Chapter 4 Authentication Applications Outline Threat, Vulnerability, Exploit Authentication Applications Kerberos X.509 Authentication Service Recommended reading and Web…