Implementing Secure Converged Wide Area Networks (ISCW)

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 12 Network Security.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Guide to Computer Network Security
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Firewalls.
Security in Networking
Firewalls Routers, Switches, Hubs VPNs
Introduction to Network Security
Presentation transcript:

Implementing Secure Converged Wide Area Networks (ISCW)

Mitigating Network Attacks Lesson 2 – Module 5 – ‘Cisco Device Hardening’

Module Introduction The open nature of the Internet makes it increasingly important for businesses to pay attention to the security of their networks. As organisations move more of their business functions to the public network, they need to take precautions to ensure that attackers do not compromise their data, or that the data does not end up being accessed by the wrong people. Unauthorised network access by an outside hacker or disgruntled employee can wreak havoc with proprietary data, negatively affect company productivity, and stunt the ability to compete. Unauthorised network access can also harm relationships with customers and business partners who may question the ability of companies to protect their confidential information, as well as lead to potentially damaging and expensive legal actions.

Objectives At the completion of this second lesson, you will be able to: Describe some of the more common network attacks, and explain what effect they have on the network Explain how to mitigate the effects of these common attacks

Reconnaissance Reconnaissance is the unauthorised discovery and mapping of systems, services, or vulnerabilities. Reconnaissance is also known as information gathering, and in most cases, precedes an access or Denial of Service (DoS) attack. The malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive and then determines which services or ports are active on the live IP addresses. The intruder then queries the ports to determine the type and version of the application and operating system that is running on the target host. Reconnaissance attacks can consist of the following: Packet sniffers Port scans Ping sweeps Internet information queries

Attacks Based on Minimal Intelligence Attacks that require little intelligence about the target network: Reconnaissance Access attacks DoS and Distributed DoS (DDoS)

Attacks Based on Intelligence or Insider Information Attacks that typically require more intelligence or insider access: Worms, viruses, and Trojan horses Application layer attacks Threats to management protocols

Packet Sniffing A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN Packet sniffers can only work in the same collision domain as the network being attacked Promiscuous mode is a mode in which the network adapter card sends all packets that are received on the physical network wire to an application for processing Some network applications distribute network packets in plaintext. Because the network packets are not encrypted, the packets can be processed and understood by any application that can pick them off the network and process them Because the specifications for network protocols, such as TCP/IP, are widely published, a third party can easily interpret the network packets and develop a packet sniffer. Numerous freeware and shareware packet sniffers are available that do not require the user to understand anything about the underlying protocols

Packet Sniffers A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. Packet sniffers: Exploit information passed in plaintext. Protocols that pass information in plaintext are Telnet, FTP, SNMP, POP, and HTTP. Must be on the same collision domain. Can be used legitimately or can be designed specifically for attack.

Packet Sniffer Mitigation The techniques and tools that can be used to mitigate packet sniffer attacks include: Authentication Using strong authentication is a first option for defense against packet sniffers. Cryptography If a communication channel is cryptographically secure, the only data a packet sniffer detects is cipher text (a seemingly random string of bits) and not the original message Anti-sniffer tools Antisniffer tools detect changes in the response time of hosts to determine whether the hosts are processing more traffic than their own traffic loads would indicate. Switched infrastructure A switched infrastructure obviously does not eliminate the threat of packet sniffers but can greatly reduce the sniffers’ effectiveness.

Port Scans and Ping Sweeps As legitimate tools, port scan and ping sweep applications run a series of tests against hosts and devices to identify vulnerable services The information is gathered by examining IP addressing and port or banner data from both TCP and UDP ports Essentially, a port scan consists of sending a message to each port, one port at a time. The kind of response that the sender receives indicates whether the port is used and can therefore be probed for weakness A ping sweep, or ICMP sweep, is a basic network scanning technique that determines which range of IP addresses map to live hosts

Port Scans and Ping Sweeps Port scans and ping sweeps attempt to identify: All services All hosts and devices The operating systems Vulnerabilities

Port Scan and Ping Sweep Mitigation Port scanning and ping sweeping is not a crime and there is no way to stop these scans and sweeps when a computer is connected to the Internet There are ways to prevent damage to the system Ping sweeps can be stopped if ICMP echo and echo-reply are turned off on edge routers When these services are turned off, network diagnostic data is lost Network-based IPS and host-based IPS (HIPS) can usually notify when a reconnaissance attack is under way ISPs compare incoming traffic to the intrusion detection system (IDS) or the IPS signatures in the IPS database. Signatures are characteristics of particular traffic patterns. A signature, such as “several packets to different destination ports from the same source address within a short period of time,” can be used to detect port scans A stealth scan is more difficult to detect, and many intrusion detection and prevention systems will not notice this scan taking place. Discovering stealth scans requires kernel-level work

Port Scan and Ping Sweep Mitigation Port scans and ping sweeps cannot be prevented without compromising network capabilities. However, damage can be mitigated using intrusion prevention systems at network and host levels.

