Copyright Goodheart-Willcox Co., Inc. 489 Chapter 15 Network Security Authentication Methods Regardless of authentication protocol used, there are three main types of au- thentication: something you know, something you have, and something you are. Two other methods were recently added: somewhere you are and something you do. Strong authentication requires at least one mechanism from at least two categories. Authentication Protocols Password Authentication Protocol (PAP) was an early development of username and password authentication that transmits the username and password as clear text. Th e Challenge Handshake Authentication Protocol (CHAP) encrypts the username and password. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is a Microsoft version of CHAP that can only be used with Microsoft operating systems. Kerberos was designed at the Massachusetts Institute of Technology (MIT) and is used to authenticate the client and the server. Th e Kerberos system uses two diff erent keys similar to a public and private key for security. Extensible Authentication Protocol (EAP) is an IETF standard used for network access and authentication in a client/server environment when IP is not available. Th e most commonly encountered variations of EAP are Protected Extensible Authentication Protocol (PEAP) and Lightweight Extensible Authentication Protocol (LEAP). Security Implementations After installing a network operating system, you should immediately apply any available software patches or service packs to the system. Th e default system-administrator username should be changed to lessen the chance of the system being cracked. A common security measure is to make devices as secure as possible this is called device hardening. A strong password is composed of letters, numbers, and special symbols. Network operating systems typically incorporate password policy features such as password history, minimum length, age, and complexity. A fi rewall monitors data packets as they enter or exit the network system and blocks or passes them. Unifi ed threat management (UTM) combines several security technologies, allowing you to manage your fi rewall as well as proxy server, IDS, or other function. A proxy server is a special fi rewall designed to hide clients inside the net- work from unauthorized personnel outside the network.
Previous Page Next Page

Resources and Downloads

Extracted Text (may have errors)

Copyright Goodheart-Willcox Co., Inc. 489 Chapter 15 Network Security Authentication Methods Regardless of authentication protocol used, there are three main types of au- thentication: something you know, something you have, and something you are. Two other methods were recently added: somewhere you are and something you do. Strong authentication requires at least one mechanism from at least two categories. Authentication Protocols Password Authentication Protocol (PAP) was an early development of username and password authentication that transmits the username and password as clear text. Th e Challenge Handshake Authentication Protocol (CHAP) encrypts the username and password. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is a Microsoft version of CHAP that can only be used with Microsoft operating systems. Kerberos was designed at the Massachusetts Institute of Technology (MIT) and is used to authenticate the client and the server. Th e Kerberos system uses two diff erent keys similar to a public and private key for security. Extensible Authentication Protocol (EAP) is an IETF standard used for network access and authentication in a client/server environment when IP is not available. Th e most commonly encountered variations of EAP are Protected Extensible Authentication Protocol (PEAP) and Lightweight Extensible Authentication Protocol (LEAP). Security Implementations After installing a network operating system, you should immediately apply any available software patches or service packs to the system. Th e default system-administrator username should be changed to lessen the chance of the system being cracked. A common security measure is to make devices as secure as possible this is called device hardening. A strong password is composed of letters, numbers, and special symbols. Network operating systems typically incorporate password policy features such as password history, minimum length, age, and complexity. A fi rewall monitors data packets as they enter or exit the network system and blocks or passes them. Unifi ed threat management (UTM) combines several security technologies, allowing you to manage your fi rewall as well as proxy server, IDS, or other function. A proxy server is a special fi rewall designed to hide clients inside the net- work from unauthorized personnel outside the network.

Help

loading