Internet Banking 3.0 Towards a National Secure (and private) Internet infrastructure for Online Banking.

Slides:



Advertisements
Similar presentations
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Internet, Intranet and Extranets
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
SDN and Openflow.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Electronic Transaction Security (E-Commerce)
IS Network and Telecommunications Risks
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
1 IT is About The Mission Randy Humphries Jr. Chief Information Officer NASA Glenn Research Center.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
E-Business William R. Mussatto CyberStrategies, Inc. 12/2/2000.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Network Fundamentals. Network Devices Routers (Layer 3)
Chapter 21 Distributed System Security Copyright © 2008.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Understand Internet Security LESSON Security Fundamentals.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Virtual Private Networks
Internet, Intranet and Extranets
Do you know who your employees are sharing their credentials with
Internet Identity, Safety, & Security
Overview 1. Phishing Scams
Internet, Intranet and Extranets
Internet, Intranet and Extranets
Risk of the Internet At Home
Information Security Session October 24, 2005
The IT Infrastructure I want & why – A Personal Perspective
Firewalls Routers, Switches, Hubs VPNs
Cengage Learning: Computer Networking from LANs to WANs
Unit 8 Network Security.
Designing IIS Security (IIS – Internet Information Service)
E-business and Network Security
Presentation transcript:

Internet Banking 3.0 Towards a National Secure (and private) Internet infrastructure for Online Banking

Uniken Management Team Gopi Gopalan, Chairman of the Board Sanjay Deshpande, Chief Scientific Officer Dr. Pat Shankar, Member of Scientific Advisory Board Ajay Dubey, Chief Product Architect Nanjundeashwar Ganapathy, Chief Technology Officer Prakash Salvi, Chief Delivery Officer Vivek Saxena, Chief Business Officer Nilesh Dhande, Head of DEEKSHA

Uniken Innovation Center TruSite TM (Powered by REL-ID) A website authentication technology ENZEN TM (Powered by REL-ID) An end-to-end secure channel and authentication technology NWIRe TM National Website Identity Repository CARDSIGN TM (Powered by REL-ID) An online credit card authentication technology InSENSE TM (Powered by REL-ID) An intrusion prevention technology REL-ID TM A Distributed Mutual Authentication Technology DEEKSHA TM An e-Learning business enabler service ADAPT TM Ad-Sales Management Solution FUELCORE TM Aviation Fuel Management Solution PIE TM (π) Product Innovation and Engineering Service

Internet 1.0 and 2.0!

What’s wrong with the internet ? Invention TCP/IP Distributed communication infrastructure Invention of HTML Primary objective was to distribute and communicate information Invention TCP/IP Distributed communication infrastructure Invention of HTML Primary objective was to distribute and communicate information Invention of the browser Dot Com and ecommerce boom (and bust) Banking industry’s thrust on Internet Banking (the cost reduction drive) Birth of Cyber Criminals! (well, they were already there, the world awakened to the fact that they are there) Invention of the browser Dot Com and ecommerce boom (and bust) Banking industry’s thrust on Internet Banking (the cost reduction drive) Birth of Cyber Criminals! (well, they were already there, the world awakened to the fact that they are there)

NOTHINGS WRONG WITH THE INTERNET Its cheap… Its free (as in anyone can use it), its available (almost everywhere now) Anyone can create any website, put any content, on any server, with any IP address with NO GOVERNMENT CONTROL! Its democracy at its best! If anything is wrong it is the fact that its been used for something that it was NOT designed to be used for in the first place. The designers never said it is for doing secure communications

Anatomy of the Internet Infrastructure (The fundamental reason for fraud) Customers PC (Hardware and OS) Browsers Internet(work) [DNS, Routers etc] (Banks) Servers WHAT PART OF THIS IS UNDER THE CONTROL OF THE BANK?

Internet Map of the World

Would you connect your ATM to such a network? Why would you not allow your customer to browse the internet while he is withdrawing cash? BECAUSE YOU DON’T TRUST THE INTERNET. PERIOD. Now, in case of Internet Banking – add the users PC (hardware/OS) and the Browser to this list – and you will now visualize what one is dealing with!

Internet (Banking) 3.0 A Uniken R&D Viewpoint Uniken

The future From generalization to specialization (from public to private) –TV –Radio Internet would evolve to a specialized dynamic virtual private networks (layered on top of the underlying communication framework) Browsers (or web-application entry points) would specialize (Banking Browser, Gaming Browser, News Browser, etc) The PC would have the technology to dynamically (on demand) become an specialized secure appliance Mutual Authentication would be de facto standard in identity

Uniken’s Patented Technology Secure Browser Secure Desktop Insecure Customer PC Virtual User Access Device REL-ID SoftCard ENZEN 2FA Mutual Authentication + PIN Data Tunnel (RMAP Mutually Authenticated and Encrypted) SSL Pipe

Dynamic Private Network Layer X X X X Man-in-the-middle Session Hijacking Replay Attacks Phishing Pharming Man-in-the-browser Man-on-the-machine Pharming

TRUBANK 2 STEP BANKING

Step 1: Launch (from PC or USB) and Enter PIN

Step 2: Start Banking

Messaging Add-on (Optional)

National Secure (and Private) Infrastructure for Internet Banking

Thank You