CISE Help & Resources
Secure Access Overview
Most internet applications that involve per-user access (remote logins, remote mail retrieval, etc.) follow a very simple protocol:
- The user connects to the remote service
- The user is prompted to enter a username
- The user sends the username to the remote service
- The user is prompted to enter a password
- The user sends the password to the remote service
- If username and password are verified, the remote service grants the remote user access
This kind of protocol is designed to allow the user in question and only the user to access this service, since, theoretically, the user's password is not divulged to anyone else barring password sharing on the part of the user himself.
Unfortunately, on the internet, this isn't necessarily the case. It is often possible for machines on the same network as either the user or the remote server to monitor and read traffic intended to be private. Through the use of a network "sniffer", unauthorized users can eavesdrop on others' communications, what may include passwords or other sensitive data.
The best way to help prevent such eavesdropping on network connections is through the use of strong cryptography. By using strong cryptography, sensitive information (your password, etc) is sent across the network securely encoded, preventing eavesdroppers from obtaining the information.
All access to CISE machines requires secure protocols.