THE WHATIS.COM WORD-OF-THE-DAY   
November 8, 2002

CRAM 
______________
TODAY'S SPONSOR: VeriSign - The Value of Trust

Secure all your Web servers now - with a proven 5-part strategy.   
The FREE Server Security Guide shows you how to:                     
- DEPLOY THE LATEST ENCRYPTION and authentication techniques
- DELIVER TRANSPARENT PROTECTION with the strongest security without
disrupting users. And more. 
Get your FREE Guide now: http://WhatIs.com/r/0,,7316,00.htm?freeguide

______________   
TODAY'S WORD: CRAM 

See our definition with hyperlinks at 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci861581,00.html

CRAM (challenge-response authentication mechanism) is the two-level
scheme for authenticating network users that is used as part of the
Web's Hypertext Transfer Protocol (HTTP). The two levels are basic
authentication and digest authentication. 

Using the CRAM, the server (or, alternatively, a proxy server or
gateway) issues a challenge to a user in the form of a "401
unauthorized" request for a password. The password is a string of
characters known only to the user and the server. When the server
receives the user response, it checks to be sure the password is
correct. If so, the user is authenticated. If not, or if for any
other reason the network does not want to accept the password, a "403
forbidden" message is issued, and access to the site is denied. The
CRAM can be used in addition to other security features, such as
strong encryption. 

The basic form of CRAM can be abused because passwords are
comparatively easy to steal. In digest authentication, the more
sophisticated of the two forms of CRAM, the password does not appear
as plain text sent over the network. This enhances security but does
not provide entirely hack-proof protection. Even digest CRAM can be
defeated under certain circumstances, giving an unauthorized hacker
superuser status. This makes it possible for the hacker to launch a
denial-of-service attack, making it difficult or impossible for
authorized users to obtain authentication. 

RELATED TERMS:

capacitance 
http://whatis.techtarget.com/definition/0,,sid9_gci211742,00.html 

wireless 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213380,00.html 

voltage 
http://whatis.techtarget.com/definition/0,,sid9_gci213320,00.html 

chassis 
http://whatis.techtarget.com/definition/0,,sid9_gci211774,00.html 

radio-frequency 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214263,00.html 

antenna
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211571,00.html 

______________________
SELECTED LINKS

JavaPro provides an overview in a paper called "Better Security with
J2EE." 
http://www.fawcette.com/Archives/premier/mgznarch/javapro/2001/bgfall01/sh01bg/sh0113-1.asp
 

SearchSecurity.com provides links to more information about
authentication. 
http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?h=true&query=authentication
 

______________________
QUIZ #32 | Logic Chips

How much do you know about the little machine inside your computer
that carries out the orders of whatever program happens to be in
charge? We're betting you know quite a bit - no pun intended!

>> Take the quiz
http://whatis.techtarget.com/definition/0,,sid9_gci861268,00.html 

______________________
CROSSWORD PUZZLE #6 | Wireless 

Improve your flexible thinking skills. Print out the puzzle and keep
it nearby to work on throughout your day!
http://whatis.techtarget.com/definition/0,,sid9_gci861329,00.html

______________________
REAL-LIFE CHALLENGE #19 | Internet banking while at work 

Rob's fellow employees want to know if it's safe to do their Internet
banking over the company LAN. Can you advise them?
http://whatis.discussions.techtarget.com/WebX?msgInContext@;233.yYyLaVl9sHU.5@.1dcfae0e/154
  

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] nagware  
http://whatis.techtarget.com/definition/0,,sid9_gci860960,00.html 

[2] Daylight Saving Time
http://whatis.techtarget.com/definition/0,,sid9_gci860747,00.html 

[3] X dimension 
http://whatis.techtarget.com/definition/0,,sid9_gci860044,00.html 

[4] DOT4  
http://searchhp.techtarget.com/sDefinition/0,,sid6_gci860597,00.html 

[5] Stefan-Boltzmann constant 
http://whatis.techtarget.com/definition/0,,sid9_gci861008,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])
___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

If you would like to sponsor this or any TechTarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]

Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to