Enhancing Security by CAPTCHA based Image Grid Master Password

Size: px
Start display at page:

Download "Enhancing E-mail Security by CAPTCHA based Image Grid Master Password"

Transcription

1 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin*, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin *College of Information Science and Technology, Department of Computer Science, Peter Kiewit Institute, University of Nebraska at Omaha, 1110 South 67th Street Omaha, Nebraska , United States Jaypee University of Information Technology, Waknaghat, Solan , Himachal Pradesh, India s: {aditya187,amanpreetsarora, radhikamedury, shubh.naval, juitrajat, doi: /ijact.vol2. issue5.10 Abstract Identity theft, privacy invasion, loss of key information is the major reasons for which security is breached these days. Hence, it is very essential that effective security prevention measures are taken. This paper, proposes many such hacking prevention measures with approaches to recover a hacked account. It also puts forward a novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism, which can protect the crucial information even if the account is hacked. Keywords: CAPTCHA, Security, Image Grid Algorithm, Grid Generation Algorithm 1. Introduction and Motivation In this day and age, s are one the most extensively used modes of communication. People access s for personal and professional uses. In both the cases there is vital information that is being sent and received. With the advent of e-commerce, there is also a risk of losing money by fraud. account can be hacked by various means. Most widely used techniques are Keylogger software and a phishing page. Keylogger software pursues keys struck on a keyboard typically in a stealthy manner so that the person using the keyboard remains unaware that his actions are being monitored. Password is guessed by analyzing the recorded key strokes. It is mostly used on a public computer. Whereas a phishing page is a fake page looking like a website s login page. A user is allured to enter his username and password. Once the details are entered they are sent directly to the hacker. Hence, it is very necessary to take proper measures to make communication as secure as possible. We put forward the concept of an easy to remember image based Master Password, which will be used to generate a collage CAPTCHA thus making it safe from automated bots and humans. This master password is actually an image uploaded by the user, which will be presented as a collage CAPTCHA whenever required. A user will have to select his particular uploaded image i.e. the master password from the set of given images. If a wrong guess is made, the collage is generated again with changed image positions. There is a limit to maximum number of wrong attempts. Growing number of accounts being hacked and absence of any sound mechanism to recover the hacked account motivated us to look for alternative ways. Hence, we propose a few suggestions and the master password mechanism to existing Service Providers. To make it effortless for the user to memorize the password, we make use of an image as the master password. The rest of the paper is organized as follows: Section 3 and 4 provides suggestions and suggested methods and Section 5 and 6 provides Image Mining and Image Grid algorithms followed by Grid Generation Algorithm explained in Section 7 and supported by user survey explained in Section 8 followed by Conclusion and References

2 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin Figure 1. Initial password recovery form in Gmail. It asks for various problems and leads the user accordingly. 2. Literature Survey Figure 2. Password recovery form in Windows Hotmail. A study of various research papers was done on CAPTCHAs [1-12], security, computer networks, image mining and image segmentation. Starting with the papers and study material on computer networks and security, a study of latest security mechanisms employed by major service providers (ESPs) was done. We also logged onto major services like Yahoo, Gmail and MSN. Various loopholes were found in their password recovery systems. Presented below (Figure 1-6) are the screenshots of Gmail, Hotmail and Yahoo Mail; these were studied as part of the literature survey to discover the ubiquitous but overlooked flaws in the existing system. A case study has been done to recover a lost password on Yahoo Mail. Few flaws were found in the existing system and to overcome these flaws finally the Master Password Mechanism is suggested by us. Beginning with Figure 3, it shows the Yahoo page when the user clicks on the Forgot My Password/ID/Cannot Login link. This figure demonstrates the various ways in which to begin the password recovery process. Next to follow is Figure 4, wherein the user is asked to enter the secondary address. This part of the password recovery process has a flaw that in case the hacker changes the secondary address of the user, will not be able to retrieve his password. Figure 5 follows with security question. Here also the same problem (as discussed with previous figure) might occur that the hacker may change user s security question as well. If in case user enters the information asked in Figure 4 and Figure 5 correctly then password can finally be renewed as shown in Figure

3 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 3. Initial password recovery form in Yahoo. It asks for various problems and leads the user accordingly. Figure 4. An alternative address is asked for password recovery. This step is not useful in case user s secondary ID is changed by the hacker. Figure 5. A security question is asked for password recovery. This step is not useful in case user s security question is changed by the hacker or the user forgets the answers

4 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin Figure 6. The final step where the password is changed. Subsequently, we have studied about CAPTCHAs in which a reverse Turing test is used to thwart the automated bot attacks to crack the passwords. CAPTCHA is basically a type of challengeresponse test used in computing to ensure that the response is not generated by a computer [11]. The most common form of CAPTCHAs are randomly generated images containing codes that are to be manually entered. A machine cannot decode the intentionally distorted letters and numbers. Also we have suggested a CAPTCHA based master password. To create the Master Password, we have used image mining and image segmentation algorithms. Image mining, a broader view of data mining technique can help us find meaningful relationship among various images generated by the image mining algorithm [2]. It is more than just an extension of data mining to image domain as it requires expertise in computer vision, image processing, image retrieval, data-mining, machine learning, database, and artificial intelligence for perfect retrieval. Image mining is rapidly gaining attention among researchers in the field of data mining, information retrieval and multimedia databases because of its potential in discovering useful image patterns that may push the various research fields to new frontiers. According to the image mining technique given in the research paper, various image descriptors/region descriptors can be assigned to an individual image after successfully mining through Figure 7. A screenshot taken from showing the record of last 5 IP addresses from where the account was last accessed. It also shows the time details

5 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 8. This figure explains the proposed way in which Master Password could be implemented. Here Master Password is used to open a locked folder. the segmentation algorithm. These region descriptors are very useful in finding different types of images from a large database [4]. A way of image mining is to rely on the automatic/semi-automatic analysis of image content and to do the mining on the generated descriptors. For example, color, texture, shape and size can be determined automatically. Objects in an image can be determined by the similarity of those attributes. After getting a collection of images from image mining algorithm, the task to be done is to choose the relevant images that are necessary for that particular application. This is known as the Refinement Process. It uses the concept of Association Rule Mining technique of databases. For example, the support and confidence parameters can be used here for getting the relevant images. The image form of password is easy to remember than the usual textual passwords. Images also have more scope than text in real world entity as it is said that A picture is worth a thousand words, therefore, mining images for the purpose of having different combinations of master password would definitely increase the complexity of cracking the password and therefore, fulfilling the aim of the research paper. 3. Suggestions for Service Providers 3.1. Safety Measure Prior to Account being Hacked Service Providers (ESPs) maintain a record of the IP address accessing the account. It can be done at the time of creation of the account that user is asked a question (given below) From where do you access this account? 1. Home/Office 2. Public Place (Internet Cafe) 3. Both If the answer to the above question is a i.e. the account is used from home/office then there must be a fixed IP address of these places provided to user by the ISPs (Internet Service Providers). Hence those particular IP addresses are recorded in the database. In case the account is being opened consistently from a new IP address then the user is alerted by a message and is authenticated by answering a security question or entering the master password. If the answer to the above question is b then user is not warned at all even if many different IP addresses are accessing the account. He s advised to uncheck the stay signed in checkbox while logging in and logout from the account when done. Timed auto logout feature can also be used in

6 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin which user is automatically logged out from the session after a certain amount of time. If the answer selected is c i.e. both, then also the procedure as explained in option b shall be followed. Another safety measure could be to lock the folders/labels prevalent today in most of the services. Locking shall be done by the master password How to Retrieve an Account after it is Hacked? There are following existing ways to recover a hacked account: 1. Secondary ID: An having the information about how to reset your password is sent to user s secondary id. 2. Security Question: User can answer the security questions filled by him while creating the account in order to retrieve his password. Mobile Phone: User s new password is sent as an SMS to the mobile number mentioned in user s account. 3. However, all the above three details can be changed by the hacker; hence user cannot recover his account by merely adhering to above-mentioned ways. 4. Proposed Mechanism 4.1. Understanding a CAPTCHA A CAPTCHA [7,11] is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. It is imperative these days to thwart any brute force attack launched by automated bots to prevent account. We have clubbed a CAPTCHA along with a password known as Master Password. This Master Password is actually an image uploaded by the user. With the help of 2 algorithms we create a collage CAPTCHA, containing the master password. A user will be presented this CAPTCHA to recover a hacked account, to reset password or to view the contents of any locked folder

7 International Journal of Advancements in Computing Technology Volume 2, Number 5, December Our suggested method uses an Image-Mining algorithm along with a Image Grid Algorithm. Here s the whole process in short is explained: 2. User uploads any 1 personal picture, specially of any object/pet. This image is the Master Password. 3. Image Mining Algorithm looks for similar (not exact) images and generates a pool of images. 4. Image Grid Algorithm makes a collage of these images. It will be a grid of say, 4 x 4 images consisting of 1 actual image uploaded by the user and 15 similar images from the image pool, which is generated by the Image mining algorithm. 5. This grid of images (Collage CAPTCHA) will be used to ask for the Master Password whenever it is required. 6. Master Password can be used to lock the folders or to recover a lost account. 5. Image Mining Algorithm 5.1. Segmentation Image segmentation is an initial and vital step in a series of processes aimed at overall image understanding. The image is segmented into various regions. The purpose of segmentation is to partition an image into meaningful regions with respect to a particular application. Here we segment images into regions identifiable by region descriptors. The segmentation is based on measurements taken from the image and might be greylevel, color, texture, depth or motion Searching Images based on various Region Descriptors According to the varied regions of the above mentioned image, we tend to find the related object images which are similar to it. Compare objects in one image to objects in every other image. In this algorithm we propose to find the images which are having the same objects as that of our segmented image Refining the Search Operation Based on the main region descriptor, we tend to make our search more specific by eliminating all the images found so far that are not associated with it with the help of some associations rule in data mining. Explanation of flowchart- The first step is to select an image for segmentation. The image which is uploaded as a master password is used as the input to the segmentation algorithm. Here we have uploaded a cat image as the master password (Refer Figure 9: highlighted using red box). This image is used for segmentation. Now, we segment the image into various region descriptors i.e R1,R2.Rn where Ri is the ith region descriptor. Let us assume that the cat s face is described by resgion descriptor R2 (main region descriptor) and other portions of image like background and cat s remaining body by R1 and R3 respectively. Now, we search for the different type of images based on these region descriptors from a centralized database having collection of different types of images. This would result with a collection of different types of images. Now, based on our main region descriptor i.e R2 (cat s face), we further refine our search by the help of association rule data mining technique to obtain different cat images. Here, we have assumed that after refinement is over, we will be getting around 16 images that are relevant to the main image (Master Password). Now, These images are used as the input to the Grid making algorithm [2]. 6. Image Grid Algorithm

8 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin 1. Set a Static Image Grid: We intend to create a grid of images, say of 6 images out of the images collected using the image mining algorithm previously explained. These images need to be cropped to a maximum height and width of 500 pixels, say. 2. Leave Margins so as to wrap the Images Nicely: Place a bit of margin on the right and bottom edges to add a bit of whitespace. 3. Align the Photographs: Image grids look best when the photographs are both vertically and horizontally centered. 4. Adding the Slider: To set up the slider, by adding some JavaScript. 7. Grid Generation Algorithm var i, j, counter=0; var a[4][4]; //selecting 16 random images from the set of 5000 images for(i=0; i<4;i++) { for(j=0; j<4;j++) a[i][j] = rand(0,4999); } im = rand(0,15); $_SESSION['mpwd'] = md5($im); //Code for generating the image grid var counter = 0; for(i=0; i<4;i++) { for(j=0;j<4;j++) { if(counter = = im) { //display the master password image of the user stored by him at the time of registration counter++; } else { //display the random images previously determined counter++; } } } The algorithm was implemented using PHP. It makes use of mt_rand() function to extract random images from a pool of 5000 images which were previously generated by the image mining algorithm. Here, randomly 16 images are selected which constitute the image grid. User s master password is also assigned a random location and is encrypted by md5() hashing algorithm. This encrypted location of user s password is stored in a session variable which is later used to check the correct answer

9 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 9. A sample 4 x 4 collage. It is formed from the image pool generated by the master password image of the user. 2 Algorithms were used. Each time the page is a refreshed image changes their position. 8. User Survey A user survey was conducted to test the ease and feasibility of this technique. The technique was implemented using PHP and was hosted over intranet on our webpage. A test pool of 1000 images was created to randomly generate the image grid. On every page refresh set of 16 new images was displayed out of which 1 was user s own master password image. Selected users were sent invitations to participate in the survey. The registered users chose the right answer with 90% accuracy in first attempt and with 95% accuracy in second attempt. Along with this a poll was posted over the webpage, in which around 83% of the users found this better than the text based CAPTCHAs. Also, a certain set of users were asked to crack the password without knowing the answer to check for the security of the technique. On an average, 89% of the people could not guess the answer. They tried refreshing the page and look for a common image to guess the answer but few images repeated themselves, thus making the guess work difficult. To further improve the efficiency of this method, a larger grid could be deployed. 9. Conclusion security can be enhanced by following the suggestions mentioned in the paper. Clubbing of CAPTCHA with password saves time and effort, increases the ease of use and is decently effective in thwarting both human intrusion and bot attacks. If the proposed mechanism is incorporated by existing service providers then security would be greatly enhanced. This will also build a confidence in novice users, business professionals and administrators who store key information in their accounts. Hence, an efficient way to protect and recover hacked account is put forth. Future holds great possibilities only if cyber crime is checked by augmenting internet security. 10. References [1] R. Gossweiler, M. Kamvar and S. Baluja, What s Up CAPTCHA? A CAPTCHA Based on Image Orientation, In Proceedings of the 18th international conference on WWW, pp , [2] C. Ordonez and E. Omiecinski, Image Mining: A New Approach for Data Mining, Georgia Institute of Technology, CC Technical Report; GIT-CC-98-12, pp.1-22,

10 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin [3] W. Hsu, M.L. Lee and J. Zhang, Image Mining: Trends and Developments, Journal of Intelligent Information Systems 19(1), pp. 7-23, [4] P. Stanchev, Using Image Mining for Image Retrieval, In Proceedings of the IASTED conference on Computer Science and Technology, pp , [5] S. Yardi, N. Feamster and A. Bruckman, Photo-Based Authentication Using Social Networks, In Proceedings of the 1st Workshop on Online Social Networks, pp.55-60, 2008 [6] Y. Rui and Z. Liu, Excuse Me, But Are You Human?,In Proceedings of the 11th ACM International Conference on Multimedia, pp , [7] L. Ahn, M. Blum, N.J. Hopper, and J. Langford, CAPTCHA: Telling humans and computers apart, In Advances in Cryptology: Lecture Notes in Computer Science, pp , [8] R. Agrawal, T. Imielinski, and A. Swami, Mining Association Rules between Sets of Items in Large Databases, In Proceedings of the ACM SIGMOD International Conference on Management of Data, pp , [9] S. Belongie, C. Carson, H. Greenspan, and J. Malik, Recognition of Images in Large Databases using a Learning Framework, Technical Report TR , U.C. Berkeley, CS Division, pp. 1-8, [10] L. Ahn, M. Blum, N.J. Hopper and J. Langford, CAPTCHA: Using Hard AI Problems for Security, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294, [11] L. Ahn, M. Blum and J. Langford, Telling Humans and Computer Apart Automatically, Communications of ACM 47, pp , [12] S. Li and H.Y. Shum, Secure Human-Computer Identification (Interface) Systems against Peeping Attacks (SecHCI): A Survey, Technical Report, pp.1-53,

SECURING SELF-SERVICE PASSWORD RESET

SECURING SELF-SERVICE PASSWORD RESET SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

How do I enroll in the password portal?

How do I enroll in the password portal? The self-serve portal is designed to allow you to change your password and unlock your locked account even if you have forgotten your password. You must enroll for this service to be able to use it. You

More information

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Security Information Management System

Security Information Management System Commonwealth of Kentucky Security Information Management System User Guide Release 1.8 February 2016 DISCLAIMER: The Commonwealth is in process of securing a service to allow use of mobile phone numbers

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Your Blueprint websites Content Management System (CMS).

Your Blueprint websites Content Management System (CMS). Your Blueprint websites Content Management System (CMS). Your Blueprint website comes with its own content management system (CMS) so that you can make your site your own. It is simple to use and allows

More information

Comparative Analysis of CAPTCHA Based Techniques : A Review

Comparative Analysis of CAPTCHA Based Techniques : A Review 79 Comparative Analysis of Based Techniques : A Review Jaswinderkaur Department of Computer Engineering Punjabi University, Patiala [email protected] Lal Chand Panwar Department of Computer

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

How Board Members and State Employees Utilize the Security Portal to Access PDMP. July 30, 2014 Version 2 Software Release Version 3.4.

How Board Members and State Employees Utilize the Security Portal to Access PDMP. July 30, 2014 Version 2 Software Release Version 3.4. How Board Members and State Employees Utilize the Security Portal to Access PDMP July 30, 2014 Version 2 Software Release Version 3.4.11 Table of Contents How to Access PDMP via the ADPH Security Portal...

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted...

Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted... Netigate User Guide Setup... 2 Introduction... 5 Questions... 6 Text box... 7 Text area... 9 Radio buttons...10 Radio buttons Weighted...12 Check box...13 Drop-down...15 Matrix...17 Matrix Weighted...18

More information

A puzzle based authentication method with server monitoring

A puzzle based authentication method with server monitoring A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T. Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages

More information

MJPEG Camera Client User Manual

MJPEG Camera Client User Manual MJPEG Camera Client User Manual CONTENTS User Manual 1 WELCOME... 3 1.1Features... 3 1.2Installation Requirements... 3 1.3 Software Installation... 3 2 Software Operation... 5 2.1 Tab bar... 6 2.2 Device

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

DKIM Enabled Two Factor Authenticated Secure Mail Client

DKIM Enabled Two Factor Authenticated Secure Mail Client DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department

More information

Distributor Control Center Private Label/Channel Administrators

Distributor Control Center Private Label/Channel Administrators March 13, 2014 Distributor Control Center Private Label/Channel Administrators Version 2.6.3 Everyone.net Table of Contents Distributor Control Center... 1 1 The Distributor Control Center... 4 1.1 Introduction...

More information

Integration of Sound Signature in 3D Password Authentication System

Integration of Sound Signature in 3D Password Authentication System Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer

More information

CMP3002 Advanced Web Technology

CMP3002 Advanced Web Technology CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...

More information

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath

More information

Multi-factor Authentication Security Enhancement

Multi-factor Authentication Security Enhancement Multi-factor Authentication Security Enhancement Contents Overview of Multi-Factor Authentication... 4 Establishing a First Mercantile Multi-Factor User Account... 5 Authentication Questionnaire... 8 Secondary

More information

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering

More information

A secure email login system using virtual password

A secure email login system using virtual password A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

Penetration Testing: Lessons from the Field

Penetration Testing: Lessons from the Field Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five

More information

1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?

1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information? Troubleshooting and Frequently Asked Questions FollowMyHealth Patient Portal 1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?

More information

EUROPEAN COMMISSION Directorate-General for Education and Culture

EUROPEAN COMMISSION Directorate-General for Education and Culture EUROPEAN COMMISSION Directorate-General for Education and Culture Lifelong Learning: policies and programme Coordination of the "Lifelong learning" programme ECAS User Manual The European Commission Authentication

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Layered security in authentication. An effective defense against Phishing and Pharming

Layered security in authentication. An effective defense against Phishing and Pharming 1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered

More information

Setting up a Personal Email Account

Setting up a Personal Email Account Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date

User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date: July 22, 2015 TABLE OF CONTENTS Page TRUST SAFETY ACCOUNTING UPLOAD USER GUIDE... 2 BACKGROUND... 2 HOW TO USE THE

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

Securemail User Guide

Securemail User Guide Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail

More information

Topic: ACE Initial Account Access

Topic: ACE Initial Account Access What s Inside: Account Creation Automatic e-mail Page 1 Password Retrieval Page 2 Initial Login Page 3 Creating New Password Page 4 Changing Password Page 6 Login Failure Page 6 Additional ACE Resources

More information

Frequently Asked Questions

Frequently Asked Questions Barclaycard Spend Management Frequently Asked Questions Access/Login 1. Is the user name case-sensitive? The user name is not case-sensitive. It must be a minimum of 6 characters and up to 100 characters.

More information

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms PhoneCrypt Desktop Phone Encryption Software PhoneCrypt Manual Mobile phone encryption for Windows Platforms Introduction Contents http:// www. securstar.com [email protected] 2009 by SecurStar GmbH,

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

User Guide. Active Online Backup - Secure, automatic protection

User Guide. Active Online Backup - Secure, automatic protection Active Online Backup - Secure, automatic protection 1. Quick Setup... 1 2. Backup Selecting Folders and Files... 2 3. Backup - Changing Selected Folders and Files... 3 4. Checking on Your Backups... 4

More information

Vico Licensing Management System User Guide

Vico Licensing Management System User Guide Vico Licensing Management System User Guide Table of Contents Introduction to Vico Licensing Management System... 3 Login and Password... 3 Account Details Page... 4 Vico Contact Tab... 5 Account Details

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Zipit Chat. Functional Specification / User Manual

Zipit Chat. Functional Specification / User Manual Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

TMD Friction IT Helpdesk

TMD Friction IT Helpdesk TMD Friction IT Helpdesk USER MANUAL TMD Friction UK, MIS Department Published: Monday, 09 January 2012 2:30 PM Contents Our global helpdesk Creating your new account My home screen My Profile I need help

More information

Maryland MESA Database School Coordinators Login and Registration Training Handout

Maryland MESA Database School Coordinators Login and Registration Training Handout Maryland MESA Database School Coordinators Login and Registration Training Handout The following information will assist users in creating a user profile in the database, managing student profiles for

More information

What s the difference between my Home Banking password and my Enhanced Login Security?

What s the difference between my Home Banking password and my Enhanced Login Security? Common Questions about Enhanced Login Security 818-973-4900 or 800-973 - 4989 Mon. - Fri. 8:30 a.m. - 4:00 p.m. Enhanced Login Security is a new online security feature that will provide you additional

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,

More information

Creating an e mail list in YahooGroups

Creating an e mail list in YahooGroups Creating an e mail list in YahooGroups Creating an e mail list in Yahoo Groups is easy to do. Just follow the steps below and your group will be created in a matter of minutes. Why use Yahoo Groups? First,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

Secure E-mail. Using Cisco Secure E-mail Server

Secure E-mail. Using Cisco Secure E-mail Server Secure E-mail Using Cisco Secure E-mail Server Background The UnitedHealthcare secure e-mail system is offered through Cisco Secure Server and is used to securely exchange information with providers. This

More information

Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website

Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Office of Disability Adjudication and Review October 2011 Representative Guide for Electronic Records

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

The anatomy of an online banking fraud

The anatomy of an online banking fraud The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Managing your e-mail accounts

Managing your e-mail accounts Managing your e-mail accounts Introduction While at Rice University, you will receive an e-mail account that will be used for most of your on-campus correspondence. Other tutorials will tell you how to

More information

Preparing your Domain to transfer from Go Daddy

Preparing your Domain to transfer from Go Daddy Preparing your Domain to transfer from Go Daddy Before you can transfer a domain: Getting Started Disable domain privacy. If the privacy service forwards incoming email, check the ʻforward toʼ contact

More information

How To Create A Digital Signature And Sign A Document With Adobe Reader XI

How To Create A Digital Signature And Sign A Document With Adobe Reader XI How To Create A Digital Signature And Sign A Document With Adobe Reader XI jhigbee 12/05/2012 How To Create A Digital Signature In Adobe Reader XI (1) Open Acrobat Reader XI and navigate to the Preferences

More information

FORWARDING EMAIL (directed to a non-gcccd email account) Revised 3/22/13

FORWARDING EMAIL (directed to a non-gcccd email account) Revised 3/22/13 FORWARDING EMAIL (directed to a non-gcccd email account) Revised 3/22/13 FORWARDING FROM OUTLOOK WEB ACCESS (easiest method) You can setup your email to auto forward to a non-gcccd account such as Yahoo,

More information

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT

More information

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services

More information

How to Apply for Employment Opportunities

How to Apply for Employment Opportunities How to Apply for Employment Opportunities Viewing job postings Visit www.stcatharines.ca and click on the Employment Opportunities button. Our Careers page will then be displayed. On the Careers page there

More information

The Real State of WiFi Security in the Connected Home August 25, 2015

The Real State of WiFi Security in the Connected Home August 25, 2015 The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing

More information

Secure Email Actions for Email Recipients

Secure Email Actions for Email Recipients Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30

More information

(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.

(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping. Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,

More information

Password Depot for ios

Password Depot for ios Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges

More information