(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune.

Size: px
Start display at page:

Download "(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune."

Transcription

1 SECUREZZA Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune Abstract The current security systems and authentication systems have much weakness and are prone to break through. Textual password is the most common and mostly used security scheme. However, even after the secure passwords requirements released by Microsoft, users do not follow them. Users generally choose meaningful words from dictionary, which make it vulnerable to hacking and brute force attacks. The next available option, i.e. the graphical password has a less password space then the textual password scheme. Smart cards or tokens based have the risk that the tokens are stolen. The most secure security system, the biometrics authentications have been proposed but the users tend to restrict using biometrics because of their intrusiveness and effect on their privacy. The most important defect of the security systems present these days is that if we buy one, then any file with more or less privacy requirements will be locked using the same security level. In this paper, we present and evaluate our contribution, i.e. the Securezza. It is a multifactor authentication scheme'. It includeall the types of security schemes and the users have the option to choose the level of security required to lock a file based on the requirements of the file. More over we provide a 3D virtual environment for the users to navigate and make use of the graphical password scheme more effectively and productively, The sequence of actions and interactions made by the user.towards the objects inside the 3D environment constructs the user's password. Keywords: Textual passwords, hacking, brute force attacks, graphical passwords, Smart cards, tokens, required security level, Securezza, 3D virtual environment. 1. INTRODUCTION The remarkable growth in the usage of computers and dependency on computers has made data safety a major point of concern. Moreover the alarming rate of increase in the number of cyber crime cases made the security aspect of data the most important topic of research and development. One of the major security module, i.e. authentication is the process of validating who the user is, and to whom to grant access. In general, authentication techniques can be classified as knowledge based, token based and biometrics. Further we can have the sub-divisions of the knowledge based authentication as: 1) Recall Based 2) Recognition Based Recall Based requires the user to reproduce a secret was created before, and recognition based require the user to identify and recognize the secret. The most common example of recall based is the Textual Passwords. Many. authentication systems, particularly in banking, require not what the user knows but also what the user possesses. Another authentication scheme is the graphical passwords are based on the idea that the users can recognize pictures better than words. The most secure authentication system till date is the biometrics. Many biometrics techniques such as face recognition, finger print etc has been proposed. AU the different authentication schemes mentioned above have many advantages as well as disadvantages. Let us see the fallacies in each one those in detail. j."

2 ClT Journal of Research, Volume 1, May 2010 First in the list comes the textual password. The textual passwords are weak and susceptible to numerous attacks. Strength of textual passwords depends on the user's ability to keep the password secret. The level of security provided by the textual passwords is inadequate for making financial transactions remotely. Brute force is a sure shot method to hack such passwords. Next is the Hardware token scheme. It involves additional costs such as cost of making the token. The user, in order to get authenticated has to carry the token and produce it every time required: There is a risk of the hardware token to get stolen and misused. The attack called meet in the middle can easily break the hardware token scheme. Another system is the software token. This method is somewhat tedious and requires the users to be trained properly to exploit the level of security provided by it. This method can only be deployed in a controlled environment and so inapplicable to most of the real world applications. The most secure system is the biometrics. But it involves additional hardware costs such as scanners. Biometrics are also a slow and complex process and requires the users to have patience to get authenticated. More over on purchasing anyone of the security system it implies, we implicate same level of security on all our files. There can be situations where we require more security for more sensitive information or less security, fast and easy access to some less sensitive data.after going through the defects in the above mentioned schemes we will readily agree to the fact that no security system till date is.as safe as applicable as it appears to be. So, in this paper we come with a better idea, "SECUREZZA". SECUREZZA empowers its users with all the security systems mentioned till date in single software. It also enables its users to decide the level of security and ease of access to every file separately. In our project we have implemented a folder lock scheme just to show an example of how it makes the required folder secure from almost all types of attacks. It is multiuser software and different users can lock their personal files with their own choice of security scheme ranging from most secure i.e. the biometrics to the most widely used textual passwords. It also provides a 3D virtual environment for user interaction with the software. This virtual environment totally changes the current concept of security and makes it more secure and interactive as well as maintaining the simplicity for unlocking a locked data. Ease of data access and security are like the two opposite sides of a water body. The closer we go towards one end the farther we are from the other end. The 3D virtual environment is an aid to this maintaining the balance in an optimal position. It makes the security system interactive for the user and safer for the data. The interactions that the user makes in tills 3D virtual environment creates a special set of passwords for the user and each element of the created password must match with the password previously set to access the locked data. 2. SECURITY DETAILS SECUREZZA combines recognition based as well recall based authentications schemes into one. The user simply navigates through the 3D virtual environment and interacts with different objects kept at different places. The combination and sequence of user's interactions creates a special set of passwords. Therefore the user walks into the virtual environment and interacts with various objects kept in the environment for example: two computers are kept at specific locations and the user interacts with a specific one and enters a text, this will act as a textual password module for the user. There can be more virtual objects like table lamps and magic cubes with are set to move on specific location if interacted by the user. This forms a module of graphical passwords. Another different module of graphical password is also available where the user has to set or click various images in a particular location to.. create a password.there are facilities such as facial recognition as well as finger print recognition and other authentication schemes placed on different locations in the environment. If the user interacts with that particular object, it will initiate that module to be active and add to the final set of passwords: The objects placed in the virtual environment can be anything like 1. A computer on which a user can type. 2..A white board that a user can draw on.

3 3. A light that can be switched on/off. 4. Objects that changes position when clicked. 5. Any biometric device replica. 6. Any graphical password scheme. (The list of possible objects is endless). Thus based on the amount of interactions made by the user it makes us possible to increase the amount of security required to access the sensitive information. Moreover, due to combinations of all the security schemes we are able to overcome the defects of the various security schemes when used separately. 3. SYSTEM USAGE DETAILS AND SEQUENCE After having a brief idea about what the system is, let us see the system usage details and the sequence of operations that are required to be performed by the user to make the information in question, most secure possible till date. Generally this technique can be used in any place where the information has to be made secure. Here we have applied an example to lock folders which contains some private information about the user.let us observe the user i.e. Mr. A about how he manages to lock and unlock his sensitive information with the level of security he wishes to implement according to the data importance and ease of access he requires.mr. A has two folders (the last two on the screen shot below named "folderl" and "folder2") on his personal computer that he wants to lock. He has different data contained in both of them and the data require different amount of security to be levied on them.he starts the software "SECUREZZA" and a startup screen appears.now Mr. A has to enter his usemame to log in. If he is new to the system then he has to create his username and the username will be added to the database with his face and finger print details. UserName Added in TIle Database Fig C: New User Creation After Logging IN Mr. A is asked whether he is asked to enter the target folder path. Fig D: User Created he wants to lock a folder or unlock it and on clicking on "Lock a Folder", Fig F: Specifying the Target Folder.

4 (IT Journal of Research, Volume I, May 2010 Now after specifying the target folder Mr. A is asked to set the passwords. Ifhe leaves a field blank it means that the particular module is disabled.observing the below two figures we can see that different levels of security can be provide for different files. r=r=»: :. ~ Face RecognitiQr:' I ~456 1'341 ri ============================~ Graphical f3s,.""ord - r-j (Ohject: In~r. "tion&):.c!wfirm Fig G: Setting Passwords for folder2 As soon as Mr. A confirms the locking a confirmation message appears on the screen.now after the folded has been locked and some other user tries to access the folder he/she is unable and a screen as shown below appears to him/her.now to unlock the folder Mr. A has to log in again and select "Unlock a Folder". As soon as he does that, a list of the folders locked by him appears. He has to select the folder he wants to unlock and after he does that a 3D virtual environment appears on the screen. Mr. A interacts with the environment to create his password. Some screen shots of the 3D virtual environment is attached. Fig: Screen Shots of the 3D virtual environment presented to the user to unlock the file After interacting with different objects of the 3D virtual environment and giving appropriate passwords at the right places the user requests for unlocking the file. The system forms a set of passwords based on the interactions made by the user in the environment. Then the system queries the database about the set of passwords given by the user at the time of locking the folder. It then matches each element of the password in detail and if the password matches the folder is unlocked and the user,;s granted access.

