Copyright Goodheart-Willcox Co., Inc. 489 Chapter 15 Network Security Authentication Methods ■ Regardless of authentication protocol used, there are three main types of au- thentication: something you know, something you have, and something you are. ■ Two other methods were recently added: somewhere you are and something you do. ■ Strong authentication requires at least one mechanism from at least two categories. Authentication Protocols ■ Password Authentication Protocol (PAP) was an early development of username and password authentication that transmits the username and password as clear text. ■ Th e Challenge Handshake Authentication Protocol (CHAP) encrypts the username and password. ■ Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is a Microsoft version of CHAP that can only be used with Microsoft operating systems. ■ Kerberos was designed at the Massachusetts Institute of Technology (MIT) and is used to authenticate the client and the server. ■ Th e Kerberos system uses two diff erent keys similar to a public and private key for security. ■ Extensible Authentication Protocol (EAP) is an IETF standard used for network access and authentication in a client/server environment when IP is not available. ■ Th e most commonly encountered variations of EAP are Protected Extensible Authentication Protocol (PEAP) and Lightweight Extensible Authentication Protocol (LEAP). Security Implementations ■ After installing a network operating system, you should immediately apply any available software patches or service packs to the system. ■ Th e default system-administrator username should be changed to lessen the chance of the system being cracked. ■ A common security measure is to make devices as secure as possible this is called device hardening. ■ A strong password is composed of letters, numbers, and special symbols. ■ Network operating systems typically incorporate password policy features such as password history, minimum length, age, and complexity. ■ A fi rewall monitors data packets as they enter or exit the network system and blocks or passes them. ■ Unifi ed threat management (UTM) combines several security technologies, allowing you to manage your fi rewall as well as proxy server, IDS, or other function. ■ A proxy server is a special fi rewall designed to hide clients inside the net- work from unauthorized personnel outside the network.