SlideShare una empresa de Scribd logo
1 de 23
Some thing you know and Some thing you have.
Two Factor Authentication
Submitted By: Saba Hameed
CT-025
Agenda
Authentication
Authentication Factors
Two Factor Authentication (2FA)
Business Need for 2FA
2FA Using OTP Hard Tokens
2FA Using Mobile Tokens
Security Analysis
Conclusion & Recommendations
Authentication
 Authentication is the process of verifying the
identity of user.
 The most common technique to authenticate a
user is to use username and passwords
Authentication Factors
Something you know
Something you have
Something you are
Threats to Passwords
 Social engineering
 Phishing
 Brute force attacks
 Shoulder surfing
 Keystroke logging
 Eavesdropping
 Dictionary attacks
Two factor Authentication
 It is an approach to authentication which requires
the presentation of two different kinds of evidence
that someone is who they say they are.
Customer
Confidence
Regulations
& Best
Practices
EFT ACT
2007
PCI DSS
NIST
Threat
Prevention
Phishing and
Packet Replay
and Man in
the middle
attacks
Fraud
Prevention
Tokens
Hard Token USB Token Smart Card Soft Token
Mobile Token
 OTP is a second layer of security to verify your
identity.
Types of OTP
 Software – OTP
An one-time password (OTP)
generated by the company and
sent to your mobile phone or PC.
 Hardware – OTP
An OTP generated by a security
device/token. You press the button
on the security device/token to
obtain the OTP.
 Event Based OTP
Here the moving factor is
triggered by an event
 Time Based OTP
Here the moving factor is
time.
2FA Using Hard Token
Courtesy: RSA SecureID
Security Analysis
Benefits
 It is secure against
packet replay attacks.
 It prevents against
phishing.
Threats
 User needs to carry
the device
everywhere, and there
is a risk that it may get
stolen or lost.
 Cost is very high.
 Vulnerable to active
attacks and Man in the
middle attacks
 
2FA Using Mobile Tokens
 It makes use of:
 Application installed on user’s mobile
 IMEI
 Time Stamp
 Seed
 Algorithm Used:
Time based One Time Password Algorithm/ HMAC-
SHA 1
How it works
 User Registration on Server
•Seed
•Pin
•IMEI number
•Time Stamp
difference
Mobile
Application
Mobile
Application
Auth Server
How it works
 OTP Generation
Same Seed
Algorithm
Time
Seed
Algorithm
Time
Seed
159759 159759
Same Time
Same OTP
Mobile
Application
Authentication
Server
How it works
 Login session
Security Analysis
Benefits
 A relatively cheaper and
flexible means of OTP.
 User just need to carry
their mobiles with them,
no extra device is
needed.
Threats
 Still vulnerable to
active attacks
 Man in the middle
attacks
 Man in the browser
attacks
 
Solution?
 1. Challenge Response
Mechanism
 For fund transfer
transactions, the server
generates a a code and
sends to the user. The
user enters the code
provided to the Internet
banking site in order to
commit the transaction.
Challenges:
•High Cost required
•Hardware required
Solution?
2. SMS with Transaction Details
Security Analysis
Threat:
 Mobile is now single point of failure. OTP is
generated/ received on mobile and the
verification code of transaction is also received
via sms on mobile. If attacker has the
possession of user’s mobile, then he can do
everything.
My Recommendation:
 It is necessary that a different medium is used
for receiving OTP and receiving transaction
verification code.
Conclusions
Method Threats Effective Against Man
in the Browser attak?
Static Passwords Can be lost and easily
obtained
Brute force attacks
possible
No
Biometric No
OTP Hard Tokens User has to carry the
token
No
OTP Soft/ Mobile Token Man in the middle
attacks
No
OTP with Signature
(Challenge Response)
Secure against man in
the middle attacks
Yes, but inconvenient
OTP with SMS
Transaction Detail
Secure against
Phishing, Packet
Replay, MIM and MITM
Yes!!
My Recommendations
 User should check and make sure the website
has https in the URL, so that the password goes
encrypted while transmission.
 The OTP and PIN should be hashed before
sending.
 Mutual authentication should be established
between the client and the server before the
session starts to ensure the user that server can
be trusted.
 Using split key technique for authentication.
References
 Mohamed Hamdy Eldefrawy, Khaled
Alghathbar, Muhammad Khurram Khan, “OTP-
Based Two-Factor Authentication Using Mobile
Phones”
 Roland M. van Rijswijk – SURFnet
bv, Utrecht, The Netherlands, “tiqr: a novel take on
two factor authentication”
 Fadi Aloul, Syed Zahidi, “Two Factor
Authentication Using Mobile Phones”
 Costin Andrei SOARE, “Internet Banking Two-
Factor Authentication using Smartphones”
Q & A Session

Más contenido relacionado

La actualidad más candente

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol PresentationAkhil Agrawal
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
WhatsApp and its security issues
WhatsApp and its security issuesWhatsApp and its security issues
WhatsApp and its security issuesKofi Kafui Kornu
 

La actualidad más candente (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Password Attack
Password Attack Password Attack
Password Attack
 
Mobile security
Mobile securityMobile security
Mobile security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol Presentation
 
Security threats
Security threatsSecurity threats
Security threats
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
WhatsApp and its security issues
WhatsApp and its security issuesWhatsApp and its security issues
WhatsApp and its security issues
 

Similar a Two factor authentication presentation mcit

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptxArpithaShoby
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationMarketingArrowECS_CZ
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordChandrapriya Rediex
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectKeet Sugathadasa
 
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays
 

Similar a Two factor authentication presentation mcit (20)

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
120 i143
120 i143120 i143
120 i143
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
E banking security
E banking securityE banking security
E banking security
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authentication
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
 
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
 

Más de mmubashirkhan

Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network securitymmubashirkhan
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkmmubashirkhan
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns mmubashirkhan
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecturemmubashirkhan
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cnsmmubashirkhan
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issuesmmubashirkhan
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manetmmubashirkhan
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 

Más de mmubashirkhan (11)

Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g network
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manet
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Último (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Two factor authentication presentation mcit

  • 1. Some thing you know and Some thing you have. Two Factor Authentication Submitted By: Saba Hameed CT-025
  • 2. Agenda Authentication Authentication Factors Two Factor Authentication (2FA) Business Need for 2FA 2FA Using OTP Hard Tokens 2FA Using Mobile Tokens Security Analysis Conclusion & Recommendations
  • 3. Authentication  Authentication is the process of verifying the identity of user.  The most common technique to authenticate a user is to use username and passwords
  • 4. Authentication Factors Something you know Something you have Something you are
  • 5. Threats to Passwords  Social engineering  Phishing  Brute force attacks  Shoulder surfing  Keystroke logging  Eavesdropping  Dictionary attacks
  • 6. Two factor Authentication  It is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are.
  • 7. Customer Confidence Regulations & Best Practices EFT ACT 2007 PCI DSS NIST Threat Prevention Phishing and Packet Replay and Man in the middle attacks Fraud Prevention
  • 8. Tokens Hard Token USB Token Smart Card Soft Token Mobile Token  OTP is a second layer of security to verify your identity.
  • 9. Types of OTP  Software – OTP An one-time password (OTP) generated by the company and sent to your mobile phone or PC.  Hardware – OTP An OTP generated by a security device/token. You press the button on the security device/token to obtain the OTP.  Event Based OTP Here the moving factor is triggered by an event  Time Based OTP Here the moving factor is time.
  • 10. 2FA Using Hard Token Courtesy: RSA SecureID
  • 11. Security Analysis Benefits  It is secure against packet replay attacks.  It prevents against phishing. Threats  User needs to carry the device everywhere, and there is a risk that it may get stolen or lost.  Cost is very high.  Vulnerable to active attacks and Man in the middle attacks  
  • 12. 2FA Using Mobile Tokens  It makes use of:  Application installed on user’s mobile  IMEI  Time Stamp  Seed  Algorithm Used: Time based One Time Password Algorithm/ HMAC- SHA 1
  • 13. How it works  User Registration on Server •Seed •Pin •IMEI number •Time Stamp difference Mobile Application Mobile Application Auth Server
  • 14. How it works  OTP Generation Same Seed Algorithm Time Seed Algorithm Time Seed 159759 159759 Same Time Same OTP Mobile Application Authentication Server
  • 15. How it works  Login session
  • 16. Security Analysis Benefits  A relatively cheaper and flexible means of OTP.  User just need to carry their mobiles with them, no extra device is needed. Threats  Still vulnerable to active attacks  Man in the middle attacks  Man in the browser attacks  
  • 17. Solution?  1. Challenge Response Mechanism  For fund transfer transactions, the server generates a a code and sends to the user. The user enters the code provided to the Internet banking site in order to commit the transaction. Challenges: •High Cost required •Hardware required
  • 18. Solution? 2. SMS with Transaction Details
  • 19. Security Analysis Threat:  Mobile is now single point of failure. OTP is generated/ received on mobile and the verification code of transaction is also received via sms on mobile. If attacker has the possession of user’s mobile, then he can do everything. My Recommendation:  It is necessary that a different medium is used for receiving OTP and receiving transaction verification code.
  • 20. Conclusions Method Threats Effective Against Man in the Browser attak? Static Passwords Can be lost and easily obtained Brute force attacks possible No Biometric No OTP Hard Tokens User has to carry the token No OTP Soft/ Mobile Token Man in the middle attacks No OTP with Signature (Challenge Response) Secure against man in the middle attacks Yes, but inconvenient OTP with SMS Transaction Detail Secure against Phishing, Packet Replay, MIM and MITM Yes!!
  • 21. My Recommendations  User should check and make sure the website has https in the URL, so that the password goes encrypted while transmission.  The OTP and PIN should be hashed before sending.  Mutual authentication should be established between the client and the server before the session starts to ensure the user that server can be trusted.  Using split key technique for authentication.
  • 22. References  Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, “OTP- Based Two-Factor Authentication Using Mobile Phones”  Roland M. van Rijswijk – SURFnet bv, Utrecht, The Netherlands, “tiqr: a novel take on two factor authentication”  Fadi Aloul, Syed Zahidi, “Two Factor Authentication Using Mobile Phones”  Costin Andrei SOARE, “Internet Banking Two- Factor Authentication using Smartphones”
  • 23. Q & A Session

Notas del editor

  1. EFT ACT – 2007 Financial Institutions and other institutions providing Electronic Funds Transfer facilities shall ensure that secure means are used for transfer, compliant with current international standards and as may be prescribed by the State Bank from time to time. PCI – DSS Implement two-factor authentication for remote access to the network by employees, administrators, and third parties. NIST SP 800-63 Provides technical guidance for implementing electronic authentication.
  2. PR attacks:These are passive attacks in which a hacker or a malicious attacker intercepts the data while transmission and retransmits it.
  3. PR attacks:These are passive attacks in which a hacker or a malicious attacker intercepts the data while transmission and retransmits it.