Phone: +44 7972 111149 Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT  Top Security  Mega.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Phone: Mega AS Consulting Ltd © 2007 CAT – the problem & the solution Using the CAT Top Security Mega AS C ellular.
Mega AS Consulting Ltd © 2008 CAT eAuthentication C e l l u l a r.
TER New User Setup Instructions for Funeral Homes.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Type Enter Authorized User Name & Password HolidayInn.
McAfee One Time Password
Benefit Portal for TATA COMMUNICATIONS
Help File For User Creation Click the “Course” button for Creating/Add User.
Use of this software acknowledges the acceptance of the Terms of Service licensed to Ma Foi Consulting Solutions Ltd. All rights reserved.Terms of Service.
User Registration. Click on ‘Sign Up’ button. Enter Registration details and click on submit button.
Digital Certificate Installation & User Guide For Class-2 Certificates.
© Tally Solutions Pvt. Ltd. All Rights Reserved Remote Access & SMS.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Two Factor Authentication (TFA) is a 100% Open Source, free to use security system for your Joomla site’s backend. Two Factor Authentication works in.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
WPX The smart way to go. Our interactive website allows customers secure online access for package tracking and more! WPX Delivery Solutions Track & Trace.
WPX The smart way to go. Our interactive website allows customers secure online access to track their packages. WPX Delivery Solutions Track n’ Trace Secure.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Students are able to generate a one-time login through their VTAC User Account.  The login details will need to be forwarded to the person nominated to.
Sync with BPS , Calendar, & Contacts. Press Start.
Identity on Force.com & Benefits of SSO Nick Simha.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT - Administrator  Mega.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Q: How do Ole and Lena get a shared private key? 1) Lena  LockmasterE keyLena ( ID Lena || ID Ole ) Example (Suppose Lena wants a key to shared with Ole.)
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
SharePoint Security Training Creating and Managing Users
Creating a COMMONS DEMO Account Please, try this at home.
CitiDirect Login Introduction
Online Parking System.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
How to Book a stall?. Go to Go to Register user link in book fair stall booking for new registration.
HOW TO CREATE A DCF ACCOUNT. Go to myflfamilies.com.
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Top Security  Using the CAT  Mega.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Step 1of 11 Admin Demonstrations Click Here to Start.
Creating a Kerberos ID  Go to to create your kerberos IDhttps://websec.it.siu.edu/util/id_request.html.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
GPS ACCESS as-of June 2014 Note: (Your username will always be your Employee ID and your first password will also be your Employee ID)
Yahoo Help Phone Number Get Instant Help.
Home Business Shopping Online – Purchasing goods and services using the Internet.
© Tally Solutions Pvt. Ltd. All Rights Reserved Rajlaxmi Solutions Pvt. Ltd.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
Oil and Natural Gas Corporation Ltd.
Online Training Course
The EBSCO eBooks App Authenticating the App
PPP – Point to Point Protocol
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Bigpond Contact Number  Support to update account features  Receive error messages during.
Taewan kang, Kevin huangfu
دورة للداعيات. دورة للداعيات هذه الدروس ليست لكل النساء بسم الله الرحمن الرحيم الحمد لله رب العالمين، و الصلاة و السلام على سيدنا محمد و آله و صحبه.
Multifactor Authentication & First Time Login
Check the buttons at the bottom of your Alert
Registering on the SITE is a MULTI-STEP process:
Operating Systems Security
Create an Account Click on the button next to the Create Account Click
IT & Security Training Skills.
COMP Student Account Activation
How to Set Secret Question ?.
Office 365 Login Instructions
Review - week 4 Basic device access security

Citizens Ebanking Login Process
Presentation transcript:

Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT  Top Security  Mega AS C ellular A uthentication T oken CAT

Phone: Mega AS Consulting Ltd © 2007 CAT = Maximum Security  Two Factors Authentication  What you have = Cellular token  What you know = Password  The Cellular is protected by PIN  CAT is protected by CAT Password  CAT Password used to encrypt Secret Data  CAT Password not kept on Cellular  Only Verification sentence is kept on Cellular  Encryption with the Cellular unique ID (IMEI )  After 3 minutes shuts down

Phone: Mega AS Consulting Ltd © 2007 CAT = Maximum Security  User enters a One Time Password to login  CAT Generates OTP every 60 Seconds  Hacker can not reuse old OTP  Hacker can not predict the next OTP  Hacker will look for the CAT Password on the Cellular

Phone: Mega AS Consulting Ltd © 2007 CAT = Maximum Security Usually: Password = 1111 Encryption Process Enc. Password = xxxx xxxx saved in memory Hacker finds XXXX in memory: Try word = zzzz Encryption Process zzzz = Password = 1111 Is it = xxxx ? yes no

Phone: Mega AS Consulting Ltd © 2007 CAT = Maximum Security With CAT: Password = 1111 Encryption Process Enc. Verification = xxxx xxxx saved in memory Hacker finds XXXX (Enc. Verification) in memory: Try word = zzzz Encryption Process zzzz = Enc. Verification Is it = xxxx ? yes Verification = Joe is the best + Password NOT SAVED Verification = ?????? + Password NOT FOUND

Phone: Mega AS Consulting Ltd © 2007 CAT = Maximum Security Hacker finds XXXX (Enc. Verification) in memory: Try word = zzzz Decryption Process Is it = ????? yes Enc. Verification = xxxx + Nothing to compare too No way to know when the Verification sentence is found

Phone: Mega AS Consulting Ltd © 2007 Performance  Check if user exists  Check if user enabled  Encrypt entered password  Compare with saved password  Allow access  Check if user exists  Check if user enabled  Calculate required OTP  Compare with entered OTP  Allow access Old wayCAT way