diff --git a/2020/2020-02-15_gnuLinuxCourse/slides/ssh_intro_3.md b/2020/2020-02-15_gnuLinuxCourse/slides/ssh_intro_3.md new file mode 100644 index 0000000000000000000000000000000000000000..69f6814305228aa9629a5935f10d81ec5ad4deb4 --- /dev/null +++ b/2020/2020-02-15_gnuLinuxCourse/slides/ssh_intro_3.md @@ -0,0 +1,39 @@ +# Accessing Computers over Network (Securely) + +* Normally, very few ports are open on a modern (LCSB) server + +<!-- .element: class="fragment" --> +* In addition, the communication to and from ports is typically encrypted + - Why? Because, between the sender and a recepient there is a whole + jungle of transfer network nodes, each of which is potentially + [p(owned)][1] by an adversary + + <!-- .element: class="fragment" --> + - For a thorough introduction, see [this set of EFF articles][2] + + <!-- .element: class="fragment" --> + - _Transparency is a virtue of the naive_ + - remember, we're not doing politics + + <!-- .element: class="fragment" --> + + <!-- .element: class="fragment" --> + +<!-- .element: class="fragment" --> +* In the context of todays lecture, one type of encrypted + communication protocol will help us solve three fundamental + questions + - How to securely log in to a server? + + <!-- .element: class="fragment" --> + - How to securely interact with a server? + + <!-- .element: class="fragment" --> + - How to securely exchange any kind (and amount) of data with a server? + + <!-- .element: class="fragment" --> + +<!-- .element: class="fragment" --> + +[1]: https://en.wikipedia.org/wiki/Zombie_(computing) +[2]: https://ssd.eff.org/