Security and Privacy Risks of Using Address as an Identity

Size: px
Start display at page:

Download "Security and Privacy Risks of Using E-mail Address as an Identity"

Transcription

1 Security and Privacy Risks of Using Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US {hatakabi, Abstract More and more websites are allowing or requiring users to input their addresses to be used either as identities or for other purposes. Although username-based identity and password problems resulting from user behaviors have been a research focus for quite some time, the serious issues related to using address as an identity and the associated online behaviors of users have not been well investigated in the literature. In this paper, we discuss and analyze security and privacy problems resulting from the use of address as identity via well-designed user behavior survey and by investigating website s design schemes. Our results illustrate that using address as an identity poses high security and privacy risks. This is mainly because of the multiple usages of addresses and users improper online habits. Moreover, we discuss the drawbacks of existing solutions for address as identity and related password problems, and present two potential solutions that may secure online identity management systems in future. Keywords- address identity; authentication; security I. INTRODUCTION The rapid development of Internet-based applications and services has made websites a crucial part of our lives. More and more users are using online office services (e.g Google Doc) instead of desktop office software, online social services (e.g Facebook, Linkedin) to engage in social activities, online information boards (e.g Twitter) to post their business products, and online shopping (e.g Amazon) to do their purchasing. However, the security and privacy problems have also grown along with these newer and open Internet applications. In order to use the online services and applications, users typically need to create accounts including usernames and passwords. The username-based identity and the related password problems because of online user behaviors have been a focus of research studies for quite some time [1-4]. Florencio et al. report the results of a large-scale study of password usage habits, where they discuss and analyze the password sharing rate among sites, password usage and strength [1]. They also emphasize that it is better to increase the strength of usernames rather than passwords as it is more effective in defending against bulk guessing attacks than attacks that focus on compromising passwords [2]. Perlman et al. summarize the existing problems of username-based identity and password schemes, including the problems related to use of the same usernames and passwords in multiple websites [3]. Just et al. investigate the users behaviors related to how they select or design secret questions and answers when they register accounts [4]. Their results show that the poorly-chosen questions and answers would weaken the security in user accounts. However, the serious issues related to using address as an identity and related users behaviors have not been well investigated. address as identity is becoming more common and may soon replace usernamebased identity as it has the following advantages: It is easier for a user to remember his addresses than different usernames. A user may easily apply one of his addresses as identity for multiple websites; hence, he only needs to remember one identity rather than multiple username-based identities. Web service providers find it more convenient to contact users using addresses that are collected during the account registration phase. For example, communication as a confirmation and tracking method is important for online shopping websites, such as Amazon and Ebay. Users are able to get or reset their passwords via when they forget them; this approach is regarded as convenient and safe by online service providers. Because of the benefits mentioned above, many websites allow and some even require users to use their addresses as identities in their login pages. However, using address as an identity introduces severe security and privacy risks. In fact, an address identity can potentially expose more private information to the public than the username-based identities, thus introducing significant privacy concerns. Such concerns arise because an address identity, in addition to representing a unique ID, also reveals the user s address details (e.g., login name, domain name, etc.). For instance, if a user has an e- mail address identity mary@gmail.com in one website, it reveals the fact that she has an account named mary in the Gmail service. Therefore, once a user s addresses or address identities have been compromised, it may put his other related accounts at a higher risk. In this paper, we focus on the security and privacy issues related to the using of address as identity. We illustrate how serious they are becoming, identify potential attacks to address identity systems and analyze the extent of damages such attacks may cause. We present the results of our survey which was carried out to investigate users behaviors in using address as an identity. We

