Account Recovery Challenges: Secure and Usable Authentication
|
|
|
- Christian Randall
- 10 years ago
- Views:
Transcription
1 Account Recovery Challenges: Secure and Usable Authentication Mike Just School of Informatics University of Edinburgh Edinburgh, UK Abstract Challenge questions represent the most popular practice today for supporting account recovery. In case a user forgets their memorized password, it is hoped that they ll be able to recall the answers to their challenge questions. In theory, it seems like a good idea: the answer to the questions should be information that is already known to the user. Challenge questions are even being used to complement password authentication; in addition to a password, users are asked for the answer to one of their questions. Despite their ubiquity, we know surprisingly little about the security and usability of challenge question authentication solutions. In this short article, we review the state-of-the-art in this area. Keywords: Authentication, recovery, challenge questions 1 Introduction Ensuring a user s authenticity is a key component of almost all business information systems. Without such protection, personal information would be readily available to numerous would-be attackers. However, over-zealous protection can also prove to be unusable for some and lead to insecure behaviour by users. For example, a system that requires users to choose a 40-character password might at first seem more secure than today s typical systems, but it would likely present users with a frustrating experience. And this experience might lead to insecure behaviour, for example, causing users to write down their password on a piece of paper next to their computer. Hence, systems require trustworthy and usable authentication solutions. Figure 1 depicts the different classes of authentication credentials that are common to authentication systems. So-called credentials refer to components used by the user to authenticate themselves. The category of Something You Have refers to physical objects that a user must carry with them, such as smartcards. The card might require a reader interface, or perhaps provides a display screen from which the user uses the displayed information to authenticate. Something You Are refers to biometrics that rely upon physical properties of the user, such as fingerprints or retinal scans. A biometric interface is used to collect the biometric. While both preceding types of credentials have been studied for many years, and are increasing in their use, the most common category is that of Something You Know. The work of this author is supported by the Engineering and Physical Sciences Research Council (EPSRC) Grant No. EP/G020760/1. Information Security Summit
2 Figure 1: Types of Authentication Credentials Something You Know refers to information the user knows such as a memorized password. One would expect that a reader of this article would be intimately familiar with passwords from their day-to-day experience, if not with their research. A typical user will remember, or more correctly, be required to remember, several passwords. So-called power users will have dozens of passwords to remember. Beyond passwords, it is also common today for information that is already known 1 to a user to be used for authentication purposes. In this instance, rather than requiring a user to choose and remember a new piece of information for authentication purposes, they ll be asked to leverage memories they already have. Most often, these take the form of challenge questions such as What is your Mother s Maiden Name? or What was the name of my first school?. Typically, such questions are used for the purpose of a secondary or fallback authentication. In other words, if you were to forget your password (your primary authentication credential), you might be asked one of your challenge questions, and required to provide the correct answer in order to access your account. As such, challenge questions would appear to offer a cost-effective way to support account recovery. In current practice, such questions are sometimes used in addition to password authentication. Despite the widespread use and apparent acceptance of challenge questions as a form of authentication, they have received very little critical study. It would be fair question to ask whether they are actually a secure and usable form of authentication. In the remainder of this paper, we discuss the challenge of secure and usable account recovery, consider the role of challenge questions, and review the alternatives that exist today. 2 Account Recovery The past decade has witnessed an explosion in online activity, and along with it, a need to manage the accounts of those online users. For the most part, time is taken up with routine, day-to-day activities. From the point of view of authentication, this simply means login after login after login. From an administrative point of view, maintenance of this account access is the most relevant (and costly!). Account maintenance begins with the registration of the user. In some cases, this can be quite simple, involving only the assignment of an account to some user. For example, many service providers and social networking sites have this behaviour; you register by choosing a username and password, perhaps provide some additional information, and an account is created. There is no need to ensure that you are who you claim to be. In other cases, there is an important step of identification as part of the registration. In other words, before creating an account you must be properly identified that you are who you claim to be. For example, when registering for an online account with a bank, a user is required to first identify themselves by perhaps providing their account number and other information related to their account. Compare this to 1 O Gorman et al. [11] refer to the distinction between memorized and already known authentication information respectively as push passwords and pull passwords to hightlight how information is either pushed into user memory, or pulled. 2 Information Security Summit 2009
3 the Internet provider who doesn t necessarily care who you are, though the account will be secure and accessible only to you once it is created. Since registration is typically a one-time event per user, it is accepted that it can sometimes be a more time-consuming endeavour and thus be more costly. In some cases, the identification step might require that in-person identification using a physical ID card. More common is the maintenance activity of account recovery. When a user forgets (or loses, in the case of Something you Have) their primary credential, a process for recovering their account needs to be created. In some cases, it would be reasonable to ask a user to simply re-register. However, since registration may be expensive, it might not be the most cost-effective option. And since there may not have been an initial identification stage, re-registration would not ensure that the account is being returned to the same, original user. In support of an effecient and cost-effective, the practice of using information such as challenge questions has become quite common. Challenge questions rely upon information already known to the user. Thus, in theory, they should not be as susceptible to the same forgetfulness as passwords; if a user has forgotten their password, hopefully they still remember the answer to their challenge questions. 3 Challenge Questions So-called Challenge Questions consist of a pair of items: a question and the corresponding answer. At registration, a user submits one or more question-answer pairs. The system stores the questions and answers for the user, with at least the answers protected for their confidentiality. 2 When the account recovery process is initiated, a user will submit their username, afterwhich their questions will be retrieved and re-presented to them. The user is then asked to provide the original answers to all (or some) of the questions. In such a process, the already known information is the answer to each question, and the challenge question itself acts as a cue to aid the user in recalling their answer. Indeed, the question-answer pairing is similar to the concept of word pairs whereby two words are paired together if they have a special relationship. In fact, early study into the use of challenge questions for authentication focused on this aspect of word association. There are different methods one can use to package a challenge question authentication solution. For example, the questions might be either administratively-generated or user-generated. Administrativelgenerated challenge questions ( fixed questions by Just [8, 9], and selectable questions by O Gorman et al. [11]) are designed by the account owner so that the account user selects their questions from a pre-defined list. User-generated questions ( open questions by Just [8, 9] and O Gorman et al. [11]) are generated by the user, possibly with guidance from the authentication system. Answers can refer to personal information, facts, beliefs, opinions, etc. More familiar examples, such as What is your Mother s Maiden Name?, What was the name of my first school?, or What was the name of your first pet? refer to personal information. A typical authentication solution will use a small number of authentication questions to authenticate an individual. Noting the lack of personal privacy regarding such information, O Gorman et al. [11] focused on questions that solicit user opinions or trivial facts with questions such as What type of apple do you prefer? and Where do you carry your house keys?. Their solutions ask a larger number of such questions (10 20) in recognition of the smaller answer space for each question. Jakobsson et al. [7] furthered this model by focusing on binary responses (yes/no) to preference questions, for example Do I like cats?. In the sections below, we review the work that has been performed on determining the security and usability of all such instances of challenge question authentication. 3.1 The Security of Challenge Questions The security of challenge questions has been studied by several researchers. And while the typical security questions that relate to the entropy of the answers are easy to calculate, the security of the answers based upon their potentially wide availability has often proved elusive. 2 The questions might also be protected for confidentiality, though it is not necessary. Information Security Summit
4 Haga and Zviran [5] performed early tests to determine the ability of family or friends to determine a user s challenge question answers. Similar to a user s own abilities, family or friends wouldn t necessarily provide the answers with perfect accuracy, but the results should performance rates of just under 50%; perhaps not too surprising, especially in the case of personal questions. Just [8, 9] defined high-level security criteria of Guessability and Observability, that respectively referred to one s difficulty in guessing the corresponding answer to a question, and one s difficulty to observe or retrieve the answer. Rabkin [13] further refined the notion of observability to identify answers that were either Attackable in which case the answer is known to friends or family and can be determined with substantial probability, or Automatically Attackable where the answer could be mined from socialnetworking, or other public sources. And Rabkin then applied these criteria to a review of the questions from 20 online banking sites. His analysis suggests that many of the administratively-generated questions in use today are potentially insecure. Unfortunately, the results don t include recommendations for constructing more secure challenge questions. Jakobsson et al. provide some initial security analysis as part of their preference-based solution [7] and have followed-up with some re-design and further security analysis [6]. Their analysis measures for too high correlations between questions and works to design a solution that is resistant to attack. 3.2 The Usability of Challenge Questions Unfortunately, there has been very little study into the usabilty of challenge question systems, especially with environments closely related to those found in practice today. However, some results exist and there appears to be a renewed interest in discovering the usability of these techniques. Below, we highlight several of the results that do exist today. Just [8, 9] identified the following criteria for the usability of challenge questions. These criteria reflect the testing of earlier studies as well. Applicability - The question is applicable, or relevant, to users. For example, the question What was the name of your first pet? would not be applicable to those users that have never owned a pet. This criterion would only apply to administratively-generated questions (and not user-generated questions). Memorability - The answer to the question is easy to recall. Since the purpose of challenge questions are to aid in the recall of already known information, a key criterion is that the answers to the questions are memorable by (at least a significant portion of) users. Repeatability - A subset of memorability, the answer to a question needs to be repeatable. This typically refers to two such aspects. First, the syntax of the answer should be repeatable over time. For example, for the question Where was my first home located?, the answer might include any one of the words Street, St., Avenue, etc., and systems today require 100% accuracy with such individual responses. Secondly, the original answer to a question is required. For example, in response to the question, Who is my favourite actor?, the user is not being asked to provide their current favourite, but rather their favourite when they first registered the question and such preferences can change over time, Haga and Zviran [5, 19] examined the memorability of so-called cognitive passwords and associative passwords where the former generally refer to challenge questions that ask for personal information, opinions, preferences etc., and the latter refer strictly to sets of word pairs (where one word is associated with the other). Their results report reasonably high levels of recall, though their data reveals that few users were able to recall their answers with 100% recall. Pond et al. [12] examined users ability to recall 20 word association pairs and after only a 2-week retention interval, had poor recall rates of only 60% in some cases (even worse for some portions of their experiment). They note, however, that their results should be replicated in a more traditional computer security setting, aligned with some of the questions we ve noted above. However, their result does speak to the difficulty for users to recall even already known information with accuracy. Ellison et al. [2] and Frykholm and Juels [3] both describe cryptographic techniques for tolerating errors on behalf of users. Specifically, they employ secret sharing techniques [15] to tolerate forgetful users so 4 Information Security Summit 2009
5 that from n questions posed, only t < n correct answers would be requires, as with a (t, n) threshold-based secret sharing scheme. More recently, Just [8, 9] performed some focus group testing on a challenge question authentication solution developed for the Government of Canada. Results indicated that users were distracted by inapplicable (administratively-generate) questions, had difficult remembering dates and first-time events, but were comfortable with being asked more than one challenge question. Rabkin [13] analyzed the usability of the questions from 20 online banking sites and found significant numbers of questions that might prove difficult to use. He also noted the trade-offs with security as there appeared to be a strong inverse relationship between those questions that were secure and those that were emorable. Jakobsson et al. [7] have studied the usability of their solutions based upon user preferences and obtained relatively positive results. However, as noted earlier, there remains a lack of rigorous, long-term study into the practical usability of challenge question answers, whether they be personal information, preferences, opinions, etc., so that the long-term benefits or issues of such solutions remain to be seen. 4 Concluding Remarks Challenge questions alone do not provide sufficient security and account protection. Indeed, early results from Just and Aspinall [10] suggest that use of only a single question-answer pair provides very little security. Thus, prudent designers will ask multiple questions and leverage additional security precautions. One such example is to include an to the user as part of the overall recovery process [17]. Despite the ubiquity of challenge question authentication solutions and their use as either a secondary authentication mechanism, or as a complement to a primary authentication system, our knowledge of their security and usability is sorely lacking. Refernces [1] F. Asgharpour, M. Jakobsson, Adaptive Challenge Questions Algorithm in Password Reset/Recovery, in First International Workshop on Security for Spontaneous Interaction (IWIISI 07), Innsbruck, Austria, (2007). [2] C. Ellison, C. Hall, R. Milbert, B. Schneier, Protecting Secret Keys with Personal Entropy, Journal of Future Generation Computer Systems, 16(4), (2000), [3] N. Frykholm, A. Juels, Error-Tolerant Password Recovery, in Proceedings of the ACM Conference on Computer and Communications Security (CCS 01), ACM Press, (2001), 1-9. [4] V. Griffith, M. Jakobsson, Messin with Texas, Deriving Mother s Maiden Names Using Public Records, RSA CryptoBytes, 8(1), (2007), [5] W. Haga, M. Zviran, Question-and-Answer Passwords: An Empirical Evaluation, Information Systems, 16(3), (1991), [6] M. Jakobsson, L. Yang, and S. Wetzel. Quantifying the Security of Preference-Based Authentication. DIM 08. [7] M. Jakobsson, E. Stolterman, S. Wetzel, L. Yang. Love and Authentication, in Proceedings of ACM Human/Computer Interaction Conference (CHI), (2008). [8] M. Just, Designing and Evaluating Challenge Question Systems, in IEEE Security & Privacy: Special Issue on Security and Usability, (L. Faith-Cranor, S. Garfinkel, editors), (2004), [9] M. Just, Designing Authentication Systems with Challenge Questions, in Designing Secure Systems that People Can Use, O Reilly, L. Faith-Cranor, S. Garfinkel, editors, (2005). [10] M. Just, D. Aspinall, Challenging Challenge Questions, to appear in Proceedings of Trust 2009, 6-8 April 2009, Oxford, UK. Information Security Summit
6 [11] L. O Gorman, S. Begga, J. Bentley, Call Center Customer Verification by Query-Directed Passwords, in Proceedings of Financial Cryptography 04, International Financial Cryptography Association, (2004). [12] R. Pond, J. Podd, J. Bunnell, R. Henderson, Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates, Computers and Security, 19(7), (2000), [13] A. Rabkin. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. in Proceedings of the Symposium On Usability, Privacy and Security (SOUPS 08), (2008). [14] B. Schneier, The curse of the secret question, Computerworld, (February 2005). [15] A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, Nov. 1979, pp [16] C. E. Shannon, A mathematical theory of communication. Bell System Technical Journal, 1948, vol. 27, pp [17] S. Garfinkel, -Based Identification and Authentication: An Alternative to PKI?, IEEE Security and Privacy, vol. 1, no. 6, pp , Nov. 2003, [18] Y. Spector, J. Ginzberg, Pass-Sentence - A New Approach to Computer Code, Computers and Security, 13(2), (1994), [19] M. Zviran, W. Haga, A Comparison of Password Techniques for Multilivel Authentication Mechanisms, The Computer Journal, 36(3), (1993), Information Security Summit 2009
Quantifying the Security of Preference-based Authentication
Quantifying the Security of Preference-based Authentication Markus Jakobsson Palo Alto Research Center Palo Alto, CA 94304 [email protected] Liu Yang, Susanne Wetzel Stevens Institute of Technology Hoboken,
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
Personal knowledge questions for fallback authentication: Security questions in the era of Facebook
Personal knowledge questions for fallback authentication: Security questions in the era of Facebook Ariel Rabkin UC Berkeley [email protected] ABSTRACT Security questions (or challenge questions)
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
How to set up a ONe-Key ID, OneSource Account, and MOE Account
To access the Environmental Activity and Sector Registry (EASR), you will need a: ONe Key ID ONe Source for Business profile Ministry of the Environment (MOE) account 1. Go to ontario.ca/onesource and
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Experiences with Studying Usability of Two-Factor Authentication Technologies. Emiliano De Cristofaro https://emilianodc.com
Experiences with Studying Usability of Two-Factor Authentication Technologies Emiliano De Cristofaro https://emilianodc.com Two Factor (2FA) Authentication Authentication Token password Fingerprint Phone
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Enhanced Security for Online Banking
Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young
Public Key Infrastructure (PKI)
One of the most sought-after benefits from any Public Key Infrastructure (PKI) solution is non-repudiation 1. Passfaces TM support PKI in meeting this expectation. During any authenticated transaction,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
ECCO Mnemonic Authentication
I.J. Computer Network and Information Security, 2014, 7, 11-18 Published Online June 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.07.02 ECCO Mnemonic Authentication Two-Factor Authentication
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Guidance on Multi-factor Authentication
Guidance on Multi-factor Authentication June 2006 Guidance on Multi-factor Authentication Guidance on Multi-factor Authentication State Services Commission June 2006 Version 1.0 ISBN 0-478-24466-5 Crown
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Universal Multi-Factor Authentication Using Graphical Passwords
Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
A Taxonomy of Single Sign-On Systems
A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
I. INTRODUCTION. of the biometric measurements is stored in the database
122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
The Current and Future Direction of Identity Assurance. A critical foundation for identity and access management solutions
The Current and Future Direction of Identity Assurance A critical foundation for identity and access management solutions Viewpoint paper systems with identity management. The surge in the number of managed
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
