Download presentation
Presentation is loading. Please wait.
1
Taewan kang, Kevin huangfu
Application Security Taewan kang, Kevin huangfu
2
Importance of Application Security
1.jpg
4
Did we get better? According to IBM X-Force, the annual growth rate in disclosed application vulnerabilities was 60% from 1996 to 2006, and is only 9% from 2006 to 2014.
5
How it improved? more compliance standards
adopting secure coding practices.
6
Two-Factor Authentication
Multi-Factor Authentication One-Factor: Something the user knows (i.e. password) Two-Factor: Something the user has (i.e. verification code) Three-Factor: Something the user is (i.e. fingerprint scan)
7
How It Works A secondary check in addition to a password (one-factor)
Uses tokens during a secondary authentication step Tokens Hard Tokens: hardware devices that user carries Soft Tokens: software-based security tokens
8
Mobile Authentication
Hard token Soft Token Three-Factor
9
Pros and Cons: Two-Factor
Provides high level protection at reasonable costs (98% coverage) Easy to implement Many ways to implement Less effective than three-factor authentication (99.99% coverage) Near useless if hackers hack into your method of secondary authentication
10
Web-Application Demonstration
11
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol (SMTP) Internet standard for electronic mail SMTP servers are responsible for delivery
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.