Computer Science, asked by pankhuri3277, 9 months ago

how does an SSH protocol protect data?​

Answers

Answered by theutpal
16

Explanation:

Secure Shell was created to replace insecure terminal emulation or login programs, such as Telnet, rlogin (remote login) and rsh (remote shell); SSH enables the same functions (logging in to and running terminal sessions on remote systems). SSH also replaces file transfer programs, such as File Transfer Protocol (FTP) and rcp (remote copy).

The most basic use of SSH is for connecting to a remote host for a terminal session.

Answered by Anonymous
9

Answer:

By authenticating and encrypting every session, SSH in networking protects data against overt forms of cyberattack perpetrated by system hijackers, as well as subtler forms of information theft like packet sniffing

Similar questions