Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model



Similar documents
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Multi-Factor Authentication of Online Transactions

How Secure is Authentication?

Egress Switch Best Practice Security Guide V4.x

SECURING SELF-SERVICE PASSWORD RESET

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Scalable Authentication

Hitachi ID Password Manager Telephony Integration

French Justice Portal. Authentication methods and technologies. Page n 1

Guide to Evaluating Multi-Factor Authentication Solutions

Voice Authentication On-Demand: Your Voice as Your Key

Enhanced Security for Online Banking

Dynamic Query Updation for User Authentication in cloud Environment

Entrust IdentityGuard

Knowledge Based Authentication (KBA) Metrics

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

How Secure is Authentication?

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

Multi-factor authentication

Decision on adequate information system management. (Official Gazette 37/2010)

Electronic Fraud Awareness Advisory

FFIEC CONSUMER GUIDANCE

Business Banking Customer Login Experience for Enhanced Login Security

電 子 銀 行 風 險 - 認 證 與 核 實. Fraud Risk Management The Past and the Future 欺 詐 風 險 管 理 - 過 去 與 未 來

Building Secure Multi-Factor Authentication

Multi-Factor Authentication Core User Policy and Procedures

Online Banking Risks efraud: Hands off my Account!

International Journal of Software and Web Sciences (IJSWS)

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Glossary of Key Terms

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

Online Cash Management Security: Beyond the User Login

Improving Online Security with Strong, Personalized User Authentication

Digital Identity Management

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Provider OnLine. Log-In Guide

Identity: The Key to the Future of Healthcare

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Applying Cryptography as a Service to Mobile Applications

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IT Security Risks & Trends

How Secure is your Authentication Technology?

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Payments Fraud: It's Not Fun & Games

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

How To Comply With Ffiec

Authentication Tokens

Jim Bray, Cyber Security Adviser InfoSight, Inc.

Guide to Vulnerability Management for Small Companies

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

SITECATALYST SECURITY

Presented by: Mike Morris and Jim Rumph

WHITE PAPER Usher Mobile Identity Platform

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

PRIVACY, SECURITY AND THE VOLLY SERVICE

Electronic approvals for forms

What the Future of Online Banking Authentication Could Be

Biometric Recognition s Role in Identity Management

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Strong Authentication in details

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

This document is not an offer, commitment, representation or warranty by AT&T and is subject to change.

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

User Authentication Guidance for IT Systems

USER-FAQ (2FA) Q. What are the key features of Fraud Management Solution (Baroda isecure)?

How To Protect Your Online Banking From Fraud

A Method of Risk Assessment for Multi-Factor Authentication

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

DEA's New Proposed Regulations For E-Prescribing

a. StarToken controls the loss due to you losing your Internet banking username and password.

IRS e-services Registration Process

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1

Certification Practice Statement

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Transcription:

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model Andrew Rolfe Authentify, Inc. Andy.Rolfe@Authentify.com

Presentation Overview Authentication basics What is OOBA? Why is it important? Examples Q&A

Security Mantra Security is a process Technologies without processes are useless Deter, detect, recover Three basic authentication tools: Knowledge based Object access based Biometric based

Framing the Authentication Problem Authentication: The verification of the identity of a person or process. Applies to Users Servers Applications The Free On-line Dictionary of Computing, 1993-2001 Denis Howe Authentication event categories First time registration Known relationships (direct or sponsored) New relationships Recurring access Transaction authorization

Typical First Time Authentication Solutions Data Comparison (own or 3rd party) Pros: easy to implement, real-time, no (to moderate) expense Cons: very weak audit trail, lack of secret data, intrusive Email activation information Pros: positive response required, extra step a deterrent Cons: not out-of-band,, weak audit trail Mailing security credentials send a PIN via mail Pros: out-of of-band communiqué,, provides real-world anchor Cons: slow, weak audit trail In-person proofing Pros: physical presence, can get signatures, pictures, etc. Cons: slow, not scalable, asynchronous from digital activity

Typical Recurring Authentication Solutions User ID with password/pin Pros: well understood, self-contained Cons: PIN management, audit trail, insider threat Digital certificates Pros: promise of Driver s s License for the Internet Cons: not broadly deployed, difficult to use, cross-certification certification issues Tokens Pros: restrict access to token you ve issued Cons: physical distribution is difficult/costly, difficult to use, tokens get lost/disabled Biometric solutions Pros: something you are,, can t t forget it Cons: trust & compatibility of capture device, complexity of device/process, first time registration, probability based

Typical Transaction Authentication Solutions Enter PIN Pros: easy, prevent casual walk up incidents, extra step (if not access PIN), confirmation of intent Cons: weak audit trail, PIN management issues Negative response notification Pros: notification that transaction took place Cons: horse is out of the barn,, not certain of destination of notice Paper authorization (mail, fax) sent after the fact Pros: paper audit trail Cons: slow, not scalable, subject to paper document fraud, data coordination Insurance (?) Pros: mitigate risk for participants Cons: costly, limits are low

What Is Your Security Objective? What do you wish to attain? Assurance of person vs. assurance of payment What is your risk/reward balance? What s s at risk? Calculating the ROI of security Raising the bar without breaking the bank Zero-tolerance fraud prevention requires non-digital backup processes Is this appropriate/necessary for your system?

Common Attacks Trojans Key loggers Phishing / Pharming Man in the Middle (MITM)

What is OOBA? Utilizing another, different channel during authentication Makes compromise twice as hard Essentially adding an outside trusted observer or participant to a single channel transaction

OOBA Examples Postal mail Registration documents PIN mailers SMS Telephone

Putting It All Together Examples: Challenge / Response Transaction Verification Session Aware Multi-factor with Biometric

Challenge / Response Gaming site wishes to do an ethical check for age Call a phone number on file (access) Ask for DTMF entry of random portion of account number (liveness( liveness,, knowledge) Ask for verbal attestation of age (deter, audit)

Transaction Verification Bank site wishes to verify high value transaction Call a phone number on file (access) Announce transaction value and ask for verbal confirmation (detect, audit) Ask to respond to randomly selected security question (liveness( liveness,, knowledge)

Session Aware Cash Management System Login Compute hash based on initial session negotiation (session binding) Call a phone number on file (user binding) Ask to enter random portion of session hash value (liveness( liveness,, detect MITM)

Biometric Multi-factor High value bank transaction verification Call a phone number on file (access) Ask to speak CAPTCHA or other cognitive, displayed value (liveness( liveness,, deter) Ask to speak shared secret (knowledge) During speech, compare with previously enrolled voice (biometric)

OOBA Web Service Credential Issuing Site ESC Site Visitor Records Internet Site Visitor Authentication / Authorization Service Executable Instructions Transaction Records PSTN Public Switched Telephone Network

A Service Based Telephone OOB Authentication process can be as simple or as complex as the situation requires with same base user interface Session Aware Confirmation Reverse Telephone Look-up Telephone Type (cell, land, other) Voice Recording Spoken or Entered PIN IP / Postal / Phone Location email alert to 3 rd party Telephone alert to 3 rd party Voice Biometric enrollment/verification Auto-callback 2 rd party approval sponsored enrollment/access

No Silver Bullet Manage risk appropriate to your application Employ the multiple tools at your disposal Easy is better than hard Use solutions that make sense for your business Remember Everything Can Be Broken Continually re-evaluate evaluate risk & technologies

The New Yorker Collection 1993 Peter Steiner from cartoonbank.com. All rights reserved. except Authentify Contact Information: Andrew Rolfe V.P. of Development & Operations Phone: 773-243-0339 Fax: 773-243-0225 Email: Andy.Rolfe@Authentify.com World Headquarters: Authentify, Inc. 8745 W. Higgins Road, Suite 240 Chicago, Illinois, 60631 773-243-0300 www.authentify.com

NIST s Assessment of Text Independent Speaker Recognition Performance Latest results show improvements

User Stats on Out-of of-band Source: Betasphere Study