Password Authentication Protocol

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Remote User Authentication in Digital Libraries
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Gursharan Singh Tatla SLIP and PPP 27-Mar
Remote Access Network Management Kelly Given Allison Traina.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
Principles of Information Technology
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Remote Networking Architectures
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
CPMT 1449 Computer Networking Technology – Lesson 1
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Chapter 1 An Introduction to Networking
NETWORK Topologies An Introduction.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
What is a Topology? The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Point to Point Protocol
Networking Basics Lesson 1 Introduction to Networks.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
BASIC NETWORKS. What is a Network? A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic.
CENTRALISED AND CLIENT / SERVER DBMS. Topics To Be Discussed………………………. (A) Centralized DBMS (i) IntroductionIntroduction (ii) AdvantagesAdvantages (ii)
Prepared By: Dr. Mohamed Abdeldayem Reference: Chapter 24 Wade Edwards, CCNP Complete Study Guide, Experiment 12 Configuring PPP on a serial link.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
PPP Configuration.
Communications & Networks National 4 & 5 Computing Science.
Activity 1 5 minutes to discuss and feedback on the following:
Virtual Private Networks
PPP Protocol.
PPP Protocol.
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Computer Networks Part 1
Remote Access Lecture 2.
Configuring and Troubleshooting Routing and Remote Access
Radius, LDAP, Radius used in Authenticating Users
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
Introduction to Computers
Introduction to Networking
Virtual Private Network (VPN)
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
Peer-to-Peer (p2p) Systems
Network+ Guide to Networks, Fourth Edition
Authentication Chapter 2.
PPP Protocol.
Client/Server and Peer to Peer
Client/Server And Peer-to-Peer
Virtual Private Networks (VPN)
Principles of Information Technology
Presentation transcript:

Password Authentication Protocol Leslie Wallace

Summary P.A.P. definition How it’s used Types of different NOS involved Why P.A.P. is important Advantages & Disadvantages New Authentication trying to replace P.A.P.

Password Authentication Protocol Also known as (PAP) - a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely with the use of a password

How P.A.P. is used… Networking Operating System (N.O.S.) - designed to support workstation, personal computer, and other terminals connected on a local area network - provide sharing, name directory, security, etc.

Types of different NOS involved in P.A.P. Peer-to-Peer Client/Server (Remote Authentication Dial In User Service) Point-to-Point Protocol

Peer-to-Peer Users allowed to share resources or files located on their computers Accessibility, ease of setup, less hardware needed Downside.. - no central location for storage - lack oh high security

Client/Server (R.A.D.I.U.S.) Server enables multiple clients to share resources Allows network to centralize functions and applications in one or more dedicated file servers (stability) Remote Authentication Dial In User Service – used to authenticate remote users with user names and passwords Downside… -expensive, regularly maintenance

Point-to-Point Protocol Point-To-Point Protocol (P.P.P.) - establishes a direct connection between to nodes Validates users before allowing them access to server resources Most common NOS used

Why P.A.P. is important.. The point of having a digital authentication password system is to secure sensitive information You simply prompt a user to enter his/her id and password to gain system access. P.A.P. transmits unencrypted American Standard Code for Information Interchange, or ASCII passwords over the network

Advantages & Disadvantages Validates users before allowing access Flexible Protocol Password Strength Lack of identity check Shoulder Surfing Plain text could be a ploblem

One & The Same? Challenge Handshake Authentication Protocol seems to be an upgraded Password Authentication Protocol It goes hand and hand with P.P.P. Authenticates users to an entity with verification such as password Many servers have replaced P.A.P. with C.H.A.P. because it’s deemed to be stronger

Recap P.A.P. definition How it’s used Types of different NOS involved Why P.A.P. is important Advantages & Disadvantages New Authentication trying to replace P.A.P.

Questions.. ?

References http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Password_authentication_protocol.html http://searchnetworking.techtarget.com/definition/network-operating-system http://technet.microsoft.com/en-us/library/cc958013.aspx http://books.google.com/books?id=l0lAoEvCytcC&pg=PA332&lpg=PA332&dq=different+nos+involved+in+password+authentication+protocol&source=bl&ots=03xOOiP0b-&sig=XvHRnr6pyN-fBbFlOKdTeZITSHs&hl=en&sa=X&ei=lcmdUoqcF8G-kQfC-4CAAw&ved=0CFwQ6AEwCA#v=onepage&q=different%20nos%20involved%20in%20password%20authentication%20protocol&f=false http://www.ehow.com/list_5924269_disadvantages-password-authentication-protocol.html