Tuesday, April 30, 2019
Computer Security Assignment Example | Topics and Well Written Essays - 250 words - 3
Computer Security - designation ExampleAfter the exploiter gets the TGT, he or she decrypts the TGT using the KINIT (Kizza 214). The habituaters computer usually stores its key automatically but does not transmit it over the wire. The cache stores the TGT received from the KDC by the user for use during the session duration. However, the TGT has expiry duration set on it by the KDC after which the user cannot use it. With the help of TGT, the user can request KDC for a ticket to communicate with certain services at heart that network (Kizza 214).Kerberos are best applicable in management of highly confidential information deep down companies and institutions, where only one user can access information using a single instauration key. With this authentication protocol, there is relatively reduced password piracy and database stealing. The authentication protocol enables easy writ of execution on embedded devices due to its one-way channel of authentication. Furthermore, there is mutual authentication of both the knob and the server bringing about simplicity in inter-domain trust management (Dong and Chen 193).Storage of the radix login credentials in one central server renders the system vulnerable to data loss and defilement if an attacker found access to the location. Poor password creation of a user can sack an attacker guess and find the password details right (Dong and Chen 193). Although Kerberos serves to block unencrypted users from using the net profit services, if accessed by malicious users, the whole system may be at risk.Nagamalai, Dhinaharan., Eric, Renault and Murugan, Dhanuskodi. Trends in Computer Science, applied science and Information Technology First International Conference on Computer Science, Engineering and Information Technology, Ccseit 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, Proceedings. Heidelberg Springer, 2011.