Discuss in detail what problems was kerberos

Assignment Help Computer Networking
Reference no: EM131626402 , Length: 1800 Words

Purpose of the assignment -

After completing this assignment, student's should be able to:
-Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain major methodologies for secure networks and threats they address

Assignment Description

Kerberos is an authentication service developed as part of project Athena at MIT. Motivation behind Kerberos is that if a set of users is provided with dedicated personal computers that have no network connections, then a user's resources and files can beprotected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, thetime-sharing operating system must provide the security. The operating system can enforce access control policies based on user identity and use the logon procedure to identify users.

Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients)and distributed or centralized servers. In this environment, three approaches to security can be envisioned:

- Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID).
- Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user.
- Require the user to prove his or her identity for each service invoked. Also require that servers prove their identity to clients.

"William Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edition"

In a small, closed environment, in which all systems are owned and operated by a single organization, the first or perhaps the secondstrategy may suffice.But in a more open environment, in which network connections to other machines are supported, the thirdapproach is needed to protect user information and resources housed at the server.

Prepare a report which should include the following:

1) Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.

2) Explain atleast four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.

3) Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.

4) Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.

5) List and explainatleastfivemajor differences between version 4 and version 5 of Kerberos.

6) Briefly discuss, what type of organisations should use Kerberos and why?

Verified Expert

The article is about Kerberos system which is an authentication service developed as part of project Athena at MIT. This article discusses the above concept mentioning the history of origine of Kerberos system, the threats associated with the internet users. It also studied the principles of objectivity, confidentiality and integrity and explained the differences between version 4 and version 5 of Kerberos system. The article also discussed about the type of organizations which will find Kerberos system relevant for implementation. The discussions will help to identify the history behind the development of Kerberos system and its relevance with respect to industry. The article has been prepared in Microsoft Office Word document.

Reference no: EM131626402

Questions Cloud

Define dianne of unpaid alimony : Dianne of unpaid alimony, child support, and investment funds. Is Michael entitled to a discharge of this debt, or does it qualify as an exception
Discuss rob sues nancy for breach of contract : Rob demands that Nancy close on the purchase and sale of the house on July 15 and Nancy sues Rob for return of her deposit. Judgment for whom
Identify potential source of return to mutual fund investors : Identify three potential sources of return to mutual fund investors and briefly discuss how each could affect total return to shareholders.
The features of objective methods of personality assessment : Summarize the features of objective methods of personality assessment, and provide at least three examples of these types of measures.
Discuss in detail what problems was kerberos : BN203 - Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.
Are all funds subject to the same level of risk : Discuss the various types of risk to which mutual fund shareholders are exposed. What is the major risk exposure of mutual funds?
What is the problem the court is dealing with in this case : What is the problem the court is dealing with in this case, What does the court finally decide
Is the item of an unusual or irregular shape : What is the size of the item? Is the item of an unusual or irregular shape? Is the item loose or is it already packaged inside a container of some type?
Explain indri claim workers compensation for the injuries : Nicola and May are presently partners in a business which operates a second-hand book shop

Reviews

len1626402

9/4/2017 7:09:36 AM

Marking Criteria: Aspects Description of the section Marks Identification of problems Correctly identifying, appropriateness to topis 5 Security threats Description and justification 5 Complete diagram Complete Diagram, Design, Detailed Description 10 Differences Between Version 4 and 5 5 Identification Type of Organisations 3 Reference Style Proper referencing is required 2 Total 30

len1626402

9/4/2017 7:09:27 AM

Complete Diagram, Design, Detailed Description A well expressed and comprehensive explanation has been provided to justify the design. A brief explanation has been provided to justify the design. A limited explanation has been provided to justify the design. Explanation does not adequately provide justification of the design Explanation does not provide justification of the design Justification Excellent use of creditable sources to justify differences answer. Extremely good effort to justify answer. Good effort made but not outstanding Made some effort but not from creditable sources Lazy effort with inaccuracies of justification not related to topic Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1626402

9/4/2017 7:09:22 AM

I need this assignment to be done till 5th - Marking Rubric: Grade Mark HD 24 – 30 D 21–23.9 C 18 – 20.9 P 15 – 17.9 Fail <15 Excellent Very Good Good Satisfactory Unsatisfactory Identification Identified problems and covered in depth. Problems are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic Security Threats Demonstrated excellent ability to justify security threats critically in detail Demonstrated excellent ability to justify security threats critically but not in detail Demonstrated good ability to justify security threats critically in general Demonstrated good ability to justify security threats but not completely related to topic Did not demonstrated ability to justify security threats critically

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd