logo

BN203 Network Security MIT

   

Added on  2020-02-23

7 Pages1660 Words49 Views

Table of Contents
Table of Contents............................................................................................... 1
1. Network Addressing Problem....................................................................2
2. Threats.......................................................................................................... 2
3. Network Diagram......................................................................................... 3
4. Security Objectives...................................................................................... 4
5. Difference between Version 4 and Version 5..........................................4
6. Organizations............................................................................................... 5
References.......................................................................................................... 5
1

1. Network Addressing Problem
Kerberos is a protocol that is used for sharing the secret information and it
makes use of the trusted third party to evaluate the identity like usernamne and
password of the client. The clients may be either users, servers or may be a
software. The trusted third party is known as the Key Distribution Center called
KDC which is used to run the Daemons of the Kerberos [1] . Kereberos has the
ability to make the enterprise in a secured manner. The Kerberos are used to
send the passwords of the plaintext in a secured way which is transmitted in a
network. This system is used for centralizing the information of the user like
username and password which is used for data manipulation. Ultimately it is
used in the prevention of storing password information by reducing the chance in
which a single machine's compromise will make results in other compromises
[2].
2. Threats
Authentication is known as the method for finding the entity by using the
username and password. Threats that are involved in the authentication are as
follows
Eavesdropping of the network
A Hacker can find the user's identity or else the credentials of the user like
username and password by reading the traffic of the network.
Brute Force Attacks
Hacker makes guess on the username and password of the user by using
the brute force.
Dictionary Attack
Dictionary attack can be used by the hacker by trying out all the
possibilities that are common terms in a dictionary.
Cookie Replay attack
A hacker can access the authenticated session of the data transmission by
reusing the cookie that is being stolen [4].
2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BN203, Organisational Use of Kerberos
|10
|2029
|38

What is Kerberos and How Does it Work?
|10
|1596
|33

BN203 Network Security Assignment - MIT
|7
|1529
|101

Computer Security: Key Distribution and Malicious Code Threats
|4
|720
|141

Information and Systems Security
|6
|1029
|28

COIT20262 - Advanced Network Security
|7
|1530
|156