Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.

Slides:



Advertisements
Similar presentations
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
Advertisements

E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Lecture 6 User Authentication (cont)
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Graphical Passwords with Integrated Trustworthy Interface TIPPI Workshop June 19, 2006 Patricia Lareau V P Product Management.
SE571 Security in Computing
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Marjie Rodrigues
Security-Authentication
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Reliability & Desirability of Data
ICT in Banking.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Security Planning and Administrative Delegation Lesson 6.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
Scout First Time Login and Setting Up PIN Number.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
CSCE 201 Identification and Authentication Fall 2015.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Policies and Security for Internet Access
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Computer Security Set of slides 8 Dr Alexei Vernitski.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Authentication & Authorisation Is the user allowed to access the site?
Challenge/Response Authentication
Authentication Schemes for Session Passwords using Color and Images
Databases.
Challenge/Response Authentication
3.6 Fundamentals of cyber security
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Setting up an online account
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Keeping your passwords safe
Presentation transcript:

Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended recipient. It is or should be transparent. The user does not see it or is aware of it. 2.Identification – ascertaining who a person really is regardless of who they say they are. The user may or may not be aware of it. Ascertained by documents (e.g. passport) issued after an identity check has been made by some authority. The document is assumed to be reliable. Alternatively or additionally Biometrics – measuring some physical characteristic e.g. Fingerprint. Assumes the device and database are accurate. 3.Authentication – confirming a person is who they say they are regardless of who they actually are. The user is always aware of it. This applies to most applications such as website access. You may call yourself (your ID) anything you like, but you must confirm that ID with e.g. a password. It is the form with which we are all familiar e.g. online banking

Authentication vs Identification The two forms are often confused. – What may be wanted is identification but what is achieved is authentication (false passport or stolen credit card & PIN). The passport or card has been authenticated NOT the person –What is wanted is authentication but what is attempted is unnecessary identification. Often seen as a personal intrusion. What is needed in most computer applications is authentication not identification –The need is for a person to confirm who they say they are. –Many people have multiple persona (ID) on the world wide web. Very few if any, need to know who they actually are.

Passfaces is an application of authentication not identification. Passfaces is an application of authentication not identification. It is superior in all ways to the normal methods of Passwords and PIN nmbers Forget your Passwords! Who needs them! “A picture is worth a thousand words!” Many computer people are “left brained”- logic and abstract. Most users are “right brained” – pictures - especially people’s faces

Breakthrough Technology that Meets All Criteria for Strong Authentication █ Portable... Device independent, with you wherever you go █ Secure... Can’t be guessed, copied or stolen █ Low Cost... No end user hardware or software required █ Easy to Implement.. Uses existing password infrastructure █ Cross-Channel... Works on any GUI: PCs, PDAs, ATMs etc. █ Reliable... Works for everyone, every time, everywhere █ Easy to Use... Intuitive regardless of age, language, intelligence, or education. Passfaces is breakthrough, patented technology that uses the brain's natural power to recognize familiar faces. We all possess this capability regardless of age, language, intelligence, or education. Passfaces uses this remarkable ability to provide highly secure and easy to use authentication as an “unforgettable” replacement for passwords or second authenticator in two-factor systems. The Science Behind Passfaces The Science Behind Passfaces Significant research has been conducted on the human brain’s remarkable ability to recognise familiar faces. Passfaces uses this science to provide strong authentication that is fun and easy to use. If you’re into Cognitive Psychology; read “The Science Behind Passfaces”.The Science Behind Passfaces

Our brain has a natural ability to recognise familiar faces Passfaces uses faces to replace passwords

Click on Your Passface There is only one on the screen Passfaces is an innovative and dynamic approach to strong authentication that is effortless for users. The technology takes advantage of our innate ability to recognise faces, a skill present in everyone. Our software assigns users Passfaces that are then used to gain access to protected systems. Passfaces products quickly and easily integrate into any web application currently using passwords. This approach dramatically reduces the implementation time as well as the cost typically required for increased authentication security. Faces are used instead of alpha numeric characters as an access code. New users sign up for Passfaces and are assigned a set of 5 separate face images. Users complete a short familiarization process to get to know their Passfaces. During log on, users pick each of their assigned Passfaces from individual 3 by 3 grids. Find out more on Forget your Passwords!

Passfaces are a visual alternative to the common password, based on our natural ability to recognize faces. Passfaces are NOT a biometric, like a fingerprint reader, or a smartcard, they require no extra hardware, and there is nothing you have to carry around with you. The way it works is like this… When you enrol you’re given a set of faces to remember, five to be exact. Once you've gone through a simple practice session, you’re ready to log in. Like most web sites, you'll type in your username but instead of entering a password, you'll be shown the first of five grids of faces. Somewhere within each group, in a different place each time you log in, there will be a face you recognise; one of your Passfaces. Click on the face you recognize, repeat for the next four grids, and you’re logged in. It’s as simple as that! Unlike passwords or PINs, Passfaces: Are easy to remember and can’t be written down or passed on Passwords and PINs can often be guessed A compromised Biometric cannot be changed Are self prompting. If you think you have forgotten, it reminds you. Biometric technology is expensive and impractical for home/ internet This amazingly simple system harnesses the human brain’s natural ability to recognise faces to provide a number of advantages over passwords, PINs and Biometrics See more and try it for yourself at The Passface Concept

How Passfaces Works Faces are used instead of alpha numeric characters as an access code. New users sign up for Passfaces and are assigned a set of 5 separate face images. Users complete a quick familiarization process to get to know their Passfaces. During log on, users pick each of their assigned Passfaces from individual 3 by 3 grids

Passfaces Work Even after over 2 years with no intermediate use, users have logged in successfully on their first or second attempt “Passfaces is one of those products that just works. We never have any problems with it.” CSO, Major US Government Agency.

Go to website The science behind Passfaces Start again Start again