Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Authentication

Kerberos

Posted on by

Kerberos is a network authentication protocol developed by Massachusetts Institute of Technology that provides strong authentication between client and server using cryptography in an open unprotected network. Key Aspects of Kerberos Architecture Key Distribution Center (KDC) is the core component of Kerberos which acts as the 3rd Party Authentication providing Central Authentication to the domain (realm)…

Read more

Authentication

Posted on by

Authentication is the process of validating and verifying the identity of a user or system trying to access a system or service before granting access. Authentication comes after the Identification process. Authentication can be done with the following ways What you know is where a user is authenticated with what they know like passwords, passphrase,…

Read more

Identification

Posted on by

Identification is the process of identifying a person or system in a realm (domain, organization, enterprise). The identification is the initial process before authenticating. Every user and system in a realm should have a unique identification, so that they can be authenticated & authorized for granting access and accounted for their actions.

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme