Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

BN203 Network Security Assignment - MIT

Added on - 23 Feb 2020

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Running head: NETWORK SECURITYNetwork SecurityName of the StudentName of the UniversityAuthor’s Note:
1NETWORK SECURITYTable of ContentsDiscussion....................................................................................................................................................21. Problems..............................................................................................................................................22. Threats and Mitigation........................................................................................................................33. Version 4 and Version 5 Differences....................................................................................................44. Recommended Organizations..............................................................................................................4Conclusion...................................................................................................................................................4References...................................................................................................................................................6
2NETWORK SECURITYIntroductionAn authentication server namely Kerberos is grown as a portion of a project named Athena inMIT. The main reason for developing Kerberos was that when a user will be having problem in networkin his computers, Kerberos can secure the files and folders of the user [3]. The operating systemprovided to the users is able to reinforce certain access control policies and can identify the users.However, recently this scenario has changed. There are three strategies that Kerberos is following; butin open environment the strategies are not working.The report outlines a brief description about the Kerberos authentication server. It covers theproblems that Kerberos were facing and the four major threats of Kerberos that are associated withauthentication of users over the internet and how Kerberos can reduce it [5]. This report furtherdiscusses about the difference between version 4 and version 5 of Kerberos and recommendations ofwhich organization should use this server. The description is given in the following paragraphs.Discussion1. ProblemsKerberos was facing many problems as an authentication server. The problems are as follows:i)Secret-Key Cryptography: Kerberos is developed to give strong authentication server for theusers using a secret key cryptography [4]. However, this idea got back fired. As it does not need theutilization of any password and the handling depends on a trusted third party, the security became aproblem for it.ii)Validation: Designing and implementation is not enough for a security system. Validation ishighly recommended [6]. Kerberos has serious flaws and they were not checked before its launch.iii)Weak Protocol: Another major problem of Kerberos is its weak protocol. It is not as strongand resistant as it should have been [1]. Thus attacks are possible with such weak protocols.iv)Secured Time Services: Machine clocks are not always synchronized. Therefore,authenticators do not depend on them much [2]. As Kerberos is made of time based protocols, it relieson the secured time services and it becomes a huge problem.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document