CAN WE ESCAPE PASSWORDS?

Size: px
Start display at page:

Download "CAN WE ESCAPE PASSWORDS?"

Transcription

1 INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an aspect of security that we all tend to encounter Traditional password methods are often regarded as very usable Easy to understand the idea Familiar across different systems But the ease of use is often because users have not been made to use them properly

2 Usability challenges Practically every aspect of good password practice makes them more difficult to use Enforcing selection criteria (length and character composition) Changing them regularly Avoiding password reuse Avoiding a written record The need to use passwords across multiple systems amplifies the challenge Password management tools overcome some of the constraints but complicate the process of retrieving and using the passwords An analysis of website password practices Examination of ten leading websites Selected from within the top 25 entries in the Alexa Global Top 500 websites in September 2011 Captures a number of the leading and most recognised online brands password practices likely to influence the largest proportion of end-users potentially used as a baseline to be followed by other sites

3 Traditional Passwords Enforcement of password restrictions Site (at initial registration / sign-up to website) Restrictions Length Surname User ID Password Dictionary Composition Reuse Meter Amazon 6 û û û û û û û ebay 6 û ü ü û ü ü ~ Facebook 6 ü û ü û û û û Google 8 û ü ü ü û ü ü LinkedIn 6 û û ü û û û û Twitter 6 û û ü ~ û û ü Wikipedia û û ü û û û û û Windows Live 6 ü ü ü û ü û ü WordPress 4 û ü ü û û û ü Yahoo! 6 ü ü ü û û û ü

4 Observations Password length enforcement was variable Most enforced a minimum of 6 characters (WordPress was 4, Google was 8) Some sites enforced a maximum length (16 characters for Windows Live, 20 for ebay, and 32 for Yahoo!) Wikipedia allowed a 1 character password Other viable checks were often excluded Although some sites did inform, they did not enforce Some sites might argue that the checks are commensurate with the data at risk Overlooks the potential for users to use the same password elsewhere Better to help contribute towards raising the general security culture Lots to remember? How many passwords? (Furnell and Bär, 2013) Based on 246 respondents

5 Passwords in practice Statement Agree (n=246) It is at least 8 characters long 82% It has alphabetic and numeric characters 84% It includes other characters (e.g. punctuation symbols) 49% It uses a word you would find in a dictionary 18% It is based on personal information about me 26% I have changed it since I started using it 36% I change it regularly 21% I have shared it with other people 6% I have forgotten it and had to reset/recover it 10% (Furnell and Bär, 2013) Does password advice help? Joint study with psychology researchers at Chemnitz University of Technology Does guiding users in password selection make any difference? Could score out of 5 based upon choosing passwords: at least 8 characters long composed of both alphabetic and numeric characters using other characters (such as punctuation symbols) not based upon a dictionary word not based upon personal information

6 Guidance helps (so websites ought to offer it!) Based on 27 initial participants: average score for unguided users was 1.8 compared to 3.8 for those receiving guidance Guided (n=13) Unguided (n=14) Used at least 8 characters Used alphanumeric characters Used other characters Used nondictionary Avoided personal info 85% 85% 62% 54% 92% 50% 64% 7% 50% 64% Online Banking Identification and authentication demands: A personal banking number Customer surname Selected digits from security number A memorable date

7 Challenging the legitimate user? More time-consuming and require more cognitive effort than passwords: the authentication challenge will not be the same each time (i.e. different digits requested) the user can no longer rely on reflex response of typing a normal PIN/password the digits of the PIN are not requested in sequential order the position of the digits on the graphical keypad varies on each occasion Online Banking HSBC Secure Key introduces a multi-stage process for each login: User needs to enter their Banking ID Then answer a security question defined when they set up the account Then enter a 4-digit PIN code on the Secure Key device Then enter the 6-digit code generated by the device into the web page

8 Acceptable trade-off? Users may not object in a banking context they realise their money is at stake Such approaches would not work for website authentication in general would not scale up well as having a variety of numbers to remember for different accounts would quickly become unmanageable for the user The user s viewpoint?

9 Graphical Authentication Replacing weak password and PINbased authentication A method based upon remembering pictures of objects Implementations in web browser and mobile device platforms Windows 8 Picture Password

10 Android Pattern Lock Clearly suited to touch screen devices Complex patterns hard to remember? More observable than PINs Potential clues from greasy fingers choose patterns that double-back or clean the screen! Biometrics Authentication based upon something the user is Theoretically far more usable nothing for the user to remember nothing to them to lose or leave behind Practical factors (e.g. failure to acquire, false rejection) may limit tolerability

11 Biometric example Android Face Unlock Unlocks the phone in response to seeing the correct face Very quick and easy under the right conditions Not a universal solution reverts to PIN/password entry in low light conditions Questionable security original version could be fooled by static photo of the legitimate user limited Liveness detection (blink checking) introduced in mid-2012, but can still be fooled by edited photo Non-intrusive mobile authentication Signature Recognition Service Utilisation Facial Recognition Voice Verification Keystroke Dynamics

12 Comparison factors Mental effort the extent to which the technique relies upon the user s ability to memorise and recall things, and how precise this must be Convenience e.g. as the speed with which the user is able to login, and the effort/engagement required to do so Applicability e.g. whether the technique will work effectively on desktop, mobile and handheld devices, with differing input mechanisms and screen sizes/resolutions Flexibility e.g. the ease with which the user can change their authentication credentials in the event of compromise SECURITY PODCASTS FREE ON ITUNES U LECTURES, DISCUSSIONS, INTERVIEWS, TUTORIALS, INDUSTRY INSIGHTS...

13 INFOSECURITY WITH PLYMOUTH UNIVERSITY Prof. Steven Centre for Security, Communications & Network Research

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

Guide to your CGIAR Network account Self Service tool

Guide to your CGIAR Network account Self Service tool Guide to your CGIAR Network account Self Service tool The self-service tool allows you to: Change Password: Change your current password from anywhere using your web browser. Reset Password: Reset your

More information

Multi-Factor Authentication Enrolment Guide

Multi-Factor Authentication Enrolment Guide Multi-Factor Authentication Enrolment Guide How to set up the service and authenticate successfully What is MFA and how does it impact the way I sign into my account or applications? Multi-Factor Authentication

More information

Security and Usability Computer Security: Lecture 9. 9 February 2009 Guest Lecture by Mike Just

Security and Usability Computer Security: Lecture 9. 9 February 2009 Guest Lecture by Mike Just Security and Usability Computer Security: Lecture 9 9 February 2009 Guest Lecture by Mike Just Introduction Who am I? Mike Just Visiting Research Fellow, School of Informatics Researching security and

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

Table of Contents. Blog and Personal Web Site Policy

Table of Contents. Blog and Personal Web Site Policy Table of Contents Blog and Personal Web Sites Policy... 2 Policy... 2 Rights to content... 3 Option for More Restrictive License Terms... 3 Attribution... 4 Guidelines... 4 Personal Website and Blog Guidelines

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

SSPR Registration. 1. Use your SVSU credentials to log in to

SSPR Registration. 1. Use your SVSU credentials to log in to Self-Service Password Reset (SSPR) SVSU uses a Self-Service Password Reset system to make it easy to recover your password if you ever forget it. To ensure you never lose access to your account, you must

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

Signup for Multi-Factor Authentication

Signup for Multi-Factor Authentication What is Multi-Factor Authentication? Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring

More information

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android) Mobile Banking App Guide (ios and Android) Page 1 A safe and efficient way of accessing your People s Choice Credit Union accounts, paying bills Contents. 1. Mobile Banking using the People s Choice iphone

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual

More information

Highly Secure Authentication Scheme: A Review

Highly Secure Authentication Scheme: A Review e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:

More information

Consumer Banking User Guide. Getting Started

Consumer Banking User Guide. Getting Started Consumer Banking User Guide Getting Started Contents About the platform... 3 Installing the mobile banking app... 4 Opening mobile banking... 4 Accessing the online banking site... 4 Browser requirements...

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Information Security & Privacy

Information Security & Privacy IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 8 Feb 24, 2015 Authentication, Identity 1 Objectives Understand/explain the issues related to, and utilize

More information

BADGECERT SHARING GUIDE - URL

BADGECERT SHARING GUIDE - URL BADGECERT SHARING GUIDE - URL About BadgeCert Just completed a continuing education course? Achieve certification in your industry area? Welcome to the world of BadgeCert. Our company works with your verified

More information

OXE Free desktop Guide

OXE Free desktop Guide OXE Free desktop Guide The below telephone screen examples are for a 4038/4068 handset, the Free Desktop IP- Touch Interface works in the same manner with a 4028 extension. The only difference is that

More information

BANKVIC APP FREQUENTLY ASKED QUESTIONS

BANKVIC APP FREQUENTLY ASKED QUESTIONS BANKVIC APP FREQUENTLY ASKED QUESTIONS TABLE OF CONTENTS TABLE OF CONTENTS... 1 ABOUT THE BANKVIC APP... 2 GETTING STARTED... 3 SECURITY... 4 FEATURES & FUNCTIONALITY... 5 PAYMENTS & TRANSFERS... 6 CARD

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Local. Responsive. Reliable.

