Banks and Web security



George Ou has a good post on Banks cheating their way to meet web security guidelines. Many of the observations that he notes come from the Between the Lines column here and are SPOT ON. The biggest I see is related to “multifactor authentication”….


For instance…

On page 3, the Federal guidelines go so far as to list the three factors of security:

Something the user knows (e.g., password, PIN);

Something the user has (e.g., ATM card, smart card) and ;

Something the user is (e.g., biometric characteristic, such as a fingerprint).

Currently MOST approaches that I’ve seen put into practice have a tendency to ask you for 2 or 3 items of something the user knows. This, of course, can easily be compromised.

I remember when online credit card transactions first started, the card number and expiration were pretty much all that was required to be input (plus the billing address). Then they started requiring the CVV2 numbers. Well – ok – so I should ONLY know that if I have the card, but what if the database is compromised of the company that just asked for my CVV2 number???? Are we going to need a third and fourth and further pins and bits of knowledge to be able to properly authenticate online.

I’ve read of some institutions use of some sort of smart card as an authentication factor and would REALLY like to see banks/card authorizations move towards taking at least that factor into account. George mentions that he’s not particularly fond of the biometric factor being pushed and I can agree on that – who wants to encourage theives to branch out into taking the thumb of a victim. (Or taking the victim hostage)… Biometrics I think could easily qualify as “something the user HAS” rather than something the user IS.

The point he gets at is this….

True strong authentication is a smartcard or some other forms of cryptographic tokens. Just the plain old ATM card or credit card does not qualify as strong authentication.

It makes me think in a way of the historical practice of signing letters with a seal. Wax would be dripped to seal the envelope and then the signet ring would be pressed in to leave a mark and it was a unique mark which, at that time would have given someone relative certainty as to the source. (The signets were supposedly unique to the wearer.) Of course, in the world of today, that could be easily forged (and likely was then).

But….. what IF we could go and get a smartcard that had a randomly generated keycode that was unique to us. Then that, as a third party card, could be used via a handshake of some sort with hardware could generate a key that ONLY that keycode could have made. (Much the way ssh encryption is built) All of it done without divulging the secret keycode…. Then if you have to prove your identity present your codecard (or whatever form this takes.) Of course, our computers would need a common and widely compatible way of using this authentication (which may be the hard part in getting widespread implementation.)

Related Posts

Blog Traffic Exchange Related Posts
  • Remove Total Security 2009 | TotalSecurity 2009 Removal Total Security 2009 is also known as TotalSecurity 2009 or TotalSecurity2009. It is a newer version of the Total Security Antivirus which we highlighted just a week or so ago. It is a more troublesome variant of this rogue security software. In addition to the false warnings about problems on......
  • How embarrasing... Computer security firms database hacked The Washington Times, has a story from Brian Krebs of their Security Fix blog about ... Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials......
  • Firefox zero-day vulnerability (or is it?) I saw a comment somewhere else that zero-day was overused and in essense ANY previously unknown vulnerability in open source software is technically zero day... the intent here though is to use the word in this context.... "vulnerability has been released without giving the vendor an opportunity to patch..." Yes,......
Blog Traffic Exchange Related Websites
  • Credit Card due date redux Got my latest bill for the card I use regularly. It came on Monday, Nov 26 and is due on Monday, Dec 3. First, during this time of year I don't know if the six days (I could only get a check out next day, as I get my mail......
  • Avoid Relief Shortcuts or Face These 8 Bad Credit Consequences! While no one wants to be burdened under big piles of debt, no one should want to live with the potentially life-long consequences of maintaining bad credit. A popular misconception among consumers today is that the only time a person needs good credit is when they plan to get a......
  • What is a Secured Credit Card? If you have poor credit, or less than perfect credit, you may be excited by offers in the mail for credit cards that appear to be designed specifically for you. They promise no credit checks, excellent interest rates, no annual fees, and if you have bad credit, it's ok! But......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site