International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, ISSN
|
|
- Nora Simon
- 5 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, ISSN ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER Priyanka Sonawane 1, Archana Augustine 2 1 Department of Information Technology 2 Department of Information Technology University of Mumbai, India ABSTRACT: Web application provides secondary authentication when user forgets their password. For that user have to select the question from pre defined lists of question which includes user long term history question like What is your first school, what is your birth place etc. Answer of such question will not change over a decade. Answer of this question can be easily break by using social networking sites like Facebook as well as answer of this question will also be guess by brute force attack. So to overcome this problem we present Secondary Authentication System based on mobile data of user. Today smart phones come with inbuilt features like GPS. We used the data for calls, SMS history, calendar, application installment and based on this data are have created the question and categorized them as MCQ, blank filling, True/False.To fetch the user mobile activity SVM algorithm is used and to keep the answer of the question secure we have used RSA algorithm. Keywords: Secondary Authentication, Smart phone data, RSA, Machine learning. [1] INTRODUCTION Secondary Authentication can be categorized in 2 types. The 1)when user forgets their password and want to log in to their account by proving answer to the security Question. And 2) is when the user want to get access to the very secure form of information like banking then also he/she should provide answer to the Security Question. Password recovery questions are widely used by many web Services as the secondary authentication method for resetting the account password when user forgets their primary credential [1]. When User creates their account on usually used websites like Gmail, yahoo, msn etc. user have to choose questions from predetermined list of the Questions. All these are blank fillings. User can reset his account password by providing the correct answer to the security Question. For the easiness of setting and memorizing the answers, most of the secret questions are blank-fillings and that are created based on the long-term remembrance of a user s personal history that may not change over months/years (e.g., What s the model of your first car? ). So the research has revealed that such kind of blank-filling questions created upon the user s Priyanka Sonawane and Archana Augustine 19
2 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER long-term personal history may lead to poor security and reliability as answers of such Questions can be guessed by the usage of social networking sites.[10] The prevalence of smart phone has provided a source of the user s personal data related to the knowledge of his short-term history, i.e., the data collected by the smart phone sensors and apps [9] can be used for creating the secret Questions. Short - term personal history (typically within one month) can be used. Short-term personal history is less likely exposed to a stranger or acquaintance, because the rapid changes of an event that a person has experienced within a short term will increase the resilience to guess attacks [3], [5]. This implies improved security for such secret questions. In this paper we present a Secret-Question based Authentication system, with the advantage of the data of smart phone sensors and apps without violating the user privacy. In this Authentication system we have categorized the questions as MCQ, True/false and blank filling for easier remembrance of user. [2] RELATED WORK This section provides the existing work related to Secondary Authentication and how mobile data can be used for secondary Authentication. In this section we are going to point out the difference between existing and proposed work. For explain this difference we mention the drawbacks of existing system. The answers of 33% questions can be guessed by the significant others who were mainly participants spouses (77%) and close friends (17%). [2] Another similar study was conducted by Podd et al, which revealed a higher rate of successful guessing (39.5%) [3]. Password was purely Cognitive Passwords which are based on personal facts, interest and opinions so they can be easily guessed. [4]. Secondary authentication Questions was based on recent internet activities of the user. So the answers of the questions will be violated by online tools. [5]. If attacker guessed one answer for single security Question then privacy of the account holder will be terminated. [6]. A recent study revealed that nearly 20% users of four famous webmail providers forgot their answers within six months [7]. Moreover, dominant blank filling secret questions with case sensitive answers require the perfect literally matching to the set answer, which also contributes to its poor reliability. Frequently-changing secret questions will be difficult for attackers to guess the answers. However, this research is based on the data related to a user s Internet activities [2][6][7], while our work leverages the mobile phone sensor and app data that can record a user s physical world activities, for creating secret questions. 20
3 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17 [3]PROPOSED SYSTEM The system is divided into 2 major parts 3.1 Event Extraction Scheme In this Sensors and mobile apps will capture various events related to a user s daily activities Selection of sensors/apps Secondary authentication system selects a lists of sensors and apps for extracting the user activities. Which includes common sensors equipped on smart phone, Downloaded android apps on mobile and legacy apps like Call, contact, SMS etc. our approach is naturally suitable for smart phone users without introducing any extra hardware costs Client app. Secondary authentication system client app called Event Logger to extract the features for question generation. The client app fetches all the data From Event Extraction As shown in figure Server server is used as the auditor, which can also provide the user authentication service even if the phone is not available. As shown in block diagram of Figure 1, when authentication is needed, users phone can generate questions with local sanitized data and send the answers/results (e.g., how many questions they answered correctly) to auditors via HTTPS channels. Figure 1. Proposed System Architecture 3.2 Challenge-Response As shown in Fig 1 User is authenticated by trusted server. The service is categorized as follows Issuing the Request: The user issues an authentication request to the service provider. The event logger fetch the user activity as shown in Figure 2 and based on that activity generated Question will flash on Event Extraction App Response from User: The user provides answers to the challenge questions according to his/her short term memory. Priyanka Sonawane and Archana Augustine 21
