessons are distributed daily. Even though unsecured file transfer protocols may be established the SSH provides a secure tunnel through which these transmissions take place.

!!Secure Command Shell

Another important use of SSH tunneling is the transmission of administrative commands. Remote administration has become an invaluable tool to both system administrators and users. Has a system administrator who is not within your geographical location, ever taken control of your client machine and sorted something out? If so then you have experienced remote administration. In the execution of remote administration by system administrators from remote locations. system commands and programs such as shutdown, startup, updates and installations are executed through the secure encrypted tunnels provided by SSH on remote client machines and

More about SSH Proxy Tunneling Case Study

Open Document