Draw a full-service kerberos environment diagram

Assignment Help Other Subject
Reference no: EM131600108 , Length: word count:1500

Assignment - Kerberos

Purpose of the assignment(with ULO Mapping) After completing this assignment, student's should be able to:

-Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain major methodologies for secure networks and threats they address

Assignment Description

Kerberos is an authentication service developed as part of project Athena at MIT. Motivation behind Kerberos is that if a set of users is provided with dedicated personal computers that have no network connections, then a user's resources and files can beprotected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, thetime-sharing operating system must provide the security. The operating system can enforce access control policies based on user identity and use the logon procedure to identify users.

Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients)and distributed or centralized servers. In this environment, three approaches to security can be envisioned:

- Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID).
- Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user.
- Require the user to prove his or her identity for each service invoked. Also require that servers prove their identity to clients.

"William Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edition"

In a small, closed environment, in which all systems are owned and operated by a single organization, the first or perhaps the secondstrategy may suffice.But in a more open environment, in which network connections to other machines are supported, the thirdapproach is needed to protect user information and resources housed at the server.

Prepare a report which should include the following:

1) Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.

2) Explain at least four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.

3) Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.

4) Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.

5) List and explain at least five major differences between version 4 and version 5 of Kerberos.

6) Briefly discuss, what type of organisations should use Kerberos and why?

Reference no: EM131600108

Questions Cloud

What margin will it earn this year : If the company pursues the investment opportunity and otherwise performs the same as last year, what margin will it earn this year
Discuss policies promoting work-life balance : What effect would these policies promoting work-life balance have on workplace productivity
Determine the price consistent with quantity : Both monopolists and monopolistically competitive firms produce the quantity at which marginal revenue equals marginal cost and then use the demand curve.
Research topic of your interest-two quantitative research : Locate six articles on a research topic of your interest-two quantitative research articles, two qualitative research articles.
Draw a full-service kerberos environment diagram : Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems - Explain atleastfourthreats associated
Explain your proposed amendment to the us constitution : First, explain your proposed amendment to the U.S. Constitution. Second, present and describe three arguments in support of your Amendment.
What is the difference between nominal and real accounts : What is the difference between "nominal" and "real" accounts. Which financial statement contains the information from nominal accounts
What is the competitive market : Compared to a perfectly competitive market, a monopoly market will usually generate higher prices and higher output.
Indicate the exceptions by discussing the gender : Asked to disprove his first contention and indicate the exceptions by discussing the gender, race, and/or class issues in any two poems.

Reviews

len1600108

8/14/2017 1:06:22 AM

Complete Diagram, Design, Detailed Description A well expressed and comprehensive explanation has been provided to justify the design. A brief explanation has been provided to justify the design. A limited explanation has been provided to justify the design. Explanation does not adequately provide justification of the design Explanation does not provide justification of the design Justification Excellent use of creditable sources to justify differences answer. Extremely good effort to justify answer. Good effort made but not outstanding Made some effort but not from creditable sources Lazy effort with inaccuracies of justification not related to topic Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1600108

8/14/2017 1:06:14 AM

Marking Rubric: Grade Mark HD 24 – 30 D 21–23.9 C 18 – 20.9 P 15 – 17.9 Fail <15 Excellent Very Good Good Satisfactory Unsatisfactory Identification Identified problems and covered in depth. Problems are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic Security Threats Demonstrated excellent ability to justify security threats critically in detail Demonstrated excellent ability to justify security threats critically but not in detail Demonstrated good ability to justify security threats critically in general Demonstrated good ability to justify security threats but not completely related to topic Did not demonstrated ability to justify security threats critically

len1600108

8/14/2017 1:06:02 AM

Submission Guidelines ? All work must be submitted on Moodle by the due date along with a “Title Page”. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking Criteria: Aspects Description of the section Marks Identification of problems Correctly identifying, appropriateness to topis 5 Security threats Description and justification 5 Complete diagram Complete Diagram, Design, Detailed Description 10 Differences Between Version 4 and 5 5 Identification Type of Organisations 3 Reference Style Proper referencing is required 2 Total 30

Write a Review

Other Subject Questions & Answers

  Define the concept known as the american dream think about

define the concept known as the american dream. think about how this concept is presented in ellisons battle royal.

  Four major theoretical perspectives

1. Of all the four major theoretical perspectives, why CONFLICT THEORY is most compelling, please include examples. 2. Prescription drug abuse on college campuses, identify which method to use to study such an issue. Please justify your decision.

  Created the religion of humanity

August Comte created the Religion of Humanity. He had desciples (i.e., John Stewart Mill, and George Sarton) that followed his works, but I can not find if these people, or other sociologists (?) followed this Positivism as a religious cult? Was this..

  Define the key characteristics of the cio and cto

Define the fundamental responsibilities and key characteristics of the Chief Information Officer (CIO) and Chief Technology Officer (CTO) within health care organizations.

  Hobbes and hume conception of morality

In studying for my final essay exam, I'm realizing there are a few things about some of the philosophers that I do not completely understand. One of the things

  Subfield of anthropology-studies diversity of human behavior

The subfield of anthropology that studies diversity of human behavior in the past is called. The anthropological term for the process of acquiring your own culture.  The man who first defined culture, as “that complex whole,” was

  Findings-state your findings based on current research

Findings-State your findings based on current research, Introduction-Describe the problem to be addressed in your research

  Analyze the feasibility of an advocacy approach

Advocacy Approach: Propose an advocacy approach for working with a diverse population. Feasibility: Analyze the feasibility of an advocacy approach to use when working with a diverse population

  New tools for distance learning

One of the articles on the results list is an article called "Web 2.0: New Tools for Distance Learning" by Christopher Essex. View this article. In the References section of Essex's article, there is a citation for an article called "Scholars Who Blo..

  Describe as succinctly as possible

Describe as succinctly as possible the difference between the questions you can ask a job applicant and the questions you are forbidden to ask in an interview.

  Pecific demographic characteristics

A psychologist who conducts research on jury characteristics has reported that potential jurors with specific demographic characteristics are more likely to render verdicts that favor the defense in certain types of felony cases

  How could the strategies be used to help nurse educators

How could these strategies be used to help nurse educators? In addition, Select one barrier that has a significant influence on a team approach to curriculum development.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd