Illustrate what is meant by the ‘single sign-on’ in the context of the access control? Provide three (3) instances of single sign-on technologies.
Illustrate how the Kerberos authentication procedure work and describe the main components in the Kerberos environment, their respective functions and the level of security provided by the Kerberos. Draw a diagram supporting your explanation.
What do you mean by the term authorization creep in context of access control? Which principle of access control must be enforced to prevent this risk from occurring? How would this principle be enforced in practice?
Describe briefly what do you mean by the term Content-Dependent Access Control, describing your answer with an illustration as to how this is executed in practice at the level of organisations?