5 4. DATABASE DETAILS To make the system able to recover from various types of system crashes and to keep the user as well as locking data organized we are using Orac1e 9i as our back hand. This database can also be on another system which is at a different location geographically. Placing the system at different can be required by the applications like banking as well as Internet security applications. If the database is at different location then the networking module of the software is activated and the database is queried for information as well updated accordingly.if we go into the depth of the database issue used in our system then we have two tables to maintain. These two tables, namely "users" and "securezza" keep the entire details of the users of the system as well as the folders locked by them separately. The "users" table contains only the users' names those who have registered with the system. The "securezza" table is the main table which has fields like "path of the folder locked", "name of the user who locked it", "several password set by the user for that folder", "several password schemes enabled by the user" etc. When a user locks a folder this table is updated according to the passwords set by the user, and when he tries to unlock a folder, this table is queried for the password details. The system then matches the set of passwords and if the passwords match exactly to the r:- one set, the folder is unlocked and the particular record is deleted from the table. 5. ENCRYPTION I DECRYPTION TECHNIQUE To make the system more secure and to make the system safer against attacks we are using encryption/decryption techniques. This encryption/decryption technique enables the system to keep the data in an encoded format which. makes it almost impossible to read it directly from the database.basically encryption is a technique in which a text is encoded before transmitting or storing it according to a particular format. This format is called the key for encryption and the encrypted data is called the cipher text.there are several encryption/decryption techniques available. Some of them are "Substitution encryption", "Positional encryption", "Public Key encryption" etc. We can use anyone of them in our project to make it more secure. For now we have used the SUBSTITUTION CIPHER TEXT GENEItA non scheme. In our scheme wheu a text is entered to the encrypting function then it. manipulates each character separately and generates a cipher text based on a particular key for substitution algorithm. For eg: if a text like "abed" is given then it generates a cipher text like "uy"5".this technique makes the data safer and less hack prone because of our system. 7. TECHNICAL DETAILS (DATA FLOW) The data flow of a system explains the flow of data in the system. It has several levels of details and can be taken to any level of complexity. The levels are like "LEVEL 0 Data flow", "LEVEL 1 Data flow" etc. The Level 0 of our system is shown below:. 1T~~1 [-03n.---', k O~~l "7~v~" _1&1_l---.J!---~~---\~i = I \i h>< i

6 ., (IT Journal of Research, Volume 1, May 2010 Fig: LEVEL 0 DATA FLOW To explain more detailed information we also have LEVEL I data flow of our system as shown below: Uo.-dl! llid.' ~ I -,, _ :.( '/~H 'j--~._/ '="'.".,..! /~,j}~~' > I T=-~ I.>---~' / \.'~. I lj-:n~ 1/' \/ ~""-"~ i ~~/ ~~~! 3D~.:r.: ) '\. ~...( ---==-~\"i ~.=I ""\1fu<_1 Fig: LEVEL I DATA FLOW _.._ _.... ~ _,"",._. _.,.."' ""... _._ '."".~..... "'......, 7. TECHNICAL DET AILS (VARIOUS ALGORITHMS). "._h_,.._'..«.,.:.jv'>"".,-'. -.,..._"""..._. "4.,. "-N'"'.. ""'",...,.~_,4) _c_ ~ "' ~''"'..~;''',.._I. _..:._... ~~...'-..,.."..~... ""-".,.. '"..--. L Designing A 3D Virtual Environment Step c- I Prepare a particular plan for the 3D environment. Step - 2 Using Software Rendering Scheme Develop Codes for various objects in the 3D environment. Step - 3 Create a Frame and add containers to the Frame, each container depicting different reasons of the 3D environment. Step - 4 Add different obj ects in the specific container as required by the plan. Step - 5 Implement Action performed function for every action performed in the environment. Step - 6 Initialize the camera view arid the angle of view for the user. Step - 7 Add navigation changes using the action performed function. Step - 8 Monitor each action performed by the user and initiate actions accordingly, Step - 9 Use Co-ordinates system to monitor the point of interaction by the user. Step - 10 Initiate different module as per the actions performed by the user. 2. Textual Password Scheme Step - 1 Create a Frame for the Textual Password Module. Step - 2 Add a password field in that field for the password input. Step - 3 Attach various buttons such as Log In as well Cancel to the Frame. Step - 4 Add respective functions to the buttons attached on the frame. Step - 5 Accept the password from the user. Step - 6 Retrieve the textual password from the Database. Step - 7 Match the passwords. 3, Face Recognition System Step - I Create a Frame for the Image capture. Step-2Initiate Web Cam to capture the Image of the user. Step - 3 Use Eigen Face Creator to test the face. Step - 4 Retrieve the Image database of the user. Step-5 Generate the Eigen Value Based on the Eigen Face Computation scheme. Step -6 Check for the Eigen Value within the Threshold value. Step - 7 Authenticate if Threshold uncrossed. 4. Graphical Passwords System Step -I Monitor the interactions made by the user in the 3D virtual environment. Step - 2 Initiate object moving in the environment on interactions. Step - 3 Develop other graphical passwords scheme.

