Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System
|
|
|
- Jared Greene
- 9 years ago
- Views:
Transcription
1 Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System Moses O. Onyesolu 1, Virginia E. Ejiofor 2, McDonald N. Onyeizu 3, Dan Ugoh 4 1,2,4 Department of Computer Science, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria. 3 MedSoft Technologies Ltd., No. 43, Okigwe Road, Owerri, Imo state, Nigeria. Abstract Online examination is a great opportunity for modern life and has seen exponential growth over the past decade. However, the tools used to present and administer this need to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Identification, authentication and monitoring of e-exam takers at a distance are of prime importance so that exams are administered by fair means. We proposed a biometric system for identification and distributed firewall techniques to monitor candidates and control network packets of all machines incorporating the traditional username and password for authentication. Keywords Biometric system, distributed firewall, password, fingerprint, e-examination, e-learning. I. INTRODUCTION Information and Communication Technology (ICT) has changed our lives and provided us with a new dimension of thinking and doing things. ICT has had effects in all aspects of human endeavor. The World Wide Web an aspect of ICT is one of the inventions of computer technology which has wide spread in all aspect of life. A new concept which has emerged from World Wide Web is education on the web otherwise known as electronic learning or e-learning [1]. Since the inception of e-learning, there has been a security breach as it poses various threats especially when exams are held electronically (online). Security is one of the challenges of both traditional and online-based examination system. It imposes fear on institutions and test administrators. Institutions and test administrators are wary of administering examinations online. One way to mitigate security breach during online examination is to identify, authenticate and monitor candidates during online examination. This is to ascertain who is exactly pushing the buttons and to ensure that candidates do not receive outside assistance to improve their exam score [2]. II. SECURITY IN ONLINE EXAMINATION One of the main challenges facing the security of e- exams and the e-learning environment is to authenticate students so that no unauthorized individuals are permitted to upload submissions or access information, respectively [3]. Some other problems faced during e-exams are double submissions from the same students [4], and e-exams not being held in supervised locations, which therefore enables the individual to access unauthorized areas, etc [5], [6]. A study by [8] concludes that 73.6% of the students that were selected for the sample have the point of view that it is easier to cheat in an online environment rather than in a conventional one. According to the Center for Academic Integrity [9] cheating on exams has been reported at an alarming range of 74%. Reference [10] reported that 70% of students in their study confessed to cheating on multiple exams. A study by [11] compared faculty members perceptions on various students unethical conducts seriousness. They concluded that students unethical conduct related to exam taking perceived by faculty to be one of the most serious unethical behaviors. Similarly, Dick et al. [12] also noted that 24% their study participants believed that advances on technology have lead to increased cheating. The perceived seriousness of cheating on exams has led numerous academic institutions to reduce their e-learning course offering and in other instances, cease e-learning altogether. In fact, [13] admitted that the inadequate technology has led some academic institutions to cease offering e-learning courses due to concerns over the quality of students assessment and standards. Ramim and Levy [14] discussed a case study of an academic institution that faced a tragic cyber attach to their e-learning environment by an insider intruder. Other scholars have documented related security problems in academic institutions. 65
2 Yu and Tsao [15] discussed security challenges of e- learning environments. However, their exploration focused on shielding the technology infrastructure against unauthorized users. Current security practices in e-learning systems relay principally on the utilization of passwords authentication mechanisms. Similarly, [3] discussed aspects of security in e-learning systems and suggested attention to two layers when securing e-learning systems. The first layer addresses security of the technology infrastructure used to facilitate e-learning (i.e. hardware, networks, etc.) and the second layer addresses the various applications employed in enabling e-learning (i.e. learning management systems, rich media communication tools, etc.). Huang et al [3] criticized existing proprietary e-learning systems for not paying enough attention to the issue of properly authenticating students, in particular during quizzes and exams. Hugl [16] noted numerous security related technologies that are not currently employed in e-learning. One such solution can include biometric technologies that may potentially become an integral part of e-learning systems. Michelle and Yair [17] argued that all computers to be used under exam conditions need to be audited. Computers connected to the Internet are difficult to make secure, and safety issues are particularly important in longer exams. Where examinations are conducted in a laboratory environment it needs to be recognized that computer labs are rarely set up for testing. Meanwhile, for proper implementation of the new system, some security features are put in place during development and design. User validation and fingerprint identification are embedded in the system to improve security. Hence, we propose the following solutions to enhance security of online examination. III. PROPOSED NEW SOLUTION After a comprehensive study of the security challenges of online examination, two new approaches are proposed: (a) use of distributed firewall system to monitor the actions on candidates during examination and (b) fingerprint biometrics solution for e-exam takers identification. A. Distributed Firewall Solution Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. Distributed firewalls that are managed from a central server can help to map corporate security policies to the configuration of workstation firewall systems [7]. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization. They are like personal firewalls except they offer several important advantages like central management, logging, and in some cases, access-control granularity. These features are necessary to implement corporate security policies in larger enterprises. In distributed firewalls, security policy is defined centrally but enforced at each individual network endpoint (hosts, routers, etc.). The system propagates the central policy to all endpoints. Policy distribution may take various forms. For example, it may be pushed directly to the end systems that have to enforce it, or it may be provided to the users in the form of credentials that they use when trying to communicate with the hosts or it may be a combination of both [18]. Figure 6 explains how distributed system will be implemented. The benefits/advantages of firewall includes: 1. Firewall protects hosts that are not within a topology boundary - topology independence 2. Firewall provides protection against internal attacks 3. Firewall helps to eliminate single point of failure 4. They secure remote end-user machines. 5. They secure critical servers on the network preventing intrusion by malicious code and "jailing" other such code by not letting the protected server be used as a launch pad for expanded attacks. B. Biometric Solutions Biometric is the application of computational methods to biological features, especially with regard to the study of unique biological characteristics of humans. Such unique biological characteristics relies on individual human identities such as DNA, voice, retinal and iris, fingerprints, facial images, hand prints, or other unique biological characteristics [19]. It is a method of identification that has been growing in popularity. These characteristics are identified using biometric devices. A biometric device is technological device that utilizes an individual s unique physical or behavioral characteristic to identify and authenticate the individual precisely [20]. Essentially, biometric technologies operate by scanning a biological characteristic and matching it with the stored data. Reference [21] noted that a biometric system is essentially a pattern recognition system that makes a personal identification by establishing the authenticity of a specific physiological or behavioral characteristic possessed by the user. 66
3 Coventry, De Angeli and Johnson [22] discussed the usability aspect of authentication systems and noted that it is a tradeoff between usability, memorability and security. They opined that in order to increase biometric security, traditional PINs and password authentication methods are inevitable by increasing the length of the password and PIN, ensuring they do not form meaningful words and ensuring all are different, makes them more difficult to remember [12], [19], [20] and [21]. Coventry et al [22] maintained that most biometric systems include a digital identifier, a template and a recognition algorithm and they follow similar matching processes. However, they maintained that biometric systems can be separated into physiological biometric (i.e. finger, iris) as well as behavioural biometric (i.e. voice, key board typing behaviour). Biometric systems performance can be assessed by employing statistical methods in which accuracy is calculated. Although biometric systems are relatively reliable, reference [22] asserted that system malfunction stems from users lack of establishing the biometric during the initial stage as well as potential interruptions during transmission of the biometric image in the validation process. Subsequently, they concluded that although the trade off between security and usability aspects remains, biometric systems can facilitate automatic verification for public environments. Pons [20] maintained that fingerprints biometric scans are the most commonly used biometric solution as they are less expensive compared with other biometric solutions. A fingerprint is a unique pattern of ridges and furrows on the surface of a fingertip, the formation of which is determined during the fetal period. Fingerprints are unique for each individual, where even identical twins have different fingerprints [21]. Several scholars documented the increase popularity of fingerprint biometric-based systems and their decline in costs [21] and [22]. For example, Joint Admission and Matriculation Board (JAMB) currently use biometric devices to authenticate their candidates by capturing candidates fingerprints before checking in for examination. Furthermore, Williams [23] pointed out that fingerprints have been universally acceptable in the legal system worldwide. Fingerprints are a permanent attribute unique to an individual. Fingerprints can be scanned, transmitted and matched with the aid of a simple device. McGinity [24] pointed out that biometric have been commonly employed in replacing conventional password systems. Biometric devices enable portable scanning and rapid identification. Thus, finger biometric can be a suitable solution for rapid authentication of users. 67 Using a portable device, users can scan their fingerprints and send a print image via the Internet to the University s network. The network will consist of an authentication server that will house a database of students fingerprints images. The server will then process the matching of the transmitted print image with a stored copy of the fingerprint (called template ). Following that, the server will generate a matching result. Thus, McGinity [24] predicted that fingerprints based biometric would become a household activity in the near future. Yang and Verbauwhede [25] proposed a secured technique for matching fingerprints in a biometric system. They argued that biometric systems enhance security far more than the current systems. Biometric systems are more accurate as well as simpler to operate compared with passwords systems. They described a fingerprint based biometric system in which the fingerprint template is kept in a server during initiation. Upon scanning the finger, an input device scans a biometric signal and transmits it to a server where it is processed for matching. In an effort to shield the system against security compromises, they recommended processing the matching of fingerprints images in an embedded device rather than the server and only transmitting the results to the servers. Furthermore, they suggested encrypting the fingerprint template prior to storing it on the server. Fingerprints templates can be decrypted whenever a matching process occurs. They also provided additional solutions useful for building up multiple layers of security in fingerprint based biometric systems. A number of affordable and widely available biometric devices that read fingerprints and plug into USB ports are shown in Figures 2, 3, 4 and 5. Figure 1: Fingerprint enabled mouse Figure 2: Fingerprint enabled keypad
4 Biometric Device(s) Fingerprint Preprocessing Figure 3: Fingerprint enabled keyboard e-exam Biometric Figure 5: Enrollment Process Figure 4: Fingerprint Enable USB device C. Proposed Enrolment Method The first process in any biometric recognition system is enrolment, whereby all students who are supposed to appear for the e-exam will have to enroll their fingerprints so that they are stored in the relevant e-learning server database and biometric server database [26]. All the fingerprint scans will be saved in an encrypted form to avoid any modifications. When the client initiates the e- exam, the intelligent agent assigns the student ID with an IP address so that the student cannot log-in from any other PC [4]. The intelligent agent will then start extracting the fingerprint scans from the hardware devices we mentioned above at every second. The advantages of the proposed biometric enrollment method include: The interval at which the fingerprints will be scanned is one second, which ensures that no other individual can take the exam on another student s behalf. The scanned fingerprints will be saved in the two databases in an encrypted form to mitigate attacks from intruders. IV. GENERAL EXAMINATION PROCESS The architecture of the general examination process is presented (Figure 6), starting from identification (using biometric device(s)), authentication (using traditional username and password system) and monitoring (using distributed firewall system). The general examination process is presented Figure 6. The Test Manager who acts as the administrator uploads the system and distributes it among the clients (candidates) machines across the institution intranet. 68
5 Controlled Clients with biometrics International Journal of Emerging Technology and Advanced Engineering Candidates are then identified with biometric system by verifying their fingerprints with those earlier captured during enrolment. After successful identification, they now log in with their Username and Password (for authentication) which are assigned to them after identification. After successful authentication, the system captures the Username and Client Machine s IP address to enable the Test manager monitor them through distributed firewall system. Test Manager e-exam Distributed Firewall SSL Institution Intranet Figure 6: General Examination Process V. CONCLUSION We have discussed the concept of biometrics and distributed firewall and their usage in enhancing security in online examination system and presented architecture for enhancing security in a distributed examination system using biometrics and distributed firewall system. Under this scheme, identification and network security policy specification remain under the control of the network/test administrator. Since security system will be strengthened using these two approaches, various shortcomings of using one approach will be overcome. Therefore, security will no longer be dependent on identifying the candidates who are to take the exam. Candidates machines will be monitored through the use of distributed firewall and communications to external world/machines are restricted. A B C Biometric 69 With distributed firewall, insiders (candidates workstation) may no longer be treated as unconditionally trusted. Flow of data and network compartmentalization will become significantly easier. REFERENCES [1] Takahashi, Y., Abiko, T. and Negishi, E An Ontology-based System for Network Security, IEEE, [2] Onyeizu, M. N. and Ejiofor, V. E Distributed Architecture for Post UTME Assessment, Unpublished Masters Theses, Nnamdi Azikiwe University, Awka, Nigeria. [3] Huang, W., Yen, D. C., Lin, Z. X. and Huang, J. H How to compete in a global education market effectively: A conceptual framework for designing a next generation eeducation system, Journal of Global Information Management, 12(2), [4] Apampa, K. M., Wills, G. B., Argles, D. and Marais, E Electronic Integrity Issues in E-assessment Security. [5] Marais, E. and Argles, D Security issues specific to E- assessments, 8th Annual Conference on WWW Applications, Conference proceedings, Bloemfontein, South Africa. [6] IS Blackboard team, Online Assessment, Aberystwyth Learning and Teaching Online, [7] Ernst-Georg, H., Uwe, R., Andreas, H., Thomas, E., and Christoph, M Managing Distributed Personal Firewalls with Smart Data s. Institute of Telematics Trier, Germany [8] King, C. G, Guyette, R. W. and Piotrowski, C Online exams and cheating: An empirical analysis of business students views, The Journal of Educators Online, 6(1). df [9] Center for Academic Integrity Retrieved September 12, 2006, from [10] McCabe, D. L., and Trevino, L. K What we know about cheating in college. Change, 28(1), [11] Pincus, H. S., and Schmelkin, L. P Faculty perceptions of academic dishonesty: A multidimensional scaling analysis. Journal of Higher Education, 74, [12] Dick, M., Sheard, J., Bareiss, C., Carter, J., Joyce, D., Harding, T., and Laxer, C ACM SIGCSE bulletin working group, 35(2), [13] King, C. G, Guyette, R. W. and Piotrowski, C Online exams and cheating: An empirical analysis of business students views, The Journal of Educators Online, 6(1). [14] Ramim, M. and Levy, Y Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university. Journal of Cases on Information Technology, 8(4), [15] Yu, C. and Tsao, C. C Web teaching: Design, security, and legal issues. Delta Pi Epsilon Journal, 45(3), [16] Hugl, U Tech-developments and possible influences on learning processes and functioning in the future. Journal of American Academy of Business, 6(2), [17] Michelle M. R. and Yair L Towards a Framework of Biometric Exam Authentication in E-Learning Environments. Idea Group Inc. [18] Sotiris Ioannidis, Angelos D. Keromytis, Steve M. Bellovin, and Jonathan M. Smith, Implementing a Distributed Firewall:
6 [19] Tabitha J., Pirim, T., Boswell, K., Reithel, B. and Barkhi, R Determining the intention to use biometric devices: An application and extension of the technology acceptance model. Journal of Organizational and End User Computing, 18(3), [20] Pons, A. P Biometric marketing: Targeting the online consumer. Communications of the ACM, 49(8), [21] Jain, A., Hong, L. and Pankanti, S Biometric identification. Communications of the ACM, 43(2), [22] Coventry, L., De Angeli, A., and Johnson, G Usability of large scale public systems: Usability and biometric verification at the ATM interface. Proceedings of the Conference on Human Factors in Computing Systems. Florida, USA, [23] Williams, J. M New security paradigms. Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, Virginia, [24] McGinity, M Staying connected: Let your fingers do the talking. Communications of the ACM, 48(1), [25] Yang, S. and Verbauwhede, I. M A secure fingerprint matching technique. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, California, USA [26] Alotaibi, S Using Biometrics Authentication via Fingerprint Recognition in E-exams in E-Learning Environment. In: The 4th Saudi International Conference, July 2010, The University of Manchester, UK 70
Development of Distributive Architecture for Post-Unified Tertiary Matriculation Examination (UTME) Assessment
Development of Distributive Architecture for Post-Unified Tertiary Matriculation Examination (UTME) Assessment Virginia E. Ejiofor 1, MacDonald N. Onyeizu 2, Daniel Ugoh 3, Anthonia N. Nwosu 4 1,3 Department
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Firewalls and IDS. Sumitha Bhandarkar James Esslinger
Firewalls and IDS Sumitha Bhandarkar James Esslinger Outline Background What are firewalls and IDS? How are they different from each other? Firewalls Problems associated with conventional Firewalls Distributed
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION
WHITE PAPER HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION The goal of this white paper is to highlight the aspect of HIPAA that pertains to patient privacy and authentication and the technologies that
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
CYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
Introducing a Moodle LMS in Higher Education: the e-courses Experience in Ticino (Switzerland)
Introducing a Moodle LMS in Higher Education: the e-courses Experience in Ticino (Switzerland) Luca Botturi, Lorenzo Cantoni, Stefano Tardini elab University of Lugano {luca.botturi, lorenzo.cantoni, stefano.tardini}@lu.unisi.ch
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Online teaching: Do you know who is taking the final exam?
Online teaching: Do you know who is taking the final exam? Qinghai Gao Department of Criminal Justice & Security Systems, Farmingdale State College Abstract: In recent years Distance Learning has been
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION Smita S. Mudholkar 1, Pradnya M. Shende 2, Milind V. Sarode 3 1, 2& 3 Department of Computer Science &
Hong Kong Baptist University
Hong Kong Baptist University Guidelines for Development and Maintenance of University/Departmental Websites FOR INTERNAL USE ONLY Date of Issue: MAY 2014 Revision History Version Author Date Revision 1.0
Online Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
