In: Operations Management
Please no plagiarism and must be in your own 500 words.
Discuss both advantages and disadvantages of remote authentication protocols and how the business will use them.
Secure Shell has many options to prevent certain vulnerabilities in the password tool.Passwords are sent encrypted online. Therefore, it is not possible to obtain a passwordthrough network traffic. Passwords are also not stored in the client. Blank passwords are notallowed by default
On the server side, the Secure Shell protocol depends on an operating system that guaranteesthe confidentiality of user passwords. The Tectia SSH server also supports passwordlimitation, which makes it difficult to use energy and vocabulary.
SecureShell does not protect you from incorrect passwords. If an attacker could enter orobtain the password of a legitimate user, an attacker could prove to be a legitimate user.These bad passwords can also be saved by attacking the dictionary from a remote computer.
Password verification can also be used as a standard control method. This is the case with theSSH Tectia connector when all users use the same connection data. In this case, only the dataencryption and data integrity services are provided.
ADVANTAGES:
Simple to use
Simple to deploy—since the operating system provides the user accounts and password, almost no extra configuration is needed.
Generic password use with SSH Tectia Connector
DISADVANTAGES:
Security is entirely based on confidentiality and the strength of the password.
Does not provide strong identity check