Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
|
|
|
- Adela Blair
- 9 years ago
- Views:
Transcription
1 Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication solution to enhance the security of accessing the Libyan e-government web portal. It avoids the traditional two-factor authentication drawbacks such as cost and efficiency. It also provides guidelines to implement the two-factor authentication solution on e- government web portal. A survey is carried out to compare several authentication methods based on criteria of cost, usability, strength of delivery, and processing time. The Libyan citizen National ID is used as a user name followed by an OTP and login session details used as confirmatory feedback dataset. Moreover, an image based authentication step is to further identify the user of e-portal. As a two-channel technique, the user as client can receive an message instead of an SMS message from the server (e-portal server). In our research, we focus on configuring the authentication methods to obtain secure access to the Libyan e-government portal. Keywords Authentication, e-portal security, conformity configuration A I. INTRODUCTION UTHENTICATION methods are commonly used techniques to identify users who are in need to have an access to systems and information resources. User s ID s and passwords are most commonly used as 1-factor authentication mechanisms. Huge sensitive systems such as e-banking and on-line payments have become vulnerable if they use the 1- factor authentication mechanism [5,7]. As a matter of fact, such sensitive systems can be easily cracked by modern technology and new guessing techniques. Hence, the need for better secure systems has given rise to the concept of multifactor authentication systems. In multi-factor authentication systems, a combination of two or more factors are applied. There are three classes of factors. First class is just the usual password chosen when account is created. This class is related to what the user knows. The second class of factors has to do with what the user owns (SIM, a token). The third and last class of factors is what characterizes the user (fingerprint, eye retina, voice). Biometric features of the third class are very promising in gaining highly secured systems but they are cost prone. In this research, only the first two classes are considered, and consequently it is named two-factor Ahmed Arara 1 is with the University of Tripoli, Computer Engineering Department, Tripoli, Libya. El-Bahlul Emhemed Fgee, is with IT Department, Libyan Academy, Tripoli, Libya. Hamdi Ahmed Jaber 3 is an MSc Student at IT Department, Libyan Academy, Tripoli, Libya. authentication (2FA). II. TWO-FACTOR AUTHENTICATION A. Two-factor Authentication Overview Authentication is the process that verifies if the entity is the one it claims to be. Two factor authentication (2FA) is a combination of any two of the following three ways:- Something the user knows (PIN, password, secret question). Something the user owns (mobile phone, token). Something the user is (Biometrics like Retina, fingerprint). Despite the fact that the technology of 2FA was patented in 1984 but it is still commonly used effectively and efficiently. Configuration schemes of 2FA is what makes it attractive and promising[8]. In fact, by configuring the 2FA, users guarantee that their accounts are secure and they can have optimum control. B. Problem statement 2FA suffers from well-known limitations and drawbacks[10,11]. At first, several common security risks still exist namely: untrustworthy interface, theft/loss of 2FA devices, man-in-the-middle attacks, cryptanalytic attacks, and eavesdropping. Secondly, there are technical limitations of 2FA such as cost effectiveness, usability, processing time, strength of delivery. Based on the general security problems mentioned above, an approach based on 2FA configuration techniques are exploited. The empirical approach of configuring and analyzing the 2FA authentication process may contribute in resolving the problem of insecure and in-efficient authentication system. C. Research approach The proposed approach is intended to be empirical. 2FA methods for an e-government web portal were analyzed and compared with respect to cost, usability, strength of delivery and processing time. Based on the results of a survey and method analysis, it is concluded that mobile phone (SMS, software token, and Push) is the best choice. messaging method came as second out of all 8 methods under study [1]. III. 2FA FOR E-GOVERNMENT PORTAL Web portal is a web site that brings information together 65
2 from diversified sources in a uniform way. A web portal is called one stop shop. Hence, the main objective is to present the user with a single web page that brings together or aggregates content from a number of other resources, systems, and/or servers. Libyan e-government web portal is developed to provide Libyan nationals with sensitive and non-sensitive information. Secure authentication to have an access to the portal is strongly recommended. Security requirements of e-government web portal have become crucial in controlling and accessing sensitive information. Web portal authentication is considered to be the first defense line to protect from malicious attacks. An enhanced 2FA system will dramatically increase the security level and moreover will decrease the risks of illegal access to the Libyan e-government web portal. A. Authentication methods Three factors of authentication could be used to have higher level of security. Factors are based on something a user knows, a user has, and a user is. Hence, the authentication process could include one or more factors and their relevant technology used. Table I shows a snapshot of possible authentication methods. TABLE I FACTORS OF AUTHENTICATION PROCESS of each aspect is given below:- 1. System Costs Cost is a major decision factor for security system stakeholder [2]. To guarantee 2FA authentication solution, the cost is calculated for the entire life cycle, and for both the client side as well as the server side. 2. Usability Usability is used to define the case with which people can use a program or a method. It is more of the user s view of software quality. Many researchers [3,4] defined usability based on several dimension. The ISO, however, defines usability in terms of effectiveness, efficiency and satisfaction. Usability is a crucial criterion in selecting 2FA methods. Point evaluation (scale of 9) is used for 8 2FA methods. message method scored the highest value and mobile phone method came as a second with respect to overall usability value (see fig. 1). Fig. 1 Total usability value of the eight suggested methods B. Selection criteria of authentication methods Authentication is an absolutely essential element of any security model. It is the process of confirming the identification of the user (or a machine) that is trying to log on or access resources. Instead of using a single layer of authentication, a multilayered authentication is used to add extra protection in a high-security environment. There are a large number of authentication methods and protocols that are used depending on the application and the security requirements [1]. In this research, the following eight methods are studied and analyzed:- Disconnected hardware token, Connected hardware token, Mobile phone (SMS), Mobile phone (software token), Mobile phone (push), message, Biometric (finger print), Biometric (Iris recognition). There are four basic metrics that are used to select the most appropriate methods that can be used as 2FA authentication for the Libya e-government web portal [1]. A short description 3. Strength of delivery The strength of delivery indicates the success of a user to enter username/password and to get a response from the second authentication level or second factor (SMS, , etc.). It should be noted here that the network traffic and mobile coverage may cause a delay of the SMS message or a failed transmission. The strength of delivery for the mobile SMS method is considered moderate but other criteria are rated high which makes the proposed method more attractive (see fig. 2). Fig. 2 the overall strength of delivery for all methods 4. Processing time Processing time means the time required between the successful inputs of username/password and getting a response from the second authentication method (SMS, e- mail, etc.). A shorter time lead to a better experience of 2FA authentication and smooth login process. Fig. 3 shows the overall processing time for the eight 2FA authentication methods. 66
3 of them (104 person) said they are not feeling secure by protecting their data by only username and password and 98% of them are using mobile phone services. B. 2FA authentication algorithm Fig. 3 The overall processing time of all methods IV. PROPOSED 2FA SOLUTION The overall results based on four basic criteria (cost, usability, strength of delivery, processing time) is shown in fig. 4. Fig. 4 overall results of 2FA authentication methods As a solution to the research question [1], the main authentication method is the mobile SMS technology. With over 8 million mobile phones in use in Libya according to local mobile operators (Libyana and Almadar), turning a phone into an authentication device quickly solves the need and additional cost and delays of sending out hardware tokens. A. Testing and survey results An online digital survey created and distributed to the public to gain information from random sample of people to collect required information that helps in identifying the importance, acceptance and most-liked methods that a normal person may prefer to use as a second authentication method. The online survey created and distributed via service provided by website. There is 187 person participated in the survey. Ninety three percent of them (174 persons) has completed the survey successfully and counted in the final survey results. The survey was designed to be answered by normal ordinary and even not qualified or technology involved people. It consist from thirteen questions. Three of them are general questions about , gender and qualification. Four questions was for the general internet usage of the participants. The last section of the survey contains six questions that focus on the feeling of importance of securing sensitive online data. Acceptance of such technology and most liked method that the end user welcomed to use. Out of 174 participate persons, 33% (58 person) said that they are using internet services that uses confidential data or runs sensitive transactions like internet banking. While a 60% The client/server architecture overall development is considered. At the client side, an app program is developed and installed on the mobile phone to generate the software token or One-Time-Pass (OTP) using a simple easy-to-use GUI. The client (user) can request an OTP from the server. At the server side, the OTP is generated when requested by the client. Also, the server is responsible for verifying the SMS information. The general steps of 2FA authentication is performed as it follows:- 1. User enters pass word. 2. Server generates an OTP and sends it to user via SMS message. 3. User enters the OTP that he/she received 4. Servers compares the token entered buy user with one already generated by the server. 5. If the two tokens match, then a user logs in successfully. The above general algorithm is used to derive new algorithms according to the configuration of multi-layer mechanism and according to the client and server requirements. < 1. Client side algorithm In the client side, the user requests opening a new account based on his/her national ID (NID). Table II gives details of creating an account for new user. TABLE I USER FIRST TIME LOGIN Algorithm 1 Name: LoginFirstTime Input: login credentials Output: SuccessfulLoginNewAccount or FailLoginNewaccount 1. User receives from server SMS with initial login details 2. User enters NID and PW// randomly generated password 3. If correct NID and PW then 4. Begin 5. Choose mobile number 6. Enter OTP received from server 7. End 8. Else display wrong login details 9. If correct OTP then 10. Begin 11. Display image category 12. Select image from category 13. End 14. Else display wrong OTP 15. If correct image then 16. Begin 17. Change password 18. Display login succeeded 19. End 20. Else display wrong image The client may login and be able to change his/her password. Table III describes the login process for the first 67
