System Access Authentication

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter 10: Authentication Guide to Computer Network Security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
Protecting Students on the School Computer Network Enfield High School.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Authentication What you know? What you have? What you are?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Networking Network Classification, by there: 3 Security And Communications software.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Challenge/Response Authentication
Technical Implementation: Security Risks
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
IT Security Awareness Day October 19, 2016
Fraud Protection.
Nick Mothershaw - Experian
Fraud protection.
Key words: Secure | Password | Character
Dove science academy Cyber Club
Chapter One: Mastering the Basics of Security
Challenge/Response Authentication
Technology for Tomorrow
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Protecting your personal information and privacy
Lesson 2- Protecting Yourself Online
Information on Types of Electronic Banking
© EIT, Author Gay Robertson, 2017
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Depository Institution Essentials
Risk of the Internet At Home
DOVE SCIENCE ACADEMY CYBER CLUB
Digital $$ Quiz Test your knowledge.
Internet safety By DAGAS YACMAS team.
Top Ten Cyber Security Hygiene Tips
Chapter 3: Protecting Your Data and Privacy
Bethesda Cybersecurity Club
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Authentication Chapter 2.
Information Systems Security and You
Lesson 2- Protecting Yourself Online
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
Cybersecurity Simplified: Phishing
Presentation transcript:

System Access Authentication Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Cybersecurity in 2017 Transactions Is more or less money being access digitally today than previously? More attacks against your physical organization or against your digital organization? What are the three things are “bad guys” after? Cybercrime = Organized Crime More breaches More threats MORE RISK! © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What Are YOU to Do? Protect your passwords and do not share them. Do not use the same password for work and personal. Change your passwords regularly. Be cautious about free Wi-Fi. Learn to recognize phishing emails. Be aware of potential fraud situations. Understand, anything you text or post online will never go away. Use multifactor authentication to access systems. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What is Multifactor Authentication? There are three main factors of authentication. Knowledge Factors - Something you know Possession Factors - Something you have Inherence Factors - Something you are Financial Institutions are required by regulations to provide multifactor authentication for access to non public customer information. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What is Multifactor Authentication? What works as a factor of authentication? Something you know – This is the most common factor and is easier to compromise. These are access credentials like user names, passwords, personal identification number (PIN), or security questions. Something you have – Hardware token or a One-time passcode. A less secure item is a hardware cookie on your device. The hardware cookie may easily be compromise. Something you are – Fingerprints, hand geometry, retinal or iris scans, handwriting, and voice analysis. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

What is Multifactor Authentication? There are less common factors sometimes used. Location Factor – Identifies the location you are gaining access from and initiates a computer call back to validate the remote user. May also be a GPS tracked device allowed to access the system based on the location of an approved device. Time Factor – Uses an intelligence configuration to identify a combination of access times from two extended locations too far apart to be legitimate and may cause the access to be suspicious and block the access. The location factor is mainly used for remote access applications. The receiving access devices will have an approved location list configured. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Something You Know Factor Sometimes this may feel like your password requirement? © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Something You Know Factor We are all consumers and we like convenience! User names should not be easily determined. Passwords should be at least 8 characters (15, if possible) with 3 of the 4 characteristics of upper case letter, lower case letter, number, or symbol. Do not use a dictionary word. Do not set your internet browser to remember passwords. Passwords should be replaced at least every 90 days. Should not use a repeated password for at least 12 months. Security questions should be out of wallet and not preselected standard questions. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

How Do You Keep Up With Access Credentials? Do not write your access credentials down and keep them on your desk, on your computer, under your keyboard, or under your desk calendar. Access credentials should be kept in a safe location and no one else should have access to your credentials. Is writing them down and locking them in your desk ok? Is a spreadsheet password protected ok to have? How about using an application to manage your access credentials ? © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Passwords are like bubblegum Strongest when fresh Should be used by an individual, not a group If left laying around, will create a sticky mess © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Something You Have Factor Something you have is the second most common factor used for authentication. This factor added to something you know will give you the multifactor authentication you need to have improved secure access. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Use Multifactor Authentication Using at least two factors of authentication dramatically increases your access security! Many systems allow you to use a second authentication factor, what you have, by implementing the one-time passcode. Use it if available. © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education

Presented by SBS CyberSecurity (605) 923-8722 sales@sbscyber.com www.sbscyber.com Let’s Connect! 700 S Washington Ave Ste 200, Madison, SD 57042 © SBS CyberSecurity, LLC www.sbscyber.com Consulting Network Security IT Audit Education