1
next generation of access control
Authentication and Transaction S ecurity in E-Business AXSionics - - PowerPoint PPT Presentation
next generation of access control Authentication and Transaction S ecurity in E-Business AXSionics AG, BFH S pin-off Park, S eevorstadt 103b, CH-2501 Biel-Bienne Lorenz Mller Mobile: + 41 79 341 03 26 Lorenz.mueller@axsionics.ch 1 next
1
next generation of access control
2
next generation of access control
3
next generation of access control
4
next generation of access control
5
next generation of access control
€ 2900 Mil 8-9 % CAGR
€ 420 Mil 20 % CAGR
€ …. Mil … % CAGR
€ 500 Mil 15 % CAGR
policies
Source: Gartner Group
6
next generation of access control
7
next generation of access control
8
next generation of access control
9
next generation of access control
10
next generation of access control
11
next generation of access control
12
next generation of access control
13
next generation of access control
Attacker Client Bank Web Server
send Spam mails With Trojan horse Fraudulent Server
Client logs to bank account
transaction data Money courier
Money courier
from courier (Western Union)
instruction from fraudulent server
14
next generation of access control
15
next generation of access control
16
next generation of access control
Number of unique phishing reports received in May: 23415 Number of unique phishing sites recorded in May: 37438 Number of brands hijacked by phishing campaigns in May: 149 Number of brands comprising the top 80%
11 Country hosting the most phishing websites in May: United States Contain some form of target name in URL: 15.5 % No hostname just IP address: 6 % Percentage of sites not using port 80: 1.1 % Average time online for site: 3.8 days Longest time online for site: 30 days
17
next generation of access control
18
next generation of access control
19
next generation of access control
20
next generation of access control
21
next generation of access control
22
next generation of access control
23
next generation of access control
Example: Nordea Bank, Sweden Thomas Claburn (01/ 24/ 2007 6:00 PM ES T) URL: http:/ / www.eetimes.eu/ scandinavia/ 197000422 Cyber crime apparently pays quite well. S wedish bank Nordea has acknowledged that about 250 of its online banking customers have been robbed of about 8 million S wedish kronor -- roughly $1.14 million dollars -- as a result of a targeted phishing campaign. Customers were duped by a phishing scam coupled with a version of the Haxdoor Troj an installed on their computers. The attack took place over the past 15 months, according to Boo Ehlin, a spokesman for the bank. S wedish trade publication Computer S weden reported that 121 people may have been involved in carrying out the attack, but Ehlin could not confirm that figure. The article identified Russian cyber thieves as being behind the attack.
24
next generation of access control
25
next generation of access control
Source: The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond A Joint Report of the US Department of Homeland Security – SRI International Identity Theft Technology Council and the Anti-Phishing Working Group. October, 2006
26
next generation of access control
27
next generation of access control
28
next generation of access control
29
next generation of access control
30
next generation of access control
31
next generation of access control
32
next generation of access control
Strong Authentication, Transaction signing SSL / TLS (Credit Card) static PW One-time PW (TAN, iTAN) Short time PW (timer based) Short Time PW (challenge based) Certificate (soft token PKI) SSL / TLS Hard Token PKI Hard Token PKI on trusted platform Personal contact Spyware attacks (today) Offline phishing attacks (today)
attack boundary
attack boundary Personal Token Cluster Transaction Signing Strong Authentication
33
next generation of access control
34
next generation of access control
35
next generation of access control
36
next generation of access control
37
next generation of access control
face)
dynam ics
38
next generation of access control
39
next generation of access control
Typical applications are:
Typical applications are:
40
next generation of access control
41
next generation of access control
42
next generation of access control
Ridge direction field Binarization Scelet extraction Feature extraction Minutiae Fingerprint recording I mage quality enhancement
43
next generation of access control
44
next generation of access control
45
next generation of access control
46
next generation of access control
Frequency density
47
next generation of access control
0.00001 0.0001 0.001 0.01 0.1 1 0.00001 0.0001 0.001 0.01 0.1 1 FMR FNMR ROC EER
48
next generation of access control
0.1 0.2 dc'
0.1 0.2 dy'
B C A D
49
next generation of access control
Verification / Identification Biometric Application System Match
Identity Data Identity Data
Extract Capture Template Database Biometric Character- istic Subject Identity claim Score threshold
Pre- Processing Feature Extraction Raw data
Comparison
Query Template
Template creation
Reference template Identity Data Identity Credential Verification Identification Physical signal presentation Measurement
Identity Database Verification mode
Enrollment Authentication
Imposter Collusion Social Engineering Fake biometrics Data Insertion Replay Enrolment collusion Template stealing Template Replacement Insider Manipulation Imposter fakes FTE Misidentification of user Imposter changes policy System tampering (SW/HW) Imposter takes session over
Comparison decision
50
next generation of access control
51
next generation of access control
52
next generation of access control
53
next generation of access control
Strong Authentication, Transaction signing SSL / TLS (Credit Card) static PW One-time PW (TAN, iTAN) Short time PW (timer based) Short Time PW (challenge based) Certificate (soft token PKI) SSL / TLS Hard Token PKI Hard Token PKI on trusted platform Personal contact troyan horses attacks (today) phishing attacks (today)
attack boundary
attack boundary Personal Token Cluster Transaction Signing Strong Authentication
54
next generation of access control
55
next generation of access control
01001101 00110010 10101001 01010101 01011101 10101001 01010101 01011101 00101000 01100101
56
next generation of access control
01001101 00110010 10101001 01010101 01011101 10101001 01010101 01011101 00101000 01100101
57
next generation of access control
58
next generation of access control
59
next generation of access control
60
next generation of access control