Nobody downloaded yet

Computer Security - Assignment Example

Comments (0) Cite this document
Summary
Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation. The authentication situation involves three different parties; the user, the resources…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Computer Security
Read TextPreview

Extract of sample "Computer Security"

Download file to see previous pages After the user gets the TGT, he or she decrypts the TGT using the KINIT (Kizza 214). The user’s computer usually stores its key automatically but does not transmit it over the wire. The cache stores the TGT received from the KDC by the user for use during the session duration. However, the TGT has expiry duration set on it by the KDC after which the user cannot use it. With the help of TGT, the user can request KDC for a ticket to communicate with certain services within that network (Kizza 214).
Kerberos are best applicable in management of highly confidential information within companies and institutions, where only one user can access information using a single entry key. With this authentication protocol, there is relatively reduced password piracy and database stealing. The authentication protocol enables easy implementation on embedded devices due to its one-way channel of authentication. Furthermore, there is mutual authentication of both the client and the server bringing about simplicity in inter-domain trust management (Dong and Chen 193).
Storage of the infrastructure login credentials in one central server renders the system vulnerable to data loss and contamination if an attacker found access to the location. Poor password creation of a user can make an attacker guess and find the password details right (Dong and Chen 193). Although Kerberos serves to block unencrypted users from using the internet services, if accessed by malicious users, the whole system may be at risk.
Nagamalai, Dhinaharan., Eric, Renault and Murugan, Dhanuskodi. Trends in Computer Science, Engineering and Information Technology: First International Conference on Computer Science, Engineering and Information Technology, Ccseit 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, Proceedings. Heidelberg: Springer, 2011. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Assignment Example | Topics and Well Written Essays - 250 words - 3”, n.d.)
Computer Security Assignment Example | Topics and Well Written Essays - 250 words - 3. Retrieved from https://studentshare.org/information-technology/1655204-computer-security
(Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3)
Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3. https://studentshare.org/information-technology/1655204-computer-security.
“Computer Security Assignment Example | Topics and Well Written Essays - 250 Words - 3”, n.d. https://studentshare.org/information-technology/1655204-computer-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Security

Computer security

...? Computer Security of the of the Concerned August 31, Computer Security Introduction The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. With the digitization of the world economies, the wealth of the world is no more confined to banks and security vaults, but has also come to reside in the servers and computers scattered across corporations and financial institutions, in the form of bits and bytes. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form (Gollmann, 1999, p. 6). Once, one comes to terms... with this...
6 Pages(1500 words)Term Paper

Computer Security

...? Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice’s laptop located in her workspace. Attacker The attacker is Charlie who can only access the physical location within 43 minutes only. He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran...
8 Pages(2000 words)Essay

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense strategies. With...
3 Pages(750 words)Essay

Computer Security

...?Differences in the two papers with respect to approaches and conclusions The paper ed by MacCarthy on Information Security Policy in the U.S. Retail Payments Industry is a thorough analysis of the security policies which incorporates and evaluates the legal doctrines embraced by the players in the industry with regards to information security. The information security policies are evaluated as an economical idea; incorporating the impact of externalities which create inefficiencies and undermine incentives for investments in information security. The paper carefully examined the impact of various acts and laws such as PCI (Payment Card Industry...
3 Pages(750 words)Essay

Computer security

...?Assessment Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the...
6 Pages(1500 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of...
2 Pages(500 words)Essay

Computer Security

...?Q: Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of activities that users describe as invasive or undesirable... , out of...
2 Pages(500 words)Essay

Computer Security

...? Adoption of Computer Security: An Investigation into the effects of Computer Security Threats, And the effective Measures and Applications that canbe used for protection Within various online Business Environments Name Institution Abstract The current drastic growth in the popularity of the Internet and in the continuous use of the wired and wireless communication protocols between computers have made this subject of computer security quite relevant and crucial to investors on computers and their applications. As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security... are...
30 Pages(7500 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their...
1 Pages(250 words)Essay

Computer security

...COMPUTER SCIENCES AND INFORMATION TECHNOLOGY ID, LAST A report on computer security licensing Computer sciences and information technology Name Student number Course code and title Date Executive Summary The report seeks to discuss computer security licensing as well as its contribution to technology to date. The report also attempts to study if the removal and elimination of the computer security measures lead to a step-down in the incidence of computer fraud. Similarly, the report discusses if it is ethical to teach solutions to the computer problems. The report...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Computer Security for FREE!

Contact Us