Network Security Assignment 973798
Network Security Assignment 973798
NETWORK SECURITY
FALL 2014
ASSIGNMENT
Submitted by:
Saitheja Kadiyala
(Student ID: 973798)
University of Bridgeport
Bridgeport, CT-06604
USA
10/01/2014
you secure your information systems across your entire enterprise. We hope
you find Kerberos as useful as it has been to us. At MIT, Kerberos has been
invaluable to our Information/Technology architecture.
Advantages of Kerberos:
Password protection :
Even though security of network is compromised it is not possible to
extract information.
Client server authentication :
It acts as an intermediate between client and server & vice-versa
Durability & Reusability :
Authentications using the Kerberos protocol are durable and reusable.
Once a user has authenticated using the protocol, the authentication is
reusable for the lifetime of the ticket. In other words, it is possible to
remain authenticated through the Kerberos protocol without having to
re-enter a user name and password across the network (until the
authentication expires).
Service session key generation :
Kerberos model uses security session so that key will not be
compromised. Even though key is compromised its not easy to access
the server and extract information
Drawbacks of Kerberos:
Migrating user passwords from a standard UNIX password database,
to a Kerberos password database can be tedious as there is no
automated mechanism to perform this task.
Kerberos has only partial compatibility with the Pluggable
Authentication Modules (PAM) system used by most servers running
Red Hat Linux.
CONCLUSION:
Kerberos is one among several authentication protocols that are used
as a part of security systems. Basically, it is a network authentication
protocol designed to provide strong authentication and confidentiality for
client/server and multi-tier applications.
LDAP, on the other hand is a method of organizing the details and
providing access to it. It is mostly used for user, service and machine details,
and is incredibly useful.
Kerberos and LDAP are both popular, when considered separately.
And when you put them together, it provides an even more powerful
solution for secure authentication.