SlideShare a Scribd company logo
SECURE INTERNETSECURE INTERNET
BANKINGBANKING
AUTHENTICATIONAUTHENTICATION
AARTHI KANNAPPAN
DHIVYAA.R
MAHA LAKSHMI.S
2
Network SecurityNetwork Security
Introduction
Introduction
Attacks on
authentication
Online channel
Attack taxonomy
Attack taxonomy
Offline credential
objectives
Short time pwd
Conclusion
Abstract
Certificate based solution
3
PRESENTATIONPRESENTATION
OBJECTIVESOBJECTIVES
 Understand network security services
 Be aware of vulnerabilities and threats
 Realize why network security is necessary
 Highly attractive solution for valuable and
secure future.
4
The authors present two challenge response Internet
banking authentication solutions
 one based on short-time passwords
 and one on certificates
attacks on authentication
transaction-signing option
ABSTRACTABSTRACT
5
INTRODUCTIONINTRODUCTION
 The Internet is an integral part of our
daily lives, and the proportion of people
who expect to be able to manage their
bank accounts anywhere, anytime is
constantly growing
This article describes current
Authentication threats and two proposed
solutions as well as how these solutions
can be extended in the face of more
complex future attacks
6
ATTACKS ON AUTHENTICATION
 Internet banking systems must
authenticate users before granting
them access to particular services.
 successful authentication
eventually enables users to access
their private information. We can
classify all Internet banking
authentication methods according
to their resistance to two types of
common attacks
 offline credential-stealing
attacks
online channel-breaking
attacks
Offline credential-stealing attacks
 Security precautions can
help users protect
themselves from
malicious software.
 For example-- installing
and maintaining a
firewall and up-to date
antivirus software,
regularly applying
operating system and
browser patches
7
Online channel-breaking attack
 The intruder noticeably
intercepts messages between
the client PC and the
banking server by
masquerading as the server
to the client and vice versa
 Online channel-breaking
attacks don’t necessarily
compromise the user’s
credentials but the
session’s credentials and
therefore typically require
the user-initiated banking
session to work properly.
8
AN ATTACK TAXONOMY
Taxonomy of Internet banking authentication methods. Methods
are classified according to their resistance against offline
credential-stealing and online channel-breaking attacks.
9
SHORT-TIME PASSWORD
SOLUTION
 It uses symmetric cryptography in combination with a hardware
security module .
User authentication works as follows:
1. The user connects to the Internet banking
2. The user claims his or her identity by entering an account number
in the bank’s login form
3. The user opens his or her smart card by entering the corresponding
PIN in the reader before entering the given challenge.
4. The user manually copies the shown response to the bank’s login
form to be checked by the bank’s authentication server.
10
The Need for Web Security 11
CERTIFICATE-BASED SOLUTION
User authentication works as
follows.
 First, the user establishes an
SSL/TLS channel between
the user PC and
the bank’s Web server by
setting up an SSL/TLS
session without client
authentication.
Once the card is available,
its certificates become visible
in the Web browser.
12
13
Conclusion
Internet banking has turned into
an arms race between financial
institutions and public network
attackers.
Both solutions offer high
security against common attacks.
However, changing legislation
and the eventually spread of e-IDs
among customers makes this
solution a highly attractive and
valuable alternative for the future.
14
THANK YOUTHANK YOU
Network
security!!!!!!!!

More Related Content

Viewers also liked

1st post from staging
1st post from staging1st post from staging
1st post from staging
Bhavani Testone
 
Final post
Final postFinal post
Final post
Bhavani Testone
 
content list check
content list checkcontent list check
content list check
Bhavani Testone
 
qwe
qweqwe
new post
new postnew post
new post
Bhavani Testone
 
non pro account
non pro accountnon pro account
non pro account
Bhavani Testone
 
content list check
content list checkcontent list check
content list check
Bhavani Testone
 
Document.docx.docx
Document.docx.docxDocument.docx.docx
Document.docx.docx
Bhavani Testone
 
presentations-tips.ppt
presentations-tips.pptpresentations-tips.ppt
presentations-tips.ppt
Bhavani Testone
 
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
Bhavani Testone
 
PPT file
PPT file PPT file
PPT file
Bhavani Testone
 
sample.pdf
sample.pdfsample.pdf
sample.pdf
Bhavani Testone
 
sample.potx
sample.potxsample.potx
sample.potx
Bhavani Testone
 
Jittu
Jittu Jittu

Viewers also liked (14)

1st post from staging
1st post from staging1st post from staging
1st post from staging
 
Final post
Final postFinal post
Final post
 
content list check
content list checkcontent list check
content list check
 
qwe
qweqwe
qwe
 
new post
new postnew post
new post
 
non pro account
non pro accountnon pro account
non pro account
 
content list check
content list checkcontent list check
content list check
 
Document.docx.docx
Document.docx.docxDocument.docx.docx
Document.docx.docx
 
presentations-tips.ppt
presentations-tips.pptpresentations-tips.ppt
presentations-tips.ppt
 
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
 
PPT file
PPT file PPT file
PPT file
 
sample.pdf
sample.pdfsample.pdf
sample.pdf
 
sample.potx
sample.potxsample.potx
sample.potx
 
Jittu
Jittu Jittu
Jittu
 

Similar to NetworkSecurity.ppt

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
plutoone TestTwo
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
sad
sadsad
this is test for today
this is test for todaythis is test for today
this is test for today
DreamMalar
 
one
oneone
disabled
disableddisabled
disabled
DreamMalar
 
qa
qaqa
ds
dsds
Production verification
Production verificationProduction verification
Production verification
DreamMalar
 
test 20072012
test 20072012test 20072012
test 20072012
DreamMalar
 
test
testtest
wed
wedwed
the
thethe
this is test for download option
this is test for download optionthis is test for download option
this is test for download option
DreamMalar
 
de
dede
dfsd
dfsddfsd
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
Aman Singh (असर)
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking System
IJCSIS Research Publications
 

Similar to NetworkSecurity.ppt (20)

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
sad
sadsad
sad
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
one
oneone
one
 
disabled
disableddisabled
disabled
 
qa
qaqa
qa
 
ds
dsds
ds
 
Production verification
Production verificationProduction verification
Production verification
 
test 20072012
test 20072012test 20072012
test 20072012
 
test
testtest
test
 
wed
wedwed
wed
 
the
thethe
the
 
this is test for download option
this is test for download optionthis is test for download option
this is test for download option
 
de
dede
de
 
dfsd
dfsddfsd
dfsd
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking System
 

More from Bhavani Testone

good one cloning the message
good one 
cloning the messagegood one 
cloning the message
good one cloning the message
Bhavani Testone
 
notification
notificationnotification
notification
Bhavani Testone
 
without CF
without CFwithout CF
without CF
Bhavani Testone
 
03DOM.ppt
03DOM.ppt03DOM.ppt
03DOM.ppt
Bhavani Testone
 
Std10-Maths-EM-1.pdf
Std10-Maths-EM-1.pdfStd10-Maths-EM-1.pdf
Std10-Maths-EM-1.pdf
Bhavani Testone
 
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
Bhavani Testone
 
Tales-29th
Tales-29thTales-29th
Tales-29th
Bhavani Testone
 
New text document-29th
New text document-29thNew text document-29th
New text document-29th
Bhavani Testone
 
uPoGPpb.ppt
uPoGPpb.pptuPoGPpb.ppt
uPoGPpb.ppt
Bhavani Testone
 
Reporting & Analytics.pdf
Reporting & Analytics.pdfReporting & Analytics.pdf
Reporting & Analytics.pdf
Bhavani Testone
 
Tales
TalesTales
Puzzles to puzzle you
Puzzles to puzzle youPuzzles to puzzle you
Puzzles to puzzle you
Bhavani Testone
 
New text document
New text documentNew text document
New text document
Bhavani Testone
 
