September 13th, 2017 By Kelly Sheridan
Frequently used but underappreciated, Secure Shell is rarely secured, assessed, documented, or managed in a systematic way, researchers report.
Most businesses use the Secure Shell (SSH) technology, a cryptographic protocol designed to enable secure file transfers and remote communications. However, it’s rare they appropriately secure, document, routinely assess, and manage SSH, as reported in a new ISACA paper released Tuesday.
SSH was developed as a secure alternative to telnet and rsh/rexec. It’s primarily used to allow a remote command shell (for example, the Bourne shell or C shell) over a network connection. It also allows port-forwarding capability and implements SFTP to allow secure file transfer.
Powered by WPeMatico