1 / 8

Secondary Authentication and Phishing Alyssa Ritchie

Secondary Authentication and Phishing Alyssa Ritchie. Outline. Secondary Authentication Phishing Secondary vs. Primary Authentication New authentication systems. Secondary Authentication.

peri
Download Presentation

Secondary Authentication and Phishing Alyssa Ritchie

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secondary Authentication and Phishing Alyssa Ritchie

  2. Outline • Secondary Authentication • Phishing • Secondary vs. Primary Authentication • New authentication systems

  3. Secondary Authentication Studies have already shown that secret questions are a weak authentication tool. Many of the answers can be found in the public domain, Facebook or just guessing. We suspect that people will select only a small portion of the total available questions. xkcd

  4. Secondary Authentication Because people come from different backgrounds, a lot of questions will not be applicable to many people. Using a survey, I hope to determine whether my hypothesis is correct.

  5. Phishing Hackers will use phishing attacks such as website forgery where they spoof a website and trick the user into volunteering personal information to a source they thought trustworthy.

  6. Phishing • Alternate authentication methods • Identifying pictures • Using different symbols

  7. Secondary vs. Primary Authentication • Time • Mistakes • Memorization • Frequency of Use

  8. Goals • Show ineffectiveness and the security concern of current secondary authentication methods • Propose an alternate secondary authentication • Create an addition to the current password system to stop phishing

More Related