SlideShare a Scribd company logo
1 of 17
TWO WAY 
AUTHENTICATION 
By 
K.Anoosha 
(11761A0523)
Keyloggers, Malicious Threats 
 Key Loggers 
• What is it? 
• What can be captured? 
• How does it exploit? 
2
Two-Factor Authentication Scope 
• Provide safe and secure access to FSA network services 
• Encompasses all FSA, Dept. of Education, and partners 
• Postsecondary Schools and Sub-Contractors 
• Guaranty Agencies 
• Servicers/PCA’s/NFPs 
• Call Centers 
• Developers/Contractors and Sub-Contractors 
• TFA project is focused on privileged users 
• A privileged user is anyone who can see more than just their own personal 
data
What is Two-Factor Authentication? 
 Two factor authentication is a security process which use two 
independent sources of evidence to demonstrate the user. 
 The two factors involved are.. 
 Something that you know is the First Factor: 
 User ID and Password 
 Something that you have is the Second Factor: 
Token with a One Time Password 
Smart card 
ATM card 
Mobile phone
Security tokens 
• Symantec Validation & ID Protection (VIP) Security Token is an 
online security credential that adds an extra layer of identity 
protection when you Sign In to participating online banks and 
merchant sites within the VIP network. 
• VIP Security Tokens are portable devices that 
can easily be attached to your keychain.
Cont… 
 The One Time Password (OTP) will be generated by a small electronic device, 
known as the TFA Token, that is in the physical possession of the user 
 To generate the OTP, a user will press the 
 “power” button on the front of the token 
 A different OTP will be generated each time the 
 button is pressed 
 Alternative Methods of obtaining OTP without TFA Token: 
● A) Answer 5 Challenge Questions online 
● B) Have the OTP sent to your Smart Phone
How do I Register my Token? 
• Once you receive your token 
you must register it for each 
system for which you have 
access to and utilize 
• Each FSA System website will 
be slightly different when 
logging in and registering 
your token
TFA Profile Information 
• Step One – Enter general identifying profile information 
• If you ever forget your assigned password or misplace 
your token, you may choose to complete the cell phone 
information to receive this information via “text” 
message
Register Token Serial Number 
• Step Two – Enter the Token Serial Number located on 
the back of the token 
• The credential will begin with three letters and nine 
numbers (i.e. AVT800000000)
TFA Challenge Questions 
 Step Three – Complete five separate questions and 
responses 
 You may not repeat questions nor may any question 
have the same response
TFA – Security Code 
• You will then be directed to the security code entry screen 
• You must enter two consecutive security codes successfully 
• A new code is generated once every 30 seconds and will 
require you to click the “On Button” in between attempts
TFA Registration Complete 
 Registration Completion – When 
successful you will receive confirmation 
and your security token will now be ready 
for use
TFA Login Process 
• Once your token is registered you must log in using both 
factors of authentication: 
• Factor One – Assigned User ID and Password 
• Factor Two – One-Time generated Password (OTP)
Two-Factor Authentication Next 
Steps 
 Action Items and Next Steps (Internal) 
• Contractor/Vendor attestation of Developers, 
Testers, and Call Center Representatives (CSRs) 
• FSA Project Team to provide information on 
confirmation processes, TFA training, and 
tokens 
• Contractor/Vendor are to register tokens 
• FSA to TFA Enable Systems
Contd…. 
 Action Items and Next Steps (External) 
• Primary Destination Point Administrator (PDPA) and 
COD Security Administrators (CSA) attestation of FAA, 
Servicers and Guaranty Agencies, etc., associated with 
their account and who are working on behalf of their 
institution 
• FSA Project Team to provide information on 
confirmation processes, TFA training, and tokens 
• Institutions are to register tokens
Any Queries???.....
Thank you……

More Related Content

Viewers also liked

Two way authentication
Two way authenticationTwo way authentication
Two way authenticationsree valli
 
Logo and Corporate Identity for Islam Group
Logo and Corporate Identity for Islam GroupLogo and Corporate Identity for Islam Group
Logo and Corporate Identity for Islam GroupKazi M. Hossain
 
Digital Marketing Strategy_RENOtrades
Digital Marketing Strategy_RENOtradesDigital Marketing Strategy_RENOtrades
Digital Marketing Strategy_RENOtradesKazi M. Hossain
 
P.o.f. sezione primavera
P.o.f. sezione primaveraP.o.f. sezione primavera
P.o.f. sezione primaveradave0481
 
Present corporativa Miguel Jaramillo Luján Comunicación & Estrategia
Present corporativa Miguel Jaramillo Luján Comunicación & EstrategiaPresent corporativa Miguel Jaramillo Luján Comunicación & Estrategia
Present corporativa Miguel Jaramillo Luján Comunicación & EstrategiaMiguel Jaramillo Luján
 
Brand building exercise for telecom brand
Brand building exercise for telecom brandBrand building exercise for telecom brand
Brand building exercise for telecom brandKazi M. Hossain
 
Canada, a true multicultural country
Canada, a true multicultural countryCanada, a true multicultural country
Canada, a true multicultural countryKazi M. Hossain
 
BBS Cables Brand & Communication Strategy
BBS Cables Brand & Communication StrategyBBS Cables Brand & Communication Strategy
BBS Cables Brand & Communication StrategyKazi M. Hossain
 
PTOF 2016-19_nuovo.pdf
PTOF 2016-19_nuovo.pdfPTOF 2016-19_nuovo.pdf
PTOF 2016-19_nuovo.pdfdave0481
 
Makalah managemen tentang perencanaan (planning)
Makalah managemen tentang perencanaan (planning)Makalah managemen tentang perencanaan (planning)
Makalah managemen tentang perencanaan (planning)Puji Winarni
 
éTica dr. jeckyll y mr. hyde
éTica   dr. jeckyll y mr. hydeéTica   dr. jeckyll y mr. hyde
éTica dr. jeckyll y mr. hydeRoudrick
 

Viewers also liked (14)

حركة
حركةحركة
حركة
 
Two way authentication
Two way authenticationTwo way authentication
Two way authentication
 
Logo and Corporate Identity for Islam Group
Logo and Corporate Identity for Islam GroupLogo and Corporate Identity for Islam Group
Logo and Corporate Identity for Islam Group
 
Digital Marketing Strategy_RENOtrades
Digital Marketing Strategy_RENOtradesDigital Marketing Strategy_RENOtrades
Digital Marketing Strategy_RENOtrades
 
CVTANOY(1)
CVTANOY(1)CVTANOY(1)
CVTANOY(1)
 
P.o.f. sezione primavera
P.o.f. sezione primaveraP.o.f. sezione primavera
P.o.f. sezione primavera
 
Present corporativa Miguel Jaramillo Luján Comunicación & Estrategia
Present corporativa Miguel Jaramillo Luján Comunicación & EstrategiaPresent corporativa Miguel Jaramillo Luján Comunicación & Estrategia
Present corporativa Miguel Jaramillo Luján Comunicación & Estrategia
 
Brand Essence
Brand EssenceBrand Essence
Brand Essence
 
Brand building exercise for telecom brand
Brand building exercise for telecom brandBrand building exercise for telecom brand
Brand building exercise for telecom brand
 
Canada, a true multicultural country
Canada, a true multicultural countryCanada, a true multicultural country
Canada, a true multicultural country
 
BBS Cables Brand & Communication Strategy
BBS Cables Brand & Communication StrategyBBS Cables Brand & Communication Strategy
BBS Cables Brand & Communication Strategy
 
PTOF 2016-19_nuovo.pdf
PTOF 2016-19_nuovo.pdfPTOF 2016-19_nuovo.pdf
PTOF 2016-19_nuovo.pdf
 
Makalah managemen tentang perencanaan (planning)
Makalah managemen tentang perencanaan (planning)Makalah managemen tentang perencanaan (planning)
Makalah managemen tentang perencanaan (planning)
 
éTica dr. jeckyll y mr. hyde
éTica   dr. jeckyll y mr. hydeéTica   dr. jeckyll y mr. hyde
éTica dr. jeckyll y mr. hyde
 

Similar to Two way authentication

Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSORohit Kapoor
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationThe Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationPortalGuard dba PistolStar, Inc.
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptxArpithaShoby
 
Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness InternetCreations
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Two factor authentication end user guide
Two factor authentication end user guideTwo factor authentication end user guide
Two factor authentication end user guideGolam Rabby
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedArash Ramez
 
Network Security-Client Authentication.PPT
Network Security-Client Authentication.PPTNetwork Security-Client Authentication.PPT
Network Security-Client Authentication.PPTmeivezhg
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO Alliance
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 

Similar to Two way authentication (20)

Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSO
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationThe Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
 
test
testtest
test
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 
Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Two factor authentication end user guide
Two factor authentication end user guideTwo factor authentication end user guide
Two factor authentication end user guide
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Network Security-Client Authentication.PPT
Network Security-Client Authentication.PPTNetwork Security-Client Authentication.PPT
Network Security-Client Authentication.PPT
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Two way authentication

  • 1. TWO WAY AUTHENTICATION By K.Anoosha (11761A0523)
  • 2. Keyloggers, Malicious Threats  Key Loggers • What is it? • What can be captured? • How does it exploit? 2
  • 3. Two-Factor Authentication Scope • Provide safe and secure access to FSA network services • Encompasses all FSA, Dept. of Education, and partners • Postsecondary Schools and Sub-Contractors • Guaranty Agencies • Servicers/PCA’s/NFPs • Call Centers • Developers/Contractors and Sub-Contractors • TFA project is focused on privileged users • A privileged user is anyone who can see more than just their own personal data
  • 4. What is Two-Factor Authentication?  Two factor authentication is a security process which use two independent sources of evidence to demonstrate the user.  The two factors involved are..  Something that you know is the First Factor:  User ID and Password  Something that you have is the Second Factor: Token with a One Time Password Smart card ATM card Mobile phone
  • 5. Security tokens • Symantec Validation & ID Protection (VIP) Security Token is an online security credential that adds an extra layer of identity protection when you Sign In to participating online banks and merchant sites within the VIP network. • VIP Security Tokens are portable devices that can easily be attached to your keychain.
  • 6. Cont…  The One Time Password (OTP) will be generated by a small electronic device, known as the TFA Token, that is in the physical possession of the user  To generate the OTP, a user will press the  “power” button on the front of the token  A different OTP will be generated each time the  button is pressed  Alternative Methods of obtaining OTP without TFA Token: ● A) Answer 5 Challenge Questions online ● B) Have the OTP sent to your Smart Phone
  • 7. How do I Register my Token? • Once you receive your token you must register it for each system for which you have access to and utilize • Each FSA System website will be slightly different when logging in and registering your token
  • 8. TFA Profile Information • Step One – Enter general identifying profile information • If you ever forget your assigned password or misplace your token, you may choose to complete the cell phone information to receive this information via “text” message
  • 9. Register Token Serial Number • Step Two – Enter the Token Serial Number located on the back of the token • The credential will begin with three letters and nine numbers (i.e. AVT800000000)
  • 10. TFA Challenge Questions  Step Three – Complete five separate questions and responses  You may not repeat questions nor may any question have the same response
  • 11. TFA – Security Code • You will then be directed to the security code entry screen • You must enter two consecutive security codes successfully • A new code is generated once every 30 seconds and will require you to click the “On Button” in between attempts
  • 12. TFA Registration Complete  Registration Completion – When successful you will receive confirmation and your security token will now be ready for use
  • 13. TFA Login Process • Once your token is registered you must log in using both factors of authentication: • Factor One – Assigned User ID and Password • Factor Two – One-Time generated Password (OTP)
  • 14. Two-Factor Authentication Next Steps  Action Items and Next Steps (Internal) • Contractor/Vendor attestation of Developers, Testers, and Call Center Representatives (CSRs) • FSA Project Team to provide information on confirmation processes, TFA training, and tokens • Contractor/Vendor are to register tokens • FSA to TFA Enable Systems
  • 15. Contd….  Action Items and Next Steps (External) • Primary Destination Point Administrator (PDPA) and COD Security Administrators (CSA) attestation of FAA, Servicers and Guaranty Agencies, etc., associated with their account and who are working on behalf of their institution • FSA Project Team to provide information on confirmation processes, TFA training, and tokens • Institutions are to register tokens