Differences between revisions 1 and 2
Revision 1 as of 2005-12-05 02:40:41
Size: 13
Editor: yakko
Comment:
Revision 2 as of 2005-12-05 02:47:41
Size: 1145
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
= Kerberos =
Line 2: Line 4:

|| authentication ||||<(> ||
|| authentication server||||<(> ||
|| Kerberos||||<(> ||
|| Kerberos realm||||<(> ||
|| Propagating cipher block chaining (PCBC) mode||||<(> ||
|| Public-key certificate||||<(> ||
|| Realm||||<(> ||
|| Sequence number||||<(> ||
|| Subkey||||<(> ||
|| Ticket||||<(> ||
|| Ticket-granting server (TGS)||||<(> ||
|| X.509 Certificate||||<(> ||

== Review Questions ==

'''14.1 What problem was Kerberos designed to address?'''

'''14.2 What are three threats associated with user authentication over a network or Internet?'''

'''14.3 List three approaches to secure user authentication in a distribted environment.'''

'''14.4 What four requirements were defined for Kerberos?'''

'''14.5 What entities constitute a full-service Kerberos environment?'''

'''14.6 In the context of Kerberos, what is a realm?'''

'''14.7 What are the principal differences between version 4 and version 5 of Kerberos?'''

'''14.8 What is the purpose of the X.509 standard?'''

'''14.9 What is a chain of certificates?'''

'''14.10 How is an X.509 certificate revoked?'''

Kerberos

Terms

authentication

authentication server

Kerberos

Kerberos realm

Propagating cipher block chaining (PCBC) mode

Public-key certificate

Realm

Sequence number

Subkey

Ticket

Ticket-granting server (TGS)

X.509 Certificate

Review Questions

14.1 What problem was Kerberos designed to address?

14.2 What are three threats associated with user authentication over a network or Internet?

14.3 List three approaches to secure user authentication in a distribted environment.

14.4 What four requirements were defined for Kerberos?

14.5 What entities constitute a full-service Kerberos environment?

14.6 In the context of Kerberos, what is a realm?

14.7 What are the principal differences between version 4 and version 5 of Kerberos?

14.8 What is the purpose of the X.509 standard?

14.9 What is a chain of certificates?

14.10 How is an X.509 certificate revoked?

Csce877Ch14Notes (last edited 2005-12-05 19:32:38 by velociraptor)