An Enhanced Countermeasure Technique for Deceptive Phishing Attack
|
|
|
- Deirdre Morton
- 10 years ago
- Views:
Transcription
1 An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science (Autonomous), Pudukkottai, TamilNadu Assistant Professor, Head, Department of Information Technology, JJ College of Arts and Science (Autonomous), Pudukkottai, Tamilnadu Abstract: The trust on internet and e-banking are more affected and attacked by fraudulent activities performed by fake web sites. When their look and feel is similar to legitimate web sites users spoofed very much. Online criminal activity are using the collection of social engineering methods such as messages and s to make the users to disclose their sensitive information such as personal details, username password, etc. The strong techniques are required to avoid fraudulent fund attacks. In the proposed work Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the attackers. Multi Factor Authentication technique authenticates the users using user s finger print image recognition and secret question answer. After successful authentication of user using Multi Factor Authentication technique, session key generated using Gaussian distribution is sent to user s mobile phone. User proceeds with the transaction only after entering the session key received. Every time user attempts their authentication the counter measure will perform and made action when user attempt more than 3 times. By incorporating above mentioned techniques users can perform online transactions safely and securely. Keywords: Authentication, Phishing, MFA, Counter Measure, Banking. 1. Introduction Phishing is a social engineering attack where the attacker looks for weakness in the users and steals their personal information. The term Phishing originated from two words Preaching (hacking of Phone calls which are the earliest method of hacking). Previous work in the context of website phishing has shown that users tend to ignore the absence of security indicators and fall victim of the attacker. Consequently, the research community has deemed personalized security indicators as an ineffective phishing detection mechanism. Phishing attacks are classified in to 2 major types. Malware and deceptive phishing attacks. Malware phishing attack happens by installing the destructive software in the system of the user. In Deceptive phishing attacks, false s are sent to the user s inbox. one is through making the software strong enough to identify such fake s and websites and alerting the users. A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure content. The server determines whether the user is a member of the group using the identifying information of the user. If the user is a member of the group, the server decrypts the encrypted session key using a private key of the group, and causes the client device to obtain a session key to access the secure content. The purpose of this project is to develop a secure multifactor authentication that would provide high security in their own web-applications. The risks of using static passwords to authenticate users show more and more security risks with the development of hacking. Multifactor Authentication is the latest secure authentication technique. Since Single-factor authentications (SFA) have been used widely. It is not secure enough for online financial transactions. Single factor authentication has been around for a while now. Yet it s not enough for having any meaningful security. The solution is to have multi-factor authentication which includes following authentication factors: Username, Question Answer Verification, Image Authentication, Password.The security levels are increased by using multiple authenticating factors. Multi-factor authentication adds more Security because the user must provide more than one secret Entity i.e. the security question. 2. Related Work S. Manasa et al proposed, Multi Factor Authentication (MFA) technique used has four phases of authentication as shown in the above section. The MFA enhanced the security level of online bank transactions against phishing attacks. Hackers are prevented successfully to a large extent from accessing the legitimate user s transactions. The Gaussian distribution based session key generation also enhances the security of online bank transactions [1]. Niharika Guptaas et al proposed, Multi-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as an application and the other of which is typically something memorized, such as a security code or password. In this context, the two factors involved are sometimes spoken of as something you have and something you know. The need for encrypting Passwords comes from fact that we need to protect passwords of users. The users then will be prevented from attacks like brute force attack, phishing, Distributed Denial of Service (DDOS) through password encryption and multifactor authentication(via One Time Password and image security at registration).[2] Paper ID: SUB
2 Vyanktesh Dorlikar et al proposed the techniques began with Basic Authentication, which considers user name and password system to Multifactor Authentication which considers knowledge factors, possession factors and inherence factors. The Multifactor Authentication technique is most secured among discussed authentication modes. Other secured techniques such as Windows Authentication and Secured Socket Layer are developed and used in the internet or the system usage authentication. The authentication techniques in smart phones such as Biometrics, Facial Recognition, Voice Control access and location tracking are also developed and widely used in individual capacity along with organizational level [3]. B. Fingerprint Recognition A fingerprint is the group of ridges and furrows of all or any part of finger. Through various studies it has been observed that each person has its own fingerprint and doesn t change during whole life. Hence, they are unique for every individual. A fingerprint quality is damaged when, our fingerprint cuts or burns. But after some time it is come back in its original quality. So it is used for identification and verification of any persons and used by many organizations. Di Liu et al proposes a two factors user authentication scheme for Beijing medical registration platform, in order to safeguard user privacy information on the platform and protect against attacker abuse. The SMS-OTP solution is chosen as the optimal way for user authentication of the Beijing medical registration platform. This scheme helps the platform to make up user authentication process during user log on [4]. Amr Farouk et al present an investigation on the authentication mechanisms in grid computing environment. Authentication mechanism in grid computing environment has to be secure and robust, moreover it should fulfill the requirements of large scale distributed and heterogeneous grid computing environment [5]. 3. Proposed Work In proposed work, we proposed Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution with counter measure to reduce the attacks caused by the phishers. MFA technique authenticates the users using user s signature image recognition and secret question answer. The user needs to enter username in the bank s login web page; if it is matched the user is provided with exact registered user s signature image along with 3 altered signature images and is asked to select his correct signature image for authentication. If it is successfully matched, the user is redirected to answer the secret question which is known only to him. In the above 2 steps of authentication, user tries to attempt wrong credentials, his/her net banking account will be blocked. After successful authentication of user using MFA technique, session key is generated using Gaussian distribution and sent to user s mobile phone [6]. User proceeds with the transaction only after entering the session key received. In every time the counter measure will perform to measure the user authentication level. Finally, user successfully logs out after performing secure and safe transaction. Figure 1: System Architecture for Proposed System Fingerprint Modes: - It has two modes. Fingerprint Verification: - In this, two fingerprints are compare by using some methods and verify original fingerprint. Fingerprint Identification: - After verification, system automatically identify the person. In my thesis I have used both modes. Fingerprint Matching: - In fingerprint matching minutiae points are extracted from both the fingerprints and calculate the similarities between two fingerprint images. 4. Methodology Used A. User Authentication This is the first module of all applications which contains the user registration and login and administrator s login. In the previous stages, an unknown user also can block the valid user account without knowing the password of the account holder [7]. Figure 2: Fingerprint Template Paper ID: SUB
3 C. Generation of Random Numbers using Gaussian distribution Some existing methods for generating standard normal random numbers discussed in this section. A new algorithm to generate standard normal random numbers is also proposed and is named. Method-1: Sum of Uniform Random Variables The simplest way of generating normal variables is an application of the central limit theorem. The central limit theorem is a weak convergence result that expresses the fact that any sum of many small independent random variables is approximately normally distributed. Use of the central limit theorem on U(0,1) random variables provide a simple method for closely approximating normal random variants. The following algorithm is used to generate the standard normal variables [8]. This method requires 12 uniform random variables to generate a single standard normal random number. D. Counter Measure Meanwhile there are a lot of protection mechanisms against Phishing and online scammers. These proposals can roughly be separated into two categories: modifications of the traditional authentication and authorization-method (PIN/TAN) on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the procedure on the other hand [10]. Figure 3: User Authentication Figure 3 shows simple authentication that is user enter unique identifier, here is and secret password. This is most widely used method for authentication but this is not a secure. Password should be difficult to guess. So it is difficult to user to remember password. B. One-Time Password One-Time Password approach is similar to the simple username password. This method uses client side generator and server. Generator accepts a secret password from user and concatenates it with some information sent from the server in control of the authentication various computations and hashes are performed on the user s secret password which can be verified by computations by each end of the communication. This type of system can protect against passive attacks against which basic password systems maybe vulnerable. 5. Experimental Results Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories: Knowledge factors ("things only the user knows"), such as passwords Possession factors ("things only the user has"), such as ATM cards factors ("things only the user is"), such as biometrics A. Usernames and Passwords The most common method for user identification is username password. The idea behind this is user has a unique identifier and also one password, when user authenticates, user provides his unique identifier and password. The user is only one who knows the password, so he is authenticated. This approach is very simple as assigning a unique identifier and user supply password [9]. Figure 4: OTP Verification C. Fingerprint Recognition Biometric technologies are most commonly combined with a password or a token to produce a multifactor authentication system. Fingerprints are classified as physiological characteristics. The rate of movement, such as the pattern of typing on a computer keyboard is classified as a physical characteristic. During the enrollment process, a sample of data relating to the user s characteristics is gathered and stored in the biometric-based system as the template. Algorithm Input: Gray-scale Fingerprint image. Output: Verified fingerprint image with matching score. 1) Fingerprint is binarized 2) Thinning on binarized image 3) Minutiae points are extracted. Data matrix is generated to get the position, orientation and type of minutiae. 4) Matching of test fingerprint with template 5) Matching score of two images is computed, if matching score is 1 images are matched and if it is 0 then they are mismatched. Paper ID: SUB
4 unauthorized access then the information of the intruder are gathered and it is being sent to the administrator in the secure manner. From those details the intruder can be identified very easily and any further action performed by the intruder can be blocked thus preventing code injection. The details like IP address, hostname, date, time, path, etc., are reported. Figure 5: Fingerprint Region Grow Figure 8: Phisher Detection 6. Conclusion and Future Work Figure 6: Vector Prediction for Finger print Template D. Session Key Generation This is an authentication service that makes use of a Session Key in addition to the conventional ID and password for personal identification. User can use this Session Key for better security during online transaction by generating special password to their system. User can perform authentication by entering an Session Key displayed by the system application in addition to their normal ID and Password. The Session Key passwords are specific to each user, and a new password is generated every minute. Even if the password is obtained by a third party fraudulently, it cannot be used outside its lifetime. Multifactor authentication provides better security to customers by making use of more than one form of authentication to validate a transaction. Although not mandatory, banking services should consider the implementation of multifactor authentication as it provides better security for their customers using their online services. They must understand that the costs of providing the security may be compensated by customer confidence and smaller losses from thefts. Banking need to perform a risk assessment to determine the type of authentication required. However, institutions must take into consideration customer acceptance and the ease of development of the technology, as tokens may need to be distributed during enrolment. They need to be aware that criminals may simply switch to other forms of frauds that do not require usage of the internet. There are few areas in which the research is complete and this is no exception. The proposals made here depend on a number of assumptions as to the feasibility of creating the device and the cost of manufacture. Before any sort of deployment can be considered these are critical questions which need to be answered. From surveying similar technology it is likely to be possible, but that was not the focus of this research. Figure 7: Session Key Verification E. Countermeasure When the intruder tries to modify any data or create any malicious event, the intruder is not permitted to perform the activities since intrusion is done with unauthorized user name and password. If the changes are done with References [1] Securing Online Bank Transactions from Phishing Attacks using MFA and Secure Session Key by S. Manasa, P. Mullaimalar, G. B. Gnanaprakash Singh and S. S. Manivannan. [2] Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography by Niharika Gupta and Rama Rani. [3] A Survey on Authentication Techniques and User Recognition by Vyanktesh Dorlikar, Anjali Chandavale. [4] A Two Factor User Authentication Scheme for Medical Registration Platform by Di Liu, Zhi-Jiang, Zhang Ni Zhang. Paper ID: SUB
5 [5] Authentication Mechanisms in Grid Computing Environment: Comparative Study by Amr Farouk, Ahmed A. Abdelhafez and Mohamed M. Fouad. [6] Dhanalakshmi R, Prabhu C, Chellapan C. Detection of phishing websites and secure transactions. IJCNS. 2011; 1(11): [7] Belabed A, Aimeur E, Chikh A. A personalized whitelist approach for phishing webpage detection Seventh International Conference on Availability, Reliability and Security; 2012 Aug p [8] Chaudhari S, Tomar SS, Rawat A. Design, implementation and analysis of multi layer, Multi Factor Authentication (MFA) setup for web mail access in multi trust networks International Conference on Emerging Trends in Networks and Computer Communications (ETNCC); 2011 Apr p [9] Hazlewood V, Kovatch P, Ezell M, Johnson M, Redd P. Improved grid security posture through multifactor authentication th IEEE/ACM International Conference on Grid Computing (GRID); 2011 Sept p [10] Mohammed MM, Elsadig M. A multi-layer of multi factors authentication model for online banking services International Conference on Computing, Electrical and Electronics Engineering (ICCEEE); 2013 Aug p Paper ID: SUB
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Enhanced Security for Online Banking
Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Guidelines for E-mail Account Management and Effective E-mail Usage
Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
E-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Online Cash Management Security: Beyond the User Login
Online Cash Management Security: Beyond the User Login Sonya Crites, CTP, SunTrust Anita Stevenson-Patterson, CTP, Manheim February 28, 2008 Agenda Industry Trends Government Regulations Payment Fraud
Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Frequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication
mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication Enhanced security for your on-line banking activities. Beginning 24 January 2007 all mbank clients
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS
BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS TABLE OF CONTENTS BEST SECURITY PRACTICES Home banking platforms have been implemented as an ever more efficient 1 channel through for banking transactions.
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Authentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
TELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
