Describe in detail the functionality of the main modules of the Automated Identity and Access Management System.
Describe briefly the vulnerability exploited by the following access control threats and their possible countermeasures (i) Phishing and (ii) botnets.
Describe what is meant by the term ‘single sign-on’ in the context of access control? Provide three instances of single sign-on technologies.
describe and discuss how the Kerberos authentication process work and outline the main constituents in the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation.
describe and describe the authentication procedure in synchronous token system?