We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byClaire Greene
Modified over 3 years ago
All Rights Reserved © Alcatel-Lucent 2008, ##### Demo: Voice Phishing Prevention by Authenticated Display-name Stanley Chow, Christophe Gustave, Dmitri Vinokurov IPTComm, July 2, 2008
All Rights Reserved © Alcatel-Lucent 2008 2 | RealName Demo – IPTComm 2008 | July 2008 The problem – Voice Phishing Someone calls you claiming to be from Deutsche Bank, and CallerID agrees. Question: Is the caller really from Deutsche Bank? If we want to authenticate a company, what is a company? Legal name? Many companies have complex structures that are unknown outside the company; joint ventures, branches, outsourcing, etc. Phone number? No way to know them all. Spoofable. Name in phone book? Words Deutsche and Bank present in 24 names in NA phone directories: Deutsche Bank Ag, Alex Brown-Deutsche Banc., West Deutsche Bank, Deutsche Bank Berkshire Mortgage, Deutsche Bank Florida Na, … plus DB abbreviation in lot of names. Domain name? The only way to get to the web site of Matsushita Electric Industrial Co., Ltd. is to go to www.panasonic.net Brand? People think of The Brand and associate the company with it. Names are not unique: different jurisdictions may allow the same name.
All Rights Reserved © Alcatel-Lucent 2008 3 | RealName Demo – IPTComm 2008 | July 2008 Solution - Demo scenarios Routine calls (from friends, family members, …) - no need to authenticate. To authenticate a call, user clicks Confirm Name button. Failed authentication. The display shows the Authentication failed result. Successful authentication. The display shows the registered name, the approving registry, and the result. Complicated phishing case. Legitimate DB Consulting name is authenticated by Health Industry registry, but pretending to be the Deutsche Bank division. Authentication succeeds but verified by irrelevant registry, thus banking phishing fails. www.ProveRealName.com Authenticated Deutsche Bank Registry: Canadian Banks
All Rights Reserved © Alcatel-Lucent 2008 4 | RealName Demo – IPTComm 2008 | July 2008 www.alcatel-lucent.com
Florida Institute of Technology - Evans Library “Women in Science” Display March – July 2006 © Florida Institute of Technology - All rights reserved PHOTO.
Introduction to Software Installation: Installation of Hotel Management System is very easy and User friendly. Software gets Installed in very less time.
Unit 21 – Creating Computer Graphics. Logo Static ButtonRoll Over Button Advertising Banner Navigation Bar.
Global Transaction Bank Deutsche Bank Investor Reporting Demo.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Registering a Foreign Medical Device in China Prepared by: Diversity Medical Services A Division of Shanghai Jian Tong Medical Equipment Company Ltd.
© Alcatel-Lucent Worldwide Teen Lab 2008 Technologies that can save the Earth By Wataru, Japan, 16 and Ryo, Japan, 17.
Skype Presentation By Dallas Brezina Skype is a software that allows you to instant message and make voice and video calls to fellow Skype users on the.
© 2013 Software AG. All rights reserved. ARIS Interactive Guide helps you to find buttons and functionality from ARIS 7.2 in ARIS 9. Start After starting.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
China's first international exchange for industrial property Rightsite Website Technology (Shanghai) Co. Ltd.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved INTERNAL iSupport platform operation guide ISSUE 1.0.
10/20/2009 Loomi Liao. The problems Some anti-phishing solutions The Web Wallet solutions The Web Wallet User Interface User study Discussion.
July 24, 1998 Matsushita Electric Industrial Co., Ltd. Technical Proposal for DVD-R File System Specifications WG3-7/24/98-7.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Contact Arvind Verma Corporate Profile.
Phone: Mega AS Consulting Ltd © 2007 CAT – the problem & the solution Using the CAT - Administrator Mega.
Locate Caller is a system That can give you location of a person whenever you want What is Locate Caller ?
By: Star Duncan & Hannah Cole Computer Apps 4 th Period.
By GANGADHARAN V.D F OUNDER OF WIPRO AZIM HASHIM PREMJI.
SpeechTek West 2007 Automating Password Reset to Make Employees More Efficient Jason Groshart Director of Product Engineering Password Reset.
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
We are a company providing outsourced accounting and bookkeeping services, legal outsourcing, as well as tax consulting and registration of international.
Leave of Absence Administration Updated August 2012.
Would you be more likely to take a piece of candy from a trusted friend or a complete stranger? Explain.
Innovative Business Solutions November 2015 I Dario Belić I director of IT Development Service, ICT Division, FINA, Croatia National Identification and.
PRODUCT TRAINING Installation. Installation Walk-through 1. Run Setup.exe. NOTE: Running the MSI installer without installing the pre-requisite will give.
© 2014 Avaya Inc. All rights reserved. 11 Mockups: This is the App Icon that should appear on the Mobile Phone.
Introduction to Banking. Canadian Banking Banks are businesses that sell services and make a profit Money is made by charging and collecting interest.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
The Domain Name System (DNS) By Alex Kamau B101 Technology Context.
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
Lenovo Loyalty Programme – Guide. 2© 2011 Lenovo Confidential. All rights reserved. At Lenovo we wish to help our partners to grow and earn more profit.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Are you buried in paper and daunted by the details of managing group travel?
All presentation contents and graphics are Copyright © 2010 New Concept Travel Technologies LTD. All Rights Reserved. Help Desk: +(972) August.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
NamesBeyond.Com.Jobs Registration Process Updated: 23-Mar-06.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
1SCBOE Technology Dept. - Nov
System for Increasing Net Profits Without Increasing Marketing Budgets 2009 NetProfitQuest Pte Ltd. All rights reserved. How to get your business noticed.
Patient Friendly Registration and Billing Kim Tilley IS Specialist Citizens Memorial Healthcare November 8, 2006.
1 SLIDE Insurance Company Regulation Division Insurance Market Regulation Division Medical Professional Liability Insurance Claim Reports Online Claim.
Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Seidenberg School of Computer Science and Information Systems.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
© 2017 SlidePlayer.com Inc. All rights reserved.