International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, ISSN

Size: px
Start display at page:

Download "International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, ISSN"

Transcription

1 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, ISSN ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER Priyanka Sonawane 1, Archana Augustine 2 1 Department of Information Technology 2 Department of Information Technology University of Mumbai, India ABSTRACT: Web application provides secondary authentication when user forgets their password. For that user have to select the question from pre defined lists of question which includes user long term history question like What is your first school, what is your birth place etc. Answer of such question will not change over a decade. Answer of this question can be easily break by using social networking sites like Facebook as well as answer of this question will also be guess by brute force attack. So to overcome this problem we present Secondary Authentication System based on mobile data of user. Today smart phones come with inbuilt features like GPS. We used the data for calls, SMS history, calendar, application installment and based on this data are have created the question and categorized them as MCQ, blank filling, True/False.To fetch the user mobile activity SVM algorithm is used and to keep the answer of the question secure we have used RSA algorithm. Keywords: Secondary Authentication, Smart phone data, RSA, Machine learning. [1] INTRODUCTION Secondary Authentication can be categorized in 2 types. The 1)when user forgets their password and want to log in to their account by proving answer to the security Question. And 2) is when the user want to get access to the very secure form of information like banking then also he/she should provide answer to the Security Question. Password recovery questions are widely used by many web Services as the secondary authentication method for resetting the account password when user forgets their primary credential [1]. When User creates their account on usually used websites like Gmail, yahoo, msn etc. user have to choose questions from predetermined list of the Questions. All these are blank fillings. User can reset his account password by providing the correct answer to the security Question. For the easiness of setting and memorizing the answers, most of the secret questions are blank-fillings and that are created based on the long-term remembrance of a user s personal history that may not change over months/years (e.g., What s the model of your first car? ). So the research has revealed that such kind of blank-filling questions created upon the user s Priyanka Sonawane and Archana Augustine 19

2 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER long-term personal history may lead to poor security and reliability as answers of such Questions can be guessed by the usage of social networking sites.[10] The prevalence of smart phone has provided a source of the user s personal data related to the knowledge of his short-term history, i.e., the data collected by the smart phone sensors and apps [9] can be used for creating the secret Questions. Short - term personal history (typically within one month) can be used. Short-term personal history is less likely exposed to a stranger or acquaintance, because the rapid changes of an event that a person has experienced within a short term will increase the resilience to guess attacks [3], [5]. This implies improved security for such secret questions. In this paper we present a Secret-Question based Authentication system, with the advantage of the data of smart phone sensors and apps without violating the user privacy. In this Authentication system we have categorized the questions as MCQ, True/false and blank filling for easier remembrance of user. [2] RELATED WORK This section provides the existing work related to Secondary Authentication and how mobile data can be used for secondary Authentication. In this section we are going to point out the difference between existing and proposed work. For explain this difference we mention the drawbacks of existing system. The answers of 33% questions can be guessed by the significant others who were mainly participants spouses (77%) and close friends (17%). [2] Another similar study was conducted by Podd et al, which revealed a higher rate of successful guessing (39.5%) [3]. Password was purely Cognitive Passwords which are based on personal facts, interest and opinions so they can be easily guessed. [4]. Secondary authentication Questions was based on recent internet activities of the user. So the answers of the questions will be violated by online tools. [5]. If attacker guessed one answer for single security Question then privacy of the account holder will be terminated. [6]. A recent study revealed that nearly 20% users of four famous webmail providers forgot their answers within six months [7]. Moreover, dominant blank filling secret questions with case sensitive answers require the perfect literally matching to the set answer, which also contributes to its poor reliability. Frequently-changing secret questions will be difficult for attackers to guess the answers. However, this research is based on the data related to a user s Internet activities [2][6][7], while our work leverages the mobile phone sensor and app data that can record a user s physical world activities, for creating secret questions. 20

3 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17 [3]PROPOSED SYSTEM The system is divided into 2 major parts 3.1 Event Extraction Scheme In this Sensors and mobile apps will capture various events related to a user s daily activities Selection of sensors/apps Secondary authentication system selects a lists of sensors and apps for extracting the user activities. Which includes common sensors equipped on smart phone, Downloaded android apps on mobile and legacy apps like Call, contact, SMS etc. our approach is naturally suitable for smart phone users without introducing any extra hardware costs Client app. Secondary authentication system client app called Event Logger to extract the features for question generation. The client app fetches all the data From Event Extraction As shown in figure Server server is used as the auditor, which can also provide the user authentication service even if the phone is not available. As shown in block diagram of Figure 1, when authentication is needed, users phone can generate questions with local sanitized data and send the answers/results (e.g., how many questions they answered correctly) to auditors via HTTPS channels. Figure 1. Proposed System Architecture 3.2 Challenge-Response As shown in Fig 1 User is authenticated by trusted server. The service is categorized as follows Issuing the Request: The user issues an authentication request to the service provider. The event logger fetch the user activity as shown in Figure 2 and based on that activity generated Question will flash on Event Extraction App Response from User: The user provides answers to the challenge questions according to his/her short term memory. Priyanka Sonawane and Archana Augustine 21

4 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER Authentication Process: The Answer provided by the user is checked with database, if it matches then user is authenticated user and get access to their account. If the authentication failures extends the threshold then server will deny the service to that user. Figure 2. Authentication Process For instance, if a user s mobile phone is stolen/ lost then also user s information will not reveal as we are storing all the user data on the server. We have Categorized Questions into 3 types for reliability of the legitimate user. 1.True /false Questions 2. Multiple Choice Questions 3. Blank Filling Questions i. e W Questions These Questions will be based on 1. GPS 2. Battery 3. Calendar, Camera 4. Contact, call, SMS history 5. App Installment. Table 1.Some of the Examples of Questions Category wise: Parameter True/False MCQ Blank Fillings GPS Did you leave campus yesterday? Where You was day before Yesterday? A. Pune B. Rasayani C. Goa Where you spend max time yesterday? 22

5 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17 Battery Was Your mobile What was your mobile s charged 100% battery level Yesterday? yesterday? A. Low NIL B. High C. Medium Calendar, Have you took more With whom you had With whom you Camera than 50 photos days frequent meeting in last have meeting before yesterday?/is week? tomorrow? their any event for A.Mr ABC next week? B.Ms XYZ C. Mr PQR Contact, Call, Have you add any Who was your frequent SMS How many SMS contact in last 2 contact in last week? contacts you days? A.Priya added Yesterday? B.Raj C.CEO Mobile App Did you installed Which app you used Which app You any app yesterday? frequently in last 3 days? installed A.Youcammakeup Yesterday? B.PDF reader C. Amazon We will make the combinations of Questions for reliability of the user. [4] CONCLUSION In this paper, we presenting Secondary Authentication System based on Event Logger in which User s data collected by smart phone will help to improve the security of secret question used in secondary authentication. We have created a set of questions based on mobile data. Event Extractor will fetch all the mobile activities of user, and based on these activities we have categorized the questions as blank filling, MCQ, True/False for reliability of user. For security purpose Answer of these questions will be Stored in database in encrypted form to prevent the data from attacks. Priyanka Sonawane and Archana Augustine 23

6 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER REFERENCES [1] Peng Zhao, Kaigui Bian, Tong Zhao, Xintong Song Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions IEEE [2] R. Reeder and S. Schechter, When the password doesn t work: Secondary authentication for websites, S & P., IEEE, vol. 9, no. 2, pp , March [3] J. Podd, J. Bunnell, and R. Henderson, Cost-effective computer security: Cognitive and associative passwords, in Computer-Human Interaction, Proceedings., Sixth Australian Conference on. IEEE, 1996, pp [4] M. Zviran and W. J. Haga, User authentication by cognitive passwords: an empirical assessment, IEEE, 1990, pp [5] A. Babic, H. Xiong, D. Yao, and L. Iftode, Building robust authentication systems with activity-based personal questions, in SafeConfig. New York, NY, USA: ACM, 2009, pp [6] S. Schechter, A. B. Brush, and S. Egelman, It s no secret. measuring the security and reliability of authentication via secret questions, in S & P., IEEE. IEEE, 2009, pp [7] S. Schechter, C. Herley, and M. Mitzenmacher, Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks, in USENIX Hot topics in security, 2010, pp [8] J. C. Read and B. Cassidy, Designing textual password systems for children, in IDC., ser. IDC 12. New York, NY, USA: ACM, 2012, pp [9] J. Whipple, W. Arensman, and M. S. Boler, A public safety application of gps-enabled smartphones and the android operating system, in SMC. IEEE, 2009, pp [10] W. Luo, Q. Xie, and U. Hengartner, Facecloak: An architecture for user privacy on social networking sites, in CSE, vol. 3. IEEE, 2009, pp Author[s] brief Introduction Priyanka Sonawane Received the B.E.in Information Technology from Kokan Gyanpeeth college of Engineering, Mumbai University in and pursuing M.E. degrees in Information Technology with specialization with Cyber Warfare from Pillai HOC College of Engineering and Technology, Mumbai University in

SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN

SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN Kavitha.G 1, KongaraDevipriya 2, SivaSankari.S 3, Deepa.J 4 1Student, Department of Computer Science, Panimalar

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Hybrid

More information

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, www.ijcea.com ISSN 2321-3469 HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME

More information

SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION

SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION Sneha Khandare

More information

14 - Authentication in Practice

14 - Authentication in Practice 14 - Authentication in Practice Engineering & Public Policy Lorrie Cranor, Blase Ur, and Rich Shay February 26, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security # Today s class Biometrics

More information

Cybersecurity in 2016 and Lessons learned

Cybersecurity in 2016 and Lessons learned Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick

More information

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security Migrant Student Information Exchange (MSIX) Security, Privacy and Account Management Webinar Deloitte Consulting LLP. February 22, 2018 Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor

More information

Frequently Asked Questions Retiro Móvil (Mobile Withdrawal)

Frequently Asked Questions Retiro Móvil (Mobile Withdrawal) Frequently Asked Questions Retiro Móvil (Mobile Withdrawal) 1. What is Retiro Móvil (Mobile Withdrawal)? Retiro Móvil (Mobile Withdrawal) is a free service that allows you to schedule withdrawal requests

More information

3D PASSWORD AUTHENTICATION FOR WEB SECURITY

3D PASSWORD AUTHENTICATION FOR WEB SECURITY 3D PASSWORD AUTHENTICATION FOR WEB SECURITY Sahana R.Gadagkar 1, Aditya Pawaskar 2, Mrs. Ranjeeta B. Pandhare 3 1,2 Department of Computer Science & Engineering, KIT s College of Engineering, Kolhapur,

More information

Trusted Profile Identification and Validation Model

Trusted Profile Identification and Validation Model International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.

More information

II. LITERATURE SURVEY

II. LITERATURE SURVEY Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of

More information

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor

More information

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer

More information

Security concern in computation offloading Technique

Security concern in computation offloading Technique Security concern in computation offloading Technique Priyanka Dnyaneshwar Patil Department of Computer Engineering Raisoni College of Engineering Jalgaon, Mahartashtra, India Abstract: Nowadays, the increasing

More information

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Mount Carmel On-line Portal Frequently Asked Questions

Mount Carmel On-line Portal Frequently Asked Questions Mount Carmel On-line Portal Frequently Asked Questions FAQ Topics: 1. General Information 2. Account Registration/Creation 3. Username and Password 4. Portal Information/Content 1. GENERAL INFORMATION:

More information

I. INTRODUCTION ABSTRACT

I. INTRODUCTION ABSTRACT 2018 IJSRST Volume 4 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Voice Based System in Desktop and Mobile Devices for Blind People Payal Dudhbale*, Prof.

More information

ISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Take Control of Your Passwords

Take Control of Your Passwords Take Control of Your Passwords Joe Kissell Publisher, Take Control Books @joekissell takecontrolbooks.com The Password Problem Passwords are annoying! It s tempting to take the easy way out. There is an

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

User Authentication + Other Human Aspects

User Authentication + Other Human Aspects CSE 484 (Winter 2010) User Authentication + Other Human Aspects Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Cryptanalysis of a Markov Chain Based User Authentication Scheme Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis

More information

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com

More information

Unwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper)

Unwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11680-11686 Unwanted Message Filtering From Osn User Walls And Implementation

More information

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their

More information

Recall Based Authentication System- An Overview

Recall Based Authentication System- An Overview Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer

More information

Implementation of Android based Code Esterno Application

Implementation of Android based Code Esterno Application IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 10 March 2017 ISSN (online): 2349-6010 Implementation of Android based Code Esterno Application Prof. Anuja Jadhav

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

Review of Phishing Detection Techniques

Review of Phishing Detection Techniques Review of Phishing Detection Techniques Swati Gaikwad Computer Engineering, DACOE, Pune, India. swatigaikwad0385@gmail.com Abstract Nowadays phishing attacks are increasing with burgeoning rate which is

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 01242018 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information

It Cannot Get Away: An Approach to Enhance Security of User Account in Online Social Networks

It Cannot Get Away: An Approach to Enhance Security of User Account in Online Social Networks IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.4, April 2015 1 It Cannot Get Away: An Approach to Enhance Security of User Account in Online Social Networks Abdulrahman

More information

InPOsition App: Frequently Asked Questions

InPOsition App: Frequently Asked Questions InPOsition App: Frequently Asked Questions How do I download the mobile app? If you have an Android, you will go to Google Play. If you have an iphone, you will go to the App Store. Then search, In Position

More information

Online Services USER GUIDE. First Time Log In

Online Services USER GUIDE. First Time Log In Online Services USER GUIDE Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. First Time Log In Log In: BankMidwest.com

More information

3LAS (Three Level Authentication Scheme)

3LAS (Three Level Authentication Scheme) 3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology,

More information

A User Authentication Based on Personal History - A User Authentication System Using History -

A User Authentication Based on Personal History - A User Authentication System Using  History - A User Authentication Based on Personal History - A User Authentication System Using E-mail History - Masakatsu NISHIGAKI Graduate School of Science and Technology, Shizuoka University, 3-5-1 Johoku, Hamamatsu,

More information

T H E S H I F T T O SMARTPHONE DOMINANCE

T H E S H I F T T O SMARTPHONE DOMINANCE T H E S H I F T T O SMARTPHONE DOMINANCE Background To understand mobile migration patterns and which factors will accelerate the shift to a mobile-first for consumers and advertisers W H A T S C O V E

More information

Filtering Unwanted Messages from (OSN) User Wall s Using MLT

Filtering Unwanted Messages from (OSN) User Wall s Using MLT Filtering Unwanted Messages from (OSN) User Wall s Using MLT Prof.Sarika.N.Zaware 1, Anjiri Ambadkar 2, Nishigandha Bhor 3, Shiva Mamidi 4, Chetan Patil 5 1 Department of Computer Engineering, AISSMS IOIT,

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner

CSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner CSE 484 / CSE M 584: Computer Security and Privacy Usable Security Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, Ada Lerner,

More information

Online Services User Guide

Online Services User Guide Online Services User Guide Welcome to Online & Mobile Banking! Whether you re online or using a mobile device, manage your money whenever and wherever it s convenient for you. Access Visit BankMidwest.com

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

ESP Egocentric Social Platform

ESP Egocentric Social Platform ESP Egocentric Social Platform T. J. Purtell, Ian Vo, Monica S. Lam With: Kanak Biscuitwala, Willem Bult, Dan Boneh, Ben Dodson, Steve Fan, and Frank Wang, Global Social Platforms Ideal for Meeting strangers

More information

Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it.

Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it. www.moochies.com Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it. This manual will take you through all the steps

More information

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks An improved security model for identity authentication against cheque payment fraud in Tanzanian banks Feno Heriniaina, R. 1 * Kitindi, Edvin 2 1. College of Computer Science, Chongqing University, Chongqing-

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Social Networking Applied

Social Networking Applied Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords

More information

Zero private information leak using multi-level security and privileged access for designated authorities on demand

Zero private information leak using multi-level security and privileged access for designated authorities on demand Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of

More information

Nielsen List of Top 10 ios Mobile Apps

Nielsen List of Top 10 ios Mobile Apps Nielsen List of Top 10 ios Mobile Apps Nielsen's list of the most popular 10 mobile apps for ios in 2016 was dominated by just four technology giants: Google, Facebook, Apple and Amazon. The Nielsen organization

More information

Ohio Child Care TAP Program Webinar Script

Ohio Child Care TAP Program Webinar Script KinderConnect Ohio Child Care TAP Program Webinar Script for Ohio Department of Job and Family Services Version 8 Prepared by Controltec, Inc. November 19, 2018 1 Introduction Hello, welcome to the demonstration

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Parent Canvas Accounts

Parent Canvas Accounts Parent Canvas Accounts In Canvas, parents will be enrolled as an Observer in their student s course. Before you do anything else, you will need to create a Parent Access account. If you have not made an

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

Developing an End-to-End Secure Chat Application

Developing an End-to-End Secure Chat Application 108 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017 Developing an End-to-End Secure Chat Application Noor Sabah, Jamal M. Kadhim and Ban N. Dhannoon Department

More information

Usable Web-based Calendaring for Blind Users

Usable Web-based Calendaring for Blind Users Usable Web-based Calendaring for Blind Users Brian Wentz Frostburg State University Frostburg, MD, USA bwentz@acm.org Jonathan Lazar Towson University Towson, MD, USA jlazar@towson.edu While a calendar

More information

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489 www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 12 Dec. 2016, Page No. 19489-19493 Data Security System in Cloud by Using Fog Computing and Data Mining

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

1.1. HOW TO START? 1.2. ACCESS THE APP

1.1. HOW TO START? 1.2. ACCESS THE APP Table of Contents 1. Get Started 1.1. How to start? 1.2. Access the app 1.3. Username and password 2. Mobile Banking features 3. Security 4. Accounts and inquiries 5. Transfers and beneficiaries 6. Charges

More information

Duo Travel Guide. duo.com

Duo Travel Guide. duo.com Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access

More information

SBI Mingle User Manual

SBI Mingle User Manual SBI Mingle User Manual 1. Facebook banking for State Bank of India: Registration 1.1 Registration Mode 1: Debit Card 2. Open the SBI Mingle application User visits SBI Official Page, clicks on SBI Mingle

More information

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE P.Shyam Sunder 1, Ballikonda Sai Chaitanya 2, D.Vijay Kumar 3, P.Satya Shekar Varma 4 1,2,4 Department of Computer Science

More information

Secure Messaging Plus Website. User s Guide

Secure Messaging Plus Website. User s Guide Secure Messaging Plus Website User s Guide While every attempt is made to ensure both accuracy and completeness of information included in this document, errors can occur, and updates or improvements may

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2 Table of Contents Hacking Web Sites Broken Authentication Emmanuel Benoist Spring Term 2018 Introduction Examples of Attacks Brute Force Session Spotting Replay Attack Session Fixation Attack Session Hijacking

More information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO

More information

Anti-Phishing Based on Face Recognition and Bio-Metric

Anti-Phishing Based on Face Recognition and Bio-Metric ISSN 2278 0211 (Online) Anti-Phishing Based on Face Recognition and Bio-Metric Dr. D. Aruna Kumari Department of ECM, KL University, Vaddeswaram, India Dr. K. Rajasekhara Rao Director, Shri Prakash Engineering

More information

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD The UAMS HIPAA Office Heather Schmiegelow, UAMS HIPAA Privacy Officer Stephen Cochran, UAMS Security Officer Sara Thompson, HIPAA

More information

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC? MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.

More information

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON W HI T E P A P ER TABLE OF CONTENTS 03 04 06 06 07 08 09 10 10 EXECUTIVE OVERVIEW INTRODUCTION IMPROVING CUSTOMER ENGAGEMENT IS ON YOUR CMO S RADAR BYOD

More information

A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password

A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password Priyanka M. Lokhande Post Graduate Student, Dept. of Information Technology, RMDSSOE Warje,

More information

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

An Assessment of Website User Authentication Mechanisms

An Assessment of Website User Authentication Mechanisms International Journal of Computing & Information Sciences Vol. 14,. 3, December 2018 14 An Assessment of Website User Authentication Mechanisms Samia R.Madhusudhan and Chaitanya S. Nayak Pages 14 20 DOI:

More information

Sign in using social media without an EU Login account

Sign in using social media without an EU Login account EU Login How to authenticate with EU Login EU Login is the entry gate to sign in to different European Commission services and/or other systems. EU Login verifies your identity and allows recovering your

More information

Mobile Messaging Apps Study : India. August 2014

Mobile Messaging Apps Study : India. August 2014 Mobile Messaging Apps Study : India August 2014 Contents 1. Research Objectives & Methodology 2. Key Findings 3. Mobile Consumption Behavior 4. Message Apps Usage & Behaviors Download Intent App Awareness

More information

New Era of authentication: 3-D Password

New Era of authentication: 3-D Password New Era of authentication: 3-D Password Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar Abstract Current authentication systems suffer from many weaknesses. Textual passwords are commonly used.

More information

BOCHK Mobile Token FAQ

BOCHK Mobile Token FAQ BOCHK Mobile Token FAQ 1. What is "Mobile Token"? "Mobile Token" is a feature of BOCHK Mobile App. Upon activation of "Mobile Token" with a designated mobile device ("mobile phone"), you can use it immediately

More information

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY?

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in

More information

Codes v. People: A comparative usability study of two password recovery mechanisms Stavova, Vlasta; Matyas, Vashek; Just, Mike

Codes v. People: A comparative usability study of two password recovery mechanisms Stavova, Vlasta; Matyas, Vashek; Just, Mike Heriot-Watt University Heriot-Watt University Research Gateway Codes v. People: A comparative usability study of two password recovery mechanisms Stavova, Vlasta; Matyas, Vashek; Just, Mike Published in:

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

McAfee Family Protection The Easiest, Most Complete Way to Keep Your Children Safe Online

McAfee Family Protection The Easiest, Most Complete Way to Keep Your Children Safe Online The Easiest, Most Complete Way to Keep Your Children Safe Online 1 Quick Start Easy Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed below.

More information

Alumni Tracking System

Alumni Tracking System IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Volume 8, PP 80-86 www.iosrjen.org Alumni Tracking System MihirJayavant, Shashank Kawle, PritiKhergamkar, ShitalGurale, Prof.

More information

Cyber Incident Response: Step 1

Cyber Incident Response: Step 1 Cyber Incident Response: Step 1 Mary McLaughlin Cybersecurity Analyst Florida Fusion Center - FDLE Product # 14-146 6 STAGES OF INCIDENT HANDLING Preparation Identification Containment Eradication Recovery

More information

Paystar Remittance Suite Tokenless Two-Factor Authentication

Paystar Remittance Suite Tokenless Two-Factor Authentication Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

An Analysis of Local Security Authority Subsystem & Extracting Password Using Packet Analyzer

An Analysis of Local Security Authority Subsystem & Extracting Password Using Packet Analyzer An Analysis of Local Security Authority Subsystem & Extracting Using Packet Analyzer Bhanu Sharma Computer Science & Engineering Department BBSBEC, Fatehgarh sahib(punjab) India Sandeep Kaur Dhanda Computer

More information

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many

More information

Innovative Graphical Passwords using Sequencing and Shuffling Together

Innovative Graphical Passwords using Sequencing and Shuffling Together Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology

More information

Keywords: Carpool ATM, Confirmation, Credit/Debit Card, Google Glass, Obscured PIN, OTP, PIN Template, Smartphone, Security. I.

Keywords: Carpool ATM, Confirmation, Credit/Debit Card, Google Glass, Obscured PIN, OTP, PIN Template, Smartphone, Security. I. ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 2, February 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article /

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

MFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install

MFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install MFA Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016 if you use the full version

More information

A Single-Sign-On Security Platform for Private and Decentralized Applications. William Swanson, Paul Puey

A Single-Sign-On Security Platform for Private and Decentralized Applications. William Swanson, Paul Puey A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized,

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Computer Security & Privacy

Computer Security & Privacy Computer Security & Privacy Melissa Winstanley (mwinst@cs.washington.edu) (based on slides by Daniel Halperin) How exploration sessions work You get 1/3 point of extra credit for each session Attendance

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 06132017 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information