Based on the information security technology of the computer network, this paper deals with its technological drawbacks and danger tendency. Though methods are given as for how to counterattack the attacks from the external network, it lays emphasis on the measures of counteracting the attacks from the internal network.. Depending on Kerberos, the trusted's three parities protocol, which is developed by MIT, it puts forwards and tries setting a safe and reliable internal network security model, of which ground is the authentication system technology in an open network environment. Not only is the model capable of providing an intensity authentication relying on secret key encryption, but also the AS and TGS is set up to control and govern the user's identity and visiting privilege, thereby enhancing the safety of the information data in the internal network. Also detailed research results are presented to the cross-realm operation between these two internal networks for the purpose of furthering the application field of the security model in the computer network.
|