User Authentication: A Secure Networking Environment Ellen Bonsall Payoff

Size: px
Start display at page:

Download "83-10-31 User Authentication: A Secure Networking Environment Ellen Bonsall Payoff"

Transcription

1 User Authentication: A Secure Networking Environment Ellen Bonsall Payoff After identifying network security requirements, defining the security process, setting policies and procedures, and defining remote access security terms, the next step is to examine the types of network security and user authentication that can be incorporated into an enterprisewide solution for protecting information. The choice of technology and products must support authentication for multiple uses with system scalability and internationally recognized standards. Introduction After identifying network security requirements, defining the security process, setting policies and procedures, and defining remote access security terms, the next step is to examine the types of network security and user authentication that can be incorporated into an enterprisewide solution for protecting information. The choice of technology and products must support authentication for multiple uses with system scalability and internationally recognized standards. In addition to the simple, reusable passwords and user IDs common to all operating systems and computing devices, are a variety of user authentication techniques that can be employed to ensure adequate system protection as remote users are added. It is common practice to combine reusable passwords, user IDs, and these other methods for a more secure networking environment: Dial-back security. Caller ID and ANI. Encryption. Two-factor, challenge-response authentication. Dial-Back Security After a user has been identified through a simple ID process, a modem can dial-back for an additional level of verification. Users must be at a predetermined phone number to receive the dial-back call. If an intruder tries to initiate the process and is not at the proper phone number, he or she will not receive the call back. This low-cost method of security was acceptable in the past before the widespread use of the Internet and when its users did not roam about as much. Most remote communications packages support dial-back as a security feature, and some modems support dial-back at the hardware level. With so many software and hardware platforms supporting dial-back, it is easy to implement, but not very secure. Dial-back security can be spoofed by call forwarding; can be spoofed if the phone system cannot initiate a hang up at the right time; is difficult to administer with large callback lists; is not effective for users who travel to unplanned call-back locations (e.g., hotels); and generates complicated phone billing issues. In addition, there are many easy methods to gain access to phone numbers and to change an individual phone number at a remote user location.

2 Caller ID and ANI Caller ID services are increasing across the nation. Known as Caller Number Delivery (CND) or calling line identification, information is passed to the receiving end of the call between the first and second rings. The CND information is passed directly from the phone company switch, which supports the caller, to the switch supporting the recipient of the call. The recipient's switch then passes the CND information to the user's premises. Another service, Automatic Number Identification (ANI) has been available for years to businesses as a component of certain types of phone lines. These services can be used to identify the phone number used by incoming callers. In theory, if not in practice, this could allow a remote user's location to be validated before the host's modem answers the phone. This makes spoofing nearly impossible. There is no actual connection between the caller side and the receiving side before the phone is picked up. CND verification devices sit between the phone system and the host's modem. These devices can be set to reject a call if the CND information does not match the remote user's table. A solution using CND for security could reside at the modem, a black box on either side of the modem, or in software. However, CND is not available universally, and is not likely to be so in the near future. In addition, a lot of privacy issues are involved. People can even request CND blocking. Such a plan is not feasible if multiple phone company areas are concerned, is difficult to administer to large remote user lists, and is not effective for users who travel to calling locations that are not pre-defined. Therefore, this should not be considered a viable, easyto-implement user authentication solution. Encryption and User Authentication Encryption algorithms use keys to encode and decode a sequence of bits. In private-key encryption, the key remains secret. With public-key encryption, the key used to encode is known by everyone, and the one used to decode is known only to the user. Many modems and LAN operating systems use encryption to protect data sent between networks, but for the purposes of negotiating an enterprise network on a daily basis, encrypting everything is not practical. Imagine having to encrypt nearly every communication, every file, everything created on the network, every day. Even if time, systems, and resources permitted such feats, that still would not keep intruders from attacking a network or its applications. Without user authentication, access to files, encrypted or not, is still possible. The following discussion looks at encryption as it is involved with user authentication and one-time passwords. When a remote user logs into a network over the telephone line, data travels over the line in clear text. Intruders can tap into the connection and steal common IDs and reusable passwords. To prevent this, remote access authentication systems use a two-factor, challenge response process along with encryption to scramble password data. Employing either public or private algorithms in the process, authentication tokens generate one-timeuse-only passwords that are used to confirm or deny access to users. By using encryption, a user authentication system can scramble passwords, PINs, and other small messages to send them safely over unprotected telephone lines. (Some tokens can also send encrypted credit card numbers for use in consumer-based electronic commerce applications.)if a hacker were to capture the encrypted information successfully, he or she would have to break the encryption scheme to use the data. If the authentication system employs proven algorithms and an asynchronous-based process, hacking the data is essentially impossible. Even if it were possible, the time and resources to hack a one-time-use password would not pay off, because the password could not be used a second time anyway.

3 Private Versus Public Key Encryption The two kinds of encryption are private key and public key. It is safest to choose authentication products based on widely used algorithms, such as the Data Encryption Standard (DES)--a private key encryption scheme- -or Rivest_Shamir-Adleman (a public key cryptosystem named by its inventors, Rivest, Shamir, and Adelman, who hold the patent). DES, the industry-standard private key encryption scheme, relies on an algorithmbased 64-bit key. Fifty-six bits are used for actual encryption and decryption, and the other eight bits are reserved for parity checking. Each bit is randomly generated. There are literally quadrillions of possible combinations. Each time data is run through the key, the key produces a unique, one-time result. With such a private key system, data is encrypted and decrypted according to one unique key. Users encrypt passwords by using their own, unique keys and then by sending the encrypted data to the host authentication server, which must have the same key to decrypt the data. Because anyone with access to the key can decrypt the data, the key must be kept private. In considering an authentication system, no one outside of the organization should have access to these private keys. Some systems require that vendors maintain user data bases. In addition, caution should be exercised if considering user authentication systems that employ private key, proprietary algorithms that are neither proven over the long run (as in decades of use) or about which little is known. If the encryption algorithm has not been employed for a long period of time, and if independent experts have not evaluated its reliability and published the results, the dependability of the overall system should be questioned. Public key encryption relies on a unique pair of keys that can only work with each other- -a private key and a public key. Once data has been encrypted, only the matching private key can decrypt it. In such a system, users are assigned unique private keys, which must be kept secret too. The matching public key is copied and distributed to fellow employees (i.e., business partners, suppliers, or investors) or stored in an authentication device (i.e., token)or in a host key server. When a user wants to send a private message, he or she encrypts the data by using a copy of the recipient's private key. As a result, only the intended recipient can read the data. Two-Factor, Challenge-Response Authentication What is a two-factor, challenge-response authentication process, and what does it look like in a complex environment? Imagine two IBM mainframes loaded with sensitive information. At the same site, add a 500-node Ethernet LAN connected to a Tricord Power- Frame ES-5000 superserver running NetWare 4.1. Attach 200 users to a Digital VAX 6000 Cluster in the same computer center. Toss in a few hundred users who need remote access to information on the mainframes through four protocol converters. How can hundreds of remote users, who may be located anywhere in the world, be authenticated? A remote user (e.g., a marketing coordinator attending a trade show) might have to call in for information he or she has stored on the LAN. He or she plugs the PC into a phone line and calls into an authentication server by using a modem and a commercial software product, such as PCAnywhere, logging in with a user ID (just as he or she would if sitting at his or her desk in the office). The remote user is now identified. The dedicated authentication server (or an authentication software server solution) intercepts the call and issues a random numerical challenge. Authentication servers can restrict access with a combination of factors not normally present in gateway security. Authentication servers authenticate through a two-factor, challenge/response process during which users communicate with the authentication server through tokens and their PCs. A comprehensive user data base that contains information on all remote users is stored in the authentication server, which depending on the vendor can authenticate those users through a combination of user ID, password, password aging, call-back, time of day, and date

4 range. It is up to the security administrator to set the specific security parameters by choosing any or all these factors if they are available. This user authentication solution provides a more secure process than relying solely on reusable passwords and common IDs. Without a dedicated hardware or a software authentication server, who is to say that the marketing coordinator(mentioned previously) is actually who he or she says he or she is? None of the traditional modes of security are in place when a remote user calls in with only an ID or a reusable password between the user and the network. No receptionist checks his or her ID; no building guard stands there to recognize him or her; and no one is sitting in the office or cubicle next to him or her to raise an alarm in the presence of a stranger. Two-factor, challenge-response authentication provides levels of security that cannot be found with traditional gateway security. Twofactor, challenge-response authentication provides better security than PC-to-PC security, traditional passwords, user ID, or native communications server security. What is two-factor, challenge-response authentication? The following describes what happens during the two-factor, challenge-response authentication process. The user has a Personal Identification Number (PIN) that only he or she knows. With the PIN, he or she activates his or her token, which can be either a hand-held key or a software key loaded directly onto his or her PC. The PIN identifies him or her as the owner of the token. An unauthorized user cannot activate the token, because he or she does not have the PIN. Only the user and the token itself know the PIN. When evaluating two-factor authentication token systems, tokens should allow the user to enter or change at will- - his or her PIN. Not even the network administrator should know a user's PIN. Moreover, PINs should not be transmitted over telephone lines, because, in some cases, it is possible to capture them and user them later.) This makes up the two factors something the user knows(i.e., the PIN) and something the user has in his or her possession (i.e., the token). After the user is identified, the network authentication server issues a random, alpha-numeric challenge that requires a specific response that can only be calculated by a token with the identical, userspecific encryption key as stored in the network authentication server. When the marketing coordinator enters the response that his or her token generates, he or she is authenticated, but only if the response (i.e., password) matches the password expected by the authentication server. Only the coordinator's token (loaded with his or her unique key) can calculate the same response (i.e., password) that the authentication server calculates. There is no possibility for someone to steal or discover such a password, one that is created on the spot by using an encryption algorithm; one that is issued only once; and one that can never be used again. Standards Compliance Authentication products should be based on internationally recommended standards. These provide a better solution than systems based on proprietary technology, especially if scalability is required and if it is expected to accommodate future applications based on emerging worldwide standards. Proprietary technology does not provide the required cross-platform interoperability demanded by today's open systems and complex distributed networking environments. An authentication solution must operate on a variety of hardware platforms, including mainframes, midrange computers, workstations, and PCs, and with a range of operating systems, including Microsoft Windows 3.1, Windows 95 and Windows NT, and UNIX systems (such as Sun Solaris, SunO/S, Hewlett Packard HP/UX, IBM/AIX, OS/2, and Berkeley Software Design O/S). The authentication solution should also comply with internationally recognized security standards, such as those promulgated by the International Organization for Standardization (ISO) and the American National Standards Institute(ANSI). The authentication solution should comply with these internationally recognized standards:

5 ANSI X3.92 in a chosen algorithm. Previous screen ANSI X9.17 for secret key management. ANSI X9.9 for the calculation and display of dynamic passwords. ANSI X9.26 for the challenge response process. These standards provide the highest level of security, interoperability, and ease of implementation in the marketplace. In addition, international standards compliance makes existing systems compatible with other enterprise networks, while it simultaneously provides for scalability in the future. Conclusion A lot of questions need to be asked before choosing an user authentication process that will work in today's multiplatform, multiple-use networking enviornment. Does the organization really want proprietary software and hardware authentication servers? The major drawback of such systems is that they do not operate across multiple networking platforms in all communications environments, and they may not be compatible with future security requirements. As time passes, it may be necessary to purchase additional hardware or software for multiple access points. Author Biographies Ellen Bonsall Ellen Bonsall is the Marketing Director, U.S. Operations for ActivCard, Inc., San Francisco, CA.

83-10-30 Remote Access Authentication Ellen Bonsall Payoff

83-10-30 Remote Access Authentication Ellen Bonsall Payoff 83-10-30 Remote Access Authentication Ellen Bonsall Payoff Complex distributed networks have made security a critical component of network architecture. Client/server technology is delivering sensitive

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

PROTECTING NETWORKS WITH FIREWALLS

PROTECTING NETWORKS WITH FIREWALLS 83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Check Point FW-1/VPN-1 NG/FP3

Check Point FW-1/VPN-1 NG/FP3 Check Point FW-1/VPN-1 NG/FP3 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

86-01-25 Protecting the Portable Computing Environment Phillip Q. Maier Payoff

86-01-25 Protecting the Portable Computing Environment Phillip Q. Maier Payoff 86-01-25 Protecting the Portable Computing Environment Phillip Q. Maier Payoff The use of portable computing has become a standard tool in the business world today, yet its use can present a wide array

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Securing Network Print Jobs

Securing Network Print Jobs White Paper - Levi, Ray & Shoup, Inc. Securing Network Print Jobs Enterprise Output Management Series LRS White Paper 2002 Levi, Ray & Shoup, Inc. All rights reserved. LRS, VPS, and are registered trademarks

More information

83-10-25 Managing Distributed Network Systems Using Single Sign-On, Password Synchronization, and the Authentication Server Jeffrey Carr Payoff

83-10-25 Managing Distributed Network Systems Using Single Sign-On, Password Synchronization, and the Authentication Server Jeffrey Carr Payoff 83-10-25 Managing Distributed Network Systems Using Single Sign-On, Password Synchronization, and the Authentication Server Jeffrey Carr Payoff For most corporations worldwide, the move to distributed

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose

More information

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

NIS Security Weaknesses and Risk Analysis

NIS Security Weaknesses and Risk Analysis A Unix Network Protocol Security Study: Network Information Service Introduction David K. Hess, David R. Safford and Udo W. Pooch Texas A&M University dhess@cs.tamu.edu This note is a study of the security

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

Implementing a Secure Virtual Private Network

Implementing a Secure Virtual Private Network IMPLEMENTING A SECURE WHITE VIRTUAL PAPER PRIVATE NETWORK Implementing a Secure Virtual Private Network WHITE PAPER Virtual Private Networks (VPNs) are quickly becoming the most universal method for remote

More information

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY

More information

dect provides high protection against unauthorized access

dect provides high protection against unauthorized access dect provides high protection against unauthorized access BACKGROUND 2 Wireless communication for voice and data is growing worldwide. The amount of DECT (Digital Enhanced Cordless Telecommunications)

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

86-10-15 The Self-Hack Audit Stephen James Payoff

86-10-15 The Self-Hack Audit Stephen James Payoff 86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need

More information

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century Cent ralized Out -Of-Band Aut hent ic at ion Syst em Security for the 21 st Century Presented by: Southeast Europe Cybersecurity Conference Sophia, Bulgaria September 8-9, 2003 Introduction Organizations

More information

IBM Tivoli Security using Two-Factor Authentication against PHISHING

IBM Tivoli Security using Two-Factor Authentication against PHISHING IBM Tivoli Security using Two-Factor Authentication against PHISHING IBM Tivoli Security IBM Tivoli Security provides an integrated family of security products that provide a comprehensive and scalable

More information

The Importance of Security Standards

The Importance of Security Standards The Importance of Security Standards Presented by Douglas Kozlay Principal Engineer, Information Resource Engineering, Inc. Member: ANSI X9F INFORMATION RESOURCE ENGINEERING, INC. The Importance of Security

