Chapter 11. Understanding Network Access Security and Kerberos
I USED TO BE MIS DIRECTOR FOR A company that ran telesales call centers. Every once in a while, a sales agent would get a prospect on the line with a network security background. How would I know? The prospect would ask questions like, "How do I know beyond a shadow of a doubt that you are who you say you are?" and "How do I know beyond a shadow of a doubt that you're permitted to sell this to me?" and "Do you mind if I record this call?"
These questions indicate that the prospect was familiar with the three pillars of network security:
In case you're wondering, the sales agents would generally react to these types of questions by hanging up and moving on to a less sophisticated prospect, proving that IT training really does have practical uses in the real world.
This chapter covers how Windows Server 2003 achieves the three A's of network security. Chapter 18, "Managing a Public Key Infrastructure," covers advanced security topics associated with Public Key Infrastructure (PKI).