Computer Applications
Answer
The SSH (Secure Socket Shell) protocol protects data in the following ways:
- Before transferring data between the client and the host computer, the SSH calls upon the SFTP (Secure File Transfer Protocol) to authenticate both the server and the client machine.
- Once the authentication process gets over, the SFTP protocol works on to set a secure channel between the client and the host computer by establishing a secure connection and then only the data transmission is initiated.
- SFTP (Secure File Transfer Protocol) protects the integrity of the data using encryption and cryptographic hash function techniques.
Related Questions
Discuss the basic requirements for connecting to an FTP server.
Discuss briefly a few disadvantages of video conferencing.
What do you mean by the term PC banking?
Parul has been given a table which contains a list of e-mail addresses. She has been asked to find all the valid e-mail addresses in the list and put a tick mark in front of them. Help her in finishing the given assignment.
aditi_gupta@rediffmail.com
tanmay(45)@webmail.ac.in
www.jay-singh.com
rini@86india@yahoo.com
harsh.kumar@yahoo.co.in