2 also investigate popular websites account design schemes to see how they address security and privacy issues related to users addresses. Based on our user survey and investigation of online sites, we show that the security and privacy problems of using address as identity are not caused only by user behaviors but also by the design schemes used by the websites. We demonstrate that the use of address as identity poses a higher risk to users online accounts and may result in more breaches of security than username-based identity. This is mainly due to the multiple usages of addresses, such as for identification and communication. We also argue that using address as an identity cannot be a secure solution for users because users share their identities and passwords in multiple websites such sharing behavior can put all of the user s accounts at a higher risk when any one of his accounts used as identities is compromised. The key contributions of this paper are as follows: To the best of our knowledge, this paper is the first investigation related to the using of address as identity for websites. Based on our survey and investigation results, we demonstrate the high security and privacy risks of using address as an identity by showing different threats resulting from such behaviors. We present the drawbacks of existing solutions for e- mail address identity (and the related password problems), and propose suggestions for users to better protect their address identities. We also discuss potential solutions that may secure identity management systems. The rest of the paper is organized as follows. Section 2 introduces our methodology for the user behavior survey and website investigation. In Sections 3 and 4, we analyze the results of our user behavior survey and present the investigation of websites, respectively. In Section 5, we discuss existing solutions for the identified security and privacy problems, their drawbacks and introduce possible approaches. In Section 6, we present our conclusions. II. METHODOLOGY Our survey is focused on investigating users behaviors related to the use of their addresses. The survey includes 74 participants who responded to the survey via e- mail. The participants are graduate students in the School of Information Sciences at the University of Pittsburgh (USA) and the School of Software in Tsinghua University (China). In order to collect information about users behaviors in using addresses, we designed a questionnaire and asked each participant to carefully read the questions and answer them. The questionnaire included 27 questions about using addresses in general, using addresses when registering in different websites, using the same passwords for different address identities, etc. The questions were in the form of multiple choice and yes/no questions. Particularly, we were interested in the following user s behavioral information: Use of addresses: we focus on the following questions: how many addresses each participant has; how many participants addresses, divided by primary and non-primary, are used during website registrations; do the participants use the same passwords for their accounts and address identities in other websites; etc. Username preferences for accounts: we gather information of participants preferences with regards to using the same username for their accounts. Capability of remembering passwords for address identities: we examine the pairs of accounts/identities and passwords participants can remember. We collected quantitative data through the survey and used it to analyze the relationships between users behaviors and potential security and privacy problems related to these behaviors. In order to analyze the data, we designed a table that includes a code for each question and the corresponding number of possible answers. Note that the survey participants are graduate students in the computer science field. Hence, they represent a fairly expert IT group and can be assumed to have a deeper understanding of security and privacy issues than general users. Although our participants are not completely representative of the community in general, this group has its own advantages. First, these participants can be expected to be more involved in online services. For example, they are more likely to share their information with his friends online. As a result, we can obtain more detailed data about users behaviors. Second, because of their background, we believe that they are better positioned to answer our survey questions. While the results of our analysis are focused on participants who might be more aware of IT issues, we can easily assume that any bad behaviors would be potentially much worse for the general population who might be less aware/educated about security issues. In addition to users behaviors, another factor that may cause security and privacy issues when using online services and applications is how websites are designed. To this end, we have investigated popular websites to examine the security and privacy risks caused by account design schemes used by the websites. We have tried to infer how users private information is stored in these websites. Based on the inferences, we have demonstrated that users accounts in different websites have a high risk of being compromised when their accounts or address identities in some sites are compromised and passwords are exposed, because users may have used the same address identities and passwords in multiple sites. In the study of websites, we examined 94 popular websites that can be categorized into different types of online services, such as shopping websites (e.g Amazon and Newegg), social networking websites (e.g Facebook and Linkedin), financial websites (e.g Paypal), etc. In our study, we specifically examined the registration, login and password recovery processes. We collected information related to the following three components of each website:

3 Website's registration scheme: we focus on what types of users information is requested during registration. Types of identities: we look at what kinds of identities are supported by the websites. Password recovery schemes: we examine what types of password recovery schemes are applied by the websites. The questionnaire, user behavior statistic reports and analysis report of websites are available in the URL mentioned in [5]. III. USE OF ADDRESS AND RELATED SECURITY AND PRIVACY ISSUES In this section, we illustrate and analyze the result of our user behavior survey and discuss various security and privacy problems related to the use of address. A. Use of Address Number of Accounts and Popular Services The survey results show that all of the participants adopt as their main medium to communicate with others. More than half of them have between 1 and 3 accounts; the remaining have more than 4 accounts. However, most of the participants (nearly 95%) only use 1 to 3 accounts. The survey also shows that 82.4% of the participants use Gmail as one of their primary accounts; 13.5% and 5.4% of them use Hotmail and Yahoo Mail, respectively, as one of their primary accounts. And, 55.4% of the participants use other addresses, such as their company addresses as their primary e- mail accounts. Primary Addresses Figure 1 demonstrates that 67.6% of the participants use their primary addresses while registering on other websites. These addresses are used by online services as identities to contact users for various purposes such as notifications, shopping confirmations and password recovery. Figure 2 illustrates the distribution of the websites where the primary addresses of the participants are used. 43.2% of the participants use their primary addresses on shopping websites (e.g Amazon, Ebay and Newegg); 51.4% of them employ their primary addresses on financial websites (e.g Paypal and Citibank); 66.2% of them use their primary addresses on social networking websites (e.g Facebook and Twitters) and 25.7% of them adopt their primary addresses on other websites. Figure 1. Use of Primary Address Florencio et al. have shown that participants use the same passwords on average in 3 different websites [1]. In our survey, we also investigate how many participants use their accounts passwords on other websites where their e- mail addresses are used as identities or for other purposes. As shown in Figure 1, of the 67.6% of the participants using their primary addresses during registration, 66.0% (20.0%+46.0%) of them share at least one of their primary e- mail accounts passwords with the address identities on other websites. In particular, 20.0% of the participants use one password for their primary accounts and address identities on multiple websites. Only 34.0% of these participants claim they use their primary addresses for website registration processes, but never use the same passwords of their primary addresses for the address identities on multiple websites. Other Websites 25.7% 66.2% Social Websites Financial Websites Shopping Websites 43.2% 51.4% 0% 10% 20% 30% 40% 50% 60% 70% Figure 2. Distribution of Primary Addresses Used in the Websites Non-Primary Addresses Although 32.4% of the participants (see Figure 1) never use their primary accounts on other websites, all of these participants employ at least one of their other addresses for website registrations; this may be because some websites, such as Amazon and Facebook, only support address identity. Compared to the impact of sharing the same passwords between primary addresses and the corresponding address identities, our survey results (see Figure 3) demonstrate that participants are at a higher risk in this case than the case of primary addresses. A significant proportion of the participants either share fully (29.7%) or partially (39.2%) their non-primary accounts passwords with the corresponding address identities on other websites. Only 31.1% of the participants never use their non-primary accounts passwords for the corresponding identities on other websites. 60.0% 40.0% 20.0% 0.0% 29.7% 39.2% 31.1% All Same Partial Same Never Same Figure 3. Passwords Sharing Rate among Non-Primary Addresses Account Settings We also collected participants behavioral information regarding how they configure the settings in their accounts. 56.8% of the participants connect at least one of their primary addresses with their other addresses for some purposes, perhaps to receive s from other accounts and/or to receive password reset links when the passwords of their accounts are forgotten. In particular, 52.7% of the participants ask their primary accounts to receive s from their non-primary accounts. Based on the results related to participants behaviors with regards to account setting, we infer that: 1) participants accounts may be easily compromised

4 when their other accounts, which are used to receive password reset links of these accounts, are compromised; 2) participants may expose their non-primary accounts more when their primary accounts are compromised; 3) participants may lose their accounts on other websites once their accounts used on these websites are compromised. This is because the containing plaintext passwords or password recovery links of these accounts can be assumed to be exposed. For instance, assume one user allows his Gmail account to receive his s of Yahoo Mail and he uses his account of Yahoo Mail as the identity on Amazon. Once this Gmail account is compromised, his Amazon account will likely be compromised as well because an adversary can get the containing the Amazon s password reset link (it has been originally sent to his Yahoo Mail account by Amazon) in his Gmail accounts. Analysis and Discussion of Security Problems Based on the results related to the use of primary addresses, we can infer that the percentage of participants who use the same passwords in both their primary accounts and websites where these addresses are used as identities, is 67.6% 20.0% 13.5%, where 67.6% is the portion of the participants using their primary addresses on other websites, and 20.0% is the portion of the participants using the same password both for their primary accounts and for accounts of websites where these e- mail addresses are used as identities. Combining the results related to the popular services, we can infer that the percentage of participants who use their primary addresses as identities (e.g., Gmail) on the social websites is approximately 82.4% 66.2% 54.5%, where 82.4% is a portion of the participants using Gmail as one of their primary addresses and 66.2% is the portion of the participants employing their primary e- mail addresses as identities on social websites. Assuming that 30% of the participants use their Gmail accounts in Facebook, the portion of the participants having the same passwords for their Gmail and Facebook accounts is approximately 13.5% 54.5% 30% 2.2%. We believe that these participants will have both accounts compromised if their Gmail accounts or Facebook accounts are compromised and then the passwords are exposed. Through the analysis above, we can infer that adversaries only need to compromise a user s primary account, e.g his Gmail account, in order to potentially compromise many of his other accounts on multiple websites. For example, adversaries may compromise the user s other addresses/identities on multiple websites by trying the same password used in his Gmail account, checking Gmail account settings and searching registration confirmation and password reset s. Moreover, adversaries can aim to compromise the user s account on some poorly-designed website where a user employs his Gmail address as identity and share the same password of this account with his Gmail account. After the password of this account is exposed to the adversaries, they can compromise his Gmail account and further compromise his other accounts on multiple websites - ways similar to those mentioned above. We analyze the issues related to the website design in Section 4. B. Username Diversity and Retention Capability For E- mail Accounts/ Address Identity Username Diversity We also investigate the issue of participants preferences regarding usernames in different services. The results show that 35.1% of the participants use one username for all of their accounts in different services; 64.9% of the participants apply one username for several services but not for all of the services for which they are registered. Among the participants who do not use the same username for all of their accounts, 20.8% of the participants use two different usernames, 58.4% of the participants apply three different usernames and 20.8% of the participants adopt more than three usernames for their e- mail accounts. The investigation of username diversity in accounts reveals that it is not difficult to obtain all of the e- mail addresses that belong to one user, because most of them only use between 1 and 3 usernames for different services. This user behavior also shows that adversaries can easily guess users identities on different websites. Retention Capability Our survey also shows the pairs of accounts/identities and corresponding passwords that the participants feel that they are able to remember. As shown in Figure 4, most of the participants indicate that they can remember 2 to 5 pairs of addresses/identities and passwords. Only 8.1% of the participants remember one pair, while 9.5% of them indicate a high retention capability and claim they can remember more than 5 pairs. 60% 40% 20% 0% 8.1% 16.2% 41.9% 24.3% 9.5% to 5 > 5 Figure 4. Memorizing Capability For Accounts/Identities Compared to the study on retention capability with regards to passwords in [1] where the authors show that their participants can usually remember 5 or 6 different passwords for username-based identities, our results indicate that the participants may have less retention capabilities for addresses/identities and passwords. Therefore, we may infer that some of the participants may tend to use same passwords of their accounts for their address identities on multiple websites. This inference may validate our previous analysis that using the same passwords among users accounts and corresponding address identities on multiple websites is a common practice. New Opportunity for Brute Force Attack Based on the analysis of username diversity and retention capability, we infer that there are a large number of users who not only use the same passwords but also the same usernames in addresses and address identities on various websites. For instance, one user may apply one username, e.g mary, both in the Gmail and Hotmail systems and employ the addresses mary@gmail.com and

5 as identities on different websites, such as Amazon, Facebook and Paypal. However, adversaries can try many different passwords simultaneously for one username on different services and websites without any restrictions, such as the limit on the number of incorrect attempts on the site in one day. For example, an adversary can try many different passwords simultaneously for and the websites where these addresses are used as identities, such as Amazon, Facebook and Paypal. If these addresses and address identities belong to one user and if he uses the same password in these different systems, which is likely based our previous discussion, these accounts may be easier to be compromised by brute force attacks. Furthermore, when adversaries use their botnets and proxies to launch such brute force attacks, they can break more security mechanisms and compromise users accounts more easily. IV. WEBSITE ACCOUNT DESIGN SCHEMES AND SECURITY AND PRIVACY ISSUES Security and privacy problems of using address as identity arise not only from users habits but also from websites unsecure designs and mechanisms. In this section, we discuss these issues and illustrate that additional risks are created when poorly-designed websites are compromised, exposing the private information stored in these websites. A. Websites Design Investigation In this section, we discuss our findings based on the investigation of 94 popular websites with regards to their schemes related to account registration, types of identities and password recovery. The details of the investigation are shown in [5]. Website Registration Schemes Scheme A B C D E F TABLE I. CATALOG OF WEBSITE REGISTRATION SCHEMES Description Websites require users to input unique usernames Websites require users to input unique usernames and select or customize secret questions and answers Websites only require users unique addresses Websites require users to input unique usernames and unique addresses Websites require users to select secret questions and set the corresponding answers, or ask users to define customized questions and provide the answers. The addresses are also required by the websites Websites require users to input unique usernames, unique e- mail addresses, secret questions and the corresponding answers Our findings of the registration schemes that websites generally adopt (Table I) are illustrated in Figure 5. The proportion of the websites that request users to input addresses as identities or use addresses for other purposes (e.g for password recovery) is 92.4% (Scheme C + Scheme D + Scheme E + Scheme F); 10.1% of the websites (Scheme B +Scheme E + Scheme F) request users to select or define their secret questions and answers. In particular, 2.5% of the websites support two kinds of registration schemes (Scheme B and Scheme D): when users forget their passwords, they can get or reset passwords via their addresses or by answering their secret questions. Only 5.0% of the websites (Scheme A + Scheme B) do not request users addresses when registering. Figure 5. Distribution of Website Registration Schemes This result confirms our argument that most of the websites (92.4%) request users to input their addresses for some purpose, such as to send passwords or password reset links. This fact also reveals a high risk for e- mail accounts because users utilize their addresses on many different websites. Types of Identities We also investigate the types of identities that websites support. The result shows that 55.3% of the websites only support address as identity, 29.8% websites employ username-based identity and 14.9% of the websites support both of these identities. Based on these data, we find that e- mail address identity is widely adopted: 70.2% (55.3% %) of the websites support it. Based on the data in website registration schemes, we can infer that the proportion of websites that request users e- mail addresses as identities is approximately 92.4% 70.2% = 64.9%. This indicates that address as identity is becoming popular. However, our analysis and discussion in Section 3 show that address as identity poses huge security and privacy risks. Password Recovery Schemes Based on the password recovery schemes of the websites that we studied (Table II), our collected data related to password recovery schemes is shown in Figure 6. When users forget their password, 62.8% of the websites send the password reset links to users addresses and 6.4% of them (Scheme C1 + Scheme C2) ask users to answer their customized secret questions. Of the remaining websites, 14.9% of them send users original passwords as plaintext and 5.3% of them send new passwords as plaintext to users addresses. Also, a small set of websites send temporary links displaying new passwords, or links showing secret questions to users, or send password reset links after users can answer secret questions correctly. In particular, 5.3% of the websites support two kinds of password recovery schemes: sending password reset links to users via and asking users to answer their pre-defined secret questions. Scheme A1 A2 60.0% 40.0% 20.0% 0.0% TABLE II. 2.5% 2.5% 34.2% 50.6% 1.3% 6.3% 2.5% A B C D E F B OR D CATALOG OF PASSWORD RECOVERY SCHEMES Description the original passwords in plaintext to the addresses recorded the new passwords set by services in plaintext to addresses recorded

6 A3 B1 B2 C1 C2 D B1 or C1 D C2 C1 B2 B1 A3 A2 A1 temporary passwords (valid for a limited time) to users addresses in plaintext. After users login using these temporary passwords, they can modify their passwords password reset links (valid for a limited time) to users addresses the links (valid for a limited time) of pages displaying new passwords to users addresses Users input their usernames or addresses. Services provide users selected or customized secret questions. After answering correctly, users can reset their passwords Users input their usernames or addresses. Services provide users selected or customized secret questions. After users answer the secret questions correctly, services send password reset links (valid for a limited time) to users addresses links that show users selected or customized secret questions to users addresses. After answering correctly, users can reset their passwords 5.3% 2.1% 1.1% 5.3% 1.1% 2.1% 5.3% 14.9% Figure 6. Password Recovery Schemes 62.8% 0% 10% 20% 30% 40% 50% 60% 70% We also observe that more than 90% of the websites (Scheme A and Scheme B) send plaintext passwords or password reset links to users accounts. This fact confirms the high risk related to address identity discussed in the previous section: a user s accounts on different websites may be easier to compromise once some of his accounts have been compromised. This is because adversaries can acquire or reset victim s passwords for his other accounts on multiple websites via the compromised account. Some users may believe that recovering passwords via secret questions is a secure mechanism. However, we argue that this is still not safe because users may typically apply the same secret questions and answers for multiple websites. Moreover, adversaries may obtain users passwords through other means even though they cannot compromise their e- mail accounts in secure services. To do this, they can compromise poorly-designed websites and get the private data, such as users addresses, passwords, secret questions and answers. After that, they may compromise accounts for other websites where users share address identities, passwords, or secret questions and answers. In the following, we analyze and discuss these issues. B. What Adversaries Obtain After Compromising Websites Generally, users private data, including passwords and answers to secret questions, are stored on the websites. When adversaries have compromised the websites, they may obtain this information. In the following, we discuss these issues based on our study of websites. Storage for Users Passwords We can infer that some websites store users passwords in plaintext because they send users original password in plaintext when the passwords are forgotten. These websites comprise at least 14.9% (Scheme A1 in the Figure 6) in our study, such as Pizza Hut (pizzahut.com) and Conduit (conduit.com). Although this is a small portion of the websites studied, we cannot ignore them because adversaries may obtain users passwords easily after they compromise these websites. In other websites, they may store users passwords as hashed values in order to protect users privacy. However, it is not difficult for adversaries to compromise these hashed passwords if the salt mechanisms [16], which can complicate and defend dictionary attacks effectively, are not applied or are exposed. This is mainly because users usually apply simple passwords which cannot be defended against a bruteforce or dictionary attack because of the increased computing resources available currently. Florencio et al show that most of the users define their passwords to be 6-13 characters long [1]. They report that more than 60% of such long passwords are composed only of lowercase letters; at least 10% of the 7-13 character long passwords are composed only of digits; only 10% of the passwords are composed of four different types of characters including lowercase/uppercase letters, digits and symbols. Based on these data, we can determine the volume of calculations necessary to compromise users hashed passwords. For example, in order to decrypt the 8- character long passwords that are composed only of lowercase letters or only of digits, the adversary only needs to do calculation. It is not difficult for an adversary to search and compare the hashed values in this space to compromise approximately 70% (60%+10%) of all 8-character long passwords. As a result, hashed-password systems without salt mechanisms can no longer be considered impervious to attacks. Adversaries can first target the websites that are easier to compromise. After getting users hashed passwords, they can compromise them by the method discussed above. Finally, they can try these real passwords in different websites to compromise users other accounts. Users Secret Questions and Answers Some well-designed websites (about 6%, Scheme C in the Figure 6) ask users to select or customize secret questions and answers. However, we strongly believe that users also employ their secret questions and answers on multiple websites, similar to their behavior of sharing their address identities and passwords. One reason for this behavior may be the limited retention capability of users. For the secret questions, most of these websites (except Scheme D) expose them to the public. For the answers to the secret questions, some of the websites may store them as hashed values while some store them in plaintext. After an adversary compromises a website, he may obtain the user s secret questions and the answers (if the answers consist of simple characters that are hashed without salts, adversaries

7 may compromise them via the brute-force approach, as described above). Then, adversaries can check and compare secret questions on multiple websites, and try the answers they get to comprise more accounts. Even though adversaries cannot decrypt the hashed answers, they can find or infer some of the users privacy information from the data exposed on multiple social websites [15], to guess the answers to the secret questions. V. EXISTING SOLUTIONS AND THEIR DRAWBACKS In this section, we discuss several existing solutions to deal with security and privacy issues related to using address as an identity and demonstrate that these approaches are still far from providing strong protections. We only consider the identity mechanisms which can be applied by websites that are open, dynamic and have a large number of users. The solutions for identity management systems based on cryptography may not be suitable for these websites because these mechanisms are suitable typically only for a controlled environment with well-organized key management schemes in place [6]. A. Password Solutions There is an argument that complex textual passwords can protect users accounts effectively. Although this might be true, the fact is that this argument overlooks the usability issues. Complex passwords, composed of lowercase letters, uppercase letters, digits and symbols, are difficult for users to remember and are not easy to input when users log into the websites. Furthermore, even though some websites require users to set more complex passwords, these passwords will likely be reused by users in other websites. Therefore, the complex password scheme cannot solve the security problems of password usage we discussed earlier. Some researchers believe that graphical passwords [7] or biometric passwords [8] can significantly improve the security of users accounts as these password schemes increase the length and complexity of passwords and may be more convenient to remember. With graphical passwords, a user needs only to remember a special image as a password, while biometric passwords do not require users to remember anything at all. However, we argue that these password schemes may not be widely adopted by websites. For graphical passwords, users may have to remember different images for each different website in order to achieve higher levels of security. If users cannot remember enough images and adopt only few images as passwords, the problem is similar to that of sharing textual passwords as discussed earlier. For biometric passwords, adversaries may get a user s biometric features from compromised websites; thus, they may be able to compromise a user s accounts on other websites as well. Furthermore, some biometric features, such as a user s fingerprints, are easy to obtain in the course of daily life. The one-time password scheme, which is a dynamic password scheme and can achieve randomization, is becoming popular and has been proved to be more secure. However, users need a device to receive an active password, such as smart cards [9] or mobile phones [10]. Users have to carry these devices and use them to receive passwords when they are logging into the websites. It may not be convenient for some users. Furthermore, the security issues of such devices, such as being lost, need to be considered. B. Password Management Tools and Single Sign-on Systems Password management tools, such as Firefox extensions proposed in [11] to manage passwords, are considered to be potential solutions to the problem of using same identities and passwords for multiple websites. Generally, a password management tool helps users to organize usernames and corresponding passwords. Such a tool typically has a local database or file that holds the encrypted passwords for different websites. Users have to create profiles and set master passwords to manage their accounts passwords. When users log into different websites, these tools can invoke corresponding passwords and input them into the login pages automatically. As such, users do not need to remember many passwords so that they can set unique and complex passwords for every website. We believe that these tools are convenient but they pose a high risk for all of users accounts. This is because all accounts recorded in these tools will be compromised if the master passwords for these tools are compromised. Single Sign On (SSO) systems allow users to log into their different accounts through one portal where the users are authenticated. Currently, there are two kinds of SSO schemes: 1) one password for different applications, such as Google applications and Microsoft online applications; 2) one master password to manage SSO systems. These SSO systems record users identities and passwords in their databases. In SSO systems, users only need to use one account and a password to login; then, they can access all the websites listed without inputting identities and passwords again. For example, users just need to log into their Gmail account, and then they can access other services in Google such as Calendar, Doc, and Voice. SSO systems indeed improve the level of convenience for users, but the security of all of the users accounts depends on the security of the SSO systems hence, they become victims of a single-pointof-attack. Once a SSO system is compromised, all the accounts in it will be compromised. C. Recommendations for Users In previous sections, we discussed that users behaviors, such as using the same address identities and passwords on multiple websites, put users at higher risk and pose increasing security and privacy problems. There are some suggestions in the literature to overcome these related problems [1, 2], such as using diverse identities and applying password diversity. In the following, we provide some additional recommendations for users based on our findings: Avoid registering for an account using addresses on websites which have not been validated as secure and avoid using the same address as identity on many websites. Avoid using the passwords of accounts for accounts of other websites where these addresses

8 have also been used as identities. Users should try to find their own password pattern, which is easy for them to remember, to achieve password diversity for multiple websites. A user should try to make his addresses and e- mail address identities independent of (or less dependent on) each other. For example, one improvement is to remove the account setting that allows forwarding from multiple accounts to just one. This mechanism can reduce the number of accounts compromised when a subset of the user s accounts are compromised. D. Identity Management in Future According to our analysis and discussion in the previous sections, a key issue of handling these problems related to e- mail address as identity is to protect users private information on the websites, such as their passwords and answers to secret questions. A feasible solution is that users do not store their addresses, passwords and answers of secret questions on the websites. They should be able to provide their anonymous credentials when they log into various websites. A potential system employing this mechanism is the Federated Identity system where a trusted and secure third party is used to store users personal information and cryptographic methods, such as Zero Knowledge Protocol [12], are used to guarantee anonymity and hence protect users privacy [13]. However, the high risk of exposing all of the accounts still exists. When a Federated Identity system is compromised by an adversary, all of the users accounts on different websites may be compromised. Therefore, such a Federated Identity system must be welldesigned to achieve a higher level of security. Another promising identity management system is introduced by Schechter et.al in [14]. They employ a mechanism called social-authentication for identifying users. This system asks trustees (previously appointed by the account holder) to verify the account holder s identity. The main problem here is how to find appropriate trustees in a timely fashion when users want to log into the service. We believe that it may not be a significant problem in future due to the rapid development of smart phones and other internetconnected devices. In this case, the selected trustees may always stay connected with Internet. VI. CONCLUSION Using address as an identity on different websites is becoming a common practice. We believe that this popularity is due to the convenience for users of having to remember only one identity. In addition, it is more convenient for websites to require an address that will be later used to contact users for services. However, the use of an address as an identity poses more security and privacy threats than username-based identity. We have demonstrated the risks are due to several factors: the multipurpose of the addresses, users behaviors in using their address identities and passwords on multiple websites, and the account design schemes used by websites which might not be secure based on our presented survey and investigation. We have also analyzed existing password management solutions and discussed two potential identity management systems. For our work in the future, we plan to focus on improving and extending these two potential solutions to achieve more practical and more secure identity management systems for dynamic large-scale websites. ACKNOWLEDGMENT This research has been supported by the US National Science Foundation award IIS REFERENCES [1] D. Florencio and C. Herley, A large-scale study of web password habits, In Proceedings of the 16th international conference on World Wide Web, 2007, pp [2] D. Florêncio, C. Herley, and B. Coskun, Do strong web passwords accomplish anything?, In Proceedings of the 2nd USENIX workshop on Hot topics in security, 2007, pp [3] R. Perlman and C. Kaufman, User-centric PKI, In Proceedings of the 7th symposium on Identity and trust on the Internet, 2008, pp [4] M. Just and D. Aspinall, Personal choice and challenge questions: a security and usability assessment, In Proceedings of the 5th Symposium on Usable Privacy and Security, 2009, pp [5] L. Jin, Investigations of Users' and Websites' Behaviors, [6] DeadMan's Handle Ltd, DeadMan's Handle and Cryptography, [7] K.M. Everitt, T. Bragin, J. Fogarty and T. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical passwords, In Proceedings of the 27th international conference on Human factors in computing systems, 2009, pp [8] J.L. Wayman, Biometrics in Identity Management Systems, IEEE Security and Privacy, (2): pp [9] S. Lee and K.M. Sivalingam, An efficient One-Time Password authentication scheme using a smart card, Int. J. Secur. Netw., (3): pp [10] K.C. Liao, W.H. Lee, M.H. Sung and T.C. Lin, A One-Time Password Scheme with QR-Code Based on Mobile Phone, In Proceedings of the 5th International Joint Conference on INC, IMS and IDC, 2009, pp [11] J.A. Halderman, B. Waters and E.W. Felten, A convenient method for securely managing passwords, in Proceedings of the 14th international conference on World Wide Web, 2005, pp [12] E. Bertino, F. Paci, R. Ferrini and N. Shang, Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng, (1): p [13] J. Camenisch and E. V. Herreweghen, Design and implementation of the idemix anonymous credential system, In Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp [14] S. Schechter, S. Egelman, and R.W. Reeder, It's not what you know, but who you know: a social approach to last-resort authentication, In Proceedings of the 27th international conference on Human factors in computing systems, 2009,pp [15] E. Zheleva and G. Lise, To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, In Proceedings of the 18th international conference on World Wide Web, 2009, pp [16] Salt (Cryptography),

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Central Desktop Enterprise Edition (Security Pack)

Central Desktop Enterprise Edition (Security Pack) Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations

More information

SECURING SELF-SERVICE PASSWORD RESET

SECURING SELF-SERVICE PASSWORD RESET SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

The Security Behind Sticky Password

The Security Behind Sticky Password The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

1 P a g e. Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University

1 P a g e. Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University 1 P a g e Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University Trust is to rely upon or place confidence in someone or something. However, this is not a definition that

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

Social Application Guide

Social Application Guide Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Building Secure Multi-Factor Authentication

Building Secure Multi-Factor Authentication Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Introduction

More information

An Anti-Phishing mechanism for Single Sign-On based on QR-Code

An Anti-Phishing mechanism for Single Sign-On based on QR-Code An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK sm19g10@ecs.soton.ac.uk David

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing

More information

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security

More information

Global UGRAD Program

Global UGRAD Program Application Instructions for Global UGRAD 2016-2017 Portal Step-by-Step I. REGISTERING FOR THE PROGRAM Google Chrome and Mozilla Firefox work best when completing the UGRAD application. We do NOT recommend

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

M-Pass: Web Authentication Protocol Resistant to Malware and Phishing

M-Pass: Web Authentication Protocol Resistant to Malware and Phishing M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer

More information

Enterprise SSO Manager (E-SSO-M)

Enterprise SSO Manager (E-SSO-M) Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Password Manager with 3-Step Authentication System

Password Manager with 3-Step Authentication System Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London z.petrov@my.westminster.ac.uk, razvan.ragazan@my.westminster.ac.uk Abstract: A big

More information

Authentication Protocols Using Hoover-Kausik s Software Token *

Authentication Protocols Using Hoover-Kausik s Software Token * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 691-699 (2006) Short Paper Authentication Protocols Using Hoover-Kausik s Software Token * WEI-CHI KU AND HUI-LUNG LEE + Department of Computer Science

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young

More information

Dalton State College Password Management System

Dalton State College Password Management System Dalton State s new password management system (PortalGuard) provides a convenient means for DSC students, faculty, and staff to unlock their Active Directory account or reset their Active Directory password

More information

User Identity and Authentication

User Identity and Authentication User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones ijones@tozny.com http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

QR-SSO : Towards a QR-Code based Single Sign-On system

QR-SSO : Towards a QR-Code based Single Sign-On system QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK sm19g10@ecs.soton.ac.uk David Argles School

More information

Single Sign-on Frequently Asked Questions

Single Sign-on Frequently Asked Questions Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Reset Virtual Gateway Password Job Aid

Reset Virtual Gateway Password Job Aid Summary of Job Aid In order to access a Virtual Gateway s business service, you must first log on to the Virtual Gateway (VG). From the Virtual Gateway s website (www.mass.gov/vg), click Logon to Virtual

More information

The Password Problem Will Only Get Worse

The Password Problem Will Only Get Worse The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD ijones@seqrd.com @SyntaxPolice Goals & Talk outline Update the group on authentication

More information

Two SSO Architectures with a Single Set of Credentials

Two SSO Architectures with a Single Set of Credentials Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

Cloudwork Dashboard User Manual

Cloudwork Dashboard User Manual STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with

More information

Why Centralized Cloud ID Management Is Crucial For The Enterprise

Why Centralized Cloud ID Management Is Crucial For The Enterprise Why Centralized Cloud ID Management Is Crucial For The Enterprise Executive Overview It is well established that we are experiencing a radical model shift in enterprise computing to hybrid-cloud models.

More information

Application Instructions for YSEALI Generation: Youth Unite Against Drugs Workshop Portal Step-by-Step

Application Instructions for YSEALI Generation: Youth Unite Against Drugs Workshop Portal Step-by-Step Application Instructions for YSEALI Generation: Youth Unite Against Drugs Workshop Portal Step-by-Step I. REGISTERING FOR THE PROGRAM Google Chrome and Mozilla Firefox work best when completing the YSEALI

More information

Account Recovery Challenges: Secure and Usable Authentication

Account Recovery Challenges: Secure and Usable Authentication Account Recovery Challenges: Secure and Usable Authentication Mike Just mike.just@ed.ac.uk School of Informatics University of Edinburgh Edinburgh, UK Abstract Challenge questions represent the most popular

More information

Centralized Self-service Password Reset: From the Web and Windows Desktop

Centralized Self-service Password Reset: From the Web and Windows Desktop Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication

More information

U.S. Bank Secure Email Quick Start Guide

U.S. Bank Secure Email Quick Start Guide Welcome to U.S. Bank s Secure Email Service! US Bank has partnered with Cisco to leverage their secure email solution, Cisco Registered Envelope Service (CRES). This guide will show you the steps for opening

More information

CAPITAL UNIVERSITY PASSWORD POLICY

CAPITAL UNIVERSITY PASSWORD POLICY 1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA) Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,

More information

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

SECUDROID - A Secured Authentication in Android Phones Using 3D Password SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy

More information

A secure email login system using virtual password

A secure email login system using virtual password A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {bhavintanti@gmail.com} 2 SVNIT, Surat,Gujarat,India 2 {doshinikki2004@gmail.com}

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Identity Access Management: Beyond Convenience

Identity Access Management: Beyond Convenience Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking

More information

CyberSecurity & Keeping your data safe. October 20, 2015

CyberSecurity & Keeping your data safe. October 20, 2015 CyberSecurity & Keeping your data safe Medway Business Council John Haddad, Bisinet Technologies October 20, 2015 We are under attack!!! 2013 110 million records compromised 2014 56 million payment cards

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images

Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5 Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...

More information

Social Media Single Sign-On: Could You Be Sharing More than Your Password?

Social Media Single Sign-On: Could You Be Sharing More than Your Password? Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com

More information

The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security

The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security Salwa Al-Samirrai 1, Zahra Fadhil Mohsen 2 and Aysh Alhroob 2 1 College of Administrative and Financial

More information

OAuth Web Authorization Protocol Barry Leiba

OAuth Web Authorization Protocol Barry Leiba www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical

More information

SWIFT Identity Management Model

SWIFT Identity Management Model ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK Abdulrahman H. Altalhi 1, Zailani Mohamed Sidek 2, Norjihan Abdul Ghani 3, Fazidah Othman 4 and Maged Abdelkhaleq

More information

The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits

The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple

More information

Authenticating Humans

Authenticating Humans 29 Oct 2015 CSCD27 Computer and Network Security Authenticating Humans CSCD27 Computer and Network Security 1 Authenticating Computers and Programs Computers and programs need to authenticate one another:

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Personal Safety Tips For Public Information Technology

Personal Safety Tips For Public Information Technology IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a

More information

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure Authentication of Distributed Networks by Single Sign-On Mechanism Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

Setting up a Personal Email Account

Setting up a Personal Email Account Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Password Management Help

Password Management Help Release: v1.7 Date: 24.12.08 DET SINGLE SIGN-ON ACCOUNT... 2 USER VALIDATION QUESTION... 3 FORGOT MY PASSWORD... 4 CHANGING PASSWORDS... 5 CHANGING PASSWORDS (CONTINUED)... 6 v1.7.doc Page 1 of 6 DET Single

More information

Firmware security features in HP Compaq business notebooks

Firmware security features in HP Compaq business notebooks HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot

More information

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec 2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

Secure Email Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution

Secure Email Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution Secure Email Portal User Manual A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution This manual can be found online at https://kyret.ky.gov in the Agency Employers Employer Publications section.

More information

An Analysis of Markov Password Against. Brute Force Attack for Effective Web Applications

An Analysis of Markov Password Against. Brute Force Attack for Effective Web Applications Applied Mathematical Sciences, Vol. 8, 2014, no. 117, 5823-5830 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.47579 An Analysis of Markov Password Against Brute Force Attack for Effective

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science

More information

Secure Password Reset in a Multiuser Web Application

Secure Password Reset in a Multiuser Web Application Secure Password Reset in a Multiuser Web Application Francisco Corella June 2007 Patent Granted Abstract This white paper presents a solution to the user lockout problem in the context of a multiuser Web

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Password Management: History, Costs, Problems and Pain Points, and Solutions

Password Management: History, Costs, Problems and Pain Points, and Solutions Password Management: History, Costs, Problems and Pain Points, and Solutions by Dean Weich, Tools4ever Everyone in the business world uses passwords. Whether you are a bank teller logging into several

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information