7 5. Database Connection Step - 1 Establish a connection using type 4 of JDBC connectivity technique, Step - 2 Create the required tables on the first run of the system, Step - 3 Create a function for new user creation. Step - 4 Create a function for user data retrieval. Step - 5 Create a function for locking data updating. Step - 6 Create a function for locking data retrieval. 6. Folder Locking Step - 1 Input the path for the target folder. Step - 2 Check for the presence oftbe target folder. Step - 3 Use the secret Locking technique to lock the folder. Step - 4 Update the database about the folder locking details, 8. APPLICATIONS The system can be applied to all the security areas, It is coded on JA V A using the swing technology instead of application window toolkit making it compatible for all kinds of embedded systems. It can also provide better security for ATMs and other banking transactions. 9. PROBABILITY OF SYSTEM HACK Let the Textual Password Hack Probability Let the Graphical Password I Hack Probability Let the Graphical Password I Hack Probability Let the Graphical Password I Hack Probability Let the Graphical Password I Hack Probability 'Let the Face Recognition Hack Probability Combination Probability IIx l/yj L/y2 l/y3 l/y4 llz 1/(XYly2y3y4z) Combinatorics for the Choice of Six 6C6*6C5*6C4 *6C3 *6C2*6C 1 1*6*15*20*15*6 = SYSTEM BREAK PROBABILITY (l/(xyly2y3y4z) )* ( ) 10. CONC~USION Textual passwords and token-based passwords are the most common user authentication schemes. However, many different schemes have been used in specific fields. Other schemes are under study yet they have never been applied in the real world. The motivation of this work is to have a scheme that has a huge Password space while also being a combination of any existing, or upcoming, authentication schemes into one scheme. Securezza gives the user the choice of modeling his 3D password to contain any authentication scheme that the user prefers. Users do not have to provide their fingerprints if they do not wish to. Users do not have to carry cards if they do not want to. Users have the choice to model their 3D password according to their needs and their preferences. Securezza probable password space can be reflected by the design of the three-dimensional virtual environment, which is designed by the system administrator. The three-dimensional virtual environment can contain any objects that the administrator feels that the users are familiar with. For example, football players can use a three dimensional virtual environment of a stadium where they can navigate and interact with objects that they are familiar with. A study on a large number of people is required. We are looking at designing different three-dimensional virtual environments that contain objects of all possible authentication schemes. The main application domains of 3D Password are critical systems and resources. Critical systems such as military facilities, critical servers and highly classified areas can be protected by 3D

