Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Assignment - Kerberos

Purpose of the assignment(with ULO Mapping) After completing this assignment, student's should be able to:

-Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain major methodologies for secure networks and threats they address

Assignment Description

Kerberos is an authentication service developed as part of project Athena at MIT. Motivation behind Kerberos is that if a set of users is provided with dedicated personal computers that have no network connections, then a user's resources and files can beprotected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, thetime-sharing operating system must provide the security. The operating system can enforce access control policies based on user identity and use the logon procedure to identify users.

Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients)and distributed or centralized servers. In this environment, three approaches to security can be envisioned:

- Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID).
- Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user.
- Require the user to prove his or her identity for each service invoked. Also require that servers prove their identity to clients.

"William Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edition"

In a small, closed environment, in which all systems are owned and operated by a single organization, the first or perhaps the secondstrategy may suffice.But in a more open environment, in which network connections to other machines are supported, the thirdapproach is needed to protect user information and resources housed at the server.

Prepare a report which should include the following:

1) Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.

2) Explain at least four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.

3) Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.

4) Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.

5) List and explain at least five major differences between version 4 and version 5 of Kerberos.

6) Briefly discuss, what type of organisations should use Kerberos and why?

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92408821
  • Price:- $55

Priced at Now at $55, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Assignmentwrite a 700- to 1050-word paper which explains

Assignment Write a 700- to 1,050-word paper which explains the responsibilities that a corporate security and network group would have in ensuring the protection of these intellectual assets. Answer the following: What r ...

Assignment application of international lawmonarch

Assignment : Application of International Law Monarch Associates, a U.S. computer parts manufacturer, entered into a joint venture with a Russian computer technology company, Vladir Unlimited. The joint venture agreement ...

Reflective journalan effective teacher is a reflective

Reflective Journal An effective teacher is a reflective decision-maker who is able to articulate a solid rationale for his or her deliberative teaching practices and professional actions. Your objective in this Assignmen ...

For this discussion board you must research a case that you

For this discussion board you must research a case that you think has changed us significantly in the way we live and work within today's society. Who were the people involved? What was actually decided in the case? What ...

Assignment bullresearch the access to essential health

Assignment: • Research the access to essential health commodities. Medical innovations are failing many patients globally. • Describe the issues, barriers, and challenges for the neglected populations. • Discuss how acce ...

Question schedules of reinforcement worksheetanswer the

Question: Schedules of Reinforcement Worksheet Answer the following questions by identifying the correct schedule of reinforcement. 1. Mrs. Blass is tired of her students not being prepared for class each day. She knows ...

Question select one of the films related to dissociative

Question: Select one of the films related to dissociative disorders from the Film List Week 6. Use the Research Analysis to complete this assignment. Prepare a 1,050- to 1,400-word paper that discusses research-based int ...

Question bullusing the spss software open the general

Question: • Using the SPSS software, open the General Social Survey dataset (ATTACHED) • Using the General Social Survey dataset, construct a research question that can be answered by a one-way ANOVA. Use SPSS to answer ...

Question prompt dayer-berenson ch 31 as we conclude this

Question: Prompt: Dayer-Berenson, Ch. 3 1. As we conclude this course, can you define the primary and secondary characteristics of your own culture? Can you describe the characteristics of you race and your ethnicity?

Questions -question 1 - you are a marketing manager for mc

Questions - Question 1 - You are a marketing manager for MC plc, an insurer, which provides a range of household and motor insurances. MC plc distributes these insurances through both their branch network and insurance b ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As