EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
CHAP
|
|
EAP
|
|
TKIP
|
|
Kerberos
|
Detailed explanation-1: -Kerberos is a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third party for authenticating client-server applications and verifying users’ identities.
Detailed explanation-2: -Kerberos uses symmetric key cryptography and a key distribution center (KDC) to authenticate and verify user identities. A KDC involves three aspects: A ticket-granting server (TGS) that connects the user with the service server (SS) A Kerberos database that stores the password and identification of all verified users.
Detailed explanation-3: -Kerberos is a network authentication protocol that is designed to provide strong authentication for client/server applications by using secret-key cryptography.
Detailed explanation-4: -Extensible Authentication Protocol (EAP) When used for wireless communications, EAP is the highest level of security as it allows a given access point and remote device to perform mutual authentication with built-in encryption.