S CENARIOS FOR THE F UTURE OF THE C ANADIAN P AYMENTS S YSTEM A UTHENTICATION AND I DENTITY W ORKSHOP N OVEMBER 3, 2010 Greg Wolfond.

Slides:



Advertisements
Similar presentations
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyberbad Where Spam is leading to Phillip Hallam-Baker
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Electronic Transaction Security (E-Commerce)
FIT3105 Smart card based authentication and identity management Lecture 4.
FIT3105 Security and Identity Management Lecture 1.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Secure Electronic Transaction (SET)
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
R U Ready? V M E EUROPAY MASTERCARD VISA EMVco was formed in 1999.
What does “secure” mean? Protecting Valuables
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Confidential – For Discussion & General Information Purposes Only EMV to Card Not Present Fraud Gavin Levin, CTP eReceivables Consultant.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Dimensions of E – Commerce Security
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Fraudsters’ Accounts Malek Costa, CPA Head of Group Compliance BLOM Bank sal.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Stop cybercrime, protect privacy, save world. Chris Monteiro Cybercrime, dark web and internet security researcher Systems administrator Pirate / Digital.
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
CSCE 201 Identification and Authentication Fall 2015.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Electronic Banking & Security Electronic Banking & Security.
Managing Risk and Growing Sales 24 th March 2016 Chris Lomax, Senior Director, EMEA Solutions Management.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Identity and Access Management
Agenda What is ECOM? ECOM in MENA and Lebanon
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 5 Electronic Commerce | Security
Own Your Identity.
Security in Networking
Use of Biometric Technology in Payments to avoid Frauds
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 5 Electronic Commerce | Security
Own Your Identity.
WorldWidePIN Corporation
Faculty of Science IT Department Lecturer: Raz Dara MA.
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

S CENARIOS FOR THE F UTURE OF THE C ANADIAN P AYMENTS S YSTEM A UTHENTICATION AND I DENTITY W ORKSHOP N OVEMBER 3, 2010 Greg Wolfond

Are they the same? 2 Identity and Authentication

Authentication (from Greek: αυθεντικός ; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true ("authentification" is a French language variant of this word). ●Thanks to Wikipedia 3 Identity and Authentication

3 ways to authenticate. What I Know 4 Authentication User ID and password Knowledge based questions Personal Information

3 ways to authenticate. What I Know What I Have 5 Authentication

3 ways to authenticate. What I Know What I Have What I am 6 Authentication

3 ways to authenticate. What I Know What I Have What I am Combination is strongest! Eg Chip and PIN 7 Authentication

This graph shows the increase in the number of unique malicious programs used to steal money from Internet users. Source: Kaspersky Lab As banks roll out new security technologies and techniques, the criminal underground quickly develops means to defeat these technologies. The exploits are rapidly (often within 30 days) widely available in numerous crimeware variants that criminals can purchase over the Internet. Attacks are often hosted on computers in different countries that where the banks and their customers are located, making it very difficult to get websites that host malware or command & control servers taken down. Mashevsky concludes that to make meaningful progress in the battle against an exponentially growing threat will require much tighter cooperation between financial institutions, their customers, the security industry, and government agencies. 8 Challenge with Online Authentication

On Top Of The Direct Revenue Losses, Cost of Stolen Goods/Services And The Associated Delivery/Fulfillment Costs… …There Are Additional Profit Leaks From Rejection Of Valid Orders, Manual Review Costs & Administration Of Fraud Claims Source: Annual Fraud Report (2009), CyberSource Corporation 9 $4B Per Year In Online Fraud Losses For Merchants In The U.S. & Canada

Source: “Fraud, the Facts” Today, Growing CNP Fraud is mostly the merchant problem online

Complete Checkout Form AuthenticatePay Integrated Checkout Solutions Disintermediate FI’s From Clients And Take Transactions Away From Card Issuers And Networks 11 In the Online space Non-FI’s Are Stepping In To Meet The Needs Of Shoppers & Merchants

Authentication is often.. (esp in online world) Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. Separate from Identification : or Identity Verification a: an act of identifying : the state of being identified b: evidence of identity ●Thanks to Wikipedia 12 Identity and Authentication

Most of the time picture ID. No relationship between the provider of the ID and the relying party Often Mag stripe.. Easy to copy. Not easy to verify What’s the dollar cost to the industry? What’s the value in making the credentials stronger? How to make it work in the physical and online worlds? 13 Identity Documents

Privacy is a big factor in any system No relationship between the provider of the ID and the relying party is a key tenant Is privacy good enough today in the physical world? NO Physical world system wouldn’t work online. (Tap your card and give everyone your name and address) How could it be better? 14 Privacy

Authentication - EMV (contact or contactless) at POS What authentication is needed online? Identification - Physical and Online - what needs to be done? Government involvement needed? Should playing field be level? All players do the same KYC, AML or new entrants ride free? Privacy - An obstacle or an opportunity? 15 Things to think about for the scenario planning