4 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER Authentication Process: The Answer provided by the user is checked with database, if it matches then user is authenticated user and get access to their account. If the authentication failures extends the threshold then server will deny the service to that user. Figure 2. Authentication Process For instance, if a user s mobile phone is stolen/ lost then also user s information will not reveal as we are storing all the user data on the server. We have Categorized Questions into 3 types for reliability of the legitimate user. 1.True /false Questions 2. Multiple Choice Questions 3. Blank Filling Questions i. e W Questions These Questions will be based on 1. GPS 2. Battery 3. Calendar, Camera 4. Contact, call, SMS history 5. App Installment. Table 1.Some of the Examples of Questions Category wise: Parameter True/False MCQ Blank Fillings GPS Did you leave campus yesterday? Where You was day before Yesterday? A. Pune B. Rasayani C. Goa Where you spend max time yesterday? 22
5 International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17 Battery Was Your mobile What was your mobile s charged 100% battery level Yesterday? yesterday? A. Low NIL B. High C. Medium Calendar, Have you took more With whom you had With whom you Camera than 50 photos days frequent meeting in last have meeting before yesterday?/is week? tomorrow? their any event for A.Mr ABC next week? B.Ms XYZ C. Mr PQR Contact, Call, Have you add any Who was your frequent SMS How many SMS contact in last 2 contact in last week? contacts you days? A.Priya added Yesterday? B.Raj C.CEO Mobile App Did you installed Which app you used Which app You any app yesterday? frequently in last 3 days? installed A.Youcammakeup Yesterday? B.PDF reader C. Amazon We will make the combinations of Questions for reliability of the user. [4] CONCLUSION In this paper, we presenting Secondary Authentication System based on Event Logger in which User s data collected by smart phone will help to improve the security of secret question used in secondary authentication. We have created a set of questions based on mobile data. Event Extractor will fetch all the mobile activities of user, and based on these activities we have categorized the questions as blank filling, MCQ, True/False for reliability of user. For security purpose Answer of these questions will be Stored in database in encrypted form to prevent the data from attacks. Priyanka Sonawane and Archana Augustine 23
6 ENHANCING THE SECURITY OF SECONDARY AUTHENTICATION SYSTEM BASED ON EVENT LOGGER REFERENCES [1] Peng Zhao, Kaigui Bian, Tong Zhao, Xintong Song Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions IEEE [2] R. Reeder and S. Schechter, When the password doesn t work: Secondary authentication for websites, S & P., IEEE, vol. 9, no. 2, pp , March [3] J. Podd, J. Bunnell, and R. Henderson, Cost-effective computer security: Cognitive and associative passwords, in Computer-Human Interaction, Proceedings., Sixth Australian Conference on. IEEE, 1996, pp [4] M. Zviran and W. J. Haga, User authentication by cognitive passwords: an empirical assessment, IEEE, 1990, pp [5] A. Babic, H. Xiong, D. Yao, and L. Iftode, Building robust authentication systems with activity-based personal questions, in SafeConfig. New York, NY, USA: ACM, 2009, pp [6] S. Schechter, A. B. Brush, and S. Egelman, It s no secret. measuring the security and reliability of authentication via secret questions, in S & P., IEEE. IEEE, 2009, pp [7] S. Schechter, C. Herley, and M. Mitzenmacher, Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks, in USENIX Hot topics in security, 2010, pp [8] J. C. Read and B. Cassidy, Designing textual password systems for children, in IDC., ser. IDC 12. New York, NY, USA: ACM, 2012, pp [9] J. Whipple, W. Arensman, and M. S. Boler, A public safety application of gps-enabled smartphones and the android operating system, in SMC. IEEE, 2009, pp [10] W. Luo, Q. Xie, and U. Hengartner, Facecloak: An architecture for user privacy on social networking sites, in CSE, vol. 3. IEEE, 2009, pp Author[s] brief Introduction Priyanka Sonawane Received the B.E.in Information Technology from Kokan Gyanpeeth college of Engineering, Mumbai University in and pursuing M.E. degrees in Information Technology with specialization with Cyber Warfare from Pillai HOC College of Engineering and Technology, Mumbai University in
SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN
SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN Kavitha.G 1, KongaraDevipriya 2, SivaSankari.S 3, Deepa.J 4 1Student, Department of Computer Science, Panimalar
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Hybrid
More informationHTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION
International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, www.ijcea.com ISSN 2321-3469 HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME
More informationSMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION
International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION Sneha Khandare
More information14 - Authentication in Practice
14 - Authentication in Practice Engineering & Public Policy Lorrie Cranor, Blase Ur, and Rich Shay February 26, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security # Today s class Biometrics
More informationCybersecurity in 2016 and Lessons learned
Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick
More informationMaria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security
Migrant Student Information Exchange (MSIX) Security, Privacy and Account Management Webinar Deloitte Consulting LLP. February 22, 2018 Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor
More informationFrequently Asked Questions Retiro Móvil (Mobile Withdrawal)
Frequently Asked Questions Retiro Móvil (Mobile Withdrawal) 1. What is Retiro Móvil (Mobile Withdrawal)? Retiro Móvil (Mobile Withdrawal) is a free service that allows you to schedule withdrawal requests
More information3D PASSWORD AUTHENTICATION FOR WEB SECURITY
3D PASSWORD AUTHENTICATION FOR WEB SECURITY Sahana R.Gadagkar 1, Aditya Pawaskar 2, Mrs. Ranjeeta B. Pandhare 3 1,2 Department of Computer Science & Engineering, KIT s College of Engineering, Kolhapur,
More informationTrusted Profile Identification and Validation Model
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.
More informationII. LITERATURE SURVEY
Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of
More informationDESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS
http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor
More informationProximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices
Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer
More informationSecurity concern in computation offloading Technique
Security concern in computation offloading Technique Priyanka Dnyaneshwar Patil Department of Computer Engineering Raisoni College of Engineering Jalgaon, Mahartashtra, India Abstract: Nowadays, the increasing
More informationSECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationMount Carmel On-line Portal Frequently Asked Questions
Mount Carmel On-line Portal Frequently Asked Questions FAQ Topics: 1. General Information 2. Account Registration/Creation 3. Username and Password 4. Portal Information/Content 1. GENERAL INFORMATION:
More informationI. INTRODUCTION ABSTRACT
2018 IJSRST Volume 4 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Voice Based System in Desktop and Mobile Devices for Blind People Payal Dudhbale*, Prof.
More informationISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationTake Control of Your Passwords
Take Control of Your Passwords Joe Kissell Publisher, Take Control Books @joekissell takecontrolbooks.com The Password Problem Passwords are annoying! It s tempting to take the easy way out. There is an
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationUser Authentication + Other Human Aspects
CSE 484 (Winter 2010) User Authentication + Other Human Aspects Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for
More informationCryptanalysis of a Markov Chain Based User Authentication Scheme
Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationInternational Journal of Pure and Applied Sciences and Technology
Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis
More informationGraphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2
Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com
More informationUnwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11680-11686 Unwanted Message Filtering From Osn User Walls And Implementation
More informationDaymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.
Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their
More informationRecall Based Authentication System- An Overview
Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer
More informationImplementation of Android based Code Esterno Application
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 10 March 2017 ISSN (online): 2349-6010 Implementation of Android based Code Esterno Application Prof. Anuja Jadhav
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More informationReview of Phishing Detection Techniques
Review of Phishing Detection Techniques Swati Gaikwad Computer Engineering, DACOE, Pune, India. swatigaikwad0385@gmail.com Abstract Nowadays phishing attacks are increasing with burgeoning rate which is
More information/ 1. Online Banking User Guide SouthStateBank.com / (800)
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 01242018 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will
More informationIt Cannot Get Away: An Approach to Enhance Security of User Account in Online Social Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.4, April 2015 1 It Cannot Get Away: An Approach to Enhance Security of User Account in Online Social Networks Abdulrahman
More informationInPOsition App: Frequently Asked Questions
InPOsition App: Frequently Asked Questions How do I download the mobile app? If you have an Android, you will go to Google Play. If you have an iphone, you will go to the App Store. Then search, In Position
More informationOnline Services USER GUIDE. First Time Log In
Online Services USER GUIDE Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. First Time Log In Log In: BankMidwest.com
More information3LAS (Three Level Authentication Scheme)
3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology,
More informationA User Authentication Based on Personal History - A User Authentication System Using History -
A User Authentication Based on Personal History - A User Authentication System Using E-mail History - Masakatsu NISHIGAKI Graduate School of Science and Technology, Shizuoka University, 3-5-1 Johoku, Hamamatsu,
More informationT H E S H I F T T O SMARTPHONE DOMINANCE
T H E S H I F T T O SMARTPHONE DOMINANCE Background To understand mobile migration patterns and which factors will accelerate the shift to a mobile-first for consumers and advertisers W H A T S C O V E
More informationFiltering Unwanted Messages from (OSN) User Wall s Using MLT
Filtering Unwanted Messages from (OSN) User Wall s Using MLT Prof.Sarika.N.Zaware 1, Anjiri Ambadkar 2, Nishigandha Bhor 3, Shiva Mamidi 4, Chetan Patil 5 1 Department of Computer Engineering, AISSMS IOIT,
More informationModern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner
CSE 484 / CSE M 584: Computer Security and Privacy Usable Security Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, Ada Lerner,
More informationOnline Services User Guide
Online Services User Guide Welcome to Online & Mobile Banking! Whether you re online or using a mobile device, manage your money whenever and wherever it s convenient for you. Access Visit BankMidwest.com
More informationThumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password
Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,
More informationESP Egocentric Social Platform
ESP Egocentric Social Platform T. J. Purtell, Ian Vo, Monica S. Lam With: Kanak Biscuitwala, Willem Bult, Dan Boneh, Ben Dodson, Steve Fan, and Frank Wang, Global Social Platforms Ideal for Meeting strangers
More informationThank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it.
www.moochies.com Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it. This manual will take you through all the steps
More informationAn improved security model for identity authentication against cheque payment fraud in Tanzanian banks
An improved security model for identity authentication against cheque payment fraud in Tanzanian banks Feno Heriniaina, R. 1 * Kitindi, Edvin 2 1. College of Computer Science, Chongqing University, Chongqing-
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationSocial Networking Applied
Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationComputer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1
Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords
More informationZero private information leak using multi-level security and privileged access for designated authorities on demand
Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of
More informationNielsen List of Top 10 ios Mobile Apps
Nielsen List of Top 10 ios Mobile Apps Nielsen's list of the most popular 10 mobile apps for ios in 2016 was dominated by just four technology giants: Google, Facebook, Apple and Amazon. The Nielsen organization
More informationOhio Child Care TAP Program Webinar Script
KinderConnect Ohio Child Care TAP Program Webinar Script for Ohio Department of Job and Family Services Version 8 Prepared by Controltec, Inc. November 19, 2018 1 Introduction Hello, welcome to the demonstration
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationParent Canvas Accounts
Parent Canvas Accounts In Canvas, parents will be enrolled as an Observer in their student s course. Before you do anything else, you will need to create a Parent Access account. If you have not made an
More informationSecure Smart Card Based Remote User Authentication Scheme for Multi-server Environment
Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,
More informationDeveloping an End-to-End Secure Chat Application
108 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017 Developing an End-to-End Secure Chat Application Noor Sabah, Jamal M. Kadhim and Ban N. Dhannoon Department
More informationUsable Web-based Calendaring for Blind Users
Usable Web-based Calendaring for Blind Users Brian Wentz Frostburg State University Frostburg, MD, USA bwentz@acm.org Jonathan Lazar Towson University Towson, MD, USA jlazar@towson.edu While a calendar
More information1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 12 Dec. 2016, Page No. 19489-19493 Data Security System in Cloud by Using Fog Computing and Data Mining
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014
Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,
More information1.1. HOW TO START? 1.2. ACCESS THE APP
Table of Contents 1. Get Started 1.1. How to start? 1.2. Access the app 1.3. Username and password 2. Mobile Banking features 3. Security 4. Accounts and inquiries 5. Transfers and beneficiaries 6. Charges
More informationDuo Travel Guide. duo.com
Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access
More informationSBI Mingle User Manual
SBI Mingle User Manual 1. Facebook banking for State Bank of India: Registration 1.1 Registration Mode 1: Debit Card 2. Open the SBI Mingle application User visits SBI Official Page, clicks on SBI Mingle
More informationMULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE
MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE P.Shyam Sunder 1, Ballikonda Sai Chaitanya 2, D.Vijay Kumar 3, P.Satya Shekar Varma 4 1,2,4 Department of Computer Science
More informationSecure Messaging Plus Website. User s Guide
Secure Messaging Plus Website User s Guide While every attempt is made to ensure both accuracy and completeness of information included in this document, errors can occur, and updates or improvements may
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationBerner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2
Table of Contents Hacking Web Sites Broken Authentication Emmanuel Benoist Spring Term 2018 Introduction Examples of Attacks Brute Force Session Spotting Replay Attack Session Fixation Attack Session Hijacking
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationAnti-Phishing Based on Face Recognition and Bio-Metric
ISSN 2278 0211 (Online) Anti-Phishing Based on Face Recognition and Bio-Metric Dr. D. Aruna Kumari Department of ECM, KL University, Vaddeswaram, India Dr. K. Rajasekhara Rao Director, Shri Prakash Engineering
More informationFamily Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD
Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD The UAMS HIPAA Office Heather Schmiegelow, UAMS HIPAA Privacy Officer Stephen Cochran, UAMS Security Officer Sara Thompson, HIPAA
More informationMCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?
MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.
More informationFIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON
FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON W HI T E P A P ER TABLE OF CONTENTS 03 04 06 06 07 08 09 10 10 EXECUTIVE OVERVIEW INTRODUCTION IMPROVING CUSTOMER ENGAGEMENT IS ON YOUR CMO S RADAR BYOD
More informationA Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password
A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password Priyanka M. Lokhande Post Graduate Student, Dept. of Information Technology, RMDSSOE Warje,
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationWhat is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.
P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.
More informationAn Assessment of Website User Authentication Mechanisms
International Journal of Computing & Information Sciences Vol. 14,. 3, December 2018 14 An Assessment of Website User Authentication Mechanisms Samia R.Madhusudhan and Chaitanya S. Nayak Pages 14 20 DOI:
More informationSign in using social media without an EU Login account
EU Login How to authenticate with EU Login EU Login is the entry gate to sign in to different European Commission services and/or other systems. EU Login verifies your identity and allows recovering your
More informationMobile Messaging Apps Study : India. August 2014
Mobile Messaging Apps Study : India August 2014 Contents 1. Research Objectives & Methodology 2. Key Findings 3. Mobile Consumption Behavior 4. Message Apps Usage & Behaviors Download Intent App Awareness
More informationNew Era of authentication: 3-D Password
New Era of authentication: 3-D Password Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar Abstract Current authentication systems suffer from many weaknesses. Textual passwords are commonly used.
More informationBOCHK Mobile Token FAQ
BOCHK Mobile Token FAQ 1. What is "Mobile Token"? "Mobile Token" is a feature of BOCHK Mobile App. Upon activation of "Mobile Token" with a designated mobile device ("mobile phone"), you can use it immediately
More informationSMART DEVICES: DO THEY RESPECT YOUR PRIVACY?
SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in
More informationCodes v. People: A comparative usability study of two password recovery mechanisms Stavova, Vlasta; Matyas, Vashek; Just, Mike
Heriot-Watt University Heriot-Watt University Research Gateway Codes v. People: A comparative usability study of two password recovery mechanisms Stavova, Vlasta; Matyas, Vashek; Just, Mike Published in:
More informationFACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:
FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,
More informationMcAfee Family Protection The Easiest, Most Complete Way to Keep Your Children Safe Online
The Easiest, Most Complete Way to Keep Your Children Safe Online 1 Quick Start Easy Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed below.
More informationAlumni Tracking System
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Volume 8, PP 80-86 www.iosrjen.org Alumni Tracking System MihirJayavant, Shashank Kawle, PritiKhergamkar, ShitalGurale, Prof.
More informationCyber Incident Response: Step 1
Cyber Incident Response: Step 1 Mary McLaughlin Cybersecurity Analyst Florida Fusion Center - FDLE Product # 14-146 6 STAGES OF INCIDENT HANDLING Preparation Identification Containment Eradication Recovery
More informationPaystar Remittance Suite Tokenless Two-Factor Authentication
Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationAn Analysis of Local Security Authority Subsystem & Extracting Password Using Packet Analyzer
An Analysis of Local Security Authority Subsystem & Extracting Using Packet Analyzer Bhanu Sharma Computer Science & Engineering Department BBSBEC, Fatehgarh sahib(punjab) India Sandeep Kaur Dhanda Computer
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationInnovative Graphical Passwords using Sequencing and Shuffling Together
Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology
More informationKeywords: Carpool ATM, Confirmation, Credit/Debit Card, Google Glass, Obscured PIN, OTP, PIN Template, Smartphone, Security. I.
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 2, February 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationDATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE
DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically
More informationMFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install
MFA Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016 if you use the full version
More informationA Single-Sign-On Security Platform for Private and Decentralized Applications. William Swanson, Paul Puey
A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized,
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationComputer Security & Privacy
Computer Security & Privacy Melissa Winstanley (mwinst@cs.washington.edu) (based on slides by Daniel Halperin) How exploration sessions work You get 1/3 point of extra credit for each session Attendance
More information/ 1. Online Banking User Guide SouthStateBank.com / (800)
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 06132017 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will
More information