BN203 Network Security MIT

Added on -2020-02-23

| BN203| 7 pages| 1660 words| 49 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 7 pages

Table of Contents
Table of Contents............................................................................................... 1
1. Network Addressing Problem....................................................................2
2. Threats.......................................................................................................... 2
3. Network Diagram......................................................................................... 3
4. Security Objectives...................................................................................... 4
5. Difference between Version 4 and Version 5..........................................4
6. Organizations............................................................................................... 5
References.......................................................................................................... 5
1
1. Network Addressing Problem
Kerberos is a protocol that is used for sharing the secret information and it
makes use of the trusted third party to evaluate the identity like usernamne and
password of the client. The clients may be either users, servers or may be a
software. The trusted third party is known as the Key Distribution Center called
KDC which is used to run the Daemons of the Kerberos [1] . Kereberos has the
ability to make the enterprise in a secured manner. The Kerberos are used to
send the passwords of the plaintext in a secured way which is transmitted in a
network. This system is used for centralizing the information of the user like
username and password which is used for data manipulation. Ultimately it is
used in the prevention of storing password information by reducing the chance in
which a single machine's compromise will make results in other compromises
[2].
2. Threats
Authentication is known as the method for finding the entity by using the
username and password. Threats that are involved in the authentication are as
follows
Eavesdropping of the network
A Hacker can find the user's identity or else the credentials of the user like
username and password by reading the traffic of the network.
Brute Force Attacks
Hacker makes guess on the username and password of the user by using
the brute force.
Dictionary Attack
Dictionary attack can be used by the hacker by trying out all the
possibilities that are common terms in a dictionary.
Cookie Replay attack
A hacker can access the authenticated session of the data transmission by
reusing the cookie that is being stolen [4].
2

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this