BestInternetSecurity.net

Information Security Resources

Entries for the ‘Access Control’ Category

How Do Brute Force Password Crackers Work? And how to avoid your password being cracked by a password cracker

Brute force password cracker is one kind of  Password Crackers. Password Crackers is a piece of software that attempts to break into a system by trying many different user names and passwords. To break a password, a Password Cracker uses two methods of attack to break into your account. The first method is Brute Force […]

Leave a Comment

Authentication, Authorization, and Identification – The three pillars of Access Control

I wrote this article because I need to talk about this topic to a group of local bank executives. What I have in mind is how to get them to understand the vague differences between these three terms using illustrations from our daily lives. For these reasons, I picked up a number of books to […]

Leave a Comment

RADIUS AAA Servers

What are RADIUS AAA Servers? According to Convery, S.(2007)1: “RADIUS was developed by Livingston Enterprises (now part of Alcatel-Lucent) in the early 1990s, became an Internet standard through the IETF in 1997, and today is the most widely accepted AAA protocol. Another widely adopted AAA protocol, which predates RADIUS as an RFC by four years, […]

Leave a Comment

PPTP port: How PPTP Works

PPTP port belong to Point-to-Point Tunneling Protocol (PPTP). PPTP is a method for implementing virtual private networks that works on the data link layer. It serves the purpose of encrypting a remote computer’s network traffic to a host using Point-to-Point Protocol’s (PPP’s) authentication methods of PAP (Password Authentication Protocol) or CHAP (Challenge-Handshake Authentication Protocol). It […]

Leave a Comment

Kerberos Authentication and Single Sign-On Access Control

Kerberos Authentication: In Greek mythology, Kerberos is the monstrous three-headed dog that guards the entrance to Hades. Indeed, we can view modern-day Kerberos Authentication as the god who guards the entrance to a network’s resources. Kerberos Authentication, a computer network authorization protocol, was originally invented and published by MIT. This system allows individuals communicating over […]

Leave a Comment