SlideShare una empresa de Scribd logo
1 de 14
SECURE INTERNET
BANKING
AUTHENTICATION

AARTHI KANNAPPAN
DHIVYAA.R
MAHA LAKSHMI.S
Network Security

Offline cre
tion
c
dential
odu
tr
In
Attacks on
Onl
Sho
ine
rt t
authentication
ime
cha
pwd
n
tives
objec

nel

Abstract

Conclusion

tack
At

omy
xon
ta

e bas
t
rtifica
Ce

l u ti o n
ed so
2
PRESENTATION
OBJECTIVES

 Understand network security services
 Be aware of vulnerabilities and threats
 Realize why network security is necessary
 Highly attractive solution for valuable and
secure future.
3
ABSTRACT
The authors present two challenge response Internet
banking authentication solutions
 one based on short-time passwords
 and one on certificates
attacks on authentication
transaction-signing option

4
INTRODUCTION


The Internet is an integral part of our
daily lives, and the proportion of people
who expect to be able to manage their
bank accounts anywhere, anytime is
constantly growing
 This article describes current
Authentication threats and two proposed
solutions as well as how these solutions
can be extended in the face of more
complex future attacks
5
ATTACKS ON AUTHENTICATION
 Internet banking systems must

authenticate users before granting
them access to particular services.
 successful authentication
eventually enables users to access
their private information. We can
classify all Internet banking
authentication methods according
to their resistance to two types of
common attacks

 offline credential-stealing
attacks
 online channel-breaking
attacks
6
Offline credential-stealing attacks
 Security precautions can
help users protect
themselves from
malicious software.
 For example-- installing
and maintaining a
firewall and up-to date
antivirus software,
regularly applying
operating system and
browser patches
7
Online channel-breaking attack
 The intruder noticeably
intercepts messages between
the client PC and the
banking server by
masquerading as the server
to the client and vice versa
 Online channel-breaking
attacks don’t necessarily
compromise the user’s
credentials but the
session’s credentials and
therefore typically require
the user-initiated banking
session to work properly.

8
AN ATTACK TAXONOMY

Taxonomy of Internet banking authentication methods. Methods
are classified according to their resistance against offline
credential-stealing and online channel-breaking attacks .

9
SHORT-TIME PASSWORD
SOLUTION
 It uses symmetric cryptography in combination with a hardware
security module .
User authentication works as follows:
1. The user connects to the Internet banking
2. The user claims his or her identity by entering an account number
in the bank’s login form
3. The user opens his or her smart card by entering the corresponding
PIN in the reader before entering the given challenge.
4. The user manually copies the shown response to the bank’s login
form to be checked by the bank’s authentication server.
10
The Need for Web Security

11
CERTIFICATE-BASED SOLUTION
User authentication works as
follows.
 First, the user establishes an
SSL/TLS channel between
the user PC and
the bank’s Web server by
setting up an SSL/TLS
session without client
authentication.
Once the card is available,
its certificates become visible
in the Web browser.
12
Conclusion
Internet banking has turned into
an arms race between financial
institutions and public network
attackers.
Both solutions offer high
security against common attacks.
However, changing legislation
and the eventually spread of e-IDs
among customers makes this
solution a highly attractive and
valuable alternative for the future.
13
THANK YOU
Network
security!!!!!!!!

14

Más contenido relacionado

Destacado

What’s new with Windows Azure / Karl Ots @ AppTalk Tampere
What’s new with Windows Azure / Karl Ots @ AppTalk TampereWhat’s new with Windows Azure / Karl Ots @ AppTalk Tampere
What’s new with Windows Azure / Karl Ots @ AppTalk TampereKarl Ots
 
Social Stream Draft v1 Duy Doan
Social Stream Draft v1 Duy DoanSocial Stream Draft v1 Duy Doan
Social Stream Draft v1 Duy DoanTai Tran
 
Retirement Plans: 10 Things You Should Know
Retirement Plans: 10 Things You Should KnowRetirement Plans: 10 Things You Should Know
Retirement Plans: 10 Things You Should KnowRudy Trebels
 
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...conselleria educacion
 
Geotermikus energia projektek Toskánában és Magyarországon
Geotermikus energia projektek Toskánában és MagyarországonGeotermikus energia projektek Toskánában és Magyarországon
Geotermikus energia projektek Toskánában és MagyarországonLuca Madiai
 
St.George's Acquisition by Westpac Analysis
St.George's Acquisition by Westpac AnalysisSt.George's Acquisition by Westpac Analysis
St.George's Acquisition by Westpac AnalysisTai Tran
 
Campbell River Community Meeting October 22, 2013
Campbell River Community Meeting October 22, 2013Campbell River Community Meeting October 22, 2013
Campbell River Community Meeting October 22, 2013Island Health
 
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9Tai Tran
 
How to use Facebook as a Social Customer Relationship Management tool for FREE
How to use Facebook as a Social Customer Relationship Management tool for FREEHow to use Facebook as a Social Customer Relationship Management tool for FREE
How to use Facebook as a Social Customer Relationship Management tool for FREETai Tran
 
La influencia de la literatura universal en los videojuegos
La influencia de la literatura universal en los videojuegosLa influencia de la literatura universal en los videojuegos
La influencia de la literatura universal en los videojuegosMercedes Pardo Céspedes
 
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...Mercedes Pardo Céspedes
 
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptx
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptxHist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptx
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptxScott E Thornton
 

Destacado (20)

What’s new with Windows Azure / Karl Ots @ AppTalk Tampere
What’s new with Windows Azure / Karl Ots @ AppTalk TampereWhat’s new with Windows Azure / Karl Ots @ AppTalk Tampere
What’s new with Windows Azure / Karl Ots @ AppTalk Tampere
 
Holly qur'an
Holly qur'anHolly qur'an
Holly qur'an
 
Social Stream Draft v1 Duy Doan
Social Stream Draft v1 Duy DoanSocial Stream Draft v1 Duy Doan
Social Stream Draft v1 Duy Doan
 
PLC
PLCPLC
PLC
 
Retirement Plans: 10 Things You Should Know
Retirement Plans: 10 Things You Should KnowRetirement Plans: 10 Things You Should Know
Retirement Plans: 10 Things You Should Know
 
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...
C:\Users\Javi\Documents\Documentos De Word Javi\Lola\Treball Cartes Dhivern P...
 
Geotermikus energia projektek Toskánában és Magyarországon
Geotermikus energia projektek Toskánában és MagyarországonGeotermikus energia projektek Toskánában és Magyarországon
Geotermikus energia projektek Toskánában és Magyarországon
 
St.George's Acquisition by Westpac Analysis
St.George's Acquisition by Westpac AnalysisSt.George's Acquisition by Westpac Analysis
St.George's Acquisition by Westpac Analysis
 
Campbell River Community Meeting October 22, 2013
Campbell River Community Meeting October 22, 2013Campbell River Community Meeting October 22, 2013
Campbell River Community Meeting October 22, 2013
 
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9
RMIT Vietnam - Managerial Finance - Efficient Market Hypothesis - Week 9
 
How to use Facebook as a Social Customer Relationship Management tool for FREE
How to use Facebook as a Social Customer Relationship Management tool for FREEHow to use Facebook as a Social Customer Relationship Management tool for FREE
How to use Facebook as a Social Customer Relationship Management tool for FREE
 
Geothermal Energy Potential - Oregon
Geothermal Energy Potential - OregonGeothermal Energy Potential - Oregon
Geothermal Energy Potential - Oregon
 
New Word Formation
New Word FormationNew Word Formation
New Word Formation
 
Geothermal Energy Potential - Nevada
Geothermal Energy Potential - NevadaGeothermal Energy Potential - Nevada
Geothermal Energy Potential - Nevada
 
La influencia de la literatura universal en los videojuegos
La influencia de la literatura universal en los videojuegosLa influencia de la literatura universal en los videojuegos
La influencia de la literatura universal en los videojuegos
 
C1 Guðjón Helgi Eggertsson
C1 Guðjón Helgi Eggertsson C1 Guðjón Helgi Eggertsson
C1 Guðjón Helgi Eggertsson
 
C1 Knútur Árnason
C1 Knútur ÁrnasonC1 Knútur Árnason
C1 Knútur Árnason
 
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...
La mitología en las sagas de Percy Jackson y los dioses del Olimpo y Los héro...
 
C2 Doyeon Kim
C2 Doyeon KimC2 Doyeon Kim
C2 Doyeon Kim
 
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptx
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptxHist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptx
Hist Petr Expl U of Myanmar_SEAPEXhouston23Jun2016pptx
 

Similar a NetworkSecurity.ppt

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 

Similar a NetworkSecurity.ppt (20)

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
sample.ppt
sample.pptsample.ppt
sample.ppt
 
PPT
PPTPPT
PPT
 
sad
sadsad
sad
 
one
oneone
one
 

Más de plutoone TestTwo (20)

Sam_V01.ppt
Sam_V01.pptSam_V01.ppt
Sam_V01.ppt
 
Scare at 13:59
Scare at 13:59Scare at 13:59
Scare at 13:59
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Effective_presentation.ppt
Effective_presentation.pptEffective_presentation.ppt
Effective_presentation.ppt
 
Effective_presentation.ppt
Effective_presentation.pptEffective_presentation.ppt
Effective_presentation.ppt
 
Effective_presentation.ppt
Effective_presentation.pptEffective_presentation.ppt
Effective_presentation.ppt
 
from app
from appfrom app
from app
 
example.pdf
example.pdfexample.pdf
example.pdf
 
7.2edited
7.2edited7.2edited
7.2edited
 
LAtest Doc
LAtest DocLAtest Doc
LAtest Doc
 
hello plutoone
hello plutoonehello plutoone
hello plutoone
 
plutoone channel
plutoone channelplutoone channel
plutoone channel
 
Document.docx.docx
Document.docx.docxDocument.docx.docx
Document.docx.docx
 
format.txt.txt
format.txt.txtformat.txt.txt
format.txt.txt
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Sample.ppt
Sample.pptSample.ppt
Sample.ppt
 
newdocument.txt
newdocument.txtnewdocument.txt
newdocument.txt
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

NetworkSecurity.ppt

  • 2. Network Security Offline cre tion c dential odu tr In Attacks on Onl Sho ine rt t authentication ime cha pwd n tives objec nel Abstract Conclusion tack At omy xon ta e bas t rtifica Ce l u ti o n ed so 2
  • 3. PRESENTATION OBJECTIVES  Understand network security services  Be aware of vulnerabilities and threats  Realize why network security is necessary  Highly attractive solution for valuable and secure future. 3
  • 4. ABSTRACT The authors present two challenge response Internet banking authentication solutions  one based on short-time passwords  and one on certificates attacks on authentication transaction-signing option 4
  • 5. INTRODUCTION  The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing  This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks 5
  • 6. ATTACKS ON AUTHENTICATION  Internet banking systems must authenticate users before granting them access to particular services.  successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks  offline credential-stealing attacks  online channel-breaking attacks 6
  • 7. Offline credential-stealing attacks  Security precautions can help users protect themselves from malicious software.  For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
  • 8. Online channel-breaking attack  The intruder noticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa  Online channel-breaking attacks don’t necessarily compromise the user’s credentials but the session’s credentials and therefore typically require the user-initiated banking session to work properly. 8
  • 9. AN ATTACK TAXONOMY Taxonomy of Internet banking authentication methods. Methods are classified according to their resistance against offline credential-stealing and online channel-breaking attacks . 9
  • 10. SHORT-TIME PASSWORD SOLUTION  It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows: 1. The user connects to the Internet banking 2. The user claims his or her identity by entering an account number in the bank’s login form 3. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge. 4. The user manually copies the shown response to the bank’s login form to be checked by the bank’s authentication server. 10
  • 11. The Need for Web Security 11
  • 12. CERTIFICATE-BASED SOLUTION User authentication works as follows.  First, the user establishes an SSL/TLS channel between the user PC and the bank’s Web server by setting up an SSL/TLS session without client authentication. Once the card is available, its certificates become visible in the Web browser. 12
  • 13. Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future. 13

Notas del editor

  1. This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities.
  2. Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability