Chip and PIN: two-factor authentication
|
|
|
- Beatrix Warren
- 10 years ago
- Views:
Transcription
1 Chip and PIN: two-factor authentication
2 Chip and PIN: two-factor authentication As online banking fraud continues to grow, consumers deep-seated security fears remain one of the biggest barriers to online banking in Europe. But now BT is developing a service offering for two factor authentication that can help banks tackle customer fears head on. Steve Martin reports There are three reasons why internet banking requires increased security: online fraud is on the up; customers need reassuring; and changes in the industry demand it. There is no doubt that chip and PIN is helping in the battle against many types of fraud. Losses due to fraudulent card activity are down 13% year-on-year since the arrival of chip and PIN. But it is not all good news. Criminals are switching their attack to online transactions. In 2005 card not present (CNP) fraud was estimated at 183.2m, up 21% on 2004, (APACS). Much of this CNP fraud is committed online 23.2m in 2005 (APACS). These figures may rise dramatically as criminals increasingly target the perceived weaknesses in online security.
3 Protecting your customers We know that many potential internet customers are put off by worries about security. Any big increase in fraudulent activity would play to these fears and make it even more difficult to develop this channel. While customers should be responsible for keeping their finances secure, they still look to their banks for action and reassurance. According to the FSA, An overwhelming majority (95%) also feel their bank has at least some responsibility in providing online protection, and almost half feel their bank is solely responsible Our survey suggests that over three-quarters of customers would simply stop banking online if liability were shifted. (Research conducted by NMG Research/IPSOS on behalf of FSA in October/November 2005). Clearly, banks have to demonstrate their commitment to protecting their customers online. Providing an authentication system that is much more secure than the normal log-in and password will go a long way towards easing these fears. Changes in the industry are also fuelling worries about online banking fraud. Autumn 2007 sees the introduction of faster payment clearing for electronic transactions. Reducing the time electronic transactions take to clear will give banks even less opportunity to spot fraudulent activity so there is a strong case for introducing improved authentication for safer customer log-in before these changes come into effect.
4 Secure and simple The need to do more to enhance online security is clear. A static password is no longer enough. In spite of all the warnings, people are still duped into revealing their log-in details. And savvy scammers with the right software can steal log-in information direct from customers PCs. The challenge facing the industry is how to increase security while keeping access simple and straightforward for the genuine customer. Two factor authentication (TFA) can go a long way towards achieving enhanced security. It is based on something the user knows a password and something they have like a token, a mobile phone, a PC or a chip and PIN card. The second factor can even be based on biometric data. Two factor authentication from BT is designed to deliver this requirement. It works by providing customers with a unique access code each time they log in. This is generated by a device or process not connected to the PC and is valid for a single transaction, making it much more difficult to steal or be guessed. BT s hosted TFA service, based on a range of authentication devices, from EMV card readers and one time password generating tokens, to SMS and voice authentication will greatly improve security at minimum cost and with little commitment of resources. The FSA endorses two factor authentication: Delivering TFA to their retail and business banking customer bases will enable banks to provide stronger authentication mechanisms and reduce the risk of fraudulent access and transfer of money out of accounts. Financial Risk Outlook 2006.
5 Chip and PIN With a view to keeping things simple for the user, the two factor authentication service from BT will initially be delivered through EMV card readers that use the chip and PIN process that consumers are now familiar with. Other authentication mechanisms such as OTP tokens, SMS and voice authentication will follow. Each private or business customer will have a card reader via which the second form of identification will be issued. Customers simply insert their card into the card reader and enter their PIN. They will then be presented with a code on the display. This one-time code, which changes every time the card is used, is then transmitted to the authentication server which authenticates the user to permit access. BT will manage the whole process and provide all the IT infrastructure needed, from the delivery of card readers through to customer help desk support and authentication of users on its own secure servers. Authorisation of access will remain with the bank.
6 Why choose BT? BT is more than able to deliver the full TFA package, because it has extensive experience in providing two factor authentication for secure remote access to corporate networks and the provision, distribution and support of devices to its millions of broadband customers. Risk is minimised because the only company banks need to work with is BT, which is the single owner and provider of the IT infrastructure. As for financial services competency, BT is a trusted supplier of secure financial services solutions. For example, BT s SettleNET service, handling share settlement in London markets, is built for full disaster recovery and business continuity and provides its own certification authority approved by the FSA and the Bank of England. Looking to the future, BT is preparing for the next stages of two-factor authentication as it migrates across other channels into new mechanisms such as voice and mobile/sms. So banks can be sure that any BT solution they choose now will be fully future-proofed, with migration to alternative channels provided as and when required.
7 Why go it alone? The FSA recognises that it may not be cost effective for banks to develop TFA themselves. But it does say that pursuing such a policy would demonstrate to customers that fraud is being tackled. Partnering with BT offers a much more viable solution, since BT will supply everything required to run the service, assist with application integration and offer attractive commercial options. Costs can be kept down because the necessary infrastructure is already in place and BT can draw on economies of scale. There are added benefits in choosing BT s two-factor authentication service: BT future proofs the two factor authentication service by providing a range of device options suitable to many customer segments. None-core IT device management can be outsourced to a capable and trusted provider. Reduced time to market.
8 For more information The two factor authentication service from BT will enable financial services organisations to interact with customers in a significantly stronger and more secure environment. It will play a major part in reducing internet banking fraud, and will demonstrate the industry's commitment to doing business securely online. The outcome should be an increase in consumer confidence, enabling banks to develop their online banking business. For more information about two factor authentication from BT, contact [email protected] BT s ability to provide a complete and effective solution, short guaranteed delivery times and high quality data centres were a critical factor in Friesland Bank s decision to choose it to host a secure internet banking environment for its customers.
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) [email protected]
Internet Banking Attacks Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) [email protected] Contents Agenda Internet banking today The most common attack vectors The possible countermeasures What protection
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
What Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
Streamline Cardholder Authentication. Avoid being the target of online fraud
Streamline Cardholder Authentication Avoid being the target of online fraud Streamline Cardholder Authentication helps protect your business and your customers Streamline Cardholder Authentication shifts
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Mobile Phone SMS version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Mobile Phone SMS version Contents About this guide... 2 Before accessing Outlook Web Access (OWA)... 3 Accessing Outlook Web Access
These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.
This guide is intended for Derbyshire County Council employees, partners and suppliers who need remote access to the Council s network. This would be primarily from locations not directly on Council property,
SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?
SOLUTION BRIEF ADVANCED AUTHENTICATION How do I increase trust and security with my online customers in a convenient and cost effective manner? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015
Safe and Sound Processing Telephone Payments Securely A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Executive summary The following information and guidance
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic
www.eset.com Proven. Trusted.
www.eset.com Proven. Trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Case Study SMS Two Factor Authentication. Contact us Infracast Ltd, Merlin House Brunel Road, Theale, Berkshire, RG7 4AB
Case Study SMS Two Factor Authentication Contact us Infracast Ltd, Merlin House Brunel Road, Theale, Berkshire, RG7 4AB T M W 0117 123 4567 07989 101 112 www.infracast.com 01 - About Infracast Infracast
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
CA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
Ultra-strong authentication to protect network access and assets
proven. trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
EMV FAQs. Contact us at: [email protected]. Visit us online: VancoPayments.com
EMV FAQs Contact us at: [email protected] Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
USER-FAQ (2FA) Q. What are the key features of Fraud Management Solution (Baroda isecure)?
USER-FAQ (2FA) Q. What is Fraud Management Solution (Baroda isecure)? Ans. Fraud Management Solution (Baroda isecure) is an enhanced security solution which helps reduce chances of phishing attack on customer
Secure Payments Framework Workgroup
Secure Payments Framework Workgroup EMV for the US Hospitality Industry Version 1.0 About HTNG Hotel Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration
BlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Business Internet Banking security user guide
Business Internet Banking security user guide You must read this user guide before using Business Internet Banking. It is a very important document as it sets out security obligations you must comply with.
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
White Paper. The Principles of Tokenless Two-Factor Authentication
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
Presentation Rundown. Introduction Product Overview Product Features Product Value Product Applications Question and Answer
www.acs.com.hk Presentation Rundown Introduction Product Overview Product Features Product Value Product Applications Question and Answer Introduction As technology becomes more and more sophisticated,
How to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
location of optional horizontal pic Corporate and Investment Banking Business Online Information Security
location of optional horizontal pic Corporate and Investment Banking Business Online Information Security Business Online Information Security Risk reduction: Ensuring your sensitive information is secure
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Fraud Trends. HSBCnet Online Security Controls PUBLIC
Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message
EuroCommerce position paper Online e-payments
EuroCommerce position paper Online e-payments 16 September 2011 EuroCommerce welcomes the opportunity to comment on online payment issues. We carried out a brief members' survey and consulted within the
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards
Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards Cards issued by The HongKong and Shanghai Banking Corporation Limited, India (HSBC) 1. What is EMV Chip Card? EMV (Europay MasterCard Visa) is
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
Facebook s Security Philosophy, and how Duo helps.
Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
A CHASE PAYMENTECH WHITE PAPER. Uncovering Five Myths About M-Commerce
A CHASE PAYMENTECH WHITE PAPER Uncovering Five Myths About M-Commerce If there is a single subject that dominates online retailing right now, it is m-commerce and it is not hard to see why. Sales of smartphones
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) Market A White Paper Prepared by Martha Vazquez, Research Analyst TABLE OF CONTENTS Introduction... 3 Brief Overview of the OTP Market...
How To Get A Cloud Based Contact Centre
why contact centres are moving to cloud-based solutions 1/18 Managing a modern contact centre is tough. Technology is moving so quickly, consumer habits change overnight and regulatory requirements are
Remote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
Simplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
Ultra-strong authentication to protect network access and assets
Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.
Ultra-strong authentication to protect network access and assets
Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
WHITE PAPER. The latest advancements in SSL technology
The latest advancements in SSL technology CONTENTS + Introduction 3 + SSL overview 3 + Server Gated Cryptography (SGC): 4 Enabling strong encryption for the most site visitors + Extended Validation SSL
3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
People, payments and the future report
People, payments and the future report % % % of online smartphone users comment about their experience on social media of people say contactless payments are quick and efficient of shoppers use a loyalty
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
A RE T HE U.S. CHIP RULES ENOUGH?
August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST [email protected]
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
PageScope Enterprise Suite 3.0
PageScope Enterprise Suite 3.0 Categories Modules Device Management Output Management User & Cost Management PageScope Net Care Device Manager PageScope Account Manager PageScope Authentication Manager
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization?
FAQ Tokenization: FAQs & General Information BACKGROUND As technology evolves, consumers are increasingly making their purchases online or through mobile devices and digital wallet applications and their
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
Rothschild Visa Card Terms and Conditions
Rothschild Visa Card Terms and Conditions These Rothschild Visa Card Terms and Conditions (June 2010 edition) are in addition to and supplemental to the Bank s standard Terms and Conditions (October 2007
