In Kerberos two items need to prove authentication. The first is the ticket and the second is the authenticator. The ticket consists of the requested server name, the client name, the address of the client, the time the ticket was issued, the lifetime of the ticket, the session key to be used between the client and the server, and some other fields. The ticket is encrypted using the server’s secret key and thus cannot be correctly decrypted by the user. If the server can properly decrypt the ticket when the client presents it and if the client presents the authenticator encrypted using the session key contained in the ticket, the server can have confidence in the user’s identity. The authenticator contains the client name, address, current time, and some other fields. The authenticator is encrypted by the client using the session key shared with the server. The authenticator provides a time-validation for the credential. If a user possesses both the proper credential and the authenticator encrypted with the correct session key and presents these items within the lifetime of the ticket, then the user’s identity can be authenticated.
Confidentiality is incorrect because it ensures that data is disclosed to only authorized subjects. Integrity is incorrect because it is the property that an object is changed only in a specified and authorized manner. Availability is incorrect because it is the property that a given resource will be usable during a given time period.
251. What is the
a. It reduces management work.
b. It is a convenience for the end user.
c. It authenticates a user once.
d. It provides a centralized administration.
252. Kerberos can prevent which one of the following attacks?
a. Tunneling attack
b. Playback attack
c. Destructive attack
d. Process attack
A tunneling attack attempts to exploit a weakness in a system that exists at a level of abstraction lower than that used by the developer to design the system. For example, an attacker might discover a way to modify the microcode of a processor used when encrypting some data, rather than attempting to break the system’s encryption algorithm.
Destructive attacks damage information in a fashion that denies service. These attacks can be prevented by restricting access to critical data files and protecting them from unauthorized users.
In process attacks, one user makes a computer unusable for others that use the computer at the same time. These attacks are applicable to shared computers.
253. From an access control point of view, which of the following are examples of history-based access control policies?
1. Role-based access control
2. Workflow policy
3. Rule-based access control
4. Chinese Wall policy
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 3 and 4
254. Which of the following is
a. Discretionary access control
b. Mandatory access control
c. Access control list
d. Logical access control