Information Security for Managers (Master MIS)

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM Security and Encryption
9/11/2012Pomcor 1 Techniques for Implementing Derived Credentials Francisco Corella Karen Lewison Pomcor (
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Authentication Approaches over Internet Jia Li
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Configuring Directory Certificate Services Lesson 13.
Cellular Mobile Communication Systems Lecture 8
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
ITU K ALEIDOSCOPE 2013 October 18, 2012 G RIFFIN – A PRIL 2013 IEEE Global Communications 2015 Conference IoTAAL Workshop - Sunday, December 6, 2015 Security.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
CSCE 201 Identification and Authentication Fall 2015.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Information Systems Design and Development Security Precautions Computing Science.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
Outline The basic authentication problem
Wireless Network PMIT- By-
Authentication.
By Theodora Kontogianni
Trezor Support Phone Number For You!! Round The Clock
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Strong Password Authentication Protocols
Faculty of Science IT Department Lecturer: Raz Dara MA.
Mobile Phone Technology
Presentation transcript:

Information Security for Managers (Master 2013 - MIS) Mobile Identity Present: Nguyen Thi Thuy Loan

Information Security for Managers (Master 2013 - MIS) OUTLINE Introduction Mobile identity authentication Mobile Identity Management Q&A

Introduction Mobile devices Mobile phones Smart cards RFIDs

Information Security for Managers (Master 2013 - MIS) Introduction Elements of a mobile identity Information describe a mobile user’s identity. Technical access to components of a mobile identity. Third parties and exchange information.

Introduction User Identity Something I know username, password or PIN

Introduction User Identity Something I know Something I have SIM card and mobile device

Information Security for Managers (Master 2013 - MIS) Introduction User Identity Something I know Something I have Something I am location, behavioural profile or biometric parameter

Mobile identity authentication Information Security for Managers (Master 2013 - MIS) Mobile identity authentication SIM card: Tampered resistant module providing strong authentication to Internet applications and services.

Mobile identity authentication Information Security for Managers (Master 2013 - MIS) Mobile identity authentication SIM card: Include: International Mobile Subscriber Identity strong encryption functions

Mobile identity authentication Information Security for Managers (Master 2013 - MIS) Mobile identity authentication SIM card: GSM authentication Random challenge: RAND 64-bit session key Kc  128-bit Response value SRES

Mobile identity authentication Information Security for Managers (Master 2013 - MIS) Mobile identity authentication Mobile Digital Signature Proving your real-world identity to third parties. Making a legally-binding commitment by sending a confirmed message to another party. Solve security problems of the online world with identity confirmation

Mobile identity authentication Information Security for Managers (Master 2013 - MIS) Mobile identity authentication Use RSA private key in SIM card.

Mobile Identity Management Information Security for Managers (Master 2013 - MIS) Mobile Identity Management GSM-based Mobile Identity Management Profile management the information may be encrypted before it is stored on the device or transmitted to the network operator.

Mobile Identity Management Information Security for Managers (Master 2013 - MIS) Mobile Identity Management GSM-based Mobile Identity Management Profile management Exchanging mobile identities The current legal landscape already limits the way of how to reveal mobile identity information.

Mobile Identity Management Information Security for Managers (Master 2013 - MIS) Mobile Identity Management GSM-based Mobile Identity Management Profile management Exchanging mobile identities Applications for mobile identities marketing service, disaster service.

Mobile Identity Management Information Security for Managers (Master 2013 - MIS) Mobile Identity Management Mobile Identity Management System Target: Easy identity management & application access Secure and controlled mobile authentication Works with native and web based mobile apps

Mobile Identity Management Mobile Identity Management System

Mobile Identity Management Authentication in Mobile Identity Management System 3-factor authentication Smart cards that store a biometric matching template Smart cards store the biometric matching template and the matching algorithm on the card Tokens provide the full biometric authentication process (sensors, feature extraction to acquire a query template from the biometric measurement

Q&A