set318 - Kerberos for Distributed Systems Security Cunsheng...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Kerberos for Distributed Systems Security Cunsheng Ding HKUST, Hong Kong, CHINA
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Agenda Distributed system security Introduction to Kerberos Kerberos Realms Authentication with Kerberos in Windows NT 5 and Windows 2000 Kerberos in Max OS X C. Ding COMP4631 L18 2
Background image of page 2
Distributed Systems Security C. Ding COMP4631 L18 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Distributed Systems A distributed system : a collection of computers linked via some network. Characteristic : The components of the distributed system may be under the authority of different organizations, and may be governed by different security policies. Example: The Internet C. Ding COMP4631 L18 4
Background image of page 4
Security Issues in Distributed Systems (1) Impersonation of user: A user may gain access to a particular workstation and pretend to be another user operating from that workstation. Impersonation of workstation: A user may alter the network address of a workstation so that the requests sent from the altered workstation appear to come from the impersonated workstation. C. Ding COMP4631 L18 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security Issues in Distributed Systems (2) Replay attacks: – A user may eavesdrop on exchanges and use a replay attack to gain entrance to a server or to disrupt operations. Conclusion: – In any of these cases, an unauthorized user may be able to gain access to services and data that he or she is not authorized to access. C. Ding COMP4631 L18 6
Background image of page 6
Security Services in Distributed Systems • Authentication ********************** • Guarding the boundaries of internal networks – Firewalls • Access control to distributed objects – Access control techniques • Availability – Counter DoS techniques C. Ding COMP4631 L18 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security Policies Fact : In a distributed system, users are
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 29

set318 - Kerberos for Distributed Systems Security Cunsheng...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online