Beruflich Dokumente
Kultur Dokumente
1
WHAT KEEPS USERS AWAY?
4
Phishing
5
Pharming
http://www http://www
http://www
Website
DNS Server www.nicebank.com
(Local or ISP)
User
6
Smishing
7
Vishing
8
Two factor authentication
Something the user has
Strengths
– Compromised user credentials less valuable for attacker
– Break down the traditional economic model of phishing attacks
9
Types of one-time-passwords
Counter-based one-time passwords
Time-based one-time passwords
10
OATH (Open Authentication)
A group of technology and industry leaders
– 60+ members
– Open and royalty-free specifications
– Promote interoperability
Benefits
Man-in-the-browser attack
1. “John”, “psd” 1. “John”, “pswd” 1. “John”, “pswd”
End-User’s Computer
12
Transaction Signing Soft Tokens
Signature = cryptographic Message Authentication Code
Transaction signature
Seal Transaction stored in Audit Log
with Signature for verification
Enter Account no Enter Amount Generate Signature
0243758 0243758
0243758
0243758 500.00 500.00
500.00
afcbff100 afcbff100
13
Risk levels (NIST SP 800-63-1)
High
PKI
Medium OTP
OOB
Low
KBA
Minimal
14
Security Industry in 2001
15
Trojans / Malware
16
Endpoint Assessment
Endpoint Security Assessment
17
Summary
Sophistication of identity fraud schemes is increasing
Authentication deployments are converging to:
– Hybrid solutions: >1 authentication method per end-user
– Risk-based authentication
– Endpoint security assessment
Choose a technology that
– Does not lock you in
– Provides entire solution – from authentication to endpoint assessment to
abolishment
18
Questions and Answers
E-mail: tejas.lagad@nexussafe.com
Mobile: +91 99229 39931
Twitter: @Ltejas