Another Pesky Security Detail
For small business owners, the multitude of tasks associated with having a website can seem like a disruption to the “real work” of running the business. And, to their website developers, the security tasks associated with having a website can seem like a loss, not a gain. The real answer is that security practices help assure that the ROI to be had from a website aren’t lost. SSH protects your website’s file structure.
What is a Public Key
The image of the lock has a key to open it. Depending on what type of lock it is, you may need the key to lock it, or you may be able just to push the post down into the hole and lock it without a key. If you can just push the post down into the hole, locking it is public, anyone can do it. If you need a key to lock it, both the locking and unlocking are private actions.
The second answer is interesting because it goes into the math.
For information on the difference between symetric and asymetric:
This is a very good question – answer set on StackOverflow. It considers situations, as well as the technical issues. And, it points out where the idea of a “key” fails. But, first, you may be wondering what public and private keys are, and why they matter.