Changes

Jump to: navigation, search

OPS235 Lab 7 - CentOS7

304 bytes added, 10:34, 23 July 2015
no edit summary
|}
As a system administrator, you have the ability to generate or create public and private keys to ensure safe and secure ssh connections. The system administer can generate these keys for the first time, of if they suspect that a hacker has compromised the server, can remove the existing keys and generate new keys. A common type of attack, Arp Poisoning (Man in the Middle Attack), can be used to redirect packets to a third party while maintaining the illusion that the connection is secure. Therefore, understanding about the generation and management of public/private keys are important to the security of servers.
13,420
edits

Navigation menu