StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security - Assignment Example

Cite this document
Summary
Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation. The authentication situation involves three different parties; the user, the resources…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Computer Security
Read Text Preview

Extract of sample "Computer Security"

Computer Security Kerberos Computer Network Authentication Protocol Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation. The authentication situation involves three different parties; the user, the resources sourced for and the Key Distribution Centre (KDC) (Nagamalai, Renault and Dhanuskodi 496). Kerberos uses the KDC for authentication. The user logs in, and the principal sent to KDC server for login.

The KDC server, in return, provides Ticket-Granting Tickets (TGT). The KDC server searches the principal name in the database and generates a TGT encrypted by the key generated and retrieved by the user. After the user gets the TGT, he or she decrypts the TGT using the KINIT (Kizza 214). The user’s computer usually stores its key automatically but does not transmit it over the wire. The cache stores the TGT received from the KDC by the user for use during the session duration. However, the TGT has expiry duration set on it by the KDC after which the user cannot use it.

With the help of TGT, the user can request KDC for a ticket to communicate with certain services within that network (Kizza 214).Kerberos are best applicable in management of highly confidential information within companies and institutions, where only one user can access information using a single entry key. With this authentication protocol, there is relatively reduced password piracy and database stealing. The authentication protocol enables easy implementation on embedded devices due to its one-way channel of authentication.

Furthermore, there is mutual authentication of both the client and the server bringing about simplicity in inter-domain trust management (Dong and Chen 193).Storage of the infrastructure login credentials in one central server renders the system vulnerable to data loss and contamination if an attacker found access to the location. Poor password creation of a user can make an attacker guess and find the password details right (Dong and Chen 193). Although Kerberos serves to block unencrypted users from using the internet services, if accessed by malicious users, the whole system may be at risk.

Works CitedTop of FormBottom of FormTop of FormTop of FormBottom of FormBottom of FormDong, Ling and Kefei, Chen. Cryptographic Protocol: Security Analysis Based on Trusted Freshness. Berlin: Springer, 2012. Print. Kizza, Joseph. Guide to Computer Network Security. London: Springer, 2013. Print.Nagamalai, Dhinaharan., Eric, Renault and Murugan, Dhanuskodi. Trends in Computer Science, Engineering and Information Technology: First International Conference on Computer Science, Engineering and Information Technology, Ccseit 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, Proceedings.

Heidelberg: Springer, 2011. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Assignment Example | Topics and Well Written Essays - 250 words - 3”, n.d.)
Computer Security Assignment Example | Topics and Well Written Essays - 250 words - 3. Retrieved from https://studentshare.org/information-technology/1655204-computer-security
(Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3)
Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3. https://studentshare.org/information-technology/1655204-computer-security.
“Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3”, n.d. https://studentshare.org/information-technology/1655204-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security

Net-centric Computing and Information Systems

UTORIAL #1: COMPUTER SECURITYA brief description of the tutorialThe tutorial studied addressed the most integral concepts of today's world: ‘Computer Security'.... Ever since the advent of the concept of connecting computing devices over a network the concept of Computer Security has risen.... The tutorial skillfully describes the concept of Computer Security breach and tells how viruses, worms and Trojan horses are a threat to the security of the data and the computing systems themselves....
2 Pages (500 words) Essay

How Safe Is Your Computer

Anti-virus software should be regularly updated because new viruses come into existence; thus, latest versions of Computer Security The computer era presents a plethora of advantages for individuals and organizations.... Computer Security is a fundamental issue in this age of information technology.... Another essential form of security for one's computer is to secure one's wireless network.... There is however a great need to protect one's computer in order to maximize its potential benefits....
1 Pages (250 words) Case Study

If computer security is the answer, what is the problem, and how can computer security solve that problem

This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters… A recent study asserts that Computer Security entails various methodologies, which are used to protect certain information from unauthorized events (Gollmann 2011).... This paper will discuss how Computer Security is regarded as the answer.... This essay will Computer Security Computer Security Introduction Computer Security is defined as a branch of computer technology, which is applied to networks, and the general use of computers (Vacca 2009)....
2 Pages (500 words) Essay

Discussion question

The safe keeping of hardware even includes security of computers where information Computer Security vs.... Information security Computer Security vs.... This part of information security is recognized as Computer Security where professionals try to secure computers from being manipulated in order to obtain ensure that the information that is secured on these computers remain safe (Smith, 2000, p.... In the case of Computer Security, professionals try to secure various parts of a particular computer as on these parts the information of individuals and organizations is secured....
1 Pages (250 words) Essay

Week 2 Academic Paper

To be precise, the main point behind is about monitoring and surveillance of Computer Security threats.... On this… In general, this paper provides a considerable enlightenment on how to perform improvised Computer Security auditing and surveillance capabilities on Academic paper review - Computer Security Threat Monitoring and Surveillance It is vital to that this paper providesa significant set of concepts on how a computer system can be exposed to either internal or external security threats....
1 Pages (250 words) Assignment

Phishing, Pharming, and Vishing: Computer Security

This work "Phishing, Pharming, and Vishing: Computer Security" focuses on a detailed analysis of the main security concerns and problems faced during online working.... The author outlines Computer Security related issues, phishing, pharming, and vishing.... This work comprises the main steps and tools for effective security implementation.... computer crime is acknowledged as unlawful actions by using a computer or against a computer system....
9 Pages (2250 words) Coursework

Computer Security and Protecting Its Data and Information: Proper Measures and Strategies

hellip; According to Halibozek (2008), the most common risks to Computer Security include and not limited to computer viruses, hackers, and crackers, vandalism, environment, and depreciation.... Computer systems face many challenges that make them vulnerable security risks.... Their main disadvantage is that they are vulnerable to information security risks that may result in loss or damage of important information.... This essay describes computer systems and the relevant measures and plans which can be used to secure the computer systems....
7 Pages (1750 words) Research Paper

Arguments for and Against Outsourcing Computer Security Services

One of the many reasons that a firm should outsource Computer Security services is the costs involved with… There are numerous costs associated with this, including costs of the IT infrastructure necessary, technical support, training, software licenses, and costs of compliance with public authorities, not to mention operations and The paper "Arguments for and Against Outsourcing Computer Security Services" is a delightful example of an essay on information technology....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us