SlideShare a Scribd company logo
SECURITY KEYS
– ARE THEY SECURE?
By: Dale Shelinbarger, CISSP
MTSI Cybersecurity Engineering Analyst
E-mail: dale.shelinbarger@gmail.com
SECURITY KEY
A security key is an authentication device that
strengthens account security when used in addition to a
password when signing in. Using a security key is better
than receiving codes via phone call or text message
because these codes can be phished or intercepted.
WHY USE A SECURITY KEY
• Security keys are one of the most secure and efficient
ways to use Two-Factor Authentication (2FA). When
prompted to provide your 2FA credentials, instead of
typing in a code, you simply insert your security key
and physically tap it when prompted during login.
• Google and Yubico created a 2FA called Universal
Two-Factor Authentication (U2F).
• A U2F Security Key generates a new pair of keys for every service, and only
the service stores the public key. With this approach, no secrets are shared
between service providers, and an affordable U2F Security Key can support
any number of services.
SUPPLIERS OF SECURITY KEYS
 Yubico Yubikey
 5 NFC
 Good – uses USB-A & NFC, durable, waterproof, and
crush resistant
 5C/5C NANO
 Good – uses USB-C, water-resistant
 Bad – tiny so can be misplaced
 5 NANO
 Good – portable USB-A device, tiny hole for
keychain
 Bad – not crush resistant, not compatible with
mobile devices, connector fully exposed
SUPPLIERS OF SECURITY KEYS (CON’T)
 Thetis
 FIDO (Fast IDentity Online) U2F
 Good - aluminum alloy casing rotates 360
degrees, less expensive
 Bad – no connectivity to mobile devices,
bulkier than other devices
 BLE (Bluetooth Low Energy) U2F
 Good – bluetooth low energy support use with
mobile devices
 Bad - bulkier than other devices, requires an app
to work with mobile devices
SUPPLIERS OF SECURITY KEYS (CON’T)
 Google Titan
 Good – comes with 2 keys (USB-A, Bluetooth), supports
Google Advanced Protection
 Bad – bluetooth takes some setting up, white paint
easily chips off on the Bluetooth module, requires you
to use the included dongle for USB-C ports
 Kennsington Verimark Fingerprint Key
 Good – has fingerprint scanner for use with Windows
Hello login, conveniently small
 Bad – cheap dinky plastic cover, requires driver/system
restart to get working fully, can’t be used for mobile
devices
SECURITY KEY PROTOCOLS
• FIDO U2F
• An open authentication standard enabling strong two-factor authentication to any number of
web-based applications, such as Gmail, Salesforce, Twitter and hundreds more services. Works
via the browser, Chrome today, and Firefox under development, and does not require any
client software or drivers.
• FIDO2
• The latest open authentication standard enabling expanded authentication options including
two-factor, multi-factor and now passwordless authentication. With YubiKey support for
FIDO2, organizations can accelerate to the passwordless future without the need for any client
software or drivers.
• OATH – TOTP (Time)
• The YubiKey generates a six or eight character, time-based one-time password (OTP) (in
conjunction with a helper application) for logging into any service (such as Microsoft Cloud
accounts, Google Apps, Dropbox, EverNote) that supports OATH-TOTP, a strong
authentication standard. A new password is generated at a set time interval, typically every 30
seconds.
• PIV-Compatible Smart Card
• Smart cards contain a computer chip that brokers data exchanges. These same features are
contained in the YubiKey 5 Series, based on the industry standard Personal Identity and
Verification Card (PIV) interface over the CCID protocol, which supports PIV on a USB interface.
• OpenPGP
• In the physical world, documents and data are often validated with a signature. In the virtual
world, OpenPGP is a standards-based public key cryptography for signing, encrypting, and
decrypting texts, e-mails, files, etc.
WHERE CAN SECURITY KEYS BE USED?
Catalog for hundreds of services that work with the Yubikey
https://www.yubico.com/works-with-yubikey/catalog/
DEMO
ARE SECURITY KEYS HACKABLE?
• Not yet, but just because it hasn’t or didn’t (not sure
how you ultimately prove that of course) get hacked,
doesn’t mean it can’t be hacked.
• Google has told the world that none of its 85,000
employees had been successfully hacked since they
started implementing Security Keys in early 2017.
ARE SECURITY KEYS HACKABLE? (CON’T)
• Security Keys are susceptible to 8 out of the 10 more popular attacks
• Man-in-the-Endpoint
• Fake Web Sites and Fake Authentication Experiences
• Downgrade/Not Required Attacks
• Tech Support Social Engineering Attacks
• Hijacking Shared Authentication Attacks
• Subject Hijacking
• Buggy Code
• Physical Attacks
• A hack found a specific design flaw with the U2F design when using WebUSB, but was reported
and corrected.
• Many times, it isn’t a design issue, it’s a human issue.
• E-BOOK - 12+ Ways to Hack Multi-Factor Authentication by Roger Grimes
SUMMARY
• Adding two-factor authentication remains one of the most basic and crucial steps to protecting
your sensitive accounts, and a U2F token like a Yubikey is the most secure form of that protection
you can use. Even two-factor authentication methods like text messages or Google Authenticator
still rely on temporary codes that the user enters when they log in; a convincing phishing site can
simply trick you into handing over those codes along with your username and password. A U2F
token like the Yubikey instead performs an authentication handshake with a website that not
only proves to a website that it's your unique key, but requires that the website prove its identity
too, preventing lookalike sites from stealing credentials.
?
Questions

More Related Content

Similar to Security Keys Presentation.pptx

Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
COMPUTEX TAIPEI
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
DevOps.com
 
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity ServerWSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
Yenlo
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
Savinder Puri
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
FIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Alliance
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
FIDO Alliance
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Giuliano Latini
 
Fast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standardsFast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standards
.NET Crowd
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
ForgeRock
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
The Next Generation of Phishing
The Next Generation of PhishingThe Next Generation of Phishing
The Next Generation of Phishing
Giuseppe Trotta
 

Similar to Security Keys Presentation.pptx (20)

Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity ServerWSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
 
Fast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standardsFast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standards
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
The Next Generation of Phishing
The Next Generation of PhishingThe Next Generation of Phishing
The Next Generation of Phishing
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Security Keys Presentation.pptx

  • 1. SECURITY KEYS – ARE THEY SECURE? By: Dale Shelinbarger, CISSP MTSI Cybersecurity Engineering Analyst E-mail: dale.shelinbarger@gmail.com
  • 2. SECURITY KEY A security key is an authentication device that strengthens account security when used in addition to a password when signing in. Using a security key is better than receiving codes via phone call or text message because these codes can be phished or intercepted.
  • 3. WHY USE A SECURITY KEY • Security keys are one of the most secure and efficient ways to use Two-Factor Authentication (2FA). When prompted to provide your 2FA credentials, instead of typing in a code, you simply insert your security key and physically tap it when prompted during login. • Google and Yubico created a 2FA called Universal Two-Factor Authentication (U2F). • A U2F Security Key generates a new pair of keys for every service, and only the service stores the public key. With this approach, no secrets are shared between service providers, and an affordable U2F Security Key can support any number of services.
  • 4. SUPPLIERS OF SECURITY KEYS  Yubico Yubikey  5 NFC  Good – uses USB-A & NFC, durable, waterproof, and crush resistant  5C/5C NANO  Good – uses USB-C, water-resistant  Bad – tiny so can be misplaced  5 NANO  Good – portable USB-A device, tiny hole for keychain  Bad – not crush resistant, not compatible with mobile devices, connector fully exposed
  • 5. SUPPLIERS OF SECURITY KEYS (CON’T)  Thetis  FIDO (Fast IDentity Online) U2F  Good - aluminum alloy casing rotates 360 degrees, less expensive  Bad – no connectivity to mobile devices, bulkier than other devices  BLE (Bluetooth Low Energy) U2F  Good – bluetooth low energy support use with mobile devices  Bad - bulkier than other devices, requires an app to work with mobile devices
  • 6. SUPPLIERS OF SECURITY KEYS (CON’T)  Google Titan  Good – comes with 2 keys (USB-A, Bluetooth), supports Google Advanced Protection  Bad – bluetooth takes some setting up, white paint easily chips off on the Bluetooth module, requires you to use the included dongle for USB-C ports  Kennsington Verimark Fingerprint Key  Good – has fingerprint scanner for use with Windows Hello login, conveniently small  Bad – cheap dinky plastic cover, requires driver/system restart to get working fully, can’t be used for mobile devices
  • 7. SECURITY KEY PROTOCOLS • FIDO U2F • An open authentication standard enabling strong two-factor authentication to any number of web-based applications, such as Gmail, Salesforce, Twitter and hundreds more services. Works via the browser, Chrome today, and Firefox under development, and does not require any client software or drivers. • FIDO2 • The latest open authentication standard enabling expanded authentication options including two-factor, multi-factor and now passwordless authentication. With YubiKey support for FIDO2, organizations can accelerate to the passwordless future without the need for any client software or drivers. • OATH – TOTP (Time) • The YubiKey generates a six or eight character, time-based one-time password (OTP) (in conjunction with a helper application) for logging into any service (such as Microsoft Cloud accounts, Google Apps, Dropbox, EverNote) that supports OATH-TOTP, a strong authentication standard. A new password is generated at a set time interval, typically every 30 seconds. • PIV-Compatible Smart Card • Smart cards contain a computer chip that brokers data exchanges. These same features are contained in the YubiKey 5 Series, based on the industry standard Personal Identity and Verification Card (PIV) interface over the CCID protocol, which supports PIV on a USB interface. • OpenPGP • In the physical world, documents and data are often validated with a signature. In the virtual world, OpenPGP is a standards-based public key cryptography for signing, encrypting, and decrypting texts, e-mails, files, etc.
  • 8. WHERE CAN SECURITY KEYS BE USED? Catalog for hundreds of services that work with the Yubikey https://www.yubico.com/works-with-yubikey/catalog/
  • 10. ARE SECURITY KEYS HACKABLE? • Not yet, but just because it hasn’t or didn’t (not sure how you ultimately prove that of course) get hacked, doesn’t mean it can’t be hacked. • Google has told the world that none of its 85,000 employees had been successfully hacked since they started implementing Security Keys in early 2017.
  • 11. ARE SECURITY KEYS HACKABLE? (CON’T) • Security Keys are susceptible to 8 out of the 10 more popular attacks • Man-in-the-Endpoint • Fake Web Sites and Fake Authentication Experiences • Downgrade/Not Required Attacks • Tech Support Social Engineering Attacks • Hijacking Shared Authentication Attacks • Subject Hijacking • Buggy Code • Physical Attacks • A hack found a specific design flaw with the U2F design when using WebUSB, but was reported and corrected. • Many times, it isn’t a design issue, it’s a human issue. • E-BOOK - 12+ Ways to Hack Multi-Factor Authentication by Roger Grimes
  • 12. SUMMARY • Adding two-factor authentication remains one of the most basic and crucial steps to protecting your sensitive accounts, and a U2F token like a Yubikey is the most secure form of that protection you can use. Even two-factor authentication methods like text messages or Google Authenticator still rely on temporary codes that the user enters when they log in; a convincing phishing site can simply trick you into handing over those codes along with your username and password. A U2F token like the Yubikey instead performs an authentication handshake with a website that not only proves to a website that it's your unique key, but requires that the website prove its identity too, preventing lookalike sites from stealing credentials.