Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Table of Contents Table of Contents...............................................................................................1 1.Network Addressing Problem....................................................................2 2.Threats..........................................................................................................2 3.Network Diagram.........................................................................................3 4.Security Objectives......................................................................................4 5.Difference between Version 4 and Version 5..........................................4 6.Organizations...............................................................................................5 References..........................................................................................................5 1
1.Network Addressing Problem Kerberos is a protocol that is used for sharing the secret information and it makes use of the trusted third party to evaluate the identity like usernamne and password of the client. The clients may be either users, servers or may be a software. The trusted third party is known as the Key Distribution Center called KDC which is used to run the Daemons of the Kerberos [1] . Kereberos has the ability to make the enterprise in a secured manner. The Kerberos are used to send the passwords of the plaintext in a secured way which is transmitted in a network. This system is used for centralizing the information of the user like username and password which is used for data manipulation. Ultimately it is used in the prevention of storing password information by reducing the chance in which a single machine's compromise will make results in other compromises [2]. 2.Threats Authentication is known as the method for finding the entity by using the username and password. Threats that are involved in the authentication are as follows Eavesdropping of the network A Hacker can find the user's identity or else the credentials of the user like username and password by reading the traffic of the network. Brute Force Attacks Hacker makes guess on the username and password of the user by using the brute force. Dictionary Attack Dictionaryattackcanbeusedbythehackerbytryingoutallthe possibilities that are common terms in a dictionary. Cookie Replay attack A hacker can access the authenticated session of the data transmission by reusing the cookie that is being stolen [4]. 2
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss