Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
|
|
|
- Hannah Lamb
- 10 years ago
- Views:
Transcription
1 International Journal of Electronic and Electrical Engineering. ISSN Volume 7, Number 8 (2014), pp International Research Publication House Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) Pawan Gupta 1 and Mohd. Suhail Ansari 2 1 Student at Dept. of Information Technology, University of petroleum and energy studies, Dehradun, Uttrakhand 2 Student at Dept. of Material Science and Nano Technology, University of petroleum and energy studies, Dehradun Uttrakhand. ABSTRACT Cloud computing is the starting of a new era in IT Industry, Cloud computing is the delivery of computing components as a service. Today almost every IT company and different sectors such as Health, Tourism, fishing and government of different countries are making huge investment in cloud computing. On an average, by 2018, government sector will invest $ Billion, health sector will invest $5. 4 Billion, IT giants like IBM and CISCO will invest $2 to $3 Billion on cloud computing. But one of the biggest challenges faced by this technology is SECURITY. Today Cyber-crime has strengthened its routes, as a result there are security breaches raised in network security. To mitigate the risk of hacking and enhancing cloud security GOTCHA (Generating panoptic Turing Tests to Tell Computers and Humans Apart) is introduced as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are easy for the human to solve. (2) The puzzles are hard for a computer to solve even if it has the random bits used by the computer to generate the final puzzle unlike a CAPTCHA. GOTCHAs can be used to mitigate the threat of offline dictionary attacks against passwords by ensuring that a password cracker must receive constant feedback from a human being while mounting an attack. GOTCHA relies on the usability assumption that users can recognize the phrases that they originally used to describe each Inkblot image a much weaker usability assumption than previous password systems based on Inkblots which required users to recall their phrase exactly. KEYWORD: Security breaches, offline dictionary attack, protocol, mounting.
2 838 Pawan Gupta and Mohd. Suhail Ansari 1. INTRODUCTION Cloud computing portends a major change in how we store information and run applications. Instead of running pro-grams and data on an individual desktop computer, every-thing is hosted in the cloud a nebulous assemblage of computers and servers accessed via the Internet. Cloud computing lets you access all your applications and documents from anywhere in the world, freeing you from the confines of the desktop and making it easier for group members in different locations to collaborate.. Clouds are a large pool of easily usable and accessible virtualized resources such as hardware, development platforms and services can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of pay-per-use for resources model with guaranties from Infrastructure Provider by means of customized Service Level Agreements. But as per the threats to cloud security are increasing, user s data can be compromised as any person who has obtained the cryptographic hash of a user s password can mount an automated brute-force attack to crack the password by comparing the cryptographic hash of the user s password with the cryptographic hashes of likely password guesses. This attack is called an offline dictionary attack, and there are many password crackers that a person can use. Servers have been compromised at large companies (Facebook, LinkedIn, Sony etc. ) resulting in the release of millions of cryptographic password hashes. It has been repeatedly demonstrated that users tend to select easily guessable passwords and password crackers are able to quickly break many of these passwords. Offline attacks are becoming increasingly dangerous as computing hardware improves a modern GPU can evaluate a cryptographic hash function like SHA2 about 250 million times per second and as more and more training data leaked passwords from prior breaches becomes available. 2. Literature Review Concept of cloud computing started back to the 1950s, when large-scale mainframe computing comes into existence. Since 2000, Amazon played a key role in the development of cloud computing by modernizing their data centers. Amazon initiated a new product development provide cloud computing to external customers, and launched Amazon Web services (AWS) on the basis of Utility Computing. In 2011, IBM announced the IBM Smart Cloud framework to support Smarter Planet Initiative. CAPTCHAs were introduced in 2000 by Luis von Ahn and pals at Carnegie Mellon University in Pittsburgh. Hermann Rorschach is the Swiss psychologist who invented the inkblot-based personality tests. GOTCHA was also used to counteract hackers that breach the walls of a server to download lists of user names and passwords. The likes of Zappos (2012), LinkedIn (2012), Sony (2011), and Gawker (2010) have all been hit, inspiring a search for a better security system. 3. HOSP (Human Only Solvable Puzzles) HOSP are randomized puzzles like CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart) which are generated by the servers
3 Enhancing Cloud Security By: Gotcha 839 to determine whether or not the user is human. CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen. Because the test is administered by a computer, in contrast to the standard Turing test that is administered by a human, a CAPTCHA is sometimes described as a reverse Turing test. CAPTCHAs can prevent bot-generated spam by requiring that the (unrecognized) sender pass a CAPTCHA test before the message is delivered, but the technology can also be exploited by spammers by impeding OCR detection of spam in images attached to messages. CAPTCHAs have also been used to prevent people from using bots to assist with massive downloading of content from multimedia websites. They are used in online message boards and blog comments to prevent bots from posting spam links as a comment or message. There are certain Drawbacks of HOSP - Techniques have been built which can beat CAPTCHAs with percent accuracy (e. g. OCR (optical character recognition)) which are mature enough to beat CAPTCHAs. 4. GOTCHA Inkblots have been proposed as an alternative way to generate and remember passwords. It is proposed to show the user ten randomly generated inkblot images and having the user make up a word or a phrase to describe each image. It is stressed that the use of Inkblot images is different in two ways: (1) Usability: It is not required for users to recall the word or phrase associated with each Inkblot. Instead it is required for user s to recognize the word or phrase associated with each Inkblot so that they can match each phrase with the appropriate Inkblot image. Recognition is widely accepted to be easier than the task of recall. (2) Security: It is not needed to assume that it would be difficult for other humans to match the phrases with each Inkblot. But it is assumed that it is difficult for a computer to perform this matching automatically. (3) Timer: A timer can also be set within the GOTCHA to mitigate offline dictionary attacks e. g. if a brute force attack is used to crack the password, after an attempt of 5 unmatched passwords a new GOTCHA should appear which should be quite difficult then the before Inkblot image. To create a GOTCHA, user chooses a password and a computer then generates several random, multi-colored inkblots. User describes each inkblot with a text phrase, and these phrases are stored in random order along with the password. When user return to the site and sign in with the password, the inkblots are displayed again along with the list of descriptive phrases. You then match each phrase with its corresponding inkblot. 5. HOSP (Human Only Solvable Puzzles) vs. GOTCHA HOSPs (Human Only Solvable Puzzles) is a way of defending against offline dictionary attacks. The basic idea is to change the authentication protocol so that
4 840 Pawan Gupta and Mohd. Suhail Ansari human interaction is required to verify a password guess. The authentication protocol begins with the user entering his password. In response the server randomly generates a challenge using the password as a source of randomness for the user to solve. Finally, the server appends the user s response to the user s password, and verifies that the hash matches the record on the server. There is a simple modification of HOSPs that are called GOTCHAs (Generating panoptic Turing Tests to Tell Computers and Humans Apart). The adjective Panoptic is used to refer to a world without privacy there are no hidden random inputs to the puzzle generation protocol. The basic goal of GOTCHAs is similar to the goal of HOSPs defending against offline dictionary attacks. GOTCHAs differ from HOSPs in two ways: (1) Opposing a HOSP a GOTCHA may require human interaction during the generation of the challenge. (2) Relaxation is given in the requirement that a user needs to be able to answer all challenges easily and consistently. If the user can remember his password during the authentication protocol then he will only ever see one challenge. It only requires that the user must be able to answer this challenge consistently. If the user enters the wrong password during authentication then the user may see new challenges. We do require that it is difficult for a computer to distinguish between the correct challenge and an incorrect challenge. This paper demonstrates that GOTCHAs like HOSPs can be used to defend against offline dictionary attacks. The goal of these relaxations is to enable the design of usable GOTCHAs. GOTCHAs are based on inkblot images. While the images are generated randomly by a computer, the human mind can easily imagine semantically meaningful objects in each image. To generate a challenge the computer first generates ten inkblot images. The user then provides labels for each image (e. g., evil clown, big frog). During authentication the challenge is to match each inkblot image with the corresponding label. 6. CONCLUSION AND FUTURE SCOPE GOTCHAs can be widely used to increase the cloud security because GOTCHAs allow for human feed- back during puzzle generation unlike HOSPs which potentially opens up a much wider space of potential GOTCHA constructions. One idea might be to have a user rate/rank random items (e. g., movies, activities, foods). By allowing human feedback we could allow the user to dismiss potentially confusing items (e. g., movies he hasn t seen, foods about which he has no strong opinion). Interaction is an incredibly powerful tool in computer security, human authentication typically does not exploit interaction with the human (e. g., the user simply enters his password). We view the idea behind HOSPs and GOTCHAs exploiting interaction to mitigate the threat of offline attacks as a positive step in this direction.
5 Enhancing Cloud Security By: Gotcha 841 GOTCHAs can not only be used to improve cloud security but can also be used to create more secure networks and help the cyber world in mitigating the risk of cybercrime. 7. REFERENCE [1] MARK VANDERWIELE, The IBM Research Cloud Computing Initiative, Keynote talk at ICVCI 2008, RTP, NC, USA, May [2] Beak, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In International conference on Computational Science and Its Applications, pages Springer-Verlag, [3] Baek, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In International conference on Computational Science and Its Applications, pages Springer-Verlag, [4] D. Song, D. Wagner, and A. Perrig. Practical techniques for searching on encrypted data. In IEEE [5] Symposium on Research in Security and Privacy, pages IEEE Computer Society, [6] Luis M. Vaquero,Luis Rodero-Merino, Jua critical areas of focus in cloud computing. Technical report, Cloud Security Alliance, April [7] Luis M. Vaquero, Luis Rodero-Merino, Jua critical areas of focus in cloud computing. Technical report, Cloud Security Alliance, April [8] A. Shamir. Ip= pspace. Journal of the ACM (JACM), 39(4): , 1992.
6
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Comparative Analysis of CAPTCHA Based Techniques : A Review
79 Comparative Analysis of Based Techniques : A Review Jaswinderkaur Department of Computer Engineering Punjabi University, Patiala [email protected] Lal Chand Panwar Department of Computer
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
How can I keep my account safe from hackers, scammers and spammers?
How can I keep my account safe from hackers, scammers and spammers? The question is a good one and especially important if you've purchased shared hosting (such as HostDime offers) since what effects your
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
SECURING SELF-SERVICE PASSWORD RESET
SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
An Analysis of Markov Password Against. Brute Force Attack for Effective Web Applications
Applied Mathematical Sciences, Vol. 8, 2014, no. 117, 5823-5830 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.47579 An Analysis of Markov Password Against Brute Force Attack for Effective
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
Protecting against modern password cracking
Protecting against modern password cracking Are passwords still an adequate form of authentication? by Yiannis Chrysanthou, MSc (RHUL, 2012), and Allan Tomlinson (supervisor), ISG, Royal Holloway istockphoto/ronen
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch (IBM Research Zurich) Anna Lysyanskaya (Brown University) Gregory Neven (IBM Research Zurich) Password
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION
BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION 1 AKASH GUPTA, 2 ALOK SHUKLA, 3 S. VENKATESAN 1,2,3 Indian Institute of Information Technology, Allahabad Abstract The evolution
User Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
TLP WHITE. Cloud storage and data security
Cloud storage and data security 1 Contents Contents... 2 Introduction... 3 What is cloud storage... 3 Benefits and risks... 4 Maintaining data security in the cloud... 5 Secure passwords and sensitive
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
A Review of Web Application Security for Preventing Cyber Crimes
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 699-704 International Research Publications House http://www. irphouse.com A Review of Web Application
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
Authenticating Humans
29 Oct 2015 CSCD27 Computer and Network Security Authenticating Humans CSCD27 Computer and Network Security 1 Authenticating Computers and Programs Computers and programs need to authenticate one another:
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Password Manager with 3-Step Authentication System
Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London [email protected], [email protected] Abstract: A big
Computer Concepts And Applications CIS-107-TE. TECEP Test Description
Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Best Practices for Password Strength
A. Allan Research Note 6 December 2004 Passwords Are Near the Breaking Point Mitigating authentication weaknesses by increasing password length and complexity will reduce security if passwords are pushed
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Secret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
The Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Cloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
things you haven t done to protect your business from cybercrime
5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates
Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Fall 2008 Course mechanics Instructor: Ian Goldberg Contact info: http://www.cs.uwaterloo.ca/ iang/ Office
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
Multi-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Enhancing E-mail Security by CAPTCHA based Image Grid Master Password
International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Enhancing E-mail Security by CAPTCHA based Image Grid Master Password Nitin*, Amanpreet Singh Arora, Aditya
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
