NIS Unit-5 JCJ
NIS Unit-5 JCJ
Course Outcome
Maintain secured networks and describe
Information Security compliance standards
Kerberos
Kerberos is a network authentication protocol and it is
designed to provide strong authentication for client
server applications.
The AS, receives the request from the client and then
AS verifies the client. This is done by just looking into
a simple database of the user’s ID.
Step 2
IP
SECURITY
ARCHITECH
TURE Domain Of Interpretation
-ipseckey
Tunnel Mode
Protect the entire IP payload
Gateway to Gateway Communication
TRANSPORT MODE
TUNNEL MODE
Payload is encrypted but Payload as well as IP
not IP header header are encrypted
Encrypte
d
AUTHENTICATION HEADER
0 8 1 3
6 1
ESP
EMAIL SECURITY
EMAIL SECURITY
PROTOCOL
1. SMTP
2. PEM
3. PGP
SIMPLE MAIL TRANSFER
PROTOCOL- (SMTP)