From the course: CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 1 Security Operations
Unlock the full course today
Join today to access over 23,000 courses taught by industry experts.
Password authentication protocols
From the course: CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 1 Security Operations
Password authentication protocols
- [Instructor] Many access control systems rely upon password-based mechanisms to implement something you know, security. One of the most common applications of password security is to secure virtual private networks and other remote access technologies. Let's take a look at the protocols used to implement remote access password security. The password authentication protocol, or PAP, is the earliest of these protocols. In this protocol, the client wishes to authenticate to a server and both the client and the server know the user's password. The client simply transmits the username and password to the server, and the server validates the password. That's about as simple as it gets and successfully implements password authentication, but there's a major flaw to this approach. PAP does not use any encryption to protect the communication. Anyone able to eavesdrop on the connection can read the username and password from the…
Contents
-
-
-
-
-
-
-
Identification, authentication, authorization, and accounting3m 34s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors4m 25s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Password authentication protocols3m 10s
-
(Locked)
Single sign-on and federation3m 9s
-
(Locked)
Passwordless authentication1m 48s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
Cloud access security brokers5m 15s
-
-
-
-
-
-
-
-
-
-
-