web analytics

Businesses Fail to Properly Secure, Assess SSH: ISACA

September 13th, 2017   By  Kelly Sheridan

 

Frequently used but underappreciated, Secure Shell is rarely secured, assessed, documented, or managed in a systematic way, researchers report.

 

Most businesses use the Secure Shell (SSH) technology, a cryptographic protocol designed to enable secure file transfers and remote communications. However, it’s rare they appropriately secure, document, routinely assess, and manage SSH, as reported in a new ISACA paper released Tuesday.

 

SSH was developed as a secure alternative to telnet and rsh/rexec. It’s primarily used to allow a remote command shell (for example, the Bourne shell or C shell) over a network connection. It also allows port-forwarding capability and implements SFTP to allow secure file transfer.

 

Full Article.

Take a look at the best antivirus, anti-malware, anti-spy, etc. software

Powered by WPeMatico