COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Secutiry tokens
|
|
CHAP
|
|
Kerberos
|
|
Certificates
|
Detailed explanation-1: -Explanation. Kerberos authentication uses a Key Distribution Center (KDC) to orchestrate the process. The KDC authenticates the principal (which can be a user, program, or system) and provides it with a ticket.
Detailed explanation-2: -Kerberos uses symmetric key cryptography and requires trusted third-party authorization to verify user identities.
Detailed explanation-3: -Kerberos runs as a third-party trusted server known as the Key Distribution Center (KDC). Each user and service on the network is a principal. The KDC has three main components: An authentication server that performs the initial authentication and issues ticket-granting tickets for users.
Detailed explanation-4: -The three heads of the Kerberos protocol represent the following: the client or principal; the network resource, which is the application server that provides access to the network resource; and. a key distribution center (KDC), which acts as Kerberos’ trusted third-party authentication service.
Detailed explanation-5: -The process of authenticating using Kerberos involves three systems: a client, a network resource, and the Kerberos server. The Kerberos server is called the Key Distribution Center (KDC). The KDC has two functions: an Authentication Service (AS) and a Ticket Granting Service (TGS).