What is Secure Shell Connection (SSH) | Definition and its purpose


Secured Shell referred to as SSH or Secure Socket Shell is a secure way to access a computer over an insecure network — like the internet. SSH most often uses public key pairs or asymmetric cryptography to authenticate hosts to each other.

Think of this like you were sending a package to a friend in the mail. Without SSH, the package could be opened by anyone with SSH, the package is locked and only you have the key.

Once your friend receives it, they put a lock on it, and send it back, now with two unique locks.

When you receive it, you remove your lock in send it back, now with only their lock on it. When they

get back, they can remove their lock and with their key read the entire message.


Purpose of SSH

SSH stands for Secure Shell Access that provides a secure connection to another computer typically a server to perform tasks like remotely executing shell commands like you might want to see

  • How much disk space is on a server
  • Install a new service or app
  • Log in to the remote machine and run pretty much any command you need to

SSH can also be used to secure any type of network resource


what is SSH used for

The problem with connecting to a remote machine over the internet is that your data will pass through many networks some of which could be unsecured and have malicious programs or users listening for interesting requests for example,

If you were trying to run a command on a remote server from your local computer over the internet your transmission could be intercepted viewed, and possibly modified before it reached its intended target SSH prevents this by creating a secure connection between the two devices where you can safely send requests to run commands on the remote server SSH can also be used to secure any type of network resource.



SSH supports

  • secure file transfer
  • Remote device management
  • Account control
  • Tunneling
  • Forwarding TCP ports and x 11 connections.

The current version, SSH-2 is nearly 14 years old and has no known exploitable vulnerabilities

Leave a Comment