<Tr> <Td> </Td> <Td> This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed . (July 2008) (Learn how and when to remove this template message) </Td> </Tr> <P> Secure copy or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts . It is based on the Secure Shell (SSH) protocol . "SCP" commonly refers to both the Secure Copy Protocol and the program itself . </P> <P> The SCP is a network protocol, based on the BSD RCP protocol, which supports file transfers between hosts on a network . SCP uses Secure Shell (SSH) for data transfer and uses the same mechanisms for authentication, thereby ensuring the authenticity and confidentiality of the data in transit . A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default . Like RCP, there is no RFC that defines the specifics of the protocol . </P> <P> Normally, a client initiates an SSH connection to the remote host, and requests an SCP process to be started on the remote server . The remote SCP process can operate in one of two modes: </P>

How does secure copy (scp) attempt to securely transmit data over the internet
find me the text answering this question