SlideShare a Scribd company logo
Multifactor authentication
Multifactor authentication or MFA is a security system that
requires more than on method of authentication from
independent categories of credentials to verify the user’s
identity for a login or other transaction.
Multifactor authentication combines two or more independent
credentials: what the user knows like a password, what the user
has the security token and what the user is like biometric
verification. The goal of multifactor authentication is to create
a layer of defense and make it more difficult for an
unauthorized person to access a some like a physical location,
network or database, or a computing device. If one of the factor
is compromised, an attacker still needs at least one more barrier
to breach before successfully breaking into the target.
Multifactor authentication cont…
Typical MFA scenarios include:
Swiping a card and entering a PIN.
Logging into a website and being requested to enter an
additional one-time password OTP that the website’s
authentication server sends to the requester’s phone, email
address, or any other form.
Downloading a VPN client with a valid digital certificate and
logging into the VPN before being granted access to a network.
Swiping a card, scanning a fingerprint and answering a security
question
Attaching a USB hardware token to a Desktop that generates a
one-time passcode and using the one-time passcode to log into a
VPN client.
RSA Token/Symantec VIP Access
RSA token or security token is a two-factor authentication
technology that is used to protect network resources. The
authentication is based on two factors. The two factors are first
something you know like your password or pin and the second
factor is something you have the authenticator (RSA Token).
The code that RSA Token produces changes every 60 seconds as
an added form of security.
Symantec VIP Access is a software that protects your online
accounts and transactions. The VIP credential provides a
dynamic security code that you can use in addition to your user
name and password for safe and secure account access. The
code that VIP Access produces changes every 30 seconds as an
added form of security.
How RSA Token/VIP software work
The way RSA Token and the VIP software work is when a user
attempts to access a protected resource, he or she is prompted
for a unique code. The code is a combination of their user’s
password or pin and the code that is displayed on the
authenticator token or VIP application at the time of logging in.
The user ID and pass code are intercepted by the RSA
Authentication Agent and presented to the RSA Authentication
Manager software which validates the pass code. The RSA
SecurID system computes what number the token is supposed to
be showing at that moment in time, checks it against what the
user entered, and makes the decision to allow or deny access.
This is also the case with the VIP software.
Reference
http://www.webopedia.com/TERM/R/rsa_secure_id.html
https://idprotect.vip.symantec.com/
http://searchsecurity.techtarget.com/definition/multifactor-
authentication-MFA
Project Outline and Schedule
At the end of Week 4 a designated Group Member has to submit
approved by all members Project Outline and Schedule.
Study Group #: Group 2
Group Project: Enterprise Secure and Not-Secure SubNetworks
· Haymanot Ayane
· Laura Bergstrom
· Cierra Ching
· Deltrick Elmore
· Serge Fabre
1. Project Outline
1.1. Group Project description
In order to better define the appropriate levels of network
security and give us a point of refernce, we have decided we
will make “Beta Company” an insurance company. We have
defined many technologies to explore high security. We are
still researching lower security measures. We will narrow down
our final topics in the next one to two weeks
1.2. List of the main topics and subtopics of your Group Project
presentation
Some of the technologies that have been identified for further
explanation are:
· RSA Token/VIP software
· Multifactor authentication
· Triple Data Encryption Standard (DES)
· Virtual LAN (VLAN)
· Network Segmentation
· Firewalls
· Data Loss Prevention (DLP)
· Intrusion Detection Systems (IDS)
1.3. Resources
· Class notes
· Open source material linked in weekly discussion areas for
ITEC 626
· UMUC Library
· Technical journals
2. Project Schedule
Week
Task
Group Member
5
Finalize topics/subtopics (we have identified many technologies
for consideration and need to narrow it down)
All
6
Create high-level PowerPoint outline and assign research and
slide content to individual group members.
Laura/Cierra
7
First drafts of slide content submitted for group review.
All
8
Draft review of Power Point and suggestions for edits back to
individual group members.
All
9
Final drafts of slide content submitted. Content compiled and
formatted int o a uniform presentation.
All to submit. Laura/Cierra to format.
10
Group review of presentation and content and any edits.
All
11
Final review and Power Point submission.
Laura/Cierra
ITEC 626 Group Project Group 2
Haymanot Ayane∙Laura Bergstrom∙Cierra Ching∙Deltrick
Elmore∙Serge Fabre
1
Introduction
Beta Company is an insurance company that underwrites
business across the United States. Beta Company’s product
offerings include: auto , homeowners, renters, motorcycle and
life insurance.
Beta Company has multiple tiers of users, needing various
levels of network access:
Consumers using the public facing site to obtain a rate
quotation/information.
Policyholders using the “consumer portal” to access information
regarding their policies and to submit online claims.
Policyholders have login ID’s and passwords.
Claimants and Preferred Providers using the public facing site
to access limited features. Claimants and Preferred Providers
can set up a login ID and password after an active claim has
been established.
Agents using the “agent portal” to access information regarding
their book of business, and information relevant to that book.
Agents have login ID’s and passwords.
Beta employees using the Beta Network to access programs and
applications that they need to their jobs. Beta employees have
multiple login ID’s and password for the network and various
applications.
2
Introduction
The Beta Executive Team has tasked the Beta Network and
Telecom Team with better designing their system, to allow
multiple levels of security, based on user types and their need to
access various data and portions of the network. The following
technologies have been identified for use in an integrated
approach to network security. In the following slides, the
following technologies will be discussed:
RSA Token/VIP software
Multifactor authentication
Triple Data Encryption Standard (DES)
Virtual LAN (VLAN)
Network Segmentation
Firewalls
Data Loss Prevention (DLP)
Intrusion Detection Systems (IDS)
3
This project consists of 3 pages each topic for a total of 4 point
slides. My topics are:
1. Network Segmentation(3 pages) and
2. Firewalls (3 pages)
With both having 2 powerpoint for network segmentation and 2
for firewalls as they pertain to an insurance company.
In short;
1 slide should define network segmentation and 1 slide should
define firewalls……etc.
1 slide should show how network segmentation will be used for
an insurance company. 1 slide should show fire walls are used
for an insurance company (protecting information of the
customer).

More Related Content

PPT
Ch08 Authentication
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
Enterprise Mobile Security for PeopleSoft
PPTX
Network Security of Data Protection
PDF
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
PPTX
Network security and firewalls
PPT
Network Security
PPT
Material best practices in network security using ethical hacking
Ch08 Authentication
Multi Factor Authentication Whitepaper Arx - Intellect Design
Enterprise Mobile Security for PeopleSoft
Network Security of Data Protection
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
Network security and firewalls
Network Security
Material best practices in network security using ethical hacking

Similar to Multifactor authenticationMultifactor authentication or MFA .docx (20)

PDF
network security.pdf
PDF
CyberSecurity101.pdf
PDF
network_security.docx_2.pdf
PPT
Network security and protocols
PPTX
Cryptography and system security
PDF
Network Security
PPT
Network Security, Change Control, Outsourcing
PDF
Plugging Network Security Holes Using NetFlow
PDF
Class paper final
PDF
Physical/Network Access Control
PPT
Network security, change control, outsourcing
PPTX
TOPIC7.pptx
PDF
Secure Mobility from GGR Communications
DOCX
Running head Assignment 1 Identifying Potential Malicious Attack.docx
PDF
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
PPTX
Ecommerce_Ch4.pptx
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PDF
Comptia Security+ Exam Notes
PPT
Information Security Audit and Analysis Module
PDF
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
network security.pdf
CyberSecurity101.pdf
network_security.docx_2.pdf
Network security and protocols
Cryptography and system security
Network Security
Network Security, Change Control, Outsourcing
Plugging Network Security Holes Using NetFlow
Class paper final
Physical/Network Access Control
Network security, change control, outsourcing
TOPIC7.pptx
Secure Mobility from GGR Communications
Running head Assignment 1 Identifying Potential Malicious Attack.docx
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Ecommerce_Ch4.pptx
CYB 102 – Fundamentals of Cyber Security .pdf
Comptia Security+ Exam Notes
Information Security Audit and Analysis Module
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Ad

More from gilpinleeanna (20)

DOCX
Name 1. The table shows the number of days per week, x, that 100.docx
DOCX
Name _____________________Date ________________________ESL.docx
DOCX
Name Bijapur Fort Year 1599 Location Bijapur city.docx
DOCX
Name _______________________________ (Ex2 rework) CHM 33.docx
DOCX
Name 1 Should Transportation Security Officers Be A.docx
DOCX
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
DOCX
Name Add name hereConcept Matching From Disease to Treatmen.docx
DOCX
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
DOCX
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
DOCX
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
DOCX
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
DOCX
Name Habitable Zones – Student GuideExercisesPlease r.docx
DOCX
Name Class Date SKILL ACTIVITY Giving an Eff.docx
DOCX
Name Speech Title I. Intro A) Atten.docx
DOCX
n engl j med 352;16www.nejm.org april 21, .docx
DOCX
Name Class Date HUMR 211 Spr.docx
DOCX
NAME ----------------------------------- CLASS -------------- .docx
DOCX
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
DOCX
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
DOCX
Name MUS108 Music Cultures of the World .docx
Name 1. The table shows the number of days per week, x, that 100.docx
Name _____________________Date ________________________ESL.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docx
Name _______________________________ (Ex2 rework) CHM 33.docx
Name 1 Should Transportation Security Officers Be A.docx
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
Name Add name hereConcept Matching From Disease to Treatmen.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
Name Habitable Zones – Student GuideExercisesPlease r.docx
Name Class Date SKILL ACTIVITY Giving an Eff.docx
Name Speech Title I. Intro A) Atten.docx
n engl j med 352;16www.nejm.org april 21, .docx
Name Class Date HUMR 211 Spr.docx
NAME ----------------------------------- CLASS -------------- .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name MUS108 Music Cultures of the World .docx
Ad

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Business Ethics Teaching Materials for college
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
Module 4: Burden of Disease Tutorial Slides S2 2025
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
O7-L3 Supply Chain Operations - ICLT Program
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O5-L3 Freight Transport Ops (International) V1.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Insiders guide to clinical Medicine.pdf
Institutional Correction lecture only . . .
Business Ethics Teaching Materials for college
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
Final Presentation General Medicine 03-08-2024.pptx

Multifactor authenticationMultifactor authentication or MFA .docx

  • 1. Multifactor authentication Multifactor authentication or MFA is a security system that requires more than on method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. Multifactor authentication combines two or more independent credentials: what the user knows like a password, what the user has the security token and what the user is like biometric verification. The goal of multifactor authentication is to create a layer of defense and make it more difficult for an unauthorized person to access a some like a physical location, network or database, or a computing device. If one of the factor is compromised, an attacker still needs at least one more barrier to breach before successfully breaking into the target. Multifactor authentication cont… Typical MFA scenarios include: Swiping a card and entering a PIN. Logging into a website and being requested to enter an additional one-time password OTP that the website’s authentication server sends to the requester’s phone, email address, or any other form. Downloading a VPN client with a valid digital certificate and logging into the VPN before being granted access to a network. Swiping a card, scanning a fingerprint and answering a security question Attaching a USB hardware token to a Desktop that generates a one-time passcode and using the one-time passcode to log into a VPN client.
  • 2. RSA Token/Symantec VIP Access RSA token or security token is a two-factor authentication technology that is used to protect network resources. The authentication is based on two factors. The two factors are first something you know like your password or pin and the second factor is something you have the authenticator (RSA Token). The code that RSA Token produces changes every 60 seconds as an added form of security. Symantec VIP Access is a software that protects your online accounts and transactions. The VIP credential provides a dynamic security code that you can use in addition to your user name and password for safe and secure account access. The code that VIP Access produces changes every 30 seconds as an added form of security. How RSA Token/VIP software work The way RSA Token and the VIP software work is when a user attempts to access a protected resource, he or she is prompted for a unique code. The code is a combination of their user’s password or pin and the code that is displayed on the authenticator token or VIP application at the time of logging in. The user ID and pass code are intercepted by the RSA Authentication Agent and presented to the RSA Authentication Manager software which validates the pass code. The RSA SecurID system computes what number the token is supposed to be showing at that moment in time, checks it against what the user entered, and makes the decision to allow or deny access. This is also the case with the VIP software. Reference http://www.webopedia.com/TERM/R/rsa_secure_id.html
  • 3. https://idprotect.vip.symantec.com/ http://searchsecurity.techtarget.com/definition/multifactor- authentication-MFA Project Outline and Schedule At the end of Week 4 a designated Group Member has to submit approved by all members Project Outline and Schedule. Study Group #: Group 2 Group Project: Enterprise Secure and Not-Secure SubNetworks · Haymanot Ayane · Laura Bergstrom · Cierra Ching · Deltrick Elmore · Serge Fabre 1. Project Outline 1.1. Group Project description In order to better define the appropriate levels of network security and give us a point of refernce, we have decided we will make “Beta Company” an insurance company. We have defined many technologies to explore high security. We are still researching lower security measures. We will narrow down our final topics in the next one to two weeks 1.2. List of the main topics and subtopics of your Group Project presentation Some of the technologies that have been identified for further explanation are: · RSA Token/VIP software
  • 4. · Multifactor authentication · Triple Data Encryption Standard (DES) · Virtual LAN (VLAN) · Network Segmentation · Firewalls · Data Loss Prevention (DLP) · Intrusion Detection Systems (IDS) 1.3. Resources · Class notes · Open source material linked in weekly discussion areas for ITEC 626 · UMUC Library · Technical journals 2. Project Schedule Week Task Group Member 5 Finalize topics/subtopics (we have identified many technologies for consideration and need to narrow it down) All 6 Create high-level PowerPoint outline and assign research and slide content to individual group members. Laura/Cierra 7 First drafts of slide content submitted for group review. All 8 Draft review of Power Point and suggestions for edits back to individual group members. All 9
  • 5. Final drafts of slide content submitted. Content compiled and formatted int o a uniform presentation. All to submit. Laura/Cierra to format. 10 Group review of presentation and content and any edits. All 11 Final review and Power Point submission. Laura/Cierra ITEC 626 Group Project Group 2 Haymanot Ayane∙Laura Bergstrom∙Cierra Ching∙Deltrick Elmore∙Serge Fabre 1 Introduction Beta Company is an insurance company that underwrites business across the United States. Beta Company’s product offerings include: auto , homeowners, renters, motorcycle and life insurance. Beta Company has multiple tiers of users, needing various levels of network access: Consumers using the public facing site to obtain a rate quotation/information. Policyholders using the “consumer portal” to access information regarding their policies and to submit online claims. Policyholders have login ID’s and passwords.
  • 6. Claimants and Preferred Providers using the public facing site to access limited features. Claimants and Preferred Providers can set up a login ID and password after an active claim has been established. Agents using the “agent portal” to access information regarding their book of business, and information relevant to that book. Agents have login ID’s and passwords. Beta employees using the Beta Network to access programs and applications that they need to their jobs. Beta employees have multiple login ID’s and password for the network and various applications. 2 Introduction The Beta Executive Team has tasked the Beta Network and Telecom Team with better designing their system, to allow multiple levels of security, based on user types and their need to access various data and portions of the network. The following technologies have been identified for use in an integrated approach to network security. In the following slides, the following technologies will be discussed: RSA Token/VIP software Multifactor authentication Triple Data Encryption Standard (DES) Virtual LAN (VLAN) Network Segmentation Firewalls Data Loss Prevention (DLP) Intrusion Detection Systems (IDS)
  • 7. 3 This project consists of 3 pages each topic for a total of 4 point slides. My topics are: 1. Network Segmentation(3 pages) and 2. Firewalls (3 pages) With both having 2 powerpoint for network segmentation and 2 for firewalls as they pertain to an insurance company. In short; 1 slide should define network segmentation and 1 slide should define firewalls……etc. 1 slide should show how network segmentation will be used for an insurance company. 1 slide should show fire walls are used for an insurance company (protecting information of the customer).