Page 151 - CISSO_Prep_ Guide
P. 151

Kerberos has the weakness of being vulnerable because it does
            not recognize a brute force attack against the stored passwords.
            The KDC is also a single point of failure and must be redundant,
            physically protected, and carefully administered.



            Access Control Methods
            There are many ways to implement access controls. In a
            physical sense, a person can have certain rights or capabilities.
            For example, they may have an ID card that indicates which
            buildings they may enter. There can also be a list of which
            people are allowed access to a certain area. In both cases the
            information is the same - it is the list of who can go where and
            what can they do - the only difference is that one looks at the
   146   147   148   149   150   151   152   153   154   155   156