Ask Computer Network & Security Expert

Purpose of the assignment -

After completing this assignment, student's should be able to:
-Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain major methodologies for secure networks and threats they address

Assignment Description

Kerberos is an authentication service developed as part of project Athena at MIT. Motivation behind Kerberos is that if a set of users is provided with dedicated personal computers that have no network connections, then a user's resources and files can beprotected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, thetime-sharing operating system must provide the security. The operating system can enforce access control policies based on user identity and use the logon procedure to identify users.

Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients)and distributed or centralized servers. In this environment, three approaches to security can be envisioned:

- Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID).
- Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user.
- Require the user to prove his or her identity for each service invoked. Also require that servers prove their identity to clients.

"William Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edition"

In a small, closed environment, in which all systems are owned and operated by a single organization, the first or perhaps the secondstrategy may suffice.But in a more open environment, in which network connections to other machines are supported, the thirdapproach is needed to protect user information and resources housed at the server.

Prepare a report which should include the following:

1) Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.

2) Explain atleast four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.

3) Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.

4) Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.

5) List and explainatleastfivemajor differences between version 4 and version 5 of Kerberos.

6) Briefly discuss, what type of organisations should use Kerberos and why?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92435111
  • Price:- $55

Priced at Now at $55, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As