--%>

Explain Kerberos

Explain the term Kerberos.

E

Expert

Verified

Kerberos is defined as an authentication service which is developed as a part of the project Athena at MIT. The problem that Kerberos address is supposed as an open distributed environment where the users at work stations want to access the services upon the servers distributed throughout the network.

   Related Questions in Computer Network Security

  • Q : Mono-alphabetic and Playfair cipher

    Define: a) Mono-alphabetic cipher b) Playfair cipher c) Transposition cipher

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?

  • Q : Situations for confidentiality attacks

    List the potential situations for confidentiality attacks for the user workstations in the typical business environment.

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Operations in Blowfish Explain the

    Explain the primitive operations which are used in the Blowfish?

  • Q : What is message authentication Explain

    Explain what is meant by the term message authentication? Describe the classes of message authentication function.

  • Q : Components in a typical security policy

    There are numerous components in a typical security policy. Explain three important components.

  • Q : Computer crime Explain the term

    Explain the term Computer crime and what are the Suggestion to stop them ?

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Wired equivalent privacy or WEP-LAN

    WEP (wired equivalent privacy): Wired equivalent privacy is capable of providing the same level of privacy as it is there in the wired network. The WEP makes use of a static key which both the access points and the clients know. The static key helps i