/***************************
Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted network. The key function of this protocol is that it allows a single sign-on in a distributed network. It's best features lays in the fact that the password does not get shared over the network between nodes. In addition, it uses KDC - key distribution center which keeps the access maintained. …show more content…
The main objective of this process is to find all kind of risk and protect the organization against them. In fact, some of the Continuous monitoring may be required by regulation or nonprofit recommendation to keep certain certification such ISO. It is known Continuous monitoring is more required for financial institutions such as banks where a lot of transaction happens.
************************
OSI stands for Open Systems Interconnection model which is a network model that contains the network standard protocols for communication between nodes. The OSI model consists of 7 layers:
1. Physical layer: also referred to as layer 1 is responsible for the electrical signals, radio signal, and light signals. It is basically the hardware layer for the OSI model. Devices such as switches and hubs operate at this layer.
2. Data link layer; is responsible for interpreting the electrical signals transmuted through the physical layer. It handles data errors. Switches operate on this