A Study and Evaluation of Different Authentication Methods and Protocols 1 K. Arthi, 2 N.M. Nandhitha, 3 S.Emalda Roslin
|
|
|
- Morgan Fleming
- 10 years ago
- Views:
Transcription
1 A Study and Evaluation of Different Authentication Methods and Protocols 1 K. Arthi, 2 N.M. Nandhitha, 3 S.Emalda Roslin 1 Final year software engineering student, Sathyabama University 2 Head/ Academics,Dept. of ECE, Sathyabama University 3 Head/ Academics,Dept. of E&C, Sathyabama University Abstract Authentication is a fundamental aspect of system security. It confirms the identity of any user trying to log on to a domain or access network resources. Text password is the most popular form of user authentication on website due to its convenience and simplicity. Passwords are prone to be stolen under different threats and vulnerabilities. Hence an authentication protocol which protects the user s password from various threats have been used. In this paper, a survey on various protocols that are resistant to password stealing attacks is done and a comparative study is made. 1. INTRODUCTION Authentication is a fundamental aspect of system security. It confirms the identity of any user trying to log on to a domain or access network resources. Due to the numerous advantages of authentication systems, it can be used in various applications. The common application involving authentication is, a computer program using a blind credential to authenticate to another program, Using a confirmation to verify ownership of an address, using an internet banking system, Withdrawing cash from an ATM.The main purpose of these systems is to validate the user's right to access the system and information, and protect against identity theft and fraud. The main types of authentication are Basic single factor authentication, multifactor authentication and cryptographic authentication. The basic authentication is commonly used among the people. It refers to the password based authentication. Example common password, numerical password etc. Multifactor authentication uses the combination of authentication s to validate identity. The final form of authentication uses the cryptography. It includes public key authentication and digital message as authentication code. Password-based authentication is a protocol in which two entities share a password in advance and use the password as the basis of authentication. Existing password-based authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. In general, strong-password authentication protocols have the advantages over the weakpassword authentication schemes in that their computational overhead are lighter, designs are simpler, and implementation are easier, and therefore are especially suitable for some constrained environments. Logging into an individual computer or a website requires a reliable authentication protocol to run on the back end to establish verification of the user. A variety of protocols are in active use by servers around the world. The Ethernet protocol is by far the most widely network protocols used for authentication. Ethernet uses a multiple access called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable or the medium through which data transmission occurs, before sending anything through the network. This allows multiple users accessing the same channel by detecting collision due to congestion. Local Talk is another network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit, before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The access used involves token-passing. In Token Ring, computers are connected in a ring topology. So that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. Any information is there to transmit then that computer catches the token and passes the information via the ring to the destination. For very large distances and to interconnect two or more local area networks, Fibre Distributed Data Interface (FDDI) is a network protocol that is used primarily. The access used by FDDI involves token-passing. FDDI uses a dual ring physical topology. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.atm is most often used to interconnect two or more local area networks. In this paper, the various existing authentication protocols in the literature is surveyed. A comparison table is also made on evaluating the existing protocols. The paper is organized as follows: Chapter 2 gives an overview of the different authentication protocols and s. In chapter 3, the various existing authentication protocols in the literature is discussed. A comparative analysis is made in the chapter 4. Conclusion and future work is given in chapter 5. II AN OVERVIEW OF DIFFERENT AUTHENTICATION PROTOCOLS & METHODS In today's highly secure high tech world, there is a need to provide rules and protocols to ensure that data is protected and K. Arthi et.al
2 away from prying eyes. The rules and protocols are constantly being updated to take account of the latest threats both online and offline. A protocol is a set of rules designed to provide communications between peers, by having a controlled conversation. Authentication includes a few more checks to validate security. a) Authentication and Key Agreement (AKA) This protocol is used in mobile 3G networks. It is also capable of generating for Digest access authentication. Symmetric cryptography is used on the basis of a challenge-response type technique. b) Extensible Authentication Protocol (EAP) Primarily used in wireless networks and point-to-point connections, EAP is an authentication mechanism for transporting information and usage parameters for EAP s, of which there are several. As EAP is not a wire protocol it is only used for defining message formats. EAP is widely used and is present in a number of different wireless based network types. challenge value after receiving a user identifier. Password list makes use of the list of which are sequentially used by the person waiting to access the system. h)public key cryptography The public key cryptography is based on the mathematical problems that require very specialized knowledge. It makes use of two keys, one private key and the other is the public key. The two keys are linked together by an extremely complex mathematical equation. Both encryption and verification is accomplished with the public key. c) Kerberos Kerberos is a well-known authentication used on computer networks. It is useful in instances whereby the underlying network is not secure, and is thus used as a mechanism for validating identities between nodes in the network. It is mainly used in a client-server environment. Messages are encrypted to provide protection from interference and interception of messages. d) Secure Remote Password protocol (SRP) The SRP protocol permits authenticate to a server, and is protected against external attacks by eavesdroppers. This protocol has the advantage that it does not require a third party to be involved in the trust process. It is very secure against potential external threats through the mechanisms built in and improved upon over the last decade. e) Digital signature A digital signature is a digest calculated from a signed document. The client verifies the digest signature by decrypting it with the server s public key and compares it to the digest value calculated from the message received. The signature can also be used by the server to verify data the client is sending. f) Password Password is the most widely used form of authentication. Password authentication does not normally require complicated or robust hardware since authentication of this type is generally simple. g) One time password To avoid the problems associated with password reuse, one time password were developed. There are two types of one time password, a challenge response password and a password list. The challenge response password responds with a Fig 1. Classification on various authentication protocols & s III RELATED WORK In [1] the author uses a simple approach to secure and convenient kiosk browsing. The key idea of Session Magnifier is to enable an extended browser on a mobile device and a regular browser on a public computer to collaboratively support a Web session. This approach requires a Session Magnifier browser extension to be installed on a trusted mobile device. A user can securely perform sensitive interactions on the mobile device and conveniently perform other browsing interactions on the public computer. A Session Magnifier has been proposed which is a simple approach to secure and convenient kiosk browsing. Session Magnifier strives to synthesize the usability advantages of a mobile device. In [2] the author introduced and evaluated various s for purely automated attacks against Pass Points-style graphical. For generating these attacks, they introduced a graph-based algorithm to efficiently create dictionaries based on heuristics such as click-order patterns. K. Arthi et.al
3 To generate an attack dictionary based on heuristics, a general graph based algorithm is used. It consists of the following phases: Window clustering algorithm, attack alphabets, dictionary generation algorithm, click order patterns, relaxation and constraints. These results suggested that automated attacks provide an effective alternative to a humanseeded attack against Pass Points-style graphical. Furthermore, they allow continuation of an attack using clickorder patterns (without any prioritization through visual attention models or other means), guessing more overall than human-seeded s. In [3] the author presented a with which it is possible to directly analyse the amount of data harvested through different types of attacks in a highly automated fashion. The ology proposed is to automate the analysis of the attack and harvesting channel as much as possible. To study the attack channel, they used the concept of honey pots, i.e., information system resources whose value lies in unauthorized or illicit use of that resource. The technical challenge of the approach is to automate the analysis process as much as possible and to analyse the large amount of data collected in this fashion. Based on empirical measurements, it is shown that the attackers steal thousands of credentials from the infected machines. This stolen data can then be traded on the underground market. In [4] the author presented a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk prior to resuming the environment on the kiosk, where kiosk is a PC-class platform equipped with a DRTM(discrete ray tracing )-enabled processor and a TPM(trusted platform module). The system consists of a user carrying a mobile device, a kiosk, and a kiosk supervisor. The mobile device is pre-equipped with an application that aids the user in ascertaining the trustworthiness of the kiosk. The kiosk supervisor may be any platform capable of running an IMA verifier. The design of a system in which a user s mobile device serves as a vehicle for establishing trust in a public computing kiosk by verifying the integrity of all software loaded on that kiosk has been proposed. In [5] the author provided a comprehensive overview of published research in the area, covering both usability and security aspects, as well as system evaluation. It catalogues the existing approaches, highlighting novel features of selected schemes and identifying key usability or security advantages. It summarizes evaluation approaches used including user studies, with focus on aspects of special concern for examining graphical password systems. Data collected from such user studies is also critical in the security evaluation. The research reveals a rich palette of ideas and a few schemes that deliver on the original promise of addressing the known problems with text. In [6] the author analyses the security provided by perspectives and describes the experience building and deploying a publicly available implementation. SSH-style host authentication offers a simple and attractive alternative to a heavyweight PKI (public key infrastructure). Trust-on-firstuse leaves users vulnerable to simple MitM attacks, limiting the effectiveness of current Tofu applications and preventing other protocols from being able to take advantage of lightweight SSH(secure style host )authentication. In [7] the author examined frequency of access to a graphical password, interference resulting from interleaving access to multiple graphical and patterns of access while training multiple graphical. The ology consists of four stages: A pre-study questionnaire examining participant demographics and current password strategies, a five-week online study of participants accessing multiple facial graphical, a post-study questionnaire regarding participant experiences and a test of long-term recall conducted four months after the end of the original five-week study. The results underscore the need for more realistic evaluations of the use of multiple graphical, having a number of implications for the adoption of graphical password systems and providing a new basis for comparing proposed graphical password systems. In [8] the author used a report on a laboratory study comparing the recall of multiple text with the recall of multiple click-based graphical and to address the memorability of multiple in user authentication software. The study includes 2 lab-based sessions. Session 1 took 1 hour and was completed by all the participants. For session 2 participants returned to the lab and tried to recall their previously created. The session includes 4 phase : Practice, password generation, retention, 2-week retention. Results of the lab study indicated that in the shortterm, Pass-points are most robust than text against multiple password interference. K. Arthi et.al
4 TABLE 1: COMPARISON ON THE VARIOUS EXSITING AUTHENTICATION METHODS REFERE NCE NO. METHODOLOGY USED METRICS ADVANTAGES DISADVANTAGES [1] Use of Session magnifier in a kiosk browsing environment 1.Web browsing 2.Kiosk 3. Mobile device 1. Uses a trusted PDA. 2. Accessing to remote Web server browser Does not study the use of multiple graphical [2] 1.Windows clustering algorithm 2.Dictionary generation algorithm 1. Edges defined by the points in an image 2.Distance measured 1. Increased validity of the 2.Long-term memorability [3] Analysis Harvesting channel It gives us a much better basis for estimating the size of the underground economy [4] Kiosk computing 1. A new kiosk front-end application 2. An existing IMA Server 3.A modified version of the OSLO secure loader [5] 1. Cued recall 2. Recognition based [6] 1. SSH 2. HTTPS [7] Long term recall [8] Password generation 1.Password Initialization 2. Login 3. Password reset and password change Authentication failure rate 2.Number of attempts required 3.Login time required 1.Graphical 2.Authentication Allowing the user to personalize a kiosk by running her own virtual machine there It helps to authenticate services that do not have certificates signed by a global PKI Provides a new basis for comparing proposed graphical password systems participants could more easily remember multiple click-based graphical than multiple text Do not know exactly on which sites the key logger becomes active 1. Bar code attacks 2. Run time attacks Accessed only by limited users Data redundancy cannot conflict answers to two clients querying about the same service even after compromising It cannot be easily adopted K. Arthi et.al
5 IV CONCLUSION AND FUTURE WORK The goal of authentication is to identify and to verify that the user has access to a system. Various authentication s have been widespread since the personal computer was developed in the 1970s. Many authentication s have been in use for centuries, such as identity cards, visual authentication and. In this paper, a detailed study on the various password authentication protocols has been done and a comparative study is also made. REFERENCES [1]C. Yue and H. Wang, SessionMagnifier: A simple approach to secure and convenient kiosk browsing, in Proc. 11th Int. Conf. UbiquitousComputing, 2009, pp , ACM. [2] P. van Oorschot, A. Salehi-Abari, and J. Thorpe, Purely automated attacks on passpoints - style graphical, IEEE Trans. InformationForensics Security, vol. 5, no. 3, pp , Sep [3] T. Holz, M. Engelberth, and F. Freiling, Learning more about the underground economy:acase-study of keyloggers and dropzones, Proc. Computer Security ESORICS 2009, pp. 1 18, [4] S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, Trustworthy and personalized computing on public kiosks, in Proc. 6th Int. Conf. Mobile Systems, Applications Services, 2008, pp , ACM. [5]R. Biddle, S. Chiasson, and P. van Oorschot, Graphical : Learning from the first twelve years, in ACM Computing SurveysCarleton Univ., [6] D. Wendlandt, D. G. Andersen, and A. Perrig, Perspectives: Improving ssh-style host authentication with multi-path probing, in Proc. USENIX 2008 Annu. Tech. Conf., Berkeley, CA, 2008, pp , USENIX Association. [7] K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical, in CHI 09: Proc. 27th Int. Conf. Human Factors Computing Systems, New York, 2009, pp , ACM [8] S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, Multiple password interference in text and click-based graphical, in CCS 09: Proc. 16th ACM Conf. ComputerCommunications Security, New York, 2009, pp , ACM. K. Arthi et.al
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Network Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
An Introduction to Computer Networking
An Introduction to Computer Networking Sumit Ahlawat #1, Anshul Anand #2 #1 M.Tech Student, #2 Asst. Professor Department of CSE, Shri Baba Mastnath Engineering College, Rohtak (INDIA) Abstract: Computer
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)
Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Securing ATM Using Graphical Password Authentication Scheme
Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Network Technologies
Network Technologies Career Cluster Information Technology Course Code 10101 Prerequisite(s) Introduction To Information Technology Careers (Recommended), Computer Applications (Recommended), Computer
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Power over Ethernet technology for industrial Ethernet networks
Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Computer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
