Biometrics and Cyber Security
|
|
|
- Peter Bradley
- 10 years ago
- Views:
Transcription
1 Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon,
2 Why is Cyber Security Important in the Context of Biometric Systems? Copyright Daon,
3 Cyber Security & Biometrics On the Internet, nobody knows you are a dog. Or a terrorist Or a student Or a spy Copyright Daon,
4 Identity is More Valuable than Money! I can t think of a single piece of information more critical to our ultimate security and prosperity, both as individuals and as a country, than our personal identity. The ability of an individual to establish identity, to verify you are who you claim to be, is critical to the many transactions that occur in a single day. As the world becomes more interdependent, as transactions become more global, and as the world embraces identity management and assurance as an element of conducting business, personal identities will become a form of global currency. Whether you are crossing a border, seeking employment, applying for a public benefit, opening a bank account, combating crime, making a purchase, enforcing immigration policy, granting access to public and private spaces, detecting terrorists ---- identity verification has limitless value. Governor Tom Ridge Former Secretary, Department of Homeland Security Copyright Daon,
5 Identity Management is Fundamental to Cyber Security Cyber Security is about establishing trust in entities accessing your networks and ensuring that they perform functions consistent with the role you define for them. The fundamental capability necessary for any cyber security solution is Identity Management. Biometrics is a key enabling technology in the fight to strengthen the security of systems against cyber crime However Copyright Daon,
6 Biometric Identity Systems Will Be Attacked! In this session we will discuss (briefly) the following cyber security topics as they relate to Biometric Systems: 1. System Level Perspective 2. Person Level Perspective 3. Independence, Flexibility, Ongoing Analysis and Adaptation Copyright Daon,
7 Attacks on Biometric Systems Biometrics provide a clear benefit to counteracting cyber security threats but biometric systems can themselves be a source of weakness Consider the following: Don t have to duplicate to spoof you just need to alter to ensure no 1:1 or 1:N match (negative identification scenarios) As our databases grow, we struggle to achieve universality As we seek to automate, unattended acquisition and authentication creates risk As more systems are deployed, frequency and sophistication of attacks will increase Microsoft OS virus vs Apple OS virus No Biometric modality is perfect don t believe anybody who tells you otherwise No silver bullet - lots of papers & patents but few commercial offerings Industry starting to look more seriously at liveness detection e.g. LivDet 2009 Copyright Daon,
8 How Do We Compete? Countermeasures are required: Enhanced Capture Software Secured Systems New Capture Devices Multi-factor Multi-modal Supervision & Oversight guiding standard and principles Ability to react through flexible technology and process Biometric matching has been a technology- and tool-centric field. A Defense-in-Depth method of dealing with biometric & identity-related concerns takes a more holistic approach: People Technology Operations Copyright Daon,
9 Biometric System Threats & Countermeasures Copyright Daon,
10 Biometric System Vulnerabilities Person Perspective System Perspective 7 Storage 11 Verifier 6 10 Data Collection Signal Processing Matching Decision Key Considerations: Source: Study report on Biometrics and E-Authentication There is no perfect identity authentication method every form of authentication has vulnerabilities The entire identity eco-system is vulnerable to attack Don t just secure the point of authentication Consider systemic weaknesses as well Must provide a defense-in-depth strategy Copyright Daon,
11 First Principle of Cyber Security Security by Design Security should be designed into a solution and not bolted on after the fact All solutions MUST be designed using industry-best security principles Encryption of data both in transit and at rest Use of strong cryptographic techniques (e.g. HSMs) Robust key management Non-repudiation of events Authorization of function Integrity protection data and system Uses industry proven techniques no security by obscurity Biometrics systems are vulnerable to attack at several points in the process: data collection, signal processing, data storage, and decision/action point Copyright Daon,
12 Defense in Depth Person Perspective System Perspective 7 Storage 11 Verifier 6 10 So How do We Design in the Countermeasures? Data Collection 1 2 Signal Processing 3 4 Matching 5 8 Decision 9 Location Threats Example Countermeasures 1 Data Collection Spoofing Liveness detection - Challenge/response Device substitution 2 Raw Data Replay attack Transmission 3 Signal Processing 5 Matching Manipulation of match (Software) Component replacement scores Hill climbing 7 - Storage Database compromise (reading/replacing template, changing bindings) Multi-modal, policy-based Mutually authenticate device Vendor agnostic architecture Sign data, timestamp, session tokens/nonces, HSM, FIPS Sign components Debugger hostile environment Coarse scoring, trusted sensor, secure channel, limit attempts DB access controls, sign/encrypt templates, store on secure token Audit, digital signature 9 Decision Threshold manipulation Protected function, data protection Copyright Daon,
13 And Don t Forget about Data Security Provide an authentication framework that Securely manages sensitive biometric data. Ensures the privacy of users personal (e.g. biometric) data. Resists attacks launched by insiders/outsiders. Provides for non-repudiation of activities. Integrates with 3rd party applications. Scales to enterprise-wide deployments. Is biometric-agnostic by design. Biometric data must be stored securely Privacy concerns (legislation) Risk of legal challenges to signatures if stolen Assume a hostile network Eavesdropping on sensitive traffic. Injection/deletion of messages Assume a hostile environment Database may be compromised. Machines may be physically attacked. Attacks launched against OS or Daon software. Copyright Daon,
