a) Briefly describe the role of Single Sign On in authentication technologies.
b) Compare and contrast Access Control Lists with Role Based Access Control (RBAC) system.
c) Briefly discuss the difference between Discretionary Access Control and Mandatory Access Control. Give examples to elaborate your point of view.
d) Describe how the following technologies are employed for securing TCP/IP implementations:
1. SSL (Secure Socket Layer)
2. IPSec (IP Security)
3. Kerberos
a)
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository such as a lightweight directory access protocol (LDAP) directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session. Google, LinkedIn, Twitter and Facebook all offer popular SSO services that allow an end user to log into a third-party application with their social media authentication credentials.
a) Briefly describe the role of Single Sign On in authentication technologies. b) Compare and contrast...
Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...