4 time. The user s normal login process is the same as shown in algorithm 1 (see table I) except for the change of the password from the initial password given by the server to the new password selected by the user. 2. Server side algorithm The main function of the server is to create new accounts and modify accounts. Table II illustrates how a new account is set up when new user joins the server. TABLE II NEW USER ACCOUNT GENERATION Algorithm 2 Name: NewAccountCreation Input: login credentials Output: newaccount 1. Create an account (NID, PW)// PW random generated password 2. Add mobile number, // (3 numbers maximum) 3. Assign photo category // out of 12 images 4. Activate the account The server supports a backup procedure in case of emergency that prevents the user from login to his account. An algorithm is shown in table III describes the steps of recovery when failure of login occurs. Algorithm 3 Name: BackupRecovery // case of lost/ forgotto password Input: login credential Output: AlternateLogin 1. User enters NID and PW 2. // case of lost or forgotten password 3. If (lost/forgotten) PW then 4. Inform the system via a link click 5. Enter user info (mobile number, , security question) 6. If correct info then 7. Begin 8. Reset PW; 9. Send SMS to user// 10. // SMS + confirmatory data (sessionid, OS template, time, etc. 11. // case of mobile phone lost SMS delay 12. If incorrect phone number 13. Begin 14. Inform the system 15. Choose an address 16. Receive ( OTP + confirmatory data) in message 17. End 18. If no access to e-portal then 19. Display appear in person to e-service desk analysis of several 2FA methods was carried out according to basic criteria of cost, usability, processing time, and strength of delivery. Based on on-line survey, 2FA authentication testing procedure, and comparative analysis of eight 2FA methods, it was validated that Mobile phone SMS method to be the best when implemented in e-government web portal access. messages used as backup in case of emergency or lack of mobile phone services. REFERENCES [1] Thesis Jaber, A..Hamdi, Libyan national Academy, Tripoli, Libya. [2] B. Nanus and L. Farr, "Some cost contributors to large-scale programs," in The Spring Joint Computer Conference, 1964, p [3] J. Nielsen, Usability engineering. Boston: Academic Press, [4] An Investigation into the Usability and Acceptability of Multi-channel Authentication. Ph.D. thesis by Mohamed Ali Al-Fairuz. University of Glasgow. [5] "Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment", August 15, 2006 [6] Yu Tao Fan, Gui ping Su. Design of Two-Way One-Time-Password Authentication Scheme Based On True Random Numbers. Second International Workshop on Computer Science and Engineering [7] A. Allan. Passwords Are Near the Breaking Point. Technical report, Gartner, December [8] "Frequently Asked Questions on FFIEC Guidance on Multi-factor Authentication", February 22, [9] RSA Security. RSA mobile and RSA Securid. December [10] The drawbacks of Two-factor authentication. URL [11] Angela Moscaritolo ( ). "Zeus for Android steals one-time banking passwords". SC Magazine. [12] Authentication in an Internet Banking Environment. URL V. CONCLUSION Passwords alone are no longer enough to protect critical resources and data. Things have to be stepped up to achieve better security in today s networking environment. With 2FA authentication, you can take a combination of what user has, what he knows, and what he is, in order to ensure granting of access in secure and appropriate manner. In this paper, an 68
5 APPENDIX A SCREEN SHOT 4 LIBYAN E-GOVERNMENT WEB PORTAL AUTHENTICATION USER INTERFACE SCREEN SHOT 1 SCREEN SHOT 5 SCREEN SHOT 2 SCREEN SHOT 6 SCREEN SHOT
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
iii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward.
Login using One-Time Password (OTP) i. You can continue to login without the OTP from now till 31 October 2012 so long as you have not activated your token via the iocbc Online platform. ii. Once you have
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Provider OnLine. Log-In Guide
Provider OnLine Log-In Guide Table of Contents 1 LOG-IN ACCESS... 3 1.1 ENTERING THE USER ID AND PASSWORD... 4 1.2 OVERVIEW AND PURPOSE OF TRICIPHER... 5 1.2.1 Log-in for Users Who Are Active, But Not
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., [email protected]
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
a. StarToken controls the loss due to you losing your Internet banking username and password.
1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
SECURING SELF-SERVICE PASSWORD RESET
SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS
A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS Soumya Murali 1, Anitha.B 2, Anitha Mary Paul 3 1, 2, 3 Assistant Professor, 1, 2 Sree Buddha College of Engineering, Pattoor, Alappuzha,
ProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
User Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
End-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to
e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Allianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
THE FUTURE OF MOBILE SECURITY http://www.cs-networks.net
http://www.cs-networks.net 1 The Future Of Mobile Security Stefan Certic CS Network Solutions Limited http://www.cs-networks.net 2 Introduction Mobile devices are more than just phones, they are a lifeline
Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication
Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication As the world increasingly depends on computers to do business, the need for safeguarding computer resources also increases.
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
New Brunswick Internal Services Agency. RSA Self-Service Console User Guide
New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
Securing SharePoint Server with Windows Azure Multi- Factor Authentication
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Multi-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Swivel Multi-factor Authentication
Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
MCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
Authentication Solutions Buyer's Guide
WHITE PAPER: AUTHENTICATION SOLUTIONS BUYER'S GUIDE........................................ Authentication Solutions Buyer's Guide Who should read this paper Individuals who would like more details regarding
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX
Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile
Second Level Authentication Using QR Codes
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication
