Public Key Infrastructure (PKI)
|
|
|
- Justina Dalton
- 9 years ago
- Views:
Transcription
1 One of the most sought-after benefits from any Public Key Infrastructure (PKI) solution is non-repudiation 1. Passfaces TM support PKI in meeting this expectation. During any authenticated transaction, in addition to establishing that the identity credential presented is valid and known, it is also imperative to establish, through personal authentication, that the presenter is also the owner of the valid identity. PKI credentials alone do not provide this assurance; they only provide the link to a known identity. Passfaces TM provide a scalable, costeffective, cognometric 2 replacement for passwords and biometrics that more reliably provide assurance of the credential owner s presence. Because of the increased reliability now available through the use of Passfaces, an anonymous authentication service can be used with a centralized credential repository to secure the online storage of users private keys thus enabling the wide-scale deployment of federated Identity Management and the moblile use of PKI tokens for web services. Public Key Infrastructure (PKI) There are few security solutions as comprehensive in what they bring to the table as a well deployed and well managed Public Key Infrastructure. In the brick and mortar world, the trust inherent in an ink signature and in the established relationships of personal contact is essential to the business process. To duplicate that in an electronic environment requires a mechanism for establishing the non-repudiation of commitments. PKIs sell trust and bring the promise of facilitating the electronic duplication of well-established business practices. By its very nature, an infrastructure carries with it an implied cohesion. In the case of a PKI, as with all Identity Management systems, all the security components required to initially establish the identities of a given population (identity proofing) and to make that information available and usable within a network have been designed to work together as a secure foundation in support of business applications. Time has refined the systems and their capabilities. Most of the major vendors today have had the architecture of their offerings scrutinized, evaluated, and certified for excellence. 1 for definition: Non-repudiation services provide unforgeable evidence that a specific action occurred. Non-repudiation services include: non-repudiation of origin, non-repudiation of submission, and nonrepudiation of delivery. Non-repudiation of origin protects against any attempt by a message originator to deny sending a message. Non-repudiation of submission protects against any attempt by an MTA to deny that a message was submitted for delivery. Nonrepudiation of delivery protects against any attempt by a message recipient to deny receiving a message. 2 Cognometrics (kagnωεmεtriks) n. class of personal authentication techniques based on measurable, innate cognitive abilities of the human brain (e.g. ability to recognize a familiar face).
2 Uses and Benefits Once the infrastructure is in place, the PKI has the ability to support an enormous range of objectives, both security related and business related. It can provide for consistency across corporate activity, support secure inter-facility communications, and remove redundancies in building secure applications. It serves as a framework for future expanded applications and therefore a PKI s benefits will be gleaned over a longer period than most security solutions that are less global in scope. For many of the business benefits to be realized, the secure distribution and management of large numbers of cryptographic keys and verifiable certificates is essential. The advent of PKI as a backbone to deliver this service took large-scale secure networks out of the realm of the impossible. It allows for the secure delivery of secrets (keys) over insecure channels without a case ever being handcuffed to someone s wrist. For the purposes of this discourse some very explicit assumptions about the business issues being addressed by the PKI will be made. Because implementing any infrastructure, and a PKI is no exception, requires a corporate commitment to expending large amounts of capital, time, and personnel resources, the critical business needs must come from a set that justify the investment. The arguments for ROI would support that assumption. It will be assumed here, therefore, that most of the following business needs are present in some form 3 : The product or services of the enterprise mandate the existence of an IT security infrastructure The decision has been made to utilize untrusted public networks to carry on corporate business There is a need to exchange cryptographic keys with partners and employees to accomplish business objectives There are business drivers, outside security considerations, that can be accommodated using non-reputable digital signatures. o Reducing Fraud o Conducting legally binding transactions o Supporting paperless contracts o Replacing wet (traditional) signatures o Reducing liability o Establishing digital identities 3 This is supported by the Gartner article in Security Matters! entitled PKI-What is it good for? July 26, 2001, Note Number: AV
3 When PKIs Falter The on-going management of a PKI, whether it is installed in-house or outsourced, requires highly skilled personnel to oversee its successful operation and therefore the maintenance of its value to the business process. A cadre of security expertise, legal support, and management must be available and allocated to this complex, on-going process. Another difficulty is the timeliness of the revocation process in a large dispersed population. This is a challenging issue when the entities served by the structure have reason to distrust each other. The revocation issue is of less importance within a trusted environment where liability is not as big an issue (e.g. Government agencies) or where other security mechanisms bind the population (e.g. DOD). When the structure of a PKI was first developed, it was envisioned that the certificate would be used off line. This was not only before on-line access was ubiquitous as it is today, but also was before on-line access to revocation lists was even available to all participants on a regular basis. Today, online access to revocation lists can be accomplished as quickly as verifying the authenticity of a certificate. More problematical may be how a revocation list can be kept current. Perhaps the day of online direct verification with the issuing CA or its proxy is getting closer. The PKI equivalent to the Telco s last mile problem is personal user authentication. The PKI itself does not tie the presence of the owner of a private key to its use in a transaction. However, any real-life implementation must address this issue if the business objectives are to be met. User Authentication Confusion between user identification and user authentication often occurs. Identification is the means by which a system establishes the identity of a user. Authentication is the process of establishing the validity of the identity when it is presented. A user identity code is a non-confidential and auditable representation used by the system to recognize a legitimate member of its population. The process of verifying that the identity presented belongs to the user submitting the identity code will depend on at least one of four factors: Something the user knows: PINS, passwords, personal information Something the user has: tokens, smartcards, etc. Something the user is: Biometrics (iris scan, fingerprints, etc.) Something the user can recognize: Cognometrics (Passfaces) The goal of the process is to provide as much assurance as is necessary that the presenter of the proof of identity is the owner of the identity. Often, in order to achieve a higher level of assurance, factors are combined.
4 Within the context of a PKI, because user identity is core to its objectives, it is essential that great care be taken in the authentication process. Much effort and expense is undertaken initially to establish the identity of the user and to associate the user with his credentials, especially where high value transactions or legally protected information is at risk. Without high assurance that the user is present when the user s associated identity is presented to the system, the nonrepudiation of the activity that follows becomes problematical. Proof of possession of the private key known to the system and associated by the system to the user s identity is only part of the authentication process. A second factor is always used to establish that the presenter is in fact the owner of the identity. The Gartner 4 group frequently states in its reports and seminars, that they believe the ubiquity of the smartcard will facilitate more widespread use of public key-based services. Providing the user a secure trusted hardware device in which to store his private key adds credibility to his claim when he presents it to the system for use. The new Homeland Security Presidential Directive # 12, which mandates a common identification standard for all federal employees and contractors, makes the US Government a champion for this ubiquity. In the banking world, however, the high cost of issuing and managing smart cards for consumers still exceeds the expected loss from fraud. Cost is an issue in the subsequent user support and card replacement as well as in the initial deployment of any token. Another issue faced by physical hardware tokens and smartcards is that of owner responsibility. It will take time to educate persons that loss of the device, or of the secrecy of the PIN used to access it, could have potential privacy implications far in excess of the loss of a credit card. Further, if the device remains home on the dresser, its usefulness is questionable. Biometric access to the private key holds the same elusive promise. Iris scans are considered to be as near a perfect identifier of an individual as a biometric can claim. Fingerprint scans, although still suffering from unacceptable error rates, hold similar promise as an identifier. Here again the cost of the infrastructure is significant. And too, there is the issue of privacy. Biometric images need the same safekeeping as the sensitive data they may be used to access. Precautions must be taken that the image is never stolen. Making these assurances requires strong cryptographic protocols, trusted hardware, and secure servers. Even where the expense of hardware tokens is acceptable for a given solution, the use of a PIN or password is still the primary authenticator used to establish the presence of the token s owner. 4 Gartner is a recognized source of global market knowledge for the IT and telecom industries.
5 Password The community of security professionals has been predicting the end of password use for 10 years. In spite of all their faults, there are reasons why they persist: Intuitively, something you know conveys a strong sense of user presence, provided the something known remains secret. The associated cost is much lower than the hardware solutions utilizing the something you are proof. The cost of user education and management, estimated to run in excess of $100/user/yr, is still significantly less than the cost of anticipated hardware distribution, support, and replacement. Until now there has been an absence of a practical alternative. The fact that passwords are still the most popular means of authenticating the user's presence attests to the fact that scalability, cost, and usability pull hard against many multi-factor authentication solutions. Knowledge factors derive their maximum security when the known information is secret. Given the need to guard the privacy of person s individually identifiable information, this excludes the use of information that, by its repeated use, would no longer be private like mother s maiden name, place of birth, and social security number. Passwords and PINS, although theoretically excellent solutions, suffer from the fact that the human ability to recall randomly generated secure strings of information is almost non-existent. Those responsible for help desk activity will attest to the fact that even user-chosen passwords are regularly forgotten. The litany of rules for producing strong passwords have not changed since their inception and yet getting compliance from a user community remains a serious challenge. Training and password strength checkers have only taught the user community how to stay one step ahead of the rules. Another more egregious problem is the fact that users share passwords, write them down, and are susceptible to social engineering by would-be intruders. Security consultants, challenged with network intrusion tasks, are readily able to gain entry through social engineering. Most policies for resetting passwords through customer support do not adequately establish the identity of the person requesting the reset before providing the service! Any authentication protocol based on a user secret must preserve the confidentiality of the secret. This ideally is true for the token itself as well as for the transmission and storage of the token: Not readily lost, stolen, forgotten, or given away by the user Enough entropy to assure it cannot be guessed by a counterfeit on-line user Protected in transit to protect against off-line attacks Protected in storage on both the client and server side if resident and associated with personally identifiable information.
6 Passfaces TM Before speaking about the synergy of Passfaces and a PKI implementation, a few words on the Passface system are in order. The Passface TM personal authentication system works by exploiting the natural human ability to recognize human faces. When Passfaces are used for user authentication, the user is presented with a series of grids each containing 9 faces: one Passface and 8 decoys. Users authenticate themselves by identifying their passface in each grid a system-assigned face that they were introduced to (and familiarized with) at enrollment. A full description of the Passface System (and the opportunity to try it for yourself) can be found at Further explanation is also provided as an appendix to this document. The Passface System has important advantages over passwords: It is based on an innate ability to recognize a face rather than on a poor ability to recall a random alphanumeric string; It provides a consistent, quantifiable level of assurance. There are no weak Passfaces as there are weak user-chosen passwords; Knowledge of the user s preferences is of no assistance when guessing their Passfaces as the Passfaces are randomly assigned; Unless allowed by the system, the user cannot use the same authentication secret when enrolling in other applications since the alphabet of faces used for any application or service can be unique (i.e. exclusive to that system); It provides a user secret that is easy to use and yet virtually impossible to forget; Passfaces cannot easily be written down or passed on inadvertently; The Passface TM System is completely intuitive to use and works reliably for everyone irrespective of language, age or education; Help desk costs drop dramatically making Passfaces cost effective to employ. Passfaces TM and PKI In current PKI implementations, the authentication process is usually carried out as a two-factor process, using possession of the private key in a soft or hardware token as one factor and either
7 a password or a PIN as the second. This second factor is used to establish the presence of the credential owner. Passfaces offer a cognometric alternative that can more reliably establish that presence with all the scalability and low cost features of a password but without their shortcomings. This added reliability enhances non-repudiation. NIST, in its guidance for electronic authentication, SP , makes a clear distinction between the token that is used for authentication purposes and the credential that represents the identity to the system. Locally Stored Credentials Today, as security consciousness increases, storage of the private key on the local client has come under significant scrutiny. Reliability, as well as security, is at issue. The management of credentials stored on PCs that crash, that are susceptible to viruses and Trojan Horses, and that are easily replaced is to be considered. Even when encrypted, unless the secret used in the encryption process is remotely stored, the strength of the protection is questionable. All of these weaknesses detract from the benefits of non-repudiation that the infrastructure was built to exploit. In building a system that is forward-looking, lack of mobility also remains as another unresolved constraint in this implementation. Alternatively, the private key could be securely stored on a trusted hardware device such as a smartcard or USB dongle, locally kept by the person whose identity it represents. For corporate applications this second device could be an appealing solution because the USB port is standard equipment on virtually all PCs sold over the last few years. Unfortunately, even if the costs of these devices drop, this solution forces the user to be responsible for carrying a device with them (and not losing it) if mobility is required. Such dongles or smartcards also require software support within browsers if they are to be used with web applications. This increases the management/installation cost and restricts mobility. Access to the credential on the device continues to be a password or pin. In both of these scenarios Passface TM technology from Real User Corp produces an important improvement in the level of assurance provided by the authentication process. Passfaces TM are usually a server-based solution that offers users a usable, reliable second authentication factor as an alternative to the use of passwords. No secret information pertaining to the user is stored on the local client, only the Passface alphabet. The user can be independently verified as present through the user s knowledge of his Passfaces, before access to the credential is granted. The entropy is consistent (no weak sets of Passfaces) and Passfaces are not easily lost, stolen, forgotten, or given away. Passfaces are user s secrets that are system-assigned without compromising usability or the reliability sought to enhance non-repudiation. The Real User Anonymous Authentication Service Solution A critical factor that cannot be overlooked is the inability of the average user to understand the security issues surrounding the protection of his credential and therefore take responsibility for its care. This is a difficult issue in even the most security conscious of user communities. Users ARE a part of any system and the success of meeting the objectives for which the system was
8 designed, is dependent on successfully incorporating this most important fact. Today this has become even more critical because so many applications are being accessed from multiple locations such as the user s PCs at home and at work, his PDA, and his laptop. The value proposition here is designed to address user responsibility, manageability, mobility, and reliability as well as privacy and security. A forward-looking solution to these problems is to provide users with an online repository for their private keys and a simple, private, and secure means to access them. This can be achieved if a PKI credential repository is used in conjunction with the Real User Anonymous Authentication service. Assuring User Identity & Preserving Privacy in a PKI-based Application CREDENTIAL REPOSITORY SERVICE PKI SUPPORTED APPLICATION OR SERVICE REAL USER PASSFACE TM ANONYMOUS AUTHENTICATION SERVICE Figure 1. In figure 1, when a user is requested by an application to use his or her credential (1), the user will obtain his credentials by securely exchanging information with two separate servers. By presenting a token (this could be a cookie or a username) to the credential repository service (using SSL, SPEKE, or other secure protocols) (2), the repository service will securely deliver to the user the encrypted credential (3). Before the user can employ the credential, the user will present himself to the PassfaceTM authentication service. His anonymous, cognometric authentication (4) will permit him access to the key to decrypt the credential (5). By signing a token to the application, authenticated possession of the private key is revealed (6). Much attention is being given to protocols that generate strong secrets from weak passwords 5 for protection against off-line password guessing attacks. In all of this work, however, it is acknowledged that there is no implied remedy for the secrecy of the password in the hands of 5 See Server-Assisted Generation of a Strong Secret from a Password, Warwick Ford and Burton S. Kaliski, Jr., Proceedings of the Fifth International Workshop on Enterprise Security, IEEE, 2000, for content and references.
9 the user. This is the contribution of Passfaces TM. When protocols such as SPEKE and those proposed by Ford/Kaliski are implemented, Passfaces can be substituted for the passwords. The combination supports the mobility of today s user while giving protection against poor user password management as well as against the feasibility of offline guessing attacks. Key to the strategy depicted in Figure 1 is the independence of the authentication service and the centralized credential repository. Any connection between the two companies providing these services or any sharing of hardware, facilities or personnel would make possible (or at least create suspicion of) collusion. As depicted, only the legitimate owner of the credential would have temporary access to both the encrypted credential and the decryption key, thus lending credibility to claims of non-repudiation. The authentication service requires no personally identifiable information to be stored by the service. The account identifier is meaningless in the event there were a compromise of the authentication service. The account identifier is also used by the credential repository, where it is associated with the encrypted data. The anonymity provided by the separation of the authentication process from the repository of the encrypted data preserves the user s right to privacy. The use of Passface TM, the password alternative, strengthens the authentication process and increases the assurance that the owner of the credential is present during its use. By centralizing the secure repository of the credential and by separating the authentication of the user from it, several benefits are gained: Authenticated access to the credential is possible from multiple locations while retaining centralized storage locations. The authentication can be anonymous in the sense that the service requires no personally identifiable information to be known or stored with the token. This same service can securely deliver, using SPEKE or SSL, the key used to decrypt the credential. Anonymity also assures this credential-encrypting key remains unusable even in the event the authentication server is compromised. The encrypted credential, separately stored, is delivered from the repository to the user as a separate step. Use of the credential depends on the user s ability to decrypt it, which cannot occur until the cognometric Passface TM authentication step has transpired. This heightens the confidence that the user is present when the credential is used. The plaintext private key will only ever exist temporarily on the user s own device where it will be used to sign or decrypt data on their behalf. Any security compromise of either the PKI credential repository or Real User s authentication server alone would be insufficient to yield any private key to a potential attacker.
10 Conclusion Personal authentication is arguably one of the most important and certainly the most fundamental of IT security requirements: all other functions in this arena (such as access control, privacy protection, data confidentiality, digital signatures, etc.) rely on the ability to confirm a person's on-line persona for their successful operation. Even when possession of a private key on a secure token, such as a smart card, provides strong evidence of an identity, the token alone does not provide assurance that the presenter is the owner of the identity. For this a second factor is needed. Unfortunately, in practice, this personal authentication has been consistently the weakest link in the security chain. The vast majority of systems today still rely on passwords or PINs - in spite of their well-documented shortcomings. The primary reason for this continued reliance on passwords has been an absence of practical alternatives that provide scalable and cost effective solutions. Passfaces changes that. In any PKI implementation, as with any Identity Management obligation, the greater the assurance provided by this second personal authenticator, the lower the occurrence of fraudulent access to information and applications. Passfaces currently provides higher reliability than passwords, PINS, and biometrics in establishing the electronic presence of the owner of a PKI credential during its use. About Real User Real User Corporation is a resident of the Chesapeake Innovation Center in Annapolis Md. Real User s Passfaces technology, patented worldwide, is a cognometric method of personal authentication, based on the measurement of the innate cognitive ability to recognize faces. Our products offer businesses, government agencies and OEMs a uniquely strong, reliable and costeffective solution that can be rapidly deployed enterprise-wide to improve security and usability and generate an immediate return on investment. For more information about the above PKI strategy, the science behind Passfaces, or the line of products, visit us at or contact: Patricia Lareau V P Security Solutions Tel: , Cell: [email protected]
11 Try Passfaces : the unforgettable password!
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Server-Assisted Generation of a Strong Secret from a Password
Server-Assisted Generation of a Strong Secret from a Password Warwick Ford, VeriSign, Inc. (Joint research with Burt Kaliski, RSA Laboratories) Requirement! User who roams between client terminals needs
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
Why Password- Enabled PKI
Password Enabled Public-Key Infrastructure (PKI): Virtual Smartcards vs. Virtual Soft Tokens Ravi Sandhu Chief Scientist SingleSignOn.Net & Professor, George Mason University Mihir Bellare Chief Cryptographer
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities
United States Government Accountability Office Washington, DC 20548 August 10, 2004 The Honorable Tom Davis Chairman, Committee on Government Reform House of Representatives Dear Mr. Chairman: Subject:
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice.
U. S. Department of Justice Information Technology Strategic Plan Public Key Infrastructure at the Department of Justice White Paper * Introduction As part of its strategic plan, the Department of Justice
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks Whitepaper W H I T E P A P E R OVERVIEW Arcot s unmatched authentication expertise and unique technology give organizations
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
An NSTIC-Compliant Identity Ecosystem For Preventing Consumer Identity Theft
An NSTIC-Compliant Identity Ecosystem For Preventing Consumer Identity Theft Executive Summary Bob Pinheiro Robert Pinheiro Consulting LLC [email protected] This note proposes that emerging NSTIC-compliant
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, NIST Special Publication 800-63 Version 1.0.2 (dated April 2006), has been superseded and is provided here only for historical purposes. For the most current
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
What s wrong with FIDO?
Patented What s wrong with FIDO? Nikos Leoutsarakos Tiny bio Nikos has a Physics background and a M.Sc. in Computer science from McGill University in Montreal, Canada, where he lives with his wife and
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Clever Security Overview
Clever Security Overview Clever Security White Paper Contents 3 Introduction Software Security 3 Transport Layer Security 3 Authenticated API Calls 3 Secure OAuth 2.0 Bearer Tokens 4 Third Party Penetration
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
