Secure Shell (SSH) protocol

GPTKB entity

Statements (51)
Predicate Object
gptkbp:instance_of gptkb:XMPP_Extension_Protocol
gptkbp:based_on gptkb:RFC_4251
gptkb:RFC_4252
gptkb:RFC_4254
gptkb:RFC_4253
gptkbp:communication password authentication
public key authentication
keyboard-interactive authentication
gptkbp:developed_by gptkb:IETF
gptkbp:first_released gptkb:1995
gptkbp:functionality tunneling
command execution
secure file transfer
gptkbp:has_variants gptkb:SSH-1
gptkb:SSH-2
gptkbp:home_port gptkb:22
https://www.w3.org/2000/01/rdf-schema#label Secure Shell (SSH) protocol
gptkbp:is_compatible_with gptkb:DJ
gptkb:SFTP
X11 forwarding
gptkbp:is_implemented_in gptkb:Bitvise_SSH_Server
gptkb:Pu_TTY
gptkb:Win_SCP
gptkb:chess_match
gptkbp:is_often_used_in gptkb:software_framework
system administration
network management
gptkbp:is_part_of gptkb:XMPP_Extension_Protocol
gptkbp:is_related_to TLS
VPN
RDP
gptkbp:is_standardized_by gptkb:ISO/_IEC_27001
gptkb:ISO/_IEC_15408
gptkb:IETF
gptkbp:is_supported_by Windows operating systems
most Unix-like operating systems
gptkbp:is_used_by gptkb:smartphone
gptkb:operating_system
gptkbp:is_used_for secure communications
secure data transfer
secure application access
remote server management
gptkbp:primary_source secure remote login
gptkbp:security_features hashing
asymmetric encryption
man-in-the-middle attacks
symmetric encryption
eavesdropping
session hijacking
gptkbp:bfsParent gptkb:SSH_Communications_Security
gptkbp:bfsLayer 6