"Remote Authentication"

User Generated

trrmltfq

Computer Science

Description

"Remote Authentication"

More companies are allowing users to work from home, which extends a company’s network and introduces new security concerns.

    • Your company has decided to allow employees to work from home two days a week. Your CISO has requested a high-level comparison between RADIUS, TACACS and VPN. How does each of these services leverage Kerberos and the AAA framework? Make a recommendation and justify your answer based on your findings. Make sure to outline any limitations associated with each service

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: REMOTE AUTHENTICATION

Remote Authentication

Student’s Name:

Instructor’s Name:
Institutional Affiliation:
Course Code:
Date of submission:

1

REMOTE AUTHENTICATION

2

It is very much true that more companies are allowing users to work from home, hence
extending a company’s network and introduces new security concerns. To secure the network,
therefore, there are various methods that can be used. These are RADIUS (Remote
Authentication Dial-in User Service), TACACS (Terminal Access Controller Access-Control
System), and the use of a Virtual Private Network (VPN). These computer network security
methods therefore also need to be configured with the right network authentication protocol
frameworks such as Kerberos, and Authentication, authorization, and accounting (AAA). This
brief paper, therefore, thoroughly compares the three methods used to secure networks security
and determined which one of them is the best for implementation for the company in as far as its
ability to successfully leverage with either or both Kerberos, and Authentication, authorization,
and accounting (AAA) are concerned.
To begin with, according to Worland (2014), Remote Authentication Dial-in User
Service abbreviated as RADIUS is just like any other security network protocol that issues
security measures against any person not authorized to use the system. It works on a principle
that only the dial-in users are allowed to access the system, otherwise the system cannot allow
access. Terminal Access Controller Access-Control System on the other hand abbreviated as
TACACS is another type of networking protocol, only that it is of an older version and works on
a principal where a central server is used to determine whether a user is authorized to access or
not based on password identification. A Virtual Private Network, on the other hand, abbreviated
as VPN is also another type of security networ...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags