SlideShare a Scribd company logo
Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Michael G. Kaishar, MSIA | CISSP | Security+ Sr. Information Security Architect & Consultant   A Master of Science Research Practicum Presentation Graduate School of Management University of Dallas Partial Fulfillment of the Requirements for the Master of Science Degree in Information Assurance   Saturday, March 27, 2010
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  2 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
MATERIALS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  3 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
ANALYSIS ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  4 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Figure 1 .  Illustration of remote connectivity process  Figure 2 .  VMWare Inc.  Illustration of where virtual machines reside in reference to the Dell Laptop Hardware Layer
VIDEO DEMONSTRATION 1 ,[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  5 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
VIDEO DEMONSTRATION 2 ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  6 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
VIDEO DEMONSTRATION 3 ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  7 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
RESULTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  8 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
CONCLUSIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  9 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
CONCLUSIONS ,[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  10 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
Questions? Saturday, March 27, 2010  Michael G. Kaishar  11 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
Thank You Saturday, March 27, 2010  Michael G. Kaishar  12 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)

More Related Content

Viewers also liked

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Portfolio CLARA Proof of Concept projects
Portfolio CLARA Proof of Concept projectsPortfolio CLARA Proof of Concept projects
Portfolio CLARA Proof of Concept projects
llevy
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Salesforce Admins
 
Better Security With Two Factor Authentication (PHP Unconference 2013)
Better Security With Two Factor Authentication (PHP Unconference 2013)Better Security With Two Factor Authentication (PHP Unconference 2013)
Better Security With Two Factor Authentication (PHP Unconference 2013)
Norman Soetbeer
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
Mike Schwartz
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
Usman Sait
 

Viewers also liked (7)

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Portfolio CLARA Proof of Concept projects
Portfolio CLARA Proof of Concept projectsPortfolio CLARA Proof of Concept projects
Portfolio CLARA Proof of Concept projects
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
 
Better Security With Two Factor Authentication (PHP Unconference 2013)
Better Security With Two Factor Authentication (PHP Unconference 2013)Better Security With Two Factor Authentication (PHP Unconference 2013)
Better Security With Two Factor Authentication (PHP Unconference 2013)
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 

Similar to Implementing Two Factor Authentication For Remote Access Using Phone Factor

Delivering software - process and infrastructure
Delivering software - process and infrastructureDelivering software - process and infrastructure
Delivering software - process and infrastructure
Rune Sundling
 
bryan-j.-reinbolt-resume
bryan-j.-reinbolt-resumebryan-j.-reinbolt-resume
bryan-j.-reinbolt-resume
Bryan Reinbolt
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014
Dan Lewis
 
Butler
ButlerButler
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
Lifesize
 
Mobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data AnalyticsMobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data Analytics
TechWell
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
Happiest Minds Technologies
 
STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015
Hank Lydick
 
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
Nicolas Bortolotti
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
Wing Venture Capital
 
Siva_resume
Siva_resumeSiva_resume
Siva_resume
SIVASANTHANAM. D
 
Windows7 First Wave Community Update
Windows7 First Wave Community UpdateWindows7 First Wave Community Update
Windows7 First Wave Community Update
WouterJansen
 
Expert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project ManagementExpert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project Management
Moshe Kaplan
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
NASA Open Government Initiative
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and How
TechWell
 
How To Sell Into Insurance with Perfecto
How To Sell Into Insurance with PerfectoHow To Sell Into Insurance with Perfecto
How To Sell Into Insurance with Perfecto
Lizzy Guido (she/her)
 
resume 10.27.14
resume 10.27.14resume 10.27.14
resume 10.27.14
Jal Berador-Pacumba
 
Security In The Cloud Timed
Security In The Cloud TimedSecurity In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
 
Madhu_Resume
Madhu_ResumeMadhu_Resume
Madhu_Resume
Madhu kumari
 
Michael kammer resume_20200818
Michael kammer resume_20200818Michael kammer resume_20200818
Michael kammer resume_20200818
Michael Kammer
 

Similar to Implementing Two Factor Authentication For Remote Access Using Phone Factor (20)

Delivering software - process and infrastructure
Delivering software - process and infrastructureDelivering software - process and infrastructure
Delivering software - process and infrastructure
 
bryan-j.-reinbolt-resume
bryan-j.-reinbolt-resumebryan-j.-reinbolt-resume
bryan-j.-reinbolt-resume
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014
 
Butler
ButlerButler
Butler
 
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
 
Mobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data AnalyticsMobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data Analytics
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015
 
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Siva_resume
Siva_resumeSiva_resume
Siva_resume
 
Windows7 First Wave Community Update
Windows7 First Wave Community UpdateWindows7 First Wave Community Update
Windows7 First Wave Community Update
 
Expert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project ManagementExpert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project Management
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and How
 
How To Sell Into Insurance with Perfecto
How To Sell Into Insurance with PerfectoHow To Sell Into Insurance with Perfecto
How To Sell Into Insurance with Perfecto
 
resume 10.27.14
resume 10.27.14resume 10.27.14
resume 10.27.14
 
Security In The Cloud Timed
Security In The Cloud TimedSecurity In The Cloud Timed
Security In The Cloud Timed
 
Madhu_Resume
Madhu_ResumeMadhu_Resume
Madhu_Resume
 
Michael kammer resume_20200818
Michael kammer resume_20200818Michael kammer resume_20200818
Michael kammer resume_20200818
 

Implementing Two Factor Authentication For Remote Access Using Phone Factor

  • 1. Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Michael G. Kaishar, MSIA | CISSP | Security+ Sr. Information Security Architect & Consultant   A Master of Science Research Practicum Presentation Graduate School of Management University of Dallas Partial Fulfillment of the Requirements for the Master of Science Degree in Information Assurance   Saturday, March 27, 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Questions? Saturday, March 27, 2010 Michael G. Kaishar 11 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
  • 12. Thank You Saturday, March 27, 2010 Michael G. Kaishar 12 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)