Wireless Operational Security

K

Kerberos, 284 “92

AS exchange, 286 “87

benefits, 284 “85

client/server authentication exchange, 287

components , 285 “86

confidentiality/integrity and, 290

defined, 284

exchanges, 286 “87

KDC, 286

network service, accessing, 288, 289

referral tickets, 286

service tickets, 286

session tickets, acquiring, 288 “89

support, 290

TGS exchange, 287

TGT, 286

TGT, obtaining, 287 “88

v5, 284

weaknesses and vulnerabilities, 290 “91

wireless implementation, 289 “90

Key management infrastructures (KMIs), 50, 55

Kismet, 197

Категории