Download presentation
Presentation is loading. Please wait.
Published byAlivia Chivington Modified over 9 years ago
1
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa
2
2 What is the process of securing a web application?
3
3
4
4 What is the most common method of end user security?
5
5 Password! (user name and password combination)
6
6 What is the weakest method for end user security?
7
7 Password!!
8
8 Why do we keep using the weakest form of security as the most widely used form of security?
9
9 Many reasons … Historical reasons Ease of use reasons Ease of deployment reasons
10
10 What are the alternatives for strengthening the security of end users?
11
11 Change from the paradigm of “something you know” to a “something you have” or “something you are”
12
12 What is practical for end users of web applications?
13
13 Something you have? A physical token Mag strip card Smart card with chip
14
14 A physical token based end user security scheme could be impractical At present, need specialized hardware This could change in the future
15
15 Something you are? A biometric Fingerprint scan Iris scan Retina scan
16
16 A biometric based end user security scheme could be impractical At present, need specialized hardware This could change in the future
17
17 What are the other alternatives?
18
18 Direct Two Factor Security Schemes
19
19 Combine “Something you know” with “Something you have” ATM card with PIN
20
20 Combine “Something you know” with “Something you are” Thumb print with Employee ID
21
21 The practical problems making direct two factor security schemes impractical still persists...
22
22 Are there any more alternatives?
23
23 Indirect Two Factor Security Schemes
24
24 The key idea is to use Two Channels of Communication
25
25 The First Channel Web Application Accessed through the computing device and Internet
26
26 The Second Channel Indirect Communication Email, SMS, Post
27
27 How does it work?
28
28 e-Post user enters the User ID Receives a randomly generated number in a SMS
29
29 Prerequisites Register the mobile phone number with e-Post Service Can be done at the time of registering for service
30
30 e-Post user enters the User ID Enters random number From a list of numbers received through Post
31
31 Prerequisites Receive the list of numbers periodically Users registered for services receive through post
32
32 Important Lesson #1 No secret password that a user needs to remember
33
33 Important Lesson #2 No special hardware or software required
34
34 Important Lesson #3 Must be usable Anytime Anywhere
35
35 Important Lesson #4 No single solution fits all users!
36
36 Important Lesson #5 Must be intuitive to use No learning curve No training
37
37 Important Lesson #6 Must be difficult for users to make mistakes
38
38 Important Lesson #7 Must be secure against hacking No stored secrets to steal!
39
39 Important Lesson #8 Must be secure against phishing No easy way to trick the user!
40
40 Important Lesson #9 Must be fast No complicated processing at the user (front end) or at the service (back end)
41
41 Important Lesson #10 Important Lesson #11 Important Lesson #12...
42
42 Thank You chandag@cse.mrt.ac.lk
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.