SlideShare a Scribd company logo
Multifactor authentication
Multifactor authentication or MFA is a security system that
requires more than on method of authentication from
independent categories of credentials to verify the user’s
identity for a login or other transaction.
Multifactor authentication combines two or more independent
credentials: what the user knows like a password, what the user
has the security token and what the user is like biometric
verification. The goal of multifactor authentication is to create
a layer of defense and make it more difficult for an
unauthorized person to access a some like a physical location,
network or database, or a computing device. If one of the factor
is compromised, an attacker still needs at least one more barrier
to breach before successfully breaking into the target.
Multifactor authentication cont…
Typical MFA scenarios include:
Swiping a card and entering a PIN.
Logging into a website and being requested to enter an
additional one-time password OTP that the website’s
authentication server sends to the requester’s phone, email
address, or any other form.
Downloading a VPN client with a valid digital certificate and
logging into the VPN before being granted access to a network.
Swiping a card, scanning a fingerprint and answering a security
question
Attaching a USB hardware token to a Desktop that generates a
one-time passcode and using the one-time passcode to log into a
VPN client.
RSA Token/Symantec VIP Access
RSA token or security token is a two-factor authentication
technology that is used to protect network resources. The
authentication is based on two factors. The two factors are first
something you know like your password or pin and the second
factor is something you have the authenticator (RSA Token).
The code that RSA Token produces changes every 60 seconds as
an added form of security.
Symantec VIP Access is a software that protects your online
accounts and transactions. The VIP credential provides a
dynamic security code that you can use in addition to your user
name and password for safe and secure account access. The
code that VIP Access produces changes every 30 seconds as an
added form of security.
How RSA Token/VIP software work
The way RSA Token and the VIP software work is when a user
attempts to access a protected resource, he or she is prompted
for a unique code. The code is a combination of their user’s
password or pin and the code that is displayed on the
authenticator token or VIP application at the time of logging in.
The user ID and pass code are intercepted by the RSA
Authentication Agent and presented to the RSA Authentication
Manager software which validates the pass code. The RSA
SecurID system computes what number the token is supposed to
be showing at that moment in time, checks it against what the
user entered, and makes the decision to allow or deny access.
This is also the case with the VIP software.
Reference
http://www.webopedia.com/TERM/R/rsa_secure_id.html
https://idprotect.vip.symantec.com/
http://searchsecurity.techtarget.com/definition/multifactor-
authentication-MFA
Project Outline and Schedule
At the end of Week 4 a designated Group Member has to submit
approved by all members Project Outline and Schedule.
Study Group #: Group 2
Group Project: Enterprise Secure and Not-Secure SubNetworks
· Haymanot Ayane
· Laura Bergstrom
· Cierra Ching
· Deltrick Elmore
· Serge Fabre
1. Project Outline
1.1. Group Project description
In order to better define the appropriate levels of network
security and give us a point of refernce, we have decided we
will make “Beta Company” an insurance company. We have
defined many technologies to explore high security. We are
still researching lower security measures. We will narrow down
our final topics in the next one to two weeks
1.2. List of the main topics and subtopics of your Group Project
presentation
Some of the technologies that have been identified for further
explanation are:
· RSA Token/VIP software
· Multifactor authentication
· Triple Data Encryption Standard (DES)
· Virtual LAN (VLAN)
· Network Segmentation
· Firewalls
· Data Loss Prevention (DLP)
· Intrusion Detection Systems (IDS)
1.3. Resources
· Class notes
· Open source material linked in weekly discussion areas for
ITEC 626
· UMUC Library
· Technical journals
2. Project Schedule
Week
Task
Group Member
5
Finalize topics/subtopics (we have identified many technologies
for consideration and need to narrow it down)
All
6
Create high-level PowerPoint outline and assign research and
slide content to individual group members.
Laura/Cierra
7
First drafts of slide content submitted for group review.
All
8
Draft review of Power Point and suggestions for edits back to
individual group members.
All
9
Final drafts of slide content submitted. Content compiled and
formatted int o a uniform presentation.
All to submit. Laura/Cierra to format.
10
Group review of presentation and content and any edits.
All
11
Final review and Power Point submission.
Laura/Cierra
ITEC 626 Group Project Group 2
Haymanot Ayane∙Laura Bergstrom∙Cierra Ching∙Deltrick
Elmore∙Serge Fabre
1
Introduction
Beta Company is an insurance company that underwrites
business across the United States. Beta Company’s product
offerings include: auto , homeowners, renters, motorcycle and
life insurance.
Beta Company has multiple tiers of users, needing various
levels of network access:
Consumers using the public facing site to obtain a rate
quotation/information.
Policyholders using the “consumer portal” to access information
regarding their policies and to submit online claims.
Policyholders have login ID’s and passwords.
Claimants and Preferred Providers using the public facing site
to access limited features. Claimants and Preferred Providers
can set up a login ID and password after an active claim has
been established.
Agents using the “agent portal” to access information regarding
their book of business, and information relevant to that book.
Agents have login ID’s and passwords.
Beta employees using the Beta Network to access programs and
applications that they need to their jobs. Beta employees have
multiple login ID’s and password for the network and various
applications.
2
Introduction
The Beta Executive Team has tasked the Beta Network and
Telecom Team with better designing their system, to allow
multiple levels of security, based on user types and their need to
access various data and portions of the network. The following
technologies have been identified for use in an integrated
approach to network security. In the following slides, the
following technologies will be discussed:
RSA Token/VIP software
Multifactor authentication
Triple Data Encryption Standard (DES)
Virtual LAN (VLAN)
Network Segmentation
Firewalls
Data Loss Prevention (DLP)
Intrusion Detection Systems (IDS)
3
This project consists of 3 pages each topic for a total of 4 point
slides. My topics are:
1. Network Segmentation(3 pages) and
2. Firewalls (3 pages)
With both having 2 powerpoint for network segmentation and 2
for firewalls as they pertain to an insurance company.
In short;
1 slide should define network segmentation and 1 slide should
define firewalls……etc.
1 slide should show how network segmentation will be used for
an insurance company. 1 slide should show fire walls are used
for an insurance company (protecting information of the
customer).

More Related Content

Similar to Multifactor authenticationMultifactor authentication or MFA .docx

Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Network Security
Network SecurityNetwork Security
Network Security
Beth Hall
 
120 i143
120 i143120 i143
120 i143
Hai Nguyen
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
PortalGuard
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
Brian Spector
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
Chetan Kapila
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
Hai Nguyen
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022
SkillCertProExams
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
IJERA Editor
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
Information Technology
 

Similar to Multifactor authenticationMultifactor authentication or MFA .docx (20)

Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Network Security
Network SecurityNetwork Security
Network Security
 
120 i143
120 i143120 i143
120 i143
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 

More from gilpinleeanna

Name 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docxName 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docx
gilpinleeanna
 
Name _____________________Date ________________________ESL.docx
Name  _____________________Date  ________________________ESL.docxName  _____________________Date  ________________________ESL.docx
Name _____________________Date ________________________ESL.docx
gilpinleeanna
 
Name Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docxName Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docx
gilpinleeanna
 
Name _______________________________ (Ex2 rework) CHM 33.docx
Name  _______________________________ (Ex2 rework) CHM 33.docxName  _______________________________ (Ex2 rework) CHM 33.docx
Name _______________________________ (Ex2 rework) CHM 33.docx
gilpinleeanna
 
Name 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docxName 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docx
gilpinleeanna
 
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
Name   Don’t ForgetDate       UNIT 3 TEST(The direct.docxName   Don’t ForgetDate       UNIT 3 TEST(The direct.docx
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
gilpinleeanna
 
Name Add name hereConcept Matching From Disease to Treatmen.docx
Name  Add name hereConcept Matching From Disease to Treatmen.docxName  Add name hereConcept Matching From Disease to Treatmen.docx
Name Add name hereConcept Matching From Disease to Treatmen.docx
gilpinleeanna
 
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docxName Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
gilpinleeanna
 
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docxName  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
gilpinleeanna
 
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name    Sophocles, AntigoneMain Characters Antigone, Cre.docxName    Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
gilpinleeanna
 
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docxN4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
gilpinleeanna
 
Name Habitable Zones – Student GuideExercisesPlease r.docx
Name  Habitable Zones – Student GuideExercisesPlease r.docxName  Habitable Zones – Student GuideExercisesPlease r.docx
Name Habitable Zones – Student GuideExercisesPlease r.docx
gilpinleeanna
 
Name Class Date SKILL ACTIVITY Giving an Eff.docx
Name    Class    Date   SKILL ACTIVITY Giving an Eff.docxName    Class    Date   SKILL ACTIVITY Giving an Eff.docx
Name Class Date SKILL ACTIVITY Giving an Eff.docx
gilpinleeanna
 
Name Speech Title I. Intro A) Atten.docx
Name  Speech Title    I. Intro  A) Atten.docxName  Speech Title    I. Intro  A) Atten.docx
Name Speech Title I. Intro A) Atten.docx
gilpinleeanna
 
n engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docxn engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docx
gilpinleeanna
 
Name Class Date HUMR 211 Spr.docx
Name     Class     Date    HUMR 211 Spr.docxName     Class     Date    HUMR 211 Spr.docx
Name Class Date HUMR 211 Spr.docx
gilpinleeanna
 
NAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docxNAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docx
gilpinleeanna
 
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docxNAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
gilpinleeanna
 
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name  Understanding by Design (UbD) TemplateStage 1—Desir.docxName  Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
gilpinleeanna
 
Name MUS108 Music Cultures of the World .docx
Name              MUS108 Music Cultures of the World              .docxName              MUS108 Music Cultures of the World              .docx
Name MUS108 Music Cultures of the World .docx
gilpinleeanna
 

More from gilpinleeanna (20)

Name 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docxName 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docx
 
Name _____________________Date ________________________ESL.docx
Name  _____________________Date  ________________________ESL.docxName  _____________________Date  ________________________ESL.docx
Name _____________________Date ________________________ESL.docx
 
Name Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docxName Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docx
 
Name _______________________________ (Ex2 rework) CHM 33.docx
Name  _______________________________ (Ex2 rework) CHM 33.docxName  _______________________________ (Ex2 rework) CHM 33.docx
Name _______________________________ (Ex2 rework) CHM 33.docx
 
Name 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docxName 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docx
 
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
Name   Don’t ForgetDate       UNIT 3 TEST(The direct.docxName   Don’t ForgetDate       UNIT 3 TEST(The direct.docx
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
 
Name Add name hereConcept Matching From Disease to Treatmen.docx
Name  Add name hereConcept Matching From Disease to Treatmen.docxName  Add name hereConcept Matching From Disease to Treatmen.docx
Name Add name hereConcept Matching From Disease to Treatmen.docx
 
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docxName Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
 
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docxName  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
 
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name    Sophocles, AntigoneMain Characters Antigone, Cre.docxName    Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
 
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docxN4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
 
Name Habitable Zones – Student GuideExercisesPlease r.docx
Name  Habitable Zones – Student GuideExercisesPlease r.docxName  Habitable Zones – Student GuideExercisesPlease r.docx
Name Habitable Zones – Student GuideExercisesPlease r.docx
 
Name Class Date SKILL ACTIVITY Giving an Eff.docx
Name    Class    Date   SKILL ACTIVITY Giving an Eff.docxName    Class    Date   SKILL ACTIVITY Giving an Eff.docx
Name Class Date SKILL ACTIVITY Giving an Eff.docx
 
Name Speech Title I. Intro A) Atten.docx
Name  Speech Title    I. Intro  A) Atten.docxName  Speech Title    I. Intro  A) Atten.docx
Name Speech Title I. Intro A) Atten.docx
 
n engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docxn engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docx
 
Name Class Date HUMR 211 Spr.docx
Name     Class     Date    HUMR 211 Spr.docxName     Class     Date    HUMR 211 Spr.docx
Name Class Date HUMR 211 Spr.docx
 
NAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docxNAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docx
 
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docxNAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
 
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name  Understanding by Design (UbD) TemplateStage 1—Desir.docxName  Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
 
Name MUS108 Music Cultures of the World .docx
Name              MUS108 Music Cultures of the World              .docxName              MUS108 Music Cultures of the World              .docx
Name MUS108 Music Cultures of the World .docx
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

