logo

Information Assurance and Information Technology Assignment 2022

   

Added on  2022-10-11

4 Pages721 Words13 Views
Running head: INFORMATION ASSURANCE AND INFORMATION TECHNOLOGY
1
Information assurance and information technology:
Name:
Institution:

INFORMATION ASSURANCE AND INFORMATION TECHNOLOGY
2
Information assurance and information technology
Authentication is a simple process that allows various users to give some credentials such as
passwords, fingerprints, smart cards, and a digital certificate. These credentials allow the
customers to log in to the system. And for the authentications to be made effective then there are
methods and protocols which will be used. Authentication is a process that allows the user to
possess a user account which is valid and that shows the rights and permission of the user.
Additionally, Network administrators are the one who are responsible configuring the account.
When the client’s needs to login to the system, then they are required to key in their credentials,
where the system will check in the database and make a clear comparison to see if the
credentials are the same. If the comparison is similar then with that in the database then the user
will be allowed to access into the system.
There exists various authentication protocols and methods that can be utilized based on the
security requirements and applications. They include the following:
Secure sockets layer (SSL) - this is a kind of protocol that is used to give access to the web sites
securely by utilizing secret key encryption and public key Encryption altogether. The technology
of the secret key technology is faster while the public key gives better authentication, so
designing of SSL will get benefits from both keys (Ogbanufe, & Kim, 2018).
Microsoft NTLM also known as NT LAN – NTLM Authentication is utilized by the windows
server to validate customers to an NT domain (Ide, Kamata, Minagawa, Higashiura, & Kasugai,
2015). Windows 2000 utilizes by default the Kerberos authentication but it will keep backing for
NTLM authentication of the customers’ networks and Microsoft servers.
Kerberos- This kind of protocol was created specifically at MIT to give authentication which is
secured for the UNIX networks. Kerberos utilizes short-term certificates which are known as

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BN203 Network Security MIT
|7
|1660
|49

Secure System: Authentication, Web Security, Types of Attacks
|14
|3428
|384

BN203, Organisational Use of Kerberos
|10
|2029
|38

VPN Technologies and Security
|9
|2031
|99

ICTNWK504 Design and Implement an Integrated Server Solution Assessment
|25
|6864
|76

Information Security Systems in ATM
|9
|1901
|332