COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
TACACS
|
|
Kerberos
|
|
RADIUS
|
|
LDAP
|
Detailed explanation-1: -Kerberos uses symmetric key cryptography and requires trusted third-party authorization to verify user identities.
Detailed explanation-2: -What is the most secure method of authentication and authorization in its default form? Kerberos is the most secure method of authentication listed. It has a more complicated system of authentication than TACACS (which is outdated) and RADIUS (which is used in different scenarios than Kerberos).
Detailed explanation-3: -Cryptography, multiple secret keys, and third-party authorization make Kerberos one of the industry’s most secure verification protocols.
Detailed explanation-4: -Kerberos ensures that only authorized users can access the network resources. Additionally, it provides AAA security: Authentication, Authorization, and Accounting. MIT developers developed Kerberos to authenticate themselves to their required systems securely.