Multifactor authenticationMultifactor authentication or MFA .docx

  • 1. Multifactor authentication Multifactor authentication or MFA is a security system that requires more than on method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. Multifactor authentication combines two or more independent credentials: what the user knows like a password, what the user has the security token and what the user is like biometric verification. The goal of multifactor authentication is to create a layer of defense and make it more difficult for an unauthorized person to access a some like a physical location, network or database, or a computing device. If one of the factor is compromised, an attacker still needs at least one more barrier to breach before successfully breaking into the target. Multifactor authentication cont… Typical MFA scenarios include: Swiping a card and entering a PIN. Logging into a website and being requested to enter an additional one-time password OTP that the website’s authentication server sends to the requester’s phone, email address, or any other form. Downloading a VPN client with a valid digital certificate and logging into the VPN before being granted access to a network. Swiping a card, scanning a fingerprint and answering a security question Attaching a USB hardware token to a Desktop that generates a one-time passcode and using the one-time passcode to log into a VPN client.
  • 2. RSA Token/Symantec VIP Access RSA token or security token is a two-factor authentication technology that is used to protect network resources. The authentication is based on two factors. The two factors are first something you know like your password or pin and the second factor is something you have the authenticator (RSA Token). The code that RSA Token produces changes every 60 seconds as an added form of security. Symantec VIP Access is a software that protects your online accounts and transactions. The VIP credential provides a dynamic security code that you can use in addition to your user name and password for safe and secure account access. The code that VIP Access produces changes every 30 seconds as an added form of security. How RSA Token/VIP software work The way RSA Token and the VIP software work is when a user attempts to access a protected resource, he or she is prompted for a unique code. The code is a combination of their user’s password or pin and the code that is displayed on the authenticator token or VIP application at the time of logging in. The user ID and pass code are intercepted by the RSA Authentication Agent and presented to the RSA Authentication Manager software which validates the pass code. The RSA SecurID system computes what number the token is supposed to be showing at that moment in time, checks it against what the user entered, and makes the decision to allow or deny access. This is also the case with the VIP software. Reference http://www.webopedia.com/TERM/R/rsa_secure_id.html
  • 3. https://idprotect.vip.symantec.com/ http://searchsecurity.techtarget.com/definition/multifactor- authentication-MFA Project Outline and Schedule At the end of Week 4 a designated Group Member has to submit approved by all members Project Outline and Schedule. Study Group #: Group 2 Group Project: Enterprise Secure and Not-Secure SubNetworks · Haymanot Ayane · Laura Bergstrom · Cierra Ching · Deltrick Elmore · Serge Fabre 1. Project Outline 1.1. Group Project description In order to better define the appropriate levels of network security and give us a point of refernce, we have decided we will make “Beta Company” an insurance company. We have defined many technologies to explore high security. We are still researching lower security measures. We will narrow down our final topics in the next one to two weeks 1.2. List of the main topics and subtopics of your Group Project presentation Some of the technologies that have been identified for further explanation are: · RSA Token/VIP software
  • 4. · Multifactor authentication · Triple Data Encryption Standard (DES) · Virtual LAN (VLAN) · Network Segmentation · Firewalls · Data Loss Prevention (DLP) · Intrusion Detection Systems (IDS) 1.3. Resources · Class notes · Open source material linked in weekly discussion areas for ITEC 626 · UMUC Library · Technical journals 2. Project Schedule Week Task Group Member 5 Finalize topics/subtopics (we have identified many technologies for consideration and need to narrow it down) All 6 Create high-level PowerPoint outline and assign research and slide content to individual group members. Laura/Cierra 7 First drafts of slide content submitted for group review. All 8 Draft review of Power Point and suggestions for edits back to individual group members. All 9
  • 5. Final drafts of slide content submitted. Content compiled and formatted int o a uniform presentation. All to submit. Laura/Cierra to format. 10 Group review of presentation and content and any edits. All 11 Final review and Power Point submission. Laura/Cierra ITEC 626 Group Project Group 2 Haymanot Ayane∙Laura Bergstrom∙Cierra Ching∙Deltrick Elmore∙Serge Fabre 1 Introduction Beta Company is an insurance company that underwrites business across the United States. Beta Company’s product offerings include: auto , homeowners, renters, motorcycle and life insurance. Beta Company has multiple tiers of users, needing various levels of network access: Consumers using the public facing site to obtain a rate quotation/information. Policyholders using the “consumer portal” to access information regarding their policies and to submit online claims. Policyholders have login ID’s and passwords.
  • 6. Claimants and Preferred Providers using the public facing site to access limited features. Claimants and Preferred Providers can set up a login ID and password after an active claim has been established. Agents using the “agent portal” to access information regarding their book of business, and information relevant to that book. Agents have login ID’s and passwords. Beta employees using the Beta Network to access programs and applications that they need to their jobs. Beta employees have multiple login ID’s and password for the network and various applications. 2 Introduction The Beta Executive Team has tasked the Beta Network and Telecom Team with better designing their system, to allow multiple levels of security, based on user types and their need to access various data and portions of the network. The following technologies have been identified for use in an integrated approach to network security. In the following slides, the following technologies will be discussed: RSA Token/VIP software Multifactor authentication Triple Data Encryption Standard (DES) Virtual LAN (VLAN) Network Segmentation Firewalls Data Loss Prevention (DLP) Intrusion Detection Systems (IDS)
  • 7. 3 This project consists of 3 pages each topic for a total of 4 point slides. My topics are: 1. Network Segmentation(3 pages) and 2. Firewalls (3 pages) With both having 2 powerpoint for network segmentation and 2 for firewalls as they pertain to an insurance company. In short; 1 slide should define network segmentation and 1 slide should define firewalls……etc. 1 slide should show how network segmentation will be used for an insurance company. 1 slide should show fire walls are used for an insurance company (protecting information of the customer).