Internet Information queries DNS queries can reveal information such as who owns a particular domain and what addresses have been assigned to that domain Ping sweeps of addresses revealed by DNS queries can present a picture of the live hosts in a particular environment After such a list is generated, port scanning tools can cycle through all well-known ports to provide a complete list of all services that are running on the hosts that the ping sweep discovered. Hackers can examine the characteristics of the applications that are running on the hosts, which can lead to specific information that is useful when the hacker attempts to compromise that service IP address queries can reveal information such as who owns a particular IP address or range of addresses and which domain is associated with the addresses

Internet Information queries Sample IP address query Attackers can use Internet tools such as “WHOIS” as weapons.

Access Attacks and Mitigation Access attacks exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information for these reasons: Retrieve data Gain access Escalate their access privileges Access attacks can be performed in a number of different ways Password attacks Trust exploitation Port redirection Man-in-the-middle attacks Buffer overflow

Password Attacks Hackers implement password attacks using the following: Brute-force attacks Trojan horse programs IP spoofing Packet sniffers

Password Attacks Password attacks can be implemented using several methods, including brute-force attacks, Trojan horse programs, IP spoofing, and packet sniffers. One security risk is the fact that passwords can be stored as plaintext. To overcome this risk, passwords should be encrypted. On most systems, passwords are run through an encryption algorithm to generate a one-way hash. In granting authorisation, the hashes are calculated and compared rather than using the plain password. To use this encryption method, you supply an account and password during the login process, and the algorithm generates a one-way hash. This hash is compared to the hash stored on the system. If they are the same, the system assumes that the proper password was supplied.

Password Attack Example L0phtCrack takes the hashes of passwords and generates the plaintext passwords from them Passwords are compromised using one of two methods: Dictionary cracking Brute-force computation

Password Attack Mitigation Password attack mitigation techniques: Do not allow users to use the same password on multiple systems Disable accounts after a certain number of unsuccessful login attempts Do not use plaintext passwords For example “strong” passwords. (Use “mY8!Rthd8y” rather than “mybirthday”)

Trust Exploitation Trust exploitation refers to an individual taking advantage of a trust relationship within a network. An example of when trust exploitation takes place is when a perimeter network is connected to a corporate network. These network segments often contain DNS, SMTP, and HTTP servers. Because these servers all reside on the same segment, a compromise of one system can lead to the compromise of other systems if those other systems also trust systems that are attached to the same network. Another example of trust exploitation is a Demilitarised Zone (DMZ) host that has a trust relationship with an inside host that is connected to the inside firewall interface. The inside host trusts the DMZ host. When the DMZ host is compromised, the attacker can leverage that trust relationship to attack the inside host.

Trust Exploitation A hacker leverages existing trust relationships. Several trust models exist: Windows: Domains Active directory Linux and UNIX: NIS NIS+

Trust Exploitation Trust exploitation-based attacks can be mitigated through tight constraints on trust levels within a network Systems that are inside a firewall should never absolutely trust systems that are outside a firewall. Absolute trust should be limited to specific protocols and, where possible, should be validated by something other than an IP address In the DMZ example, the hacker connected to the Internet has already exploited some vulnerability of the DMZ host connected to the DMZ interface of the firewall The hacker’s next goal is to compromise the inside host that is connected to the inside (trusted) interface of the firewall To attack the inside host from the DMZ host, the hacker needs to find the protocols that are permitted from the DMZ to the inside interface. Once the protocols are known, the attacker searches for vulnerabilities on the inside host. This attack can be stopped if the firewall allows only minimum or no connectivity from the DMZ to the inside interface

Trust Exploitation Attack Mitigation Trust levels within a network are tightly restrained by ensuring that systems inside a firewall never absolutely trust systems outside the firewall.

Port Redirection A port redirection attack is a type of trust exploitation attack that uses a compromised host to pass traffic through a firewall that would otherwise have been dropped. Port redirection bypasses the firewall rule sets by changing the normal source port for a type of network traffic. You can mitigate port redirection by using proper trust models that are network-specific. Assuming a system is under attack, an IPS can help detect a hacker and prevent installation of such utilities on a host.

Port Redirection The host outside the network can reach the host on the public services segment (Host A), but not the host on the inside (Host B). The host on the public services segment can reach the host on both the outside and the inside. If hackers are able to compromise the public services segment host, they can install software to redirect traffic from the outside host directly to the inside host. Though neither communication violates the rules that are implemented in the firewall, the outside host has now achieved connectivity to the inside host through the port redirection process on the public services host. An example of an application that provides that type of access is Netcat.

“Man-in-the-Middle” Attacks Man-in-the-middle attacks have these purposes: Theft of information Hijacking of an ongoing session to gain access to your internal network resources Traffic analysis to obtain information about your network and network users DoS Corruption of transmitted data Introduction of new information into network sessions An example of a man-in-the-middle attack is when someone working for your ISP gains access to all network packets that transfer between your network and any other network Man-in-the-middle attacks can be mitigated by encrypting traffic in a VPN tunnel. Encryption allows the hacker to see only cipher text

Man-in-the-Middle Attacks and their Mitigation A man-in-the-middle attack requires that the hacker has access to network packets that come across a network A man-in-the-middle attack is implemented using the following: Network packet sniffers Routing and transport protocols Man-in-the-middle attacks can be effectively mitigated only through the use of cryptographic encryption

DoS and DDoS Attacks and Mitigation A DDoS attack and the simpler version of a DoS attack on a server, send extremely large numbers of requests over a network or the Internet These many requests cause the target server to run well below optimum speeds. Consequently, the attacked server becomes unavailable for legitimate access and use By overloading system resources, DoS and DDoS attacks crash applications and processes by executing exploits or a combination of exploits DoS and DDoS attacks are the most publicised form of attack and are among the most difficult to completely eliminate The hacker community regards DoS attacks as trivial and considers them unsophisticated because the attack requires so little effort to execute

DoS and DDoS Attack Characteristics A DoS attack damages or corrupts your computer system or denies you and others access to your networks, systems, or services Distributed DoS technique performs simultanous attacks from many distributed sources DoS and DDoS attacks have these characteristics: Generally not targeted to gain access or information Require very little effort to execute Difficult to eliminate, but their damage can be minimised DoS and DDoS attacks can use IP spoofing

DDoS Attack Risks DDoS attack risks include: Downtime and productivity loss Revenue loss from sales and support services Lost customer loyalty Theft of information Extortion Stock price manipulation Malicious competition Some of the risks associated with DoS attacks: Downtime and productivity loss. Revenue loss from sales and support services during the outage: Companies that use websites for commerce, vital support services, or the core business, such as a news service or search engine, stand to lose the most from a DDoS attack. Lost customer loyalty: If a customer uses a competitor’s website during the preferred supplier’s DDoS-related outage, the customer might transfer his or her loyalty to the competitor, resulting in ongoing revenue loss. Theft of information: Hackers sometimes launch DDoS attacks as a diversion while they snoop through confidential customer or company information, such as credit card numbers or intellectual property. Extortion: Attackers offer to stop (or not initiate) a DDoS attack for a cash payment. Stock price manipulation: For certain types of businesses, an unavailable website sends the stock price down. Attackers can launch a DDoS attack to profit from day trading. Malicious competition: Attackers can launch DDoS attacks against competitors.

DDoS Attack Example

DoS and DDoS Attack Mitigation The threat of DoS and DDoS attacks can be reduced using: Anti-spoof features on routers and firewalls Proper configuration of anti-spoof features on your routers and firewalls can reduce your risk of attack. These features include an appropriate filtering with access lists, unicast reverse path forwarding that looks up the routing table to identify spoofed packets, disabling of source route options, and others. Anti-DoS features on routers and firewalls Proper configuration of anti-DoS features on routers and firewalls can help limit the effectiveness of an attack. These features often involve limits on the amount of half-open TCP connections that a system allows at any given time. Traffic rate limiting at the ISP level An organization can implement traffic rate limiting with the organization’s ISP

IP Spoofing in DoS and DDoS IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer. IP spoofing can use either a trusted IP address in the network or a trusted external IP address. Uses for IP spoofing include: Injecting malicious data or commands into an existing data stream Diverting all network packets to the hacker who can then reply as a trusted user by changing the routing tables IP spoofing may only be one step in a larger attack. IP spoofing is a technique a hacker uses to gain unauthorized access to computers. In IP spoofing, the intruder sends messages to a computer with an IP address that indicates that the message is coming from a trusted host. To engage in IP spoofing, hackers must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers to appear as though packets are coming from that trusted host. In addition, the attacker can engage other unsuspecting hosts to also generate traffic that appears as though this traffic too is coming from the trusted host, thus flooding the network. Routers determine the best route between distant computers by examining the destination address. The originating address is ignored by routers. However, the destination machine uses the originating address when the machine responds back to the source. In a spoofing attack, the intruder sends messages to a computer indicating that the message has come from a trusted system. For example, an attacker outside your network pretends to be a trusted computer, either by using an IP address that is within the range of IP addresses for your network or by using an authorized external IP address that your network trusts and provides specified resource access to. To be successful, the intruder must first determine the IP address of a trusted system and then modify the packet headers so that the packets appear to be coming from the trusted system. The goal of the attack is to establish a connection that allows the attacker to gain root access to the host and to create a backdoor entry path into the target system. Normally, an IP spoofing attack is limited to the injection of data or commands into an existing stream of data that passes between a client and server application or a peer-to-peer network connection. To enable bidirectional communication, the attacker must change all routing tables to point to the spoofed IP address. Another approach the attacker could take is to simply not worry about receiving any response from the applications. For example, if an attacker is attempting to get a system to mail a sensitive file, application responses are unimportant. If an attacker manages to change the routing tables to divert network packets to the spoofed IP address, the attacker can receive all network packets that are addressed to the spoofed address and reply just as any trusted user. Like packet sniffers, IP spoofing is not restricted to people who are external to the network. IP spoofing can also provide access to user accounts and passwords or be used in other ways. For example, an attacker can emulate one of your internal users in ways that prove embarrassing for your organization. The attacker could send e-mail messages to business partners that appear to have originated from someone within your organization. Such attacks are easier to accomplish when an attacker has a user account and password, but the attacks are also possible when attackers combine simple spoofing attacks with knowledge of messaging protocols.

IP Spoofing Attack Mitigation The threat of IP spoofing can be reduced, but not eliminated, using these measures: Access control configuration Encryption RFC 3704 filtering Additional authentication requirement that does not use IP address-based authentication; examples are: Cryptographic (recommended) Strong, two-factor, one-time passwords Access Control Configuration The most common method for preventing IP spoofing is to properly configure access control. To reduce the effectiveness of IP spoofing, configure the access control list (ACL) to deny any traffic from the external network that has a source address that should reside on the internal network. This configuration helps to prevent spoofing attacks only if the internal addresses are the only trusted addresses. If some external addresses are trusted, this method is not effective. Encryption Another possible way to prevent IP spoofing is to encrypt all network traffic to prevent source and destination hosts from being compromised. RFC 3704 Filtering You can prevent your network users from spoofing other networks (and be a good Internet citizen at the same time) by preventing any outbound traffic on your network that does not have a source address in your the IP range of your organization. This filtering denies any traffic that does not have the source address that was expected on a particular interface. For example, if an ISP is providing a connection to the IP address 15.1.1.0/24, the ISP could filter traffic so that only traffic sourced from address 15.1.1.0/24 can enter the ISP router from that interface. Note that unless all ISPs implement this type of filtering, the effectiveness is significantly reduced. RFC 3704 covers ingress filtering for multihomed networks. It updates RFC 2827. RFC 2827 defines filters to drop packets that come from source addresses within 0.0.0.0/8, 10.0.0.0/8, 127.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/4, or 240.0.0.0/4. This source address is a so-called Martian Address. Additional Authentication The most effective method for mitigating the threat of IP spoofing is to eliminate the attack’s effectiveness. IP spoofing can function correctly only when devices use IP address-based authentication; therefore, if you use additional authentication methods, IP spoofing attacks are irrelevant. Cryptographic authentication is the best form of additional authentication. However, when cryptographic authentication is not possible, strong two-factor authentication using OTPs can also be effective.