Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.

Slides:



Advertisements
Similar presentations
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Advertisements

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Operating System Security
Breaking Trust On The Internet
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
FIT3105 Smart card based authentication and identity management Lecture 4.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Norman SecureSurf Protect your users when surfing the Internet.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Cryptography on Non-Trusted Machines Stefan Dziembowski.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
CYBER CRIME.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
A practical overview on how the bad guys adopt and circumvent security initiatives Commercial – in - Confidence Alex Shipp Imagineer.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Build Your Business by making the Right Connections.
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
Cybersecurity Test Review Introduction to Digital Technology.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
Securing Information Systems
Security Issues.
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
Cypak core technology Combat fraud and keep your customer happy
PREPARED BY: RUMMY MIRANDA
Cyber Issues Facing Medical Practice Managers
Windows Summit /27/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may.
Prepared By : Binay Tiwari
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security.
Microsoft Data Insights Summit
Week 7 - Wednesday CS363.
Microsoft Virtual Academy
Presentation transcript:

Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s Security Business & Technology Unit System Protection Products Team © Microsoft Corporation. All rights reserved.

Outline Goals Rationale Securing Online Transactions Enabling Secure Scenarios  Trusted Digital Identity

Goals 1. Enable customers to securely perform online transactions on an insecure machine, over a hostile internet Bellua Cyber Security Conference Find more secure scenarios which are enabled with a trusted digital identity TIPPI Workshop

Online Bank Fraud in the News “A Miami man blames Bank of America for more than $90,000 stolen in an unauthorized wire transfer to Latvia. Joe Lopez filed a lawsuit on Feb. 7 claiming that Bank of America had not alerted him to malicious code that could -- and indeed had -- infected his computer. A forensic investigation by the U.S. Secret Service revealed that a Trojan called Coreflood, which acts as a keystroke logger, had compromised one of his PCs.”

The Threat of Identity Theft RSA Security chief executive Art Coviello suggested that the effects were already being felt, pointing out that some Australian banks have recently pulled out of planned web services because of security fears. "We are at a confidence crisis. For the first time we run the risk of taking a step backwards and the reason is the threat of identity theft," he said.

Generic Transaction Model

Remember the User

Online Banking with User

Secure Protocol + USER

Threat 1: Phishing

Threat 2: “Man In the Middle”?

Threat 3: Computer is Fully Compromised; aka 0wn3d

Two-Factor Authentication “Protecting Against Phishing by Implementing Strong Two-Factor Authentication”  For example:

Bar is Raised, but High Enough? Does strong authentication add enough security to bank online?

Threat 1*: Phishing

Threat 2*: Man in the Middle by Social Engineering

Threat 3*: Fully Compromised

Focus on Verification Stages

Secure Verification Content Client Server Human-User Server

Today’s Online Banking

Verification Stage

Secure Online Banking

Secure the Receipt

Securing Online Transactions Recap Current Online Transaction Models  Threats Still Exist Solution  One Time Secret per Transaction  Keep Secret Off Untrusted Device Reduces Attack Surface  Attack vectors localized  Hardware Hacking/Physically Present  Tempest Attacks  Break Crypto

Trusted Digital Identity Mini MAC Connectivity through DAC system Enable specific, fine grain scenarios

Scenarios Online Transactions Digital Rights Management Secure, Redundant Storage. Security and System Configurations Paperless Money

Limitations  Size of mobile device interfaces are small  Size of mobile device is small  Horsepower of a mobile device Realistic scenarios  Not real time  Not heavily dependant on performance

Questions for TIPPI Attendees What end-to-end scenarios can we enable or include with a v1 of this idea? What end-to-end scenarios can we enable in the future? Do we need to provide trusted interfaces with Mandatory Access Control (MAC) to achieve a trusted identity? Do we need to ensure the user has the only access to the Identity interfaces?

© Microsoft Corporation. All rights reserved. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.