1. What are Kerberos authentication path? How do they solve the problem of remote authentication?
2. The Kerberos system has several bugs that pose potential security risks. Study the Kerberos ticketing service and discuss these bugs.
3. The Kerberos system is built on the principle that only a limited number of machines on any network can possibly be secure. Discuss the validity of this statement.