Prepare a report which should include the following:.
1)Discuss in detail what problems was Kerberos designed to address in a network of trusted client systems.
2)Explain atleast four threats associated with user authentication over a network or internet and how Kerberos can mitigate it.
3)Using any networking diagram software, draw a full-service Kerberos environment diagram with detailed description of the architecture.
4)Justify in your own words, how this diagram satisfy security objectives of confidentiality, integrity and authentication.
5)List and explain atleast five major differences between version 4 and version 5 of Kerberos.
6)Briefly discuss, what type of organisations should use Kerberos and why?