1
11
1.txt
1.txt1.txt
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
Bhavani Testone
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
Bhavani Testone
 
HTML_Basics.pdf
HTML_Basics.pdfHTML_Basics.pdf
HTML_Basics.pdf
Bhavani Testone
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
Bhavani Testone
 

More from Bhavani Testone (20)

good one cloning the message
good one 
cloning the messagegood one 
cloning the message
good one cloning the message
 
notification
notificationnotification
notification
 
without CF
without CFwithout CF
without CF
 
03DOM.ppt
03DOM.ppt03DOM.ppt
03DOM.ppt
 
Empty:d-1:05
Empty:d-1:05Empty:d-1:05
Empty:d-1:05
 
Std10-Maths-EM-1.pdf
Std10-Maths-EM-1.pdfStd10-Maths-EM-1.pdf
Std10-Maths-EM-1.pdf
 
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
 
Tales-29th
Tales-29thTales-29th
Tales-29th
 
New text document-29th
New text document-29thNew text document-29th
New text document-29th
 
uPoGPpb.ppt
uPoGPpb.pptuPoGPpb.ppt
uPoGPpb.ppt
 
Reporting & Analytics.pdf
Reporting & Analytics.pdfReporting & Analytics.pdf
Reporting & Analytics.pdf
 
Tales
TalesTales
Tales
 
Puzzles to puzzle you
Puzzles to puzzle youPuzzles to puzzle you
Puzzles to puzzle you
 
New text document
New text documentNew text document
New text document
 
1
11
1
 
1.txt
1.txt1.txt
1.txt
 
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
http---cdata.nqa.sprinklr.com-DAM-5-2010blast-100530124747-Blast-cc20d154-5e0...
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
HTML_Basics.pdf
HTML_Basics.pdfHTML_Basics.pdf
HTML_Basics.pdf
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

NetworkSecurity.ppt

  • 2. 2 Network SecurityNetwork Security Introduction Introduction Attacks on authentication Online channel Attack taxonomy Attack taxonomy Offline credential objectives Short time pwd Conclusion Abstract Certificate based solution
  • 3. 3 PRESENTATIONPRESENTATION OBJECTIVESOBJECTIVES  Understand network security services  Be aware of vulnerabilities and threats  Realize why network security is necessary  Highly attractive solution for valuable and secure future.
  • 4. 4 The authors present two challenge response Internet banking authentication solutions  one based on short-time passwords  and one on certificates attacks on authentication transaction-signing option ABSTRACTABSTRACT
  • 5. 5 INTRODUCTIONINTRODUCTION  The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks
  • 6. 6 ATTACKS ON AUTHENTICATION  Internet banking systems must authenticate users before granting them access to particular services.  successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks  offline credential-stealing attacks online channel-breaking attacks
  • 7. Offline credential-stealing attacks  Security precautions can help users protect themselves from malicious software.  For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
  • 8. Online channel-breaking attack  The intruder noticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa  Online channel-breaking attacks don’t necessarily compromise the user’s credentials but the session’s credentials and therefore typically require the user-initiated banking session to work properly. 8
  • 9. AN ATTACK TAXONOMY Taxonomy of Internet banking authentication methods. Methods are classified according to their resistance against offline credential-stealing and online channel-breaking attacks. 9
  • 10. SHORT-TIME PASSWORD SOLUTION  It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows: 1. The user connects to the Internet banking 2. The user claims his or her identity by entering an account number in the bank’s login form 3. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge. 4. The user manually copies the shown response to the bank’s login form to be checked by the bank’s authentication server. 10
  • 11. The Need for Web Security 11
  • 12. CERTIFICATE-BASED SOLUTION User authentication works as follows.  First, the user establishes an SSL/TLS channel between the user PC and the bank’s Web server by setting up an SSL/TLS session without client authentication. Once the card is available, its certificates become visible in the Web browser. 12
  • 13. 13 Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future.

Editor's Notes

  1. This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities. updated 2000-08-07
  2. Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability