STRONG USER AUTHENTICATION

Size: px
Start display at page:

Download "STRONG USER AUTHENTICATION"

Transcription

1 DATA SECURITY MANAGEMENT STRONG USER AUTHENTICATION Daniel Mouly INSIDE Risk Analysis; Remote Access; High Data Value; Highly Differentiated User Profiles; Billed Services; PKI; Requirements; User Friendliness; Help-Desk Friendliness; Low Cost of Ownership; System Friendliness; Keys to Success; Choose User Communities; Create User s Strong Ownership Feeling; Find Added Value to SUA; Leverage with Single Sign-On; Leverage with Enterprise Access Management; Leverage with New Services WHY IS STRONG USER AUTHENTICATION (SUA) SO IMPORTANT? In the author s years of experience in the security industry, he has come across one recurring and universal principle: people make security much more complicated than it really is. Yes, systems are complex; and yes, securing and managing those systems can present real challenges. Yet it is by simplifying security, by getting to its underlying principles, and by applying these to the systems one is trying to protect, that one can really begin to build effective security. The security definition that the author relies on can be distilled to one phrase: Who can be granted access to what? Any security system, whether for a small business or for a large multinational organization, must solve that equation. This article focuses on the who an overview and analysis of the methods for ensuring the authentic identity of users of a system s resources. Because the what is usually determined by the organization itself, and thus by the security system in place, those resources can be anything from a sales and marketing database to the ability to issue billion-dollar wire transfers over the Internet, in real-time, from a company account. First, some definitions. Authentication means verifying that people are who they say they are before one can trust them with one s sensitive data and before they can do harm to that data. Strong means preventing people from simulating other users PAYOFF IDEA By simplifying security, by getting to its underlying principles, and by applying these to the systems one is trying to protect, one can really begin to build effective security. Strong user authentication is the cornerstone of any well-elaborated security plan. It is the element that creates what is in everybody s mind when talking about security: trust.

2 EXHIBIT 1 Comparison of Common SUA Methods Criteria Tokens Smart Cards Biometrics Portability High Medium Low Cost of ownership Low to high High High Management burden Low to medium Medium to high High Scalability Medium Low Low Ease-of-use and deployment High Medium Low identities. In a face-to-face conversation, speaking partners can see and verify who they are. If they want to strongly identify someone, they will ask for a passport or any other positive ID. In our computing world, strong authentication translates to any technology used to get the best proof possible that someone sitting behind any form of terminal (desktop, laptop, PDA, mobile phone, etc.) in order to enter an information system is really what the label user ID mentions. There are many technologies out there to accomplish this, the most popular being what are called two-factor authentication devices or tokens the two factors being what-you-know and what-you-have. Those more James Bond-oriented are using the what-you-are factor biometrics such as fingerprint, retina scan, voice verification, imaging. Some years ago, these were considered sci-fi, but many of them become more affordable as the horsepower of our PCs increase and silicon-based components are cheaper. But being relatively affordable does not necessarily mean they are ready to be implemented. (See Exhibit 1 for a comparison of SUA technologies available today.) Tokens are the most portable solution for strong user authentication. They work unconnected and can be used across any media. Smart cards have quite good portability for the smart card itself, but they are limited by the need for a smart card reader and client software residing on a PC. PKI offers poor portability for pure software implementations. It is improved when the certificate is hosted in a removable device such as a smart card, but then one gets the other limitations associated with smart cards. PKI also requires the use of applications that have been programmed for PKI, while the other two can be used as a replacement of static passwords. The cost of ownership for tokens primarily depends on hardware reliability, purchase options, and PIN management features. These factors vary dramatically from one manufacturer to another. Smart cards suffer from the cost of smart card readers and their relative fragility when used intensively for log-in. PKI costs vary, depending on the type of certificates used; using a company s own CA (certificate authority) to build certificates has no comparison to buying certificates from a public CA.

3 The author s experience as a security consultant taught him that the simplest solutions have the best chances of success if one considers addressing large user populations. Only some high-tech addicts will really accept seeing their log-in procedure be dependent on this kind of technology, just for the pleasure of using it. The vast majority of the others, those whose VCRs have been blinking 12:00 for five years, will be reluctant to quit their good old user ID/password combination to get logged on. Moreover, they will complain that the new technology does not offer the same level of backup as the old one, with its Post-it notes hidden behind the mouse pad. So, let us try to further analyze how a strong user authentication (SUA) project can become a success story. WHEN DOES SUA ENTER INTO THE PICTURE? Good timing is often very important to the success of a project, as it is for SUA. First, analyze the typical drivers for implementing SUA in an IT environment, or in any application. Risk Analysis Always start with this step because one must know the enemy, and risks are present within all elements of a security solution. However, it is impossible to assess risks if the resulting business exposures are not understood first. The most common of these are: Information may be used for personal gain. Information may be used for malicious purposes. Information may be lost or modified. Systems may not be accessible when required. False information may be used for deception. Denial of information transmitted may occur. The risk analysis should start with a question: What would happen if any of the situations listed were to occur? Examples of the type of impact are a new product launch strategy could be obtained and sold to a competitor; or funds diverted from the intended recipient to another account. Unfortunately, many security breaches are perpetrated by people with some type of grudge. These may be people who have been laid off from a company or overlooked for promotion (it is estimated that more than 70 percent of attacks are internal). Even if there are no specific causes, some people feel they have to get their own back on the world or show how clever they are. This constitutes a lot of the motivation behind virus authors and hackers. Having determined the impact of an exposure occurring, a cost can be estimated not just in financial terms, but in loss of reputation and im-

4 age that gives an idea of the level of security required and the contingency measures to be considered. Remote Access When the process does not start as it theoretically should by a risk analysis, the most typical driver to consider implementing SUA is when companies decide to open access to their corporate network to remote workers or business partners using dial-up connections or through an extranet. High Data Value Conscious decisions can only be made about protecting data once the sensitivity of information contained within the systems is established. Data segmentation is analogous to the layers of an onion, in which the inner core represents the high data value of the core systems containing sensitive information (e.g., personnel and finance). Outer layers may contain information derived from the core data that requires protection but is not critical, and the skin may be seen as public domain information that everyone on the outside can view. If data integrity is also a concern, then SUA can be coupled with electronic signature, which in fact authenticates both the data and the user at the same time. Highly Differentiated User Profiles If one continues to represent the various security levels as layers of the onion, the access rights of each user determine the layer of the onion that they may reach. Protection of the inner core, the most sensitive information, therefore requires protection of the user s identity that can access the inner core. Highly differentiated user profiles allow different access levels dependent on user ID. The need to ensure that the user matches the user ID therefore increases as one penetrates through the layers. High-profile user IDs that can access the sensitive information therefore need to be protected by SUA where there can be no doubt regarding the true identity of the user. Billed Services Another very good reason to implement SUA appears when any kind of service provider (ISP, ASP, etc.) sends invoices to its users based on their connection frequency or duration. From the xsp standpoint, knowing who is really consuming resources may not be very important as long as the invoices get paid; but in case of any dispute, being able to prove that only the legitimate user could log on may help in closing the litigation. To some extent, it is a kind of nonrepudiation based on SUA.

5 PKI It is this author s opinion that PKI is not a strong user authentication technology per se if one refers to the above definitions. If one considers the authentication act as a real-time proof of identity, then from the server standpoint, the only proof one can get is that the user one is dealing with has access to a certificate (and its associated private key) that one can trust because a trusted certificate authority (CA) has generated it. So, one relies on that one-time authentication performed by the CA when delivering the certificate, but what about how the user got access to the certificate now? Was it by entering a static password (maybe permanently stored on his laptop) or by presenting a PIN to an attached smart card or USB token? Even worse, because of the painful deployment of PKI certificates into the client workstation or just because many new devices, such as PDAs or smart phones, cannot store them, many vendors now revert to serverside certificate and private key storage. This just moves the problem of SUA to the relationship between the user and the certificate server, and technologies such as tokens are a perfect fit to provide this service. Other technologies such as virtual smart cards fall into the same schema, and one will see more and more of this combination of a good old SKI system enabling access to PKI-based applications. This makes perfect sense because PKI can be considered a very powerful identification technique compared to a simple user ID. It allows people to present themselves on a new system on behalf of a trusted third party, thus enabling relationships such as those involved in B2C situations. But this trusted chain has a weak link, and this link is the authentication technique used to give a user access to his or her PKI-based identity. REQUIREMENTS Whatever the requirement that drives the choice to implement strong user authentication, one will need to seriously consider the following factors when selecting an SUA solution, each of them being of a special interest for the involved parties. User Friendliness The most important factor for future users is Rule 1: know your users and the way they work with your system. Strong user authentication needs to be as seamless as possible in order to gain the maximum acceptance from the majority of users. User friendliness is supported by strong authentication systems incorporating a number of standard features designed to assist with this process. The most common of these are:

6 Automatic registration of users Automatic assignment of devices Grace period for implementation Automatic registration of users enables a strong authentication solution to fit over an existing system and gradually learn the user s identity based on an existing security profile. This is normally the case where a system has been built that relies on user name/password authentication. The user access rights have been established within the system; however, because strong user authentication is not used, one cannot be confident of the user s identity when he logs in. Automatic registration allows the strong authentication system to automatically register all the users. Following the automatic registration of the user, he or she needs to be assigned a strong authentication device. This can also happen automatically by the system assigning the next available device and notifying an administrator that this has taken place. The administrator then only needs to deliver the device to the correct user. That another user does not use the device can be ensured by the use of initial PINs, etc. Finally, the use of a grace period allows the user to receive his or her authentication device within a certain period of time before strong authentication is enforced. During this period, a user can continue to use his or her previous form of identification, but a clever system will terminate the grace period immediately when the user tries his device for the first time. This means that as soon as the user can use his device correctly to authenticate himself correctly, strong authentication is enforced from that point forward. The combination of these features allows rapid deployment of strong authentication in the user-friendliest manner. Help-Desk Friendliness This is the most important factor for network and security administrators. It is very important to take care of this factor before any massive deployment of new technology, but this is particularly true when it comes to a new authentication method. User authentication is a process that takes place at the same time for the vast majority of users, so one can expect peaks of help requests in the morning and after lunchtime. Because SUA often means implementing a new technology, this technology must offer help-desk-friendly features, such authentication backup or recovery, device unlocking, diagnostics, etc. The SUA implementation must not become a nightmare for help-desk personnel, and should remove the usual pain of password reset procedures. As described, the SUA solution may come with useful features such as auto-assign, auto-register, or auto-unlock that will greatly improve user acceptance and help-desk efficiency.

7 Low Cost of Ownership This is the most important factor for the enterprise. It is tightly coupled with the two previous factors. Whatever the initial investment for the SUA solution in both devices and servers, the real cost of ownership will be driven by the ease of deployment, the battery lifetime, the ease of PIN reset or unlock, every operation that may involve personnel or would generate loss of working hours. System Friendliness This is the most important factor for the IT department. System friendliness concerns the ability of the SUA technology to be seamlessly integrated to replace the currently available technology usually the password. Because SUA support is very rarely a native feature of an existing system, one must take care of how intrusive the installation of the new technology is to the current architecture. System administrators do not like changes because changes usually generate trouble. Hopefully, many modern operating systems or environments offer some kind of plug-in capability to make room for SUA hostside software infrastructure. For example, modern UNIX systems offer a mechanism called PAM (pluggable authentication modules) that provides great flexibility to implement SUA support for UNIX log-in, FTP, Telnet, etc. PAM is also available for Apache Web servers but, unfortunately, not for NT/IIS environments. A general rule to evaluate the system friendliness of an SUA solution is its ability to use existing user databases to offer native or natural extensions to existing user management. A good example of that is how Novell has integrated its NMAS (Novell Modular Authentication Services) component with existing ConsoleOne NDS management. SUA management is just another tab dynamically added to the existing user management GUI. And NMAS takes control as part of the usual Novell Client component, reusing already installed components. KEYS TO SUCCESS IN IMPLEMENTING SUA In addition to the above factors that must be considered when selecting the most appropriate SUA solution, once one has decided on a specific system or technology, one must take care of the following concerns at implementation time. Why? Because SUA itself is not an attractive new application. People usually do not buy security unless they are forced to do so. One will need to offer side orders to SUA users to make the implementation a success. Choose User Communities This may be obvious but SUA may not be necessary for all users. One will certainly be more successful if one limits the implementation to users

8 who need SUA according to the risk analysis or because they fall into one of the requirements described above. These users will be more likely to accept change in their log-in procedure if they are involved for some reason in what motivated this implementation. Another concern that must be addressed is how fitted to the user profile is the technology that has been chosen. Engineers and administrative people will not have the same perception of what is being offered, and one can select different solutions based on different user populations. This is one of the reasons why the author s company, VASCO, offers the same technology under many different form factors, so that the human interface to the technology is the most adapted. Create User s Strong Ownership Feeling Security is not something that can be bolted on to an organization. It is imperative that a security culture is implemented throughout the organization to prevent trust being compromised through lack of user awareness. The more users consider the strong authentication device to be their own property, the better the penetration of strong user authentication. Users must understand that their user ID is personal. In the same way that individuals automatically lock all windows and doors before leaving their houses, protecting the organization s business, including its reputation, must become a habit with every employee and partner. This will only happen if there is strong, active support from the CEO/managing director and a continuous education process. A security policy, endorsed by the head of the organization, and acceptance of it (in writing) in everyone s personnel file is a starting point. Constant reminders, through newsletters and promotional materials, especially during the logging-on process, reinforce the need to maintain vigilance. This feeling is also enforced when offering any form of electronic signature capability. The security policy must embrace all parties. The importance of legally binding contracts between business partners and between employees and employers cannot be overstressed. These contracts should extend to standards of business conduct for employees and cover the use of any electronic equipment, such as a laptop computer or hardware token, for company business. Find Added Value to SUA Users do not like security, or do not buy security. SUA must be introduced as a way to get access to a higher level of service. Most of VASCO s bank customers understand that very well, and they combine the requirement to use a token with the access to an extended set of online services that are not offered when using a simple password. Making an SUA user feel like a privileged user will transform him into a fervent sponsor.

9 Leverage with Single Sign-On Once SUA is implemented, or even in parallel to this process, introducing the concept of single sign-on (SSO) may be a good leverage of the SUA effort. SSO does not necessarily need SUA, but if one considers making a single authentication, it should be a good one, one that can be trusted. And an important aspect of SSO that users always appreciate is the reduction in the number of log-ins they are required to perform to access their various applications. Combining SUA and SSO creates a secure single sign-on solution that satisfies both the end user and the security officer requirements. Leverage with Enterprise Access Management Enterprise access management (EAM) is usually the most popular security project when presented to the end-user community because it merely reproduces in the virtual world of information technology what they have always been used to using in the real world: privileges, authorizations, delegated rights, etc. The argument for SUA in this case is that it is not worth defining finegrained authorization and spending a lot of time and money to build an authorization infrastructure if the key element to deliver access rights cannot be sufficiently trusted. A typical situation that occurs with weak authentication is that all members of a department will know each other s passwords after a short period of time, and this obsoletes the effort made to differentiate their security profile through authorizations. If a user does not obtain access to a resource or a function, he or she will switch to another user ID known to have this level of privilege. This shows the importance of what was previously mentioned about the strong ownership feeling brought by SUA. SUA brings a level of trust to the entire security infrastructure that password authentication cannot guarantee. Leverage with New Services Because of this same trust level, new services can now be accessed from remote locations (dial-up, Internet, wireless) to users of SUA, thus encouraging the use of this technology. Again, selling SUA to users by providing something new in the form of privileges or flexibility has a good chance of success. CONCLUSION Strong user authentication is the cornerstone of any well-elaborated security plan. It is the element that creates what is in everybody s mind when talking about security: trust.

10 Daniel Mouly is the Chief Technology Officer for VASCO Data Security International ( A software engineer and manager with more than 20 years of experience in the security industry, including as founder of a security software development and consulting company, Mouly has directed security systems development for financial institutions, corporations, and government agencies. He also currently heads VASCO s worldwide security R&D activities. Mouly can be reached at [email protected].

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Simplifying Security with Datakey Axis Single Sign-On. White Paper Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

How To Secure Your Store Data With Fortinet

How To Secure Your Store Data With Fortinet Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Advanced Authentication

Advanced Authentication Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D12 1031 HL

More information

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

86-10-15 The Self-Hack Audit Stephen James Payoff

86-10-15 The Self-Hack Audit Stephen James Payoff 86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

e-governance Password Management Guidelines Draft 0.1

e-governance Password Management Guidelines Draft 0.1 e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse

More information

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

ADVANCE AUTHENTICATION TECHNIQUES

ADVANCE AUTHENTICATION TECHNIQUES ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by

More information

Authentication Tokens

Authentication Tokens State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION

HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION WHITE PAPER HIPAA: THE CRITICAL ROLE OF STRONG AUTHENTICATION The goal of this white paper is to highlight the aspect of HIPAA that pertains to patient privacy and authentication and the technologies that

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Ubisecure. White Paper Series. e-service Maturity Model

Ubisecure. White Paper Series. e-service Maturity Model Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use

More information

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.

More information

Take Control of Identities & Data Loss. Vipul Kumra

Take Control of Identities & Data Loss. Vipul Kumra Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees

More information

2 factor + 2. Authentication. way

2 factor + 2. Authentication. way 2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

SCB Access Single Sign-On PC Secure Logon

SCB Access Single Sign-On PC Secure Logon SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150

More information

BSHSI Security Awareness Training

BSHSI Security Awareness Training BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information