Anti-Phishing Strong Authentication Technology Options
نویسنده
چکیده
The United States banking industry has been directed by its regulatory agencies to provide authentication stronger than single factor for “high risk” transactions, as a defense against phishing. Financial institutions have a wide array of options available to them to meet this requirement, and choosing among those options is likely not a simple matter. Factors involved in the decision process include usability, security, and acceptability to the regulatory agencies. This paper presents an overview of the options available in the commercial market, and proposes future research to monitor the activities of financial institutions as they move toward the deadline.
منابع مشابه
Mitigating Phishing with ID-based Online/Offline Authentication
Enforcing strong authentication is an option to mitigate phishing. However, existing authentication methods, like traditional digital signatures, require unrealistic full deployment of public key infrastructure(PKI) and destroy email users’ privacy in that the identity of an email sender is automatically revealed to the public. There have been some works in the literature, where the technology ...
متن کاملBanking Regulatory Response - The Case of Strong Authentication
The United States banking industry was directed by its regulatory agencies to provide authentication stronger than single factor for “high risk” transactions, as a defense against phishing, by year-end 2006. Financial institutions had a wide array of options available to them to meet this requirement, and there was considerable latitude in how to interpret the regulatory guidance. This paper pr...
متن کاملAnti phishing Framework using a Modified captcha technique
Phishing is a technique of the fraudulent by creating exact look-a-like well known portal and making the possibility such that the users are navigated to phishing portal rather than the original portal and capturing the sensitive data like usernames, passwords etc. with the advantage of phishing portal and misusing the information. Many have proposed the solution for anti-Phishing area and thei...
متن کاملChapter 3 Improving Phishing Countermeasures
As the battle against phishing continues, many questions remain about where stakeholders should place their efforts to achieve effective prevention, speedy detection, and fast action. Do stakeholders have sufficient incentives to act? What should be the top priorities for the anti-phishing community? To provide insights into these questions we conducted 31 in-depth interviews with anti-phishing...
متن کاملEvaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies
Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans. It is an extension of the concept of network security protocol and includes user interface and human-protocol interaction. We propose a model with ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006