• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
single sign-on
What type of system is Kerberos?
symmetric
What type of cryptography does Kerberos use?
heterogenous
Kerberos is used for what type of networks? (homogenous or heterogenous?)
Key Distribution Center (KDC)
Component of Kerberos: holds all users’ and
services’ secret keys. It provides an authentication service, as well as key distribution
functionality
principals
The KDC provides security services to ____________, which can be users, applications,
or network services
secret key
The KDC must have an account for, and share a ________ ____ with,
each principal.
User authenticates to AS
Kerberos authentication process step 1
AS sends initial ticket to user
Kerberos authentication process step 2
User requests access to access file server
Kerberos authentication process step 3
TGS creates new ticket with session keys
Kerberos authentication process step 4
User extracts one session key and sends ticket to file server
Kerberos authentication process step 5
session key
shared between two principals and is generated when needed and destroyed after the
session is completed.
password guessing
Kerberos is susceptible to what type of attack?
symmetric and asymmetric
SESAME uses what type of cryptography?
Privileged Attribute Certificates (PACs)
Kerberos uses tickets to authenticate subjects to objects, whereas SESAME uses ____________________ , which contain the subject’s identity, access capabilities
for the object, access time period, and lifetime
Privileged Attribute Server (PAS)
(In SESAME) The trusted authentication server is referred to as what?