Protocol benchmarking / auditing inquiry
Ken Hornstein
kenh at cmf.nrl.navy.mil
Thu Feb 15 12:38:36 EST 2024
>This approach is taught in first year engineering.
Geez dude, no need to drag me; I'll be the first one to admit that I'm old
and don't know everything! Back in my day our curriculums didn't cover
any computer security topics at all.
But I stand by my original statements: I, personally, have not encountered
those terms before and I've feel it's fair to say I've done a large amount
of accreditation and audit work and some of it involves Kerberos. And
even with your followup emails I'm still unclear what you are asking for.
Is this because I am old and don't know everything? Certainly! Maybe
it's like Zero Trust Security and I am already mostly doing it. Maybe
it's something we have never been asked to do, so I've never done it
(because in the accreditation world you don't seem to get extra credit
for doing stuff that the accreditors do not ask for).
--Ken
More information about the Kerberos
mailing list