Willing to coordinate DS-2-2014: Access Control Argus: multi-factor authentication Professor Hui Wang, Dr Omar Nibouche Computer Science Research Institute,

Slides:



Advertisements
Similar presentations
1 Identification Who are you? How do I know you are who you say you are?
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Controls for Information Security
Biometrics: Identity Verification in a Networked World
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
The Office of Information Technology Two-Factor Authentication.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 10: Authentication Guide to Computer Network Security.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
BUSINESS B1 Information Security.
DRS Crisis management topic 7: Crises and disaster resilience – operationalizing resilience concepts Dr Glenn Hawe and Professor Hui Wang University.
Secure Societies 2014 Working programme University of ULSTER (UU), United Kingdom University of ULSTER (UU), United Kingdom Prof. Hui Wang, Dr. Jun Liu,
3D password Umesh ECE.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
COMPSCI 705 / SOFTENG 702 Exam Review Lecture Jim Warren Professor of Health Informatics Course coordinator CS705/SE702.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory PIV Pilot Usability Lessons Learned.
Awicaksi E-Commerce Security & Payment System E-Commerce.
3D PASSWORD FOR SECURE AUTHENTICATION
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Welcome Topic : Security.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Physical security By Ola Abd el-latif Abbass Hassan.
Chris Calderon – February 2016 MIS 534 Information Security Management.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
CSCE 201 Identification and Authentication Fall 2015.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
3D Password.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Onsite CRM Security
Unobtrusive Authentication Using ACTIvity Related and Soft BIOmetrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
System Access Authentication
Goodbye to Passwords.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Issues with Your D-Link Router; Call D-Link Router Customer Support Number
Operating Systems Security
Biometric technology.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Pervasive Computing Happening?
Hybrid Finger print recognition
Zachary blum Sam Garcia Courtney Sullivan
PLANNING A SECURE BASELINE INSTALLATION
COEN 351 Authentication.
Presentation transcript:

Willing to coordinate DS : Access Control Argus: multi-factor authentication Professor Hui Wang, Dr Omar Nibouche Computer Science Research Institute, University of Ulster, UK

Argus: multi-factor authentication Aim: The Argus project will address issues related to granting access to facilities, equipment and networks only to the people that are entitled to it Objectives:  Management of access rights, avoiding single point of failure  Multi-factor authentication: knowledge ("something only the user knows“, password), possession ("something only the user has“, handheld device or application specific device) and inherence ("something only the user is“, biometric traits)  Use of biometrics and handheld devices  Implementation of countermeasures such as combining biometric information from multiple sources.

Project team Ulster expertise  Semantic analytics to make sense of data  Deductive and inductive data analysis, pattern recognition  Risk analysis and management  Decision support system, and GIS-based DSS  Video and text analytics, text summarisation  Single/multi modal biometrics: face, iris, palmprint, fingerprint  Hardware and DSP Desired Partners  Experts in data encryption and biometrics.  Mobile computing and smart card programming practitioners  Networking and HCI specialists  End users  National and international law enforcement agency