8 Password system with large three dimensional virtual environments. Moreover, a small three dimensional virtu environment can be used to protect less critical systems such as handhelds, ATM's and operating system's logir Acquiring the knowledge of the probable distribution of a User's 3D password might show the practical strength of a 3D password. Moreover, finding a solution for should surfing attacks on 3D passwords and other authentication schemes is also a field of study. 11.REFERENCES [1] X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," in Proc.z lst Annu. Cornput. Security ApI Conf., Dec. 5-9,2005, pp [2] D. V. Klein, "Foiling the cracker: A survey of, and improvement to passwords security," in Proc. USENl Security Workshop, 1990, pp [3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATlI.Dec. 11,2003. [4] T. Kitten, Keeping an Eye on the ATM. (2005, JuL J 1). [Online]. Available: ATMMarketPlace.com [5] BBC news, Cash Machine Fraud up, Say Banks, Nov. 4,2006. [6] G. E. Blonder, "Graphical password," U.S. Patent , Sep. 24, [7] R. Dhamija and A. Perrig, "Deja Vu: A user study using images for authentication," in Proc. 9th USINE Security Symp., Denver, CO, Aug. 2000, pp [8] S. Wiedenbeck, J. Waters, J.-c. Birget, A. Brodskiy, and N. Memon, " Authentication using graphic passwords: Basic results," in Proc. Human-Comput. Interaction Int., Las Vegas, NY, JuL 25-27,2005. [9] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudin evaluation of a' graphical password system," lot. J. Human-Comput. Stud. (Special Issue on HC} Research in Privac and Security), vol. 63, no. 112,pp , JuL [10] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design. and analysis of graphic passwords," in Proc. 8th USENIX Security Symp., Washington DC, Aug. 1999, pp [II] J. Thorpe and P. C. van Oorschot, "Graphical dictionaries and the memorable space of graphical passwords," Proc, USENIX Security, San Diego, CA, Aug. 9-13,2004, p. 10. ' [12] A. Adams and M. A. Sasse, "Users are not the enemy:why users compromise computer security mechanisn and how to take remedial measures," Commun. ACM, vol 42, no. 12, pp , Dec

Advanced Autherization System by Using 3D and CCP

Advanced Autherization System by Using 3D and CCP Advanced Autherization System by Using 3D and CCP Pinal M Hansora 1, Jwalant Baria 2 1 M.E.(CSE) Student, 2 Assistant Professor, Parul Institute of Engg and Technology,Vadodara Abstract-- Current authorization

More information

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India 3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human

More information

I. INTRODUCTION LITERATURE SURVEY

I. INTRODUCTION LITERATURE SURVEY 3D Graphical Password Authentication System Mr. Rakesh Prakash Kumawat 1, Mr. SachinSampat Bhosale 2, Mr. PrashantPrabhakar Ratnaparkhi 3 1,2,3 P.Dr.V.V.Patil Inst.of technology &Engg.(Polytechnic),Loni

More information

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

SECUDROID - A Secured Authentication in Android Phones Using 3D Password SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Integration of Sound Signature in 3D Password Authentication System

Integration of Sound Signature in 3D Password Authentication System Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer

More information

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES Dinesha H A 1 and Dr.V.K Agrawal 2 1 Assistant Professor, Department of ISE & CORI, PES Institute of Technology, Bangalore,

More information

M-Pass: Web Authentication Protocol Resistant to Malware and Phishing

M-Pass: Web Authentication Protocol Resistant to Malware and Phishing M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer

More information

Universal Multi-Factor Authentication Using Graphical Passwords

Universal Multi-Factor Authentication Using Graphical Passwords Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu

More information

3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT

3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT 3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT Waraporn Viyanon Computer Science Program, Department of Mathematics Faculty of Science, Srinakharinwirot University Bangkok,

More information

Securing ATM Using Graphical Password Authentication Scheme

Securing ATM Using Graphical Password Authentication Scheme Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner

Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Secure Authentication with 3D Password Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Abstract Providing

More information

Pass-Image Authentication Method Tolerant to Video-Recording Attacks

Pass-Image Authentication Method Tolerant to Video-Recording Attacks Proceedings of the Federated Conference on Computer Science and Information Systems pp. 767 773 ISBN 978-83-60810-22-4 Pass-Image Authentication Method Tolerant to Video-Recording Attacks Yutaka Hirakawa

More information

One Time Password Generation for Multifactor Authentication using Graphical Password

One Time Password Generation for Multifactor Authentication using Graphical Password One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,

More information

A puzzle based authentication method with server monitoring

A puzzle based authentication method with server monitoring A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS

PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS International Journal of Computer Science and Applications Technomathematics Research Foundation Vol. 9, No. 3, pp. 20 36, 2012 PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS

More information

Cognitive Authentication Schemes Safe Against Spyware (Short Paper)

Cognitive Authentication Schemes Safe Against Spyware (Short Paper) In Proc. IEEE Symposium on Security and Privacy (S&P), May 2006 Cognitive Authentication Schemes Safe Against Spyware (Short Paper) Daphna Weinshall School of Computer Science and Engineering The Hebrew

More information

Protected Cash Withdrawal in Atm Using Mobile Phone

Protected Cash Withdrawal in Atm Using Mobile Phone www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering

More information

A Three Level Graphical Password Scheme for Providing High Degree of Security

A Three Level Graphical Password Scheme for Providing High Degree of Security A Three Level Graphical Password Scheme for Providing High Degree of Security Pranita H. Mokal 1, R. N. Denikar 2 1 Pune University, Amrutvahini College of Engineering, Sangamner-422605 2 Professor, Pune

More information

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

ATM Transaction Security Using Fingerprint/OTP

ATM Transaction Security Using Fingerprint/OTP ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering

More information

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting

More information

Integrating Security and Usability at Requirement Specification Process

Integrating Security and Usability at Requirement Specification Process Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Authentication Using Graphical Passwords: Basic Results

Authentication Using Graphical Passwords: Basic Results Authentication Using Graphical Passwords: Basic Results Susan Wiedenbeck Jim Waters College of IST Drexel University Philadelphia, PA, 19104 USA susan.wiedenbeck@cis.drexel.edu jw65@drexel.edu Jean-Camille

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Personal Identification Techniques Based on Operational Habit of Cellular Phone Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

IT Security Procedure

IT Security Procedure IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1 ENHANCED DATA SECURITY IN CLOUD COMPUTING TO PRESERVING DATA IN CLOUD STOREHOUSE USING THIRD PARTY AUDITOR Dr.M.V. BRAHMANANDA REDDY, PRINCIPAL, MEKAPATI RAJA REDDY INSTITUTE OF TECHNOLOGY & SCIENCE UDAYAGIRI,SPS

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION Rupal Rawat 1, Sreeja Nair 2 1 M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P,

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Application of Neural Network in User Authentication for Smart Home System

Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Android Based Total Security for System Authentication

Android Based Total Security for System Authentication RESEARCH ARTICLE OPEN ACCESS Android Based Total Security for System Authentication Mithil Vasani*, Bhavesh Pandya**, Charmi Chaniyara*** *(Information Technology, Mumbai University, Sfit) ** (Assistant

More information

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam

More information

ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS

ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS www.ijcsi.org 352 ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS Prof. Selina Oko 1 and Jane Oruh 2 1 Department of Computer Science, Ebonyi State University Abakaliki, Nigeria 2 Department of Computer

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

True Identity solution

True Identity solution Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright

More information

ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND

ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND TRANS-TASMAN 11.2015 Simplifying and connecting your transaction banking across Australia and New Zealand DISCLAIMER > > References to Australia(n)

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

Challenges of Online Exam, Performances and problems for Online University Exam

Challenges of Online Exam, Performances and problems for Online University Exam www.ijcsi.org 439 Challenges of Online Exam, Performances and problems for Online University Exam Mohammad A Sarrayrih 1, Mohammed Ilyas 2 1 Information System and Technology Department, Sur University

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

83-10-31 User Authentication: A Secure Networking Environment Ellen Bonsall Payoff

83-10-31 User Authentication: A Secure Networking Environment Ellen Bonsall Payoff 83-10-31 User Authentication: A Secure Networking Environment Ellen Bonsall Payoff After identifying network security requirements, defining the security process, setting policies and procedures, and defining

More information

White Paper: Multi-Factor Authentication Platform

White Paper: Multi-Factor Authentication Platform White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

Data Security 2. Implement Network Controls

Data Security 2. Implement Network Controls UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information