Question: Question 3. Security (20 marks) (a) Kerberos involves three (bi-directional) exchanges, one between the client and the Key Distribution Center (KDC), one between the client

 Question 3. Security (20 marks) (a) Kerberos involves three (bi-directional) exchanges,

Question 3. Security (20 marks) (a) Kerberos involves three (bi-directional) exchanges, one between the client and the Key Distribution Center (KDC), one between the client and the Ticket Granting Service (TGS), and one between the client and the server (S) chosen by the client. Describe the main Kerberos components and explain the purpose of each of the three exchanges mentioned above. (b) Describe some of how conventional Web applications are vulnerable to eavesdropping, cross-site request forgery, injections, replay and denial of service attacks. Suggest methods by which Web applications could be protected against each of these forms of attack. (c) There is no authentication in the Diffie-Hellman key-exchange protocol. By exploiting this property, a malicious third party can easily break into the key exchange taking place between Alice and Bob, and subsequently, ruin the security. Explain how this would work. (d) Suppose that you were asked to develop a distributed application that would allow the PEO office to set up exams. Give at least three state- ments that would be part of the security policy for such an application

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!