Two factor Authentication

Slides:



Advertisements
Similar presentations
3SKey 3SKey.
Advertisements

A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Types of Connection Dial up –adv : most easily available not expensive (need PNETs charge) –disadv : limited data transfer rate (max : 56 Kbps) when data.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
For Online Banking Ebony Powell What Is Online Banking? Online Banking is a way for consumers to quickly and efficiently handle financial transactions.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
School Management Software
Understand what a business is and why they exist Understand businesses as systems Understand the basic characteristics of systems Understand different.
Skype Created By Niklas Zennstrom in 2003 Today more than 370 Million people are registered globally. Skype is currently the largest international voice.
presented by NorikoGladysFarhanaBonnie Smartphones.
Security-Authentication
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
By the end of the lesson you will: 1.Be able to identify different types of computers 2.Be able to explain the advantages and disadvantages of different.
Module Common Network Environments, Connectivity and Security Issues.
Excellence Publication Co. Ltd. Volume Volume 1.
DIGITAL VOICE COMMUNICATION By Eric Stief sec. 009 Introduction Personal Advantages Business Advantages.
A Digital Gateway Michele Reed Vice President and Director of Communications Missouri PTA.
MOBILE SERVICE O2 and Vodafone. In Life- Support BASIC CHECKS FOR PHONE/NETWORK ISSUES Has the customer got a signal? Ask the customer to check signal.
Networking Basics Lesson 1 Introduction to Networks.
Cintas Fire Protection
SMS Notifications SMS notifications on account status.
REPORT IN MALAYSIA. NATIONAL CENTRE FOR SCIENTIFIC AND TECHNOLOGICAL INFORMATION VU THUY LIEN DEVISION OF RURAL.
Network- Concept and Requirements Connects the watch to the call center via existing networks Same basic functionality as a cell phone Be able to send.
Connectivity  The ability of a computer to communicate with others Sending Device Communications Device Communications Channel Communications Device Receiving.
Voice over Internet Protocol (VoIP)
Connecting to the Internet.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Different computer networks. Star network The star network is local area network mostly used at home, school and offices. Star network has 5 or 6 workstations.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Captioned Phones & more …Captioned Phones & more … For the deaf & hearing impairedFor the deaf & hearing impaired.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
The Internet – Connection Methods 14 The Internet – Connection Methods 14.
Home Business Shopping Online – Purchasing goods and services using the Internet.
Step 1.Install the upgrade tool first in your copmputer.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Printer is the most important peripheral device of computer. Any problem in printer directly affects the productivity of your business. To sort out your.
Hotmail technical support number. Contact Hotmail Support Contact Hotmail Support at helpdesk number to get free advice over the phone.
ArchPass Duo Presentation
By Asma Hamad Alharbi.
Jio Customer Care Toll Free Helpline Number
for the Final Stage of our Merger:
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
Group Research Report 2.
UNIT 19 Data Security 2.
How to Fix Gmail Sync Issues |
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
WELCOME TO CHANGELLY CUSTOMER SUPPORT. Changelly is a cryptocurrency exchange service based in the Czech Republic. This is act as a link between trading.
Roadrunner Customer Toll-Free Phone
QuickBooks Customer Toll-Free Support Phone O 8184.
How to Make Free International Calls Using MagicJack?
Class 3 Digital Signature Certificate Noida
A mobile single sign-on system
Mock Exam feedback Fundamentals of IT.
Library Utensils.
Baseline (Aiming for 4): Describe the
Answer of Internet Banking
Software, O/S & Interfaces
E-cert (Digital Certificate)
Mentimeter A How To Guide.
Advantages access the applications in any place, any time. They do not need a wired connection. use both telephone signal and WiFi (for high end models)
New type of devices for identification of users of “Raiffeisen ONLINE” – Hardware and Software Tokens.
Presentation transcript:

Two factor Authentication SMS Token E-cert 6/5/2014

SMS Disadvantages Advantages Telephone signal not available (e.g. in basement) Need to have a mobile phone Possible delay (in busy period or overseas connection) Additional costs (roaming overseas) Costs for the bank Need to register again if users change their phone number s Advantages Almost everyone got a mobile phone No need to carry other devices Easy to use 6/5/2014

Token Devices Disadvantages Advantages Need to carry additional devices One token device for one bank only Many tokens if user has many account in different banks Additional cost for the bank (up to this moment in HK) Maintenance (Battery) Advantages Free to customers (up to this moment in HK) Easy to operate 6/5/2014

Digital Certificate Disadvantages Advantages Additional cost for customers (e.g. $50/year in HK) Need some computer knowledge for first time installation Need to carry the digital certificate (and to protect it) Advantages Can be used for many accounts in different banks Can be used for other applications 6/5/2014