14 In Summary Biometrics enable stronger defense against cyber security attacks but biometric systems need to ensure that they don t become a platform for launching an attack themselves Design Security In Don t just bolt it on Protect biometric systems using a holistic approach Ensure all data is encrypted (in motion and at rest) Ensure robust key management and distribution Signing of all parties in a transaction Tamper evidence and integrity checks throughout system Audit trails and non-repudiation Consider all points in a solution and look for vulnerabilities Its NOT just about the matching algorithm! Copyright Daon,
15 Person-Oriented Attacks & Countermeasures Copyright Daon,
16 Person Oriented Attacks Historically the focus has been finger, face, and iris however, there are several modes being refined: vein, voice, iris on the move,. To defeat a biometric system, sometimes it is sufficient to cause distortion (i.e. to not match). Example, distortion of fingerprints to avoid watchlist hits Universality/Inclusivity becomes a major issue for large populations Multi-Modal solutions work best Systems need an adaptive architecture that can incorporate these new modes and leverage technology improvements over time The most progressive, modern systems begin as a multi-biometric platform with built in systemic security & privacy safeguards and add different biometric capabilities as needed over time! Copyright Daon,
17 Multi-biometric Fusion Use fusion to improve accuracy and robustness Increase accuracy beyond single biometric matching Reduce FTE (broaden population) Spoof/denial resistance Cope with poor quality data Sensor/user fault tolerance Fusion performance depends on: Input data available Comparison algorithm accuracy Correlations between different matcher scores Fusion technique Training data Copyright Daon,
18 Multi-Biometric Fusion in Action Choose a platform that enables multiple biometrics to ensure optimized performance Multi-biometric systems provide key advantages: Increased accuracy (noise reduction) Enhanced Usability Greater Universality Improved Security Improved performance (FMR, FNMR) False Non-Match Rate (FNMR) % % % % % % % % False Match Rate (FMR) % % % Face Finger Sum fusion Product fusion As enrollment populations grow dramatically, multimodal solutions are inevitable. Performance of large scale identity programs can be significantly improved through the use of multiple biometrics. Large scale systems should establish a core multi-biometric platform first and then choose the most applicable algorithms to suit their population, commercial and performance needs Copyright Daon,
19 In Summary There is NO perfect biometric type There is NO perfect biometric device or algorithm Biometric performance will continue to increase over time, costs will decrease Spoofing attacks will continue and gain in frequency and complexity A flexible framework is needed to counteract these attacks Multi-biometric systems provide best defense with ability to continually add new technology components Policy based normalization and fusion should be kept independent of biometric matching algorithms Adopt a platform that enables you to take advantage of technological improvements over time Copyright Daon,
20 Technology Flexibility, Ongoing Analysis and Adaptation Copyright Daon,
21 Analysis and Adaptation Question: How do you react to: Biometric technologies continuously changing Weaknesses identified in specific algorithms or devices Spoofing techniques continuously improving New normalization and fusion techniques emerging Throughput and performance models emerging Answer: Deploy an analysis and adaptation engine that enables you to do what-if analysis and understand consequences of changes ahead of implementation Identify and correct weak points ahead of cyber attackers Automate performance analysis of what-if scenarios: Algorithms: Matching, Quality, Fusion Devices/sensors Interoperability: Cross-device analysis, multi-algorithm scenarios Protocols e.g. 1:1, 1:N, #attempts, preferred sample types Copyright Daon,
22 Which Fusion? DETs 1.0E E E E E E E E+00 False Non-Match Rate (FNMR) 1.0E E _Face_C 517_Finger_LI SUM: MinMax SUM: Zscore SUM: MAD SUM: TanH PROD: FNMR PROD: Liklihood False Match Rate (FMR) 1.0E-03 Copyright Daon,
23 Self Optimizing Framework for Analysis and Adaptation Policy Based Biometric Platform Biometric Performance Analysis Engine Biometric Performance Results Analysis Analysis Engine Copyright Daon,
24 In Summary Vendor independence provides both a monetary ROI and a cyberthreat risk mitigation Leverage concept of master broker to orchestrate operations of biometric components Ensure a vendor independent framework is put in place Ensure (i.e. prove positively) that your solution is independent of any single biometric technology provider Maintain strict data independence from underlying device or matcher technology Large scale programs can clearly benefit for performance analysis tools to ensure optimum use of biometrics Deploying a system that leverages synergies between an identification broker and analysis tools enables systems to be self optimizing over time yielding better performance and mitigating against cyber security threats Copyright Daon,
25 Thank You Questions? Conor White Direct: Copyright Daon,
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Biometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Vulnerabilities of Biometric Authentication Threats and Countermeasures
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 947-958 International Research Publications House http://www. irphouse.com Vulnerabilities
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Usable Multi-Factor Authentication and Risk-Based Authorization
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Usable Multi-Factor Authentication and Risk-Based Authorization IBM T. J. Watson Research Center Larry Koved, Research Staff Member 17 September 2013
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.
Article Electronic Notary Practices Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Key Features and
Usable Multi-Factor Authentication and Risk- Based Authorization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Usable Multi-Factor Authentication and Risk- Based Authorization IBM T.J. Watson Research Center Larry Koved December 18, 2014 Team Profile
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:
Andrew M. Cuomo Governor Anthony J. Albanese Acting Superintendent FROM: TO: Anthony J. Albanese, Acting Superintendent of Financial Services Financial and Banking Information Infrastructure Committee
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions
Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
