Draw a full-service kerberos environment diagram

Assignment Help Other Subject
Reference no: EM131600108 , Length: word count:1500

Assignment - Kerberos

Purpose of the assignment(with ULO Mapping) After completing this assignment, student's should be able to:

-Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain major methodologies for secure networks and threats they address

Assignment Description

Kerberos is an authentication service developed as part of project Athena at MIT. Motivation behind Kerberos is that if a set of users is provided with dedicated personal computers that have no network connections, then a user's resources and files can beprotected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, thetime-sharing operating system must provide the security. The operating system can enforce access control policies based on user identity and use the logon procedure to identify users.

Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients)and distributed or centralized servers. In this environment, three approaches to security can be envisioned:

- Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID).
- Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user.
- Require the user to prove his or her identity for each service invoked. Also require that servers prove their identity to clients.

"William Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edition"

In a small, closed environment, in which all systems are owned and operated by a single organization, the first or perhaps the secondstrategy may suffice.But in a more open environment, in which network connections to other machines are supported, the thirdapproach is needed to protect user information and resources housed at the server.

Prepare a report which should include the following:

1) Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.

2) Explain at least four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.

3) Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.

4) Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.

5) List and explain at least five major differences between version 4 and version 5 of Kerberos.

6) Briefly discuss, what type of organisations should use Kerberos and why?

Reference no: EM131600108

Questions Cloud

What margin will it earn this year : If the company pursues the investment opportunity and otherwise performs the same as last year, what margin will it earn this year
Discuss policies promoting work-life balance : What effect would these policies promoting work-life balance have on workplace productivity
Determine the price consistent with quantity : Both monopolists and monopolistically competitive firms produce the quantity at which marginal revenue equals marginal cost and then use the demand curve.
Research topic of your interest-two quantitative research : Locate six articles on a research topic of your interest-two quantitative research articles, two qualitative research articles.
Draw a full-service kerberos environment diagram : Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems - Explain atleastfourthreats associated
Explain your proposed amendment to the us constitution : First, explain your proposed amendment to the U.S. Constitution. Second, present and describe three arguments in support of your Amendment.
What is the difference between nominal and real accounts : What is the difference between "nominal" and "real" accounts. Which financial statement contains the information from nominal accounts
What is the competitive market : Compared to a perfectly competitive market, a monopoly market will usually generate higher prices and higher output.
Indicate the exceptions by discussing the gender : Asked to disprove his first contention and indicate the exceptions by discussing the gender, race, and/or class issues in any two poems.

Reviews

len1600108

8/14/2017 1:06:22 AM

Complete Diagram, Design, Detailed Description A well expressed and comprehensive explanation has been provided to justify the design. A brief explanation has been provided to justify the design. A limited explanation has been provided to justify the design. Explanation does not adequately provide justification of the design Explanation does not provide justification of the design Justification Excellent use of creditable sources to justify differences answer. Extremely good effort to justify answer. Good effort made but not outstanding Made some effort but not from creditable sources Lazy effort with inaccuracies of justification not related to topic Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1600108

8/14/2017 1:06:14 AM

Marking Rubric: Grade Mark HD 24 – 30 D 21–23.9 C 18 – 20.9 P 15 – 17.9 Fail <15 Excellent Very Good Good Satisfactory Unsatisfactory Identification Identified problems and covered in depth. Problems are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic Security Threats Demonstrated excellent ability to justify security threats critically in detail Demonstrated excellent ability to justify security threats critically but not in detail Demonstrated good ability to justify security threats critically in general Demonstrated good ability to justify security threats but not completely related to topic Did not demonstrated ability to justify security threats critically

len1600108

8/14/2017 1:06:02 AM

Submission Guidelines ? All work must be submitted on Moodle by the due date along with a “Title Page”. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking Criteria: Aspects Description of the section Marks Identification of problems Correctly identifying, appropriateness to topis 5 Security threats Description and justification 5 Complete diagram Complete Diagram, Design, Detailed Description 10 Differences Between Version 4 and 5 5 Identification Type of Organisations 3 Reference Style Proper referencing is required 2 Total 30

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd