SlideShare a Scribd company logo
1 of 55
3 Factors of Fail
Barry Caplin
Like what you hear? Tweet it using:
#WebTracks
Welcome to UMSA WebTracks
Questions during webinar
Post webinar survey
Are you tweeting? #WebTracks
Like what you hear? Tweet it
using: #WebTracks
3 Factors of Fail
The Authentication Problem
UMSA WebTracks
Wed. Apr. 9, 2015
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Officer
Fairview Health Services
Celebrating a decade
of guiding security
professionals.
@Secure360 or www.Secure360.org
Secure360!
May 12-13, 2015
Be There!
http://about.me/barrycaplin
securityandcoffee.blogspot.com
@bcaplin
Who is Fairview?
A partnership of North Memorial and Fairview
Authentication isAuthentication is thethe ChallengeChallenge
And The Challenge is…And The Challenge is…
People need to:
•Enter Buildings
•Use Systems
•Use Data
And The Challenge is…And The Challenge is…
The Right People need to:
•Enter Buildings
•Use Systems
•Use Data
Guiding PrincipleGuiding Principle
Minimum Necessary
We Usually Think Of…We Usually Think Of…
SS
And Passwords Get StolenAnd Passwords Get Stolen
And Bad Choices Are MadeAnd Bad Choices Are Made
Luckily, Passwords are Dead!Luckily, Passwords are Dead!
3 Factors of3 Factors of
AuthenticationAuthentication
1. Something You Know
2. Something You Have
3. Something You Are (or Do)
3 Factors of Auth FAIL3 Factors of Auth FAIL
1. Something You Forgot
2. Something You Lost
3. Something You Were (or Did)
1. Something You Forgot1. Something You Forgot
• P@sswOrd5
• PINs
• Combinations
• “Secret” Phrases
• Picture Identification
• Patterns
Used by…Used by…
Not SimpleNot Simple
• Can’t be easily guessable
• False positives
−Grant rights to wrong person
−Actions attributable to you!
So not simple/guessable…
But simple is memorable…
ComplexityComplexity
RequirementsRequirements
• Make Guessing Hard
−Common: 8 char,
upper/lower, numeric,
special
• Smart Users Circumvent
• Nonsense/Random great
−But impossible to remember
To Make It WorseTo Make It Worse
• Expiration
−“best practice”
−Like changing your house locks every 30 days!
• Secret Questions – too simple, too guessable
−Answers on Facebook
−Remember… don’ t have to be true!
• Help Desks
−social engineering and process hacks (ask Mat
Honan)
3 More Issues3 More Issues
• Bad Choices
−NYG1@nts! meets
requirements
• Shoulder Surfing
−Complex => slow to
enter
• Writing Down
−Not bad if done well
To Make It WorseTo Make It Worse
• Social Engineering
• Phishing
These are Legit
SolutionsSolutions
• Length
− Better than Complexity!
− Long phrases easier to remember
− Why do some sites have max length???
• Vaults
− Use ‘em!
− Don’t forget the main password!
• OTP (One Time Passwords)
− Fixes many issues except delivery
Something You LostSomething You Lost
• Hard/Soft token
• Static/Dynamic
OTP DeliveryOTP Delivery
• Hard Token
−Time (RFC 6238) or Sequence-based
−Also Smart Cards, Key Cards
• Soft Tokens
−Program or App
−Device independence
• SMS
• Paper
ChallengesChallenges
• Hard Tokens
−Can be lost
−Worse – often kept with laptop
−Multiple systems = multiple tokens
• Soft Tokens – better because people don’t
lose their phones…
• … Oh Wait…
SolutionSolution
• I still like this when implemented well
−Google Auth
−SMS
−Smart phones
−Paper
Something You WereSomething You Were
• Usually means biometrics
• Oldest form of ID
• Animals, babies, tribes/groups
– senses
• Mixed reliability
BiometricsBiometrics
• False Positives – bad for security
• False Negatives – bad for business
BiometricsBiometrics
Some common choices
•Iris/retinal scan, fingerprint, palm print/geometry
Less common
•Voice, typing cadence, “bottom” print
BiometricsBiometrics
• Best auth method for use in movies!
ChallengesChallenges
• Logistics
• Registration, hardware/people, “failure to
enroll” (FER), contaminants on readers
• Hygiene
• Perception (movie story)
• Back-end systems
2 Biggest Issues2 Biggest Issues
• Can’t change your biometric when you need
to
• Your biometric can change when it wants to
−Hard to fake (getting easier)
−Easy to steal
−Nearly impossible to change/fix
Solutions?Solutions?
• Not bad if used correctly
• Local physical access
• Voice-print for automated pw reset
The 4The 4thth
FactorFactor
• Risk-based, location-based, adaptive auth
• “somewhere you are” or “something you are
doing”
• Key need – “rich” user profile
• Check against profile, then:
−Allow
−Deny
−Challenge
Biggest IssueBiggest Issue
• Establishing profile
−Takes time
−Highly non-trivial
−Needs much info and/or long/ongoing relationship
• Otherwise degenerates to 1-factor
• Promising
Multi-Factor (MFA)Multi-Factor (MFA)
•Take 2 bad things and combine them
together!
•That makes sense!
Multi-Factor (MFA)Multi-Factor (MFA)
• Typically 2-factor
−ID/pw + token
−Steal one, you can’t get in
−Either can be “easily” changed
Multi-Factor (MFA)Multi-Factor (MFA)
• But…
Solutions!
SolutionsSolutions
• Typical
− 1-factor – id/pw for login ; badges for entry
− Occasional hard token use
− But 1-factor only safe in “controlled” environments
• Challenge:
− Positively id a person
− Easy to use
User/UseUser/Use
• Customer
• Staff
• Tech worker
• Clinical
• Newbie
• Hardware/software
• Control over hw/sw
• Data classification
• Regulatory
• Threats/Risks
• Replay attack
• Availability
• Work-arounds
• Single/multi-use
• Easy to use?
Then do what makes
sense!
ExampleExample
• Biometrics for entrance into high-security area
• Badges can be lost or used by anyone
− Combine with measures like Keywatcher
• OTP
− Google Auth or Yubikey
− SmartPhones – can be lost but often kept close and
rarely left with computer
− Good choice for online/web-based services
ExampleExample
Online Banking
•System auth ->
−Preselected word/picture ->
 Id/pw ->
Challenge or Reauth for large/unusual
transaction
ExampleExample
• Long passwords + vault
−pw’s – with us for a while
−People make poor pw choices
−Long phrases easier to remember
−Long random strings better
• Better – Add easy-to-use soft fob
• Remote access + risk-based auth
−We have more info about staff
The FutureThe Future
Nymi
Wearing My Heart On
My Sleeve…
Literally!
Secure360
Tues. May 12, 2015
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Official
Fairview Health Services
CISOs are from Mars
CIOs are from Venus
Secure360
Tues. May 12, 2015 1:30P
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Official
Fairview Health Services
@bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Thank you for attending
Don’t forget to complete your post
webinar survey
Barry will stay on for additional
questions until 1:30pm
Like what you hear? Tweet it
using: #WebTracks

More Related Content

Viewers also liked

Surgical dressing
Surgical dressingSurgical dressing
Surgical dressingPrajwal Rao
 
Bandaging principles and techniques
Bandaging principles and techniquesBandaging principles and techniques
Bandaging principles and techniquesSatyajeet Singh
 
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)Bandaging and Splinting & Slings; Techniques and Types (Health Subject)
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)Jewel Jem
 
Instruments ppt
Instruments pptInstruments ppt
Instruments pptJuveriaali
 

Viewers also liked (6)

Surgical dressing
Surgical dressingSurgical dressing
Surgical dressing
 
Bandaging principles and techniques
Bandaging principles and techniquesBandaging principles and techniques
Bandaging principles and techniques
 
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)Bandaging and Splinting & Slings; Techniques and Types (Health Subject)
Bandaging and Splinting & Slings; Techniques and Types (Health Subject)
 
Bandaging
BandagingBandaging
Bandaging
 
Instruments ppt
Instruments pptInstruments ppt
Instruments ppt
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Similar to 3 factors of fail sec360 5-15-13

TransPort Workshop
TransPort WorkshopTransPort Workshop
TransPort Workshopjwcampbe
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
2019-12-WWC-Toronto.pdf
2019-12-WWC-Toronto.pdf2019-12-WWC-Toronto.pdf
2019-12-WWC-Toronto.pdfMeghalMistry1
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
205-5-6-Security Seminar - Master
205-5-6-Security Seminar - Master205-5-6-Security Seminar - Master
205-5-6-Security Seminar - MasterDan Tervo
 
RPS/APS vulnerability in snom/yealink and others - slides
RPS/APS vulnerability in snom/yealink and others - slidesRPS/APS vulnerability in snom/yealink and others - slides
RPS/APS vulnerability in snom/yealink and others - slidesCal Leeming
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Databasejohanswart1234
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheelsinfodox
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptxssuser2f0fb0
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a featureElizabeth Smith
 

Similar to 3 factors of fail sec360 5-15-13 (20)

TransPort Workshop
TransPort WorkshopTransPort Workshop
TransPort Workshop
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Confidence web
Confidence webConfidence web
Confidence web
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
2019-12-WWC-Toronto.pdf
2019-12-WWC-Toronto.pdf2019-12-WWC-Toronto.pdf
2019-12-WWC-Toronto.pdf
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
205-5-6-Security Seminar - Master
205-5-6-Security Seminar - Master205-5-6-Security Seminar - Master
205-5-6-Security Seminar - Master
 
RPS/APS vulnerability in snom/yealink and others - slides
RPS/APS vulnerability in snom/yealink and others - slidesRPS/APS vulnerability in snom/yealink and others - slides
RPS/APS vulnerability in snom/yealink and others - slides
 
Password Management
Password ManagementPassword Management
Password Management
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
BSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheels
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a feature
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare securityBarry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503Barry Caplin
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Barry Caplin
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusBarry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

3 factors of fail sec360 5-15-13

Editor's Notes

  1. 1993 New Yorker magazine cartoon
  2. People get the minimum access necessary to do their jobs… no more and no less
  3. The challenge is that passwords need to be used by people
  4. One can make easily guessable pw’s that meet requirements; Shorter pw’s make shoulder surfing worse; Schneier suggests putting passwords in wallet – which is already well secured
  5. http://www.ismytwitterpasswordsecure.com/
  6. http://www.ismytwitterpasswordsecure.com/
  7. http://www.ismytwitterpasswordsecure.com/
  8. 2-factor is most common. Static methods can’t be changed – sword-in-stone, license, card, ring, etc. Have all the problems of Dynamic plus revocation problems.
  9. I need to find a video of that security commercial with bald, pale people who can’t authenticate because they have no more hair and can’t get a blood sample.
  10. Risk-based, location-based, adaptive authentication “somewhere you are”, “something you are doing” Key is establishing “rich” profile of user: machine used, software, used, date/time of access, IP address, geo location, actions attempted (NBA) Upon connection, check against profile, then: allow, deny or further challenge
  11. Biggest issue… establishing profile (like with biometrics) non-trivial and takes time – so probably best when you already have long relationship with, or much info about, user – otherwise degenerates to 1-factor Newer but promising
  12. But tokens often left with laptops; tokens on badge (or smart card) lanyards left also (pic); and “safety” of token causes some users to choose weak pw; policy can prevent but then we back to pw’s on sticky notes Makes sense in theory but has all the problems already covered
  13. Can’t just admire the problems!
  14. Single factor is not good except in tightly controlled environments (controlled how???) Challenge: we need a system to positively identify a person, and it has to be easy (enough) to use
  15. Think about: User. Use. Ex: customer or staff already have relationship with; tech worker; newbie; what hardware/software; what control do you have over hardware/software; classification of data; regulatory; threats; risks Auth method: susceptible to replay attack; need to be available anywhere; manual/help-desk work-arounds; single or multi-use; easy to use? Then use what makes sense
  16. biometric authentication for entrance to a high-security building or room - badges are typically used, but anyone can be in possession of a badge.  If you have an area that needs higher security physical controls, biometrics or perhaps a keywatcher-type system can be used. One-time passwords - using tools like Google Authenticator or Yubikey.  I like the use of smartphone app or sms for one-time passwords because users are less likely to leave their phone (rather than a hard token) with their computer.  This is a great choice for websites.
  17. Bank example: system auth -> preselected word/picture -> id/pw + reauth for large/unusual transaction
  18. long passwords! + vault - Unfortunately, passwords as a stand-alone authentication method will still be with us for a while.  Among the problems with passwords is that people make poor choices.  Long alphabetic passphrases are easier to remember, but I still recommend the use of long random passwords and a vault. remote access with risk-based authentication - we discussed risk-based authentication in part 5.  People may attempt to login in a variety of situations.  Risk-based authentication can help measure the potential threat and challenge for additional levels or factors.
  19. Fast Identity Online (Google, Yubico, NokNok); brainwave authentication - http://neurogadget.com/2013/04/17/passthoughts-the-future-of-authentication/7671 OATH – initiative for Open Authentication – standard for 2-factor “strong” auth incl. Verisign, Google Auth, etc. Oauth – Open standard for Auth – 3rd party login via token (after logging in at another site like Facebook, Twitter, Google) OpenID – like Oauth except uses certs via self-created URI SQRL - https://www.grc.com/sqrl/sqrl.htm Nymi – uses pulse - http://www.getnymi.com/