Security Technique using SSH Tunneling for CCTV Remote Access
نویسندگان
چکیده
منابع مشابه
Flexible and Scalable Public Key Security for SSH
A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. However, widely-deployed implementations of the protocol are vulnerable to man-in-the-middle attacks, where an adversary substitutes her public key for the server’s. This danger particularly threatens a traveling user Bob borrowin...
متن کاملThe CRUD Security Matrix: A Technique for Documenting Access Rights
The CRUD matrix is an excellent technique to model processes and data and how they interact with respect to creation, reading, updating, and deleting of the data. In this paper, we extend the CRUD matrix to a CRUD Security Cube where we propose incorporating a third dimension on the matrix to include individuals or groups and the rights and security privileges granted to each. This additional d...
متن کاملImage import and SSH security in Emulab
Cloud providers typically provide compute facilities for their users. It would be very convenient if users’ could import and export their machines with much greater ease to other cloud providers or to their desktops or local machines. Here, we talk about how we’ve enabled users to easily do this with Emulab. Specifically, we’ve implemented image import mechanisms to import machines from cloud p...
متن کاملVision Processing in Intelligent CCTV for Mass Transport Security
Intelligent Surveillance Systems is attracting unprecedented attention from research and industry. In this paper, we describe a real-life trial system where various video analytic systems are used to detect events and objects of interests in a mass transport environment. The system configuration and architecture of this system is presented. In addition to implementation and scalability challeng...
متن کاملThe Risks of Using SSH
Executive Summary This paper deals with security issues surrounding the use of Secure Shell (SSH). SSH is a replacement for telnet, rlogin, ftp, rsh, rcp, rdist, and other r*-based programs. It offers a secure communication channel between computers on an insecure network. Authenticity, confidentiality, and integrity are provided. Despite these features, SSH has several weaknesses that render i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society
سال: 2016
ISSN: 1975-4701
DOI: 10.5762/kais.2016.17.11.148