Two Way Authentication

Slides:



Advertisements
Similar presentations
An ATM with an eye.
Advertisements

ATM WITH AN EYE PRESENTED BY G. SATHISHKUMAR 3RD YEAR, EEE, RMK ENGG
3SKey 3SKey.
Computer Security Computer Security is defined as:
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Karthiknathan Srinivasan Sanchit Aggarwal
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Information Security for Managers (Master MIS)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
3D password Umesh ECE.
Computer encryption is… Based on the science of cryptography.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
BROADBAND ISDN Presented by Supreeti Mitra EI
Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Biometrics.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Biometric Technologies
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Usably Secure, Low-Cost Authentication for Mobile Banking Saurabh Gupta Sandeep Kumar Gupta.
Access Control / Authenticity Michael Sheppard 11/10/10.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
CSCE 201 Identification and Authentication Fall 2015.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Information Systems Design and Development Security Precautions Computing Science.
CSCE 522 Identification and Authentication
Biometrics Security in Banking Systems Image processing in ATM
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Diane DiLorenzo Cosc 101 section 7
Security of Digital Signatures
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Cryptography: an overview
Microsoft Passport and Windows Hello Developer’s Guide to Windows 10 Build SDK Update Andy Wigley
Unit 3 Section 6.4: Internet Security
Digital Signature By: Jermel Lee.
Unique Identification Number Project
SECURITY in IT ~Shikhar Agarwal.
Network Security Unit-VI
Buses.
Taewan kang, Kevin huangfu
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Strong Password Authentication Protocols
HIMSS National Conference New Orleans Convention Center
Lecture 6: Digital Signature
Computer Security CIS326 Dr Rachel Shipsey.
Chapter -8 Digital Signatures
Zachary blum Sam Garcia Courtney Sullivan
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Two Way Authentication By: Lauren Ashurst

Overview Authentication Methods of Two Way Authentication One Way Authentication Other Forms of Authentication Methods of One Way Authentication Conclusion Two Way Authentication Works Cited

Authentication Computer Security Secure Channel Identity Theft Proving Validity Know, Have and Are

One Way Authentication One message to provide “Something a user knows.” Less secure Unidirectional

Two Way Authentication Authenticating on both sides “Something a user has.”  and “Something a user knows.” More secure than one Bidirectional

Methods of Two Way Authentication Used Everyday ATM Building Access Digital Signatures Order

Demonstration of Two Way Authentication http://www.youtube.com/watch?v=qt6b37SKm6w&feature=related

Other Forms of Authentication Three Way Authentication Multi Authentication “Something a user is.” Most secure Biometric Retina Scan Two of the same factors

Conclusion Security Authentication Know, Have and Are

Works Cited http://en.wikipedia.org/wiki/Mutual_authentication http://pciguru.wordpress.com/2010/05/01/one-two-and-three-factor-authentication/ http://www.techrepublic.com/article/understanding-and-selecting-authentication-methods/1060518 http://www.youtube.com/watch?v=qt6b37SKm6w&feature=related