You have just contracted with a third-party to provide web hosting for your organization, and all of the servers are located at a remote facility. Which of these methods would allow you to securely manage your servers over your insecure Internet connection?
E) Just wear sunglasses when you log in
The answer: D) ssh
Secure shell (ssh) is a secure protocol that encrypts a console connection, allowing you to manage remote devices without the fear of someone grabbing your packets and viewing your usernames, passwords, and server content.
Want to know more? Watch “Firewalls and Secure Connections.”
There are a number of important security components that should be part of our normal computer use. In this video, you’ll learn the fundamentals of communicating securely over the network and using the Windows Firewall to protect your computer from attack.