O'Reilly logo

Next Generation SSH2 Implementation by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Solutions in this chapter:

  • Attacking SSL: Hacking the User
  • Recognizing an SE Attack
  • Responding to an SE Event
  • Defending Against Social Engineering Attacks
  • Social Engineering Scenarios for Awareness Training
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

SSL has become the de facto standard for security transactions on the Internet. History proves it's a secure protocol and continued development provides real security improvements. Unfortunately, this protocol has provided a false sense of safety for the security and financial fields. SSL protocol can be breached based on the shortcomings of the user. This chapter will provide you with the information to protect SSL from compromise and help you develop a security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required