Local. Responsive. Reliable. Local. Responsive. Reliable. FAQs WHAT IS myvrb? myvrb is the new name of your online and mobile banking experience at Valley Republic Bank. While you will continue to access online and mobile banking

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication Session objectives Background Identification and Authentication CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2008 Week 3 Recognise the purposes of (password) identification.

More information

Signer Authentication

Signer Authentication Signer Authentication WHITE PAPER A common question arises as people migrate to electronic signature and electronic contract execution from paper and ink signatures. How do I know my intended signer is

More information

COMMON ISSUES AFFECTING SECURITY USABILITY

COMMON ISSUES AFFECTING SECURITY USABILITY Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,

More information

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired... WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...

More information

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily

More information

How do I configure my Roqos Core to work with a Verizon FIOS router?

How do I configure my Roqos Core to work with a Verizon FIOS router? Getting Started How do I configure my Roqos Core to work with a Verizon FIOS router? A modem and wireless router come together in a Verizon FIOS router. Please refer to the instructions within the article

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

Citibank Online. Registration Guide. Or call for further assistance. For details and Terms & Conditions, Log on to

Citibank Online. Registration Guide.  Or call for further assistance. For details and Terms & Conditions, Log on to For details and Terms & Conditions, Log on to www.citibank.com.pk Or call 111 222 222 for further assistance CBOL-RegGuide-V1-11-06 Citibank Online Registration Guide Introduction How does Citibank Online

More information

A guide to the Cyber Essentials Self-Assessment Questionnaire

A guide to the Cyber Essentials Self-Assessment Questionnaire A guide to the Cyber Essentials Self-Assessment Questionnaire Introduction Cyber Essentials and Cyber Essentials Plus Information brought to you by APMG International 1 P a g e Cyber Essentials was always

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

(Toll-Free) # IMPORTANT DATES AND CRITICAL INFORMATION

(Toll-Free) # IMPORTANT DATES AND CRITICAL INFORMATION MERGER GUIDE We re excited that you are becoming a member of Baylands Family Credit Union. Please use this booklet to help guide you through the merger activities as Spruance Cellophane Credit Union becomes

More information

Graphical Password or Graphical User Authentication as Effective Password Provider

Graphical Password or Graphical User Authentication as Effective Password Provider www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2765-2769 Graphical Password or Graphical User Authentication as Effective

More information

A guide to the Cyber Essentials Self-Assessment Questionnaire

A guide to the Cyber Essentials Self-Assessment Questionnaire A guide to the Cyber Essentials Self-Assessment Questionnaire Apply for certification at https://ces.apmg-certified.com/ Introduction Cyber Essentials and Cyber Essentials Plus Information brought to you

More information

MFA (Multi-Factor Authentication) Enrollment Guide

MFA (Multi-Factor Authentication) Enrollment Guide MFA (Multi-Factor Authentication) Enrollment Guide Morristown Medical Center 1. Open Internet Explorer (Windows) or Safari (Mac) 2. Go to the URL: https://aka.ms/mfasetup enter your AHS email address and

More information

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution RSA Adaptive Authentication On-Premise Implementation Guide Partner Information Last Modified: June 12, 2013 Product Information Partner Name Web Site www.monitise.com Product Name Version & Platform 5.0

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability

More information

Slice Intelligence!

Slice Intelligence! Intern @ Slice Intelligence! Wei1an(Wu( September(8,(2014( Outline!! Details about the job!! Skills required and learned!! My thoughts regarding the internship! About the company!! Slice, which we call

More information

Tennessee Technological University Policy No Password Management

Tennessee Technological University Policy No Password Management Tennessee Technological University Policy No. 852 Password Management Effective Date: January 1, 2014 Policy No: 852 Policy Name: Password Management Policy Policy Subject: Password Management Date Revised:

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

BSE-SINGLE SIGN ON. For Brokers/ Banks/ Mutual Funds

BSE-SINGLE SIGN ON. For Brokers/ Banks/ Mutual Funds BSE-SINGLE SIGN ON For Brokers/ Banks/ Mutual Funds Contents Introduction:... 2 Features:... 2 Advantages:... 2 On-boarding process.... 3 SSO application Login Process... 7 Authentication via OTP... 7

More information

Ecommerce UX Nielsen Norman Group. Lecture notes

Ecommerce UX Nielsen Norman Group. Lecture notes Ecommerce UX Nielsen Norman Group Lecture notes Table of Content 5 types of EC shoppers 3 Design Trends to Follow and 3 to Avoid http://www.nngroup.com/ 5 types of EC shoppers Product focused Browsers

More information

HCI Lecture 10: Guest Lecture Usability & Security 28 October 2008

HCI Lecture 10: Guest Lecture Usability & Security 28 October 2008 HCI Lecture 10: Guest Lecture Usability & Security 28 October 2008 Mike Just, Visiting Research Fellow Key Points: Reliance upon memory is a key factor for usability Usability and security can be achieved

More information

Frequently Asked Questions About Columbia Connect

Frequently Asked Questions About Columbia Connect First Time Login How do I login? You will access Columbia Connect from the online banking login box at www.columbiabank.com. Ensure personal is selected in the online banking login box. Enter your current

More information

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Welcome to INTRODUCTION TO WINDOWS 10 Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Email: cpu@cpu-onsite.com Phone: 209-296-0660 1 You are viewing the Student Version of the

More information

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment December 2017 00 Table of Contents What is MFA and how does it impact the way I sign into applications? 2 MFA Enrollment Log-in 3 Setup

More information

Two-Factor Authentication User FAQ s

Two-Factor Authentication User FAQ s Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices

More information

CSCI 667: Concepts of Computer Security

CSCI 667: Concepts of Computer Security CSCI 667: Concepts of Computer Security Lecture 8 Prof. Adwait Nadkarni Derived from slides by William Enck, Micah Sherr, Patrick McDaniel and Peng Ning 1 2 Announcements Project Proposals due Tonight,

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. INSTALLATION Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. From this point on, you may install any additional

More information

Table of Contents. After registering, fundraising is the next step to treating animals to a sweeter life!

Table of Contents. After registering, fundraising is the next step to treating animals to a sweeter life! Table of Contents Log In -------------------------------------------------------------------------- 2 Set up your personal fundraising page link ------------------ 3 Edit your personal fundraising page

More information

ADP Security Management Services

ADP Security Management Services ADP Security Management Services Getting Started Guide for Security Administrators Updated August 2017 Contents Getting Started with Security Management Service... 5 Setting Up Your Organization... 5 Setting

More information

GoToMyPC Corporate Administrator Guide

GoToMyPC Corporate Administrator Guide GoToMyPC Corporate Administrator Guide Contents Getting Started... 6 Administration Center Overview... 6 Log in to the Administration Center... 6 Notes on Installation and Feature Access... 8 Mac Features...

More information

BOCHK Mobile Token FAQ

BOCHK Mobile Token FAQ BOCHK Mobile Token FAQ 1. What is "Mobile Token"? "Mobile Token" is a feature of BOCHK Mobile App. Upon activation of "Mobile Token" with a designated mobile device ("mobile phone"), you can use it immediately

More information

Participant Center User s Guide

Participant Center User s Guide Participant Center User s Guide Your online Participant Center houses all the tools you ll need to begin fundraising for the Walk to End Alzheimer s. This guide provides the details you ll need to get

More information

What is Mobile Deposit? What items can be deposited via Mobile Deposit? What items cannot

What is Mobile Deposit? What items can be deposited via Mobile Deposit? What items cannot Mobile Deposit FAQ s What is Mobile Deposit? What items can be deposited via Mobile Deposit? What items cannot be deposited through Mobile Deposit? Are Mobile Banking and Mobile Deposit secure? What are

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

How to set up your NMC Online account

How to set up your NMC Online account How to set up your NMC Online account How to set up your NMC Online account Introduction NMC Online is a secure service that allows you to manage your registration with us online. This guidance explains

More information

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION P.Kiruthika R.Tamilarasi Department of Computer Applications, Dr.Mahalingam College Of Engineering and Technology,

More information

Continuous user authentication using multi-modal biometrics

Continuous user authentication using multi-modal biometrics Continuous user authentication using multi-modal biometrics Hataichanok Saevanee 1, Nathan Clarke 1, 3, Steven Furnell 1, 3, Valerio Biscione 2 1 Centre for Security, Communications and Network Research,

More information

Quick Start Guide (External Preview Version)

Quick Start Guide (External Preview Version) Quick Start Guide (External Preview Version) 2016 PSP Security Co. Ltd. All rights reserved A. Establishing Connection 1. The following peripherals are required to operate AccuFACE: 12 VDC power supply

More information

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted

More information

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications

More information

AP Computer Science Principles: Problem Set 1

AP Computer Science Principles: Problem Set 1 AP Computer Science Principles: Problem Set 1 Due date: Friday, September 8, 2017 Instructor: Mr. Alwin Tareen Task Overview Setting up the KeePass password manager for Windows and Mac OS. Linux users

More information

Codebook. Codebook for OS X Introduction and Usage

Codebook. Codebook for OS X Introduction and Usage Codebook Codebook for OS X Introduction and Usage What is Codebook Encrypted Data Vault Guards passwords and private data Keeps sensitive information organized Enables quick recall of secrets Syncs data

More information

Welcome to State Bank of Herscher s Online Banking!

Welcome to State Bank of Herscher s Online Banking! Welcome to State Bank of Herscher s Online Banking! 1. To enroll in Online Banking, click on Enroll below the Online Banking Login on our website: www.sbherscher.com 2. You will be taken to the Enrollment

More information

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits

More information

Authentication KAMI VANIEA 1

Authentication KAMI VANIEA 1 Authentication KAMI VANIEA FEBRUARY 1ST KAMI VANIEA 1 First, the news KAMI VANIEA 2 Today Basics of authentication Something you know passwords Something you have Something you are KAMI VANIEA 3 Most recommended

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 3 User Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown User Authentication fundamental security building

More information

Privacy, Law, and Smartphones

Privacy, Law, and Smartphones CyLab Privacy, Law, and Smartphones Engineering & Public Policy acy & Secur ity Priv e l :// C DU HT TP ratory bo La Oct. 29, 2015 CyLab U sab Rebecca Balebako U P S.C S.C M U.E 1 Agenda Quiz Reading discussion

More information

Authentication. Chapter 2

Authentication. Chapter 2 Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

Take Control of Your Passwords

Take Control of Your Passwords Take Control of Your Passwords Joe Kissell Publisher, Take Control Books @joekissell takecontrolbooks.com The Password Problem Passwords are annoying! It s tempting to take the easy way out. There is an

More information

Digital Door Lock User S Guide

Digital Door Lock User S Guide Digital Door Lock User S Guide YDM4115 ISL-1591-01 The functions and design of this product can be changed without prior notice for quality improvement. INTRO CONTENTS For peace of mind, you need to secure

More information

Getting Started Reliance Communications, Inc.

Getting Started Reliance Communications, Inc. Getting Started Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Before you Begin... 3 Bookmark Your Login Page... 3 Setting your Password...

More information

Sumy State University Department of Computer Science

Sumy State University Department of Computer Science Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

GETTING STARTED MANUAL. Your guide on how to navigate the member portal

GETTING STARTED MANUAL. Your guide on how to navigate the member portal GETTING STARTED MANUAL Your guide on how to navigate the member portal Contents Registration..... 1 Security Question..... 4 Password..... 5 Login..... 6 One Time Pin(OTP)... 8 Resetting your password..

More information

Welcome to, internet banking available on the go.

Welcome to, internet banking available on the go. 01 Welcome to, internet banking available on the go. 02 aba.mobile offers you convenient and flexible access to online banking wherever you are. Features & Benefits Available to iphone and Android users

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Getting Started. What is the genuine URL for RHB Now Internet Banking? The genuine URL is Username and Password

Getting Started. What is the genuine URL for RHB Now Internet Banking? The genuine URL is   Username and Password Getting Started What is the genuine URL for RHB Now Internet Banking? The genuine URL is https://rhbnow.rhbgroup.com/kh Username and Password What should I do if I've forgotten my Username? Please access

More information

MULTI-FACTOR AUTHENTICATION SET-UP

MULTI-FACTOR AUTHENTICATION SET-UP MULTI-FACTOR AUTHENTICATION SET-UP DepositPartner Desktop Application FIRST TIME ENROLLMENT NOTE: Your computer settings cannot be set to clear cookies upon exit, otherwise you will be prompted to enter

More information

Now there is: Asignio web-based signature authentication.

Now there is: Asignio web-based signature authentication. THE COST OF KYC AND AML Know Your Customer (KYC) technology and Anti-Money Laundering (AML) compliance are crucial elements of modern banking. Financial institutions are trusted to verify and authenticate

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information