A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.

Slides:



Advertisements
Similar presentations
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
McAfee One Time Password
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
eToken Virtual and MobilePASS
Authentication & Kerberos
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
eToken PKI Client Overview
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
11th September 2008 Stockholm Sweden Simon Josefsson Head of R&D
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Implementation of LSI for Privacy Enhancing Computation Kazue Sako, Sumio Morioka
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Security Awareness: Applying Practical Security in Your World
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
SE571 Security in Computing
RSA SecurID November 10, 2005.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Certificate and Key Storage Tokens and Software
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission.
Securing Applications With Firmware (Going Beyond TCPA Platform Security) Dr. Robert W. Baldwin Chief Scientist.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
“Stronger” Web Authentication: A Security Review Cory Scott.
Deepnet Unified Authentication for Outlook Anywhere.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Single Sign-On
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
A Practical Comparison of Modern Authentication Mechanisms.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Building a Fully Trusted Authentication Environment
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Authentication.
Installation & User Guide
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Installation & User Guide
Faculty of Science IT Department Lecturer: Raz Dara MA.
The Italian Academic Community’s Electronic Voting System
Presentation transcript:

a l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó

a l a d d I n. c o m Aladdin Product Lines Software Rights Management – Copy protection, IP protection and secure licensing solution for software vendors Software Publishers and Embedded System Vendors Solutions for access, authentication and password/digital identity management Enterprise Education Finance Biopharm Government TARGET MARKET Web gateway content security and proactive security Enterprise Education Government and ISP’s DRM ENTERPRISE SECURITY

a l a d d I n. c o m Data is everywhere Servers Workstations (LAN) Laptops Mobile

a l a d d I n. c o m Identity Theft There are two kinds of companies: those who have experienced a data breach, and those who will.

a l a d d I n. c o m Identification, Authentication and Strong Authentication Benefits of Strong Authentication Aladdin Strong Authentication Product Offering Strong Authentication and Beyond STRONG AUTHENTICATION

a l a d d I n. c o m Evidence of identity; something that identifies a person or thing The condition of having the identity (of a person or object) established The unique data, name, number or code, identifying a certain object or person The process of specifically identifying an object from a large class of objects through reading symbols Identification IDENTIFICATION

a l a d d I n. c o m Identification – Real World Name, Paper Certificate (ID Card, Driver’s License…) Physical Appearance

a l a d d I n. c o m Identification – Computer Systems Username Digital Certificate RFID Biometrics

a l a d d I n. c o m Identification - Usernames Most dominant identification factor Easily Obtained

a l a d d I n. c o m Identification – Digital Certificates Identifies a User, Computer, Server X509V3 is the latest standard Subject to Human Error (Trust)

a l a d d I n. c o m In computer security, verification of the identity of a user or the user's eligibility to access an object The process of identifying an individual or data. In security systems, authentication is distinct from authorization. Authentication merely confirms that the identification of the individual or data is accurate Simply put, authentication is verifying identity. Authentication is the process of determining whether someone or something is actually who or what it asserts itself to be The process of verifying the claimed identity of an individual user, machine, software component, or any other entity Authentication

a l a d d I n. c o m Authentication Methods Passwords One Time Passwords Public/Private Key Pairs (Digital Certificates) Biometrics METHODS AUTHENTICATION

a l a d d I n. c o m Passwords

a l a d d I n. c o m Passwords – Insecure and Costly Simple passwords – easy to guess Complex passwords – hard to remember Passwords are rarely changed Passwords can be shared “Not only are passwords insecure… Gartner Group and Forrester Research put the cost of resetting a password at about $50, while a survey from software giant Computer Associates estimated 70% of help desk calls concern password replacements” Source: , Identity thieves target firmswww.cryptocard.com

a l a d d I n. c o m One Time Passwords An OTP (one-time password) system generates a series of passwords that are used to authenticate Once one of the passwords is used, it cannot be used again The logon system will always expect a new one-time password at the next logon

a l a d d I n. c o m One Time Password - Tokens Password is generated on the device (token) Zero footprint, Platform independent Battery Operated (limited lifetime) Strong Authentication when combined with PIN code

a l a d d I n. c o m One Time Password – Soft OTP Software generated Variety of devices (Cell. Phone, PDA, Laptop, PC) Low cost solution (compared to token) Limited control Distribution Overhead (of the OTP program)

a l a d d I n. c o m One Time Password over SMS Challenge-Response system Generate the challenge on the Web, via SMS, etc’ Main problem is reliability (usability concern) SMS Costs is also a concern (in large volumes) High TCO / Limited ROI

a l a d d I n. c o m Public-Private Key Pairs (Dig. Certificates) Digital Certificates contain the Public Key After trust is established, mathematical operation authenticates Allows mutual authentication (protocol dependant) Private key must be protected

a l a d d I n. c o m Digital Certificates on Smart Cards Dedicated Hardware Secure – on-board key generation and storage Allows personalization Costly and less convenient – requires a reader

a l a d d I n. c o m Digital Certificates on USB based Smart Cards Dedicated Hardware Secure – on-board key generation and storage Reader-less Portable

a l a d d I n. c o m Biometrics Can provide both functions: Identification and Authentication Physiological / Behavioral Costly Complex to install (FAR/FRR) Privacy Issues

a l a d d I n. c o m Strong Authentication Strong authentication means using two or more authentication methods What you are Authentication – the three ‛what’s What you haveWhat you know User Name: Password: x 

a l a d d I n. c o m Enhanced online services 24x7 secure access to sensitive business information Enhanced productivity (single sign-on) Digital signing of transactions Secure PCs and laptops Reliable Authentication Enables Business

a l a d d I n. c o m eToken Product Offering

a l a d d I n. c o m OTP or PKI?

a l a d d I n. c o m Strong Authentication and Beyond OTP Provides Strong Authentication Smart Tokens with PKI will take you beyond: Authentication Encryption Signing

a l a d d I n. c o m Strong Authentication and Beyond Source: eToken Customer Survey PKI PKI PKI PKI PKI PKI PKI PKI OTP

a l a d d I n. c o m eToken Devices eToken PRO –USB, reader-less smart card eToken PRO Smartcard –eToken PRO in traditional smart card form factor eToken NG-OTP –First ever USB smart card token with One-Time Password generation capabilities eToken NG-FLASH –USB smart card token with encrypted Flash memory for portable mass data storage eToken PASS –One Time Password Authenticator

a l a d d I n. c o m SafeWord 2008

a l a d d I n. c o m Köszönöm megtisztelő figyelmüket