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,

More information

Elements of Security

Elements of Security Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

ADVANCE AUTHENTICATION TECHNIQUES

ADVANCE AUTHENTICATION TECHNIQUES ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

BlackBerry Enterprise Solution and RSA SecurID

BlackBerry Enterprise Solution and RSA SecurID Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering

More information

OBM (Out of Band Management) Overview

OBM (Out of Band Management) Overview OBM (Out of Band Management) Overview With the growth of IP, routers deployed into an IP network must not only be accessible by the network operator for maintenance and configuration purposes, but secure

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology

RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology What is Radmin? Radmin is a secure and reliable Windows-based remote control program, which allows you to work on several computers through a simple and familiar graphical interface. Radmin allows a user

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

White paper. Wireless Security: It s Like Securing Your Home

White paper. Wireless Security: It s Like Securing Your Home White paper Wireless Security: It s Like Securing Your Home WLAN SECURITY IS JUST LIKE YOUR HOUSE Imagine your home, filled with the people you love and your prized possessions. You open all the windows

More information

Connecting to the network

Connecting to the network 5 Connecting to the network This chapter discusses the basic stages of connecting the printer to the network, provides an overview of network requirements and protocol diagrams, and describes how to physically

More information

White Paper. Security: Cortado Corporate Server for BlackBerry. Information on the Cortado infrastructure and Bluetooth printing

White Paper. Security: Cortado Corporate Server for BlackBerry. Information on the Cortado infrastructure and Bluetooth printing White Paper Security: Cortado Corporate Server for BlackBerry Information on the Cortado infrastructure and Bluetooth printing This white paper provides information about the security of BlackBerry and

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION. Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,

More information

APC Enterprise KVM Switches

APC Enterprise KVM Switches APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean

More information

Securely Delivering Applications Over the Internet. White Paper

Securely Delivering Applications Over the Internet. White Paper Securely Delivering Applications Over the Internet White Paper SECTION CONTENTS 2 Table of Contents Section 1 Information security in the age of the remote community Section 2 Enterprise security concerns

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Two Factor Authentication. Software Version (SV) 1.0

Two Factor Authentication. Software Version (SV) 1.0 Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

83-01-20.1 A Guide to Evaluating Tokens Joseph T. Hootman Payoff

83-01-20.1 A Guide to Evaluating Tokens Joseph T. Hootman Payoff 83-01-20.1 A Guide to Evaluating Tokens Joseph T. Hootman Payoff Fixed passwords are no longer appropriate for controlling computer access. Effective access control calls for the use of dynamic passwords,

More information

1-06-20 Internet Security Using Firewalls Vincent C. Jones

1-06-20 Internet Security Using Firewalls Vincent C. Jones 1-06-20 Internet Security Using Firewalls Vincent C. Jones Payoff Openness has long been the modus operandi on the Internet. Now, as more businesses connect to the Internet as a service to their internal

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

An Efficient data storage security algorithm using RSA Algorithm

An Efficient data storage security algorithm using RSA Algorithm An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

FUNDAMENTALS OF REMOTE ACCESS

FUNDAMENTALS OF REMOTE ACCESS 83-10-45 DATA SECURITY MANAGEMENT FUNDAMENTALS OF REMOTE ACCESS Naaman Mustafa and Tom Peltier INSIDE Benefits of Remote Access, Connectivity Options, Remote Access Methods, Security Goals, Administration

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT Namzak Labs White Paper, 2002-02 Version 1 September 30, 2002 Overview As deployment of computer applications over the Internet becomes more prevalent, companies

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

The ABCs of KVMs: How Remote KVM Switches Put You in Control of Your Data Center

The ABCs of KVMs: How Remote KVM Switches Put You in Control of Your Data Center How Remote KVM Switches Put You in Control of Your Data Center Lantronix, Inc. 15353 Barranca Parkway Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Contents Introduction...

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with

More information

How Virtual Private Networks Work

How Virtual Private Networks Work How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater

More information