SSH is a cryptographically protected remote login protocol that provides strong protection against password sniffing and spoofing attacks. When connecting to a server for the first time, the client has no way to verify the server's host key and will ask the user if they want to trust it. Encryption methods like AES and Blowfish can be used for encryption, with AES being the default, while older protocols like SSH-1 are still supported but less secure.