Page 151 - CISSO_Prep_ Guide
P. 151
Kerberos has the weakness of being vulnerable because it does
not recognize a brute force attack against the stored passwords.
The KDC is also a single point of failure and must be redundant,
physically protected, and carefully administered.
Access Control Methods
There are many ways to implement access controls. In a
physical sense, a person can have certain rights or capabilities.
For example, they may have an ID card that indicates which
buildings they may enter. There can also be a list of which
people are allowed access to a certain area. In both cases the
information is the same - it is the list of who can go where and
what can they do - the only difference is that one looks at the