SHIFT4 PTE LTD RAYNALD ZHANG KEYON GUO AYUSH MODI MICHELLE HUANG JASMINE HAW LIU XIAOYU Improved User Security.

Slides:



Advertisements
Similar presentations
How to Sign Up for a “My AmeriCorps Online Account” Compiled from Montana and Washington Campus Compacts.
Advertisements

Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
ICT Curriculum Evening – an introduction to Wizkid.
Conceptual Model Lexicon Back – Back takes the user back to the previous screen. This is useful if the user would like to correct an item on.
Bonrix Track & Trace System A GPS Based Vehicle Tracing System (SMS, GPRS/3G, Offline) Bonrix Software Systems Ahmedabad (INDIA) Website:
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
CPanel Introduction Todd S. Thuma. cPanel: What is it? Backend administration of web-based content Provides web site management tools through a web-based,
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Another Method to Open WebSpace as a Web Folder Alternative Method for Creating Web Folder in WebSpace, Slide 1Copyright © 2004, Jim Schwab, University.
1.NET Web Forms Security Issues © 2002 by Jerry Post.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Discovering Computer 2010 Setup Student Account. Create New User Website: scsite.com/dc2010scsite.com/dc2010 Click Create a New Student Enter code:
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Online Parking System.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Mr. Verlin South Philadelphia High School September 17, 2010.
INTRODUCTION TO COMPUTER CHAPTER N0 2 INPUT & INPUT & OUTPUT DEVICES OUTPUT DEVICES INSTRUCTOR: ADEEL ANJUM ADEEL ANJUM.
Setting up an on-line account The Alberta Teachers’ Association.
Versatile online trading platform – “Shareetrade” Move to a higher level in online trading with Shareetrade - arguably the fastest and most robust trading.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Lunchbox. Overview ➲ We developed a program called Lunchbox with the purpose of allowing the administrator to create a time sheet, create an employee.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
FFT Aspire – The two websites Always use Google Chrome – Internet Explorer can be a problem with Aspire FFT Aspire contains lots of very sensitive pupil.
1 TCS Internal MyBank MyBank. 2 Content  Introduction  Data Flow Diagram  Class Diagram  Use case Diagram  Application Layouts.
1 /6 Introducing TaxWise Online’s Administrator Functions © 2006, Universal Tax Systems, Inc. All Rights Reserved. Administrator Functions Objectives –In.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
By Hello Team Awesome World™.  To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based.
Hire the Best Web Application Service Provider in Singapore
Office 2016 and Windows 10: Essential Concepts and Skills
Choosing A Username and Password
What this activity will show you
©Salesfundaa.com.
Patient access Forgotten password
The Self-Service Website
Mobile Banking What can it do for you?.
Online Banking Security
Passwords.
Reset AOL Mail Password Online How to Reset AOL Mail Password Online? Call AOL Technical Support Number to Reset AOL Mail Password by AOL.
Multifactor Authentication & First Time Login
UNIT R001: Understanding Computer Systems
Digital $$ Quiz Test your knowledge.
Start at our website at In the upper right hand corner is a link for “Office 365”
مناهــــج البحث العلمي
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
How to check out eBooks at RRHS.
USA TestPrep Registration and Use
Create New User in Database. First Connect the System.
Instructions for accessing Accelerated Learning (Stemscopes)
Title Layout Subtitle.
Security in mobile technologies
How to Download And Install McAfee Mobile Security on iOS?
PowerPoint Directions
Quickbooks Error 108 Call Now Causes of QuickBooks Error 108 Error 108 can occur due to different reasons such as – Bank has generated.
Presentation transcript:

SHIFT4 PTE LTD RAYNALD ZHANG KEYON GUO AYUSH MODI MICHELLE HUANG JASMINE HAW LIU XIAOYU Improved User Security

Industry: Infocomm Patent no. : PCT/AU2010/ Title: SYSTEM AND METHOD FOR IMPROVING SECURITY OF USER ACCOUNT ACCESS

Introduction What?  Alternative way to key in username and password for an online account Who?  Online account users Where?  Web, mobile Why?  Risk (keyboard logging, skimming devices, password guessers and phishing)

Introduction How?  Graphical display access interface  Select some characters or pictures  Compare to database

Commercialisation Plan Incorporate into our website Sell to information sensitive industries  Defence  High level management user accounts  Banks  Secret agencies

Q&A Insert correct password to ask questions