RSS. Adaptive Authentication

Improved Essays
It has been a long established conceit that two actor authentication is essential for secure remote access scenarios. Anyone who has accessed private networks from the internet is familiar with the concept in one form or another. Whether the additional factors include Smart Badges, Security Tokens, Soft Certificates (encrypted code downloaded to a device to identify it as genuine), or a combination of the above, using two factor authentication has become a familiar and even expected part of our computing security routine and rightfully so. Two Factor Authentication has been so effective at reducing information compromise that many services are quickly adapting its safeguards for internal use as well. We have all read the alarmingly increasing …show more content…
The EFG is the core access gateway for many Lockheed Martin solutions that are available to external users. Adaptive Authentication, like many of the applications in the EFG, utilize Claims Based Authentication using Enterprise Business Services’ long established Federation solution to send user credentials to the solution provider. During the process, two factor authentication is enforced via the gateway, and Adaptive Authentication observes the access behavior, combing for evidence, and evaluates that evidence to find fraudulent behavior such is where from or when the user is accessing the solution. If a discrepancy is discovered, the user is flagged and prompted for a verification code that the user must respond to from their own pre-registered mobile device or land line in order to complete the authentication process. This additional hardware verification is difficult to compromise without access to the legitimate user’s cell phone or landline. This type of multi factor strategy involving phone verification is already in use by many popular financial institutions to deter fraud. However, the innovation is not in what Adaptive Authentication and our implementation of it does but is in how it does …show more content…
history last holiday season, Adaptive Authentication had been operating in the EFG environment in a non-enforcement mode effectively watching and reviewing authentications but without responding. During this review period, the adaptive engine was learning normal login behaviors from thousands of users internationally evaluating and logging specific criteria related to the individual user. It is in this way that Adaptive Authentication gets its name. The system is able to create then continuously update a profile for each individual user creating a baseline rating. Later, as authentication attempts build, and behaviors change, a variance to the baseline is generated and scored. This elevated “Risk Score” is what prompts the system to take additional action so as to focus its resources only on suspicious behavior and not against the literally hundreds of thousands of legitimate authentication attempts processed regularly by the EFG. This solution represents an intelligent response to fraudulent access attempts. By monitoring and learning from all access attempts, it can detect fraud even if legitimate credentials and associated PKI technology have been compromised, thus reducing Lockheed Martin’s risk of data compromise and its aftermath, which has reportedly cost U.S. corporations billions of dollars in

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson Financial (JF) is a mid-sized insurance company located in the northeast United States. The company supports a remote computing environment for users located outside of the corporate offices. The remote users, outside of the corporate network, support various aspects of the business operations. Up to twenty percent of the company users may remote compute at any point in time. The current method of remote computing is based on a company provided laptop and a vpn connection to the corporate data center.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    MI Branch recently briefed US Army Intelligence Center of Excellence and the EUCOM J2 on the “health” of the MI force. This graph provides a comparison of hard code 35 authorizations. Many officers also express interest in the size of their respective cohort year group (CYG), especially as promotion and selection boards approach. The chart to the left depicts MI LTC CYG strengths as a percentage of the total MI LTC inventory and, at the bottom, as a comparison to 17-02 Personnel Management Authorization Document (PMAD) MI LTC authorizations. All data points are as of 3 May 2017.…

    • 181 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    A thorough analysis was made on the VeriSign Certification Practice Statement (CPS) document to identify the type of security services addressed and if the document enforces and support the FISMA security controls. The CPS presentation of the capabilities demonstrated on the security services were equated to the security controls and how the security services can reduce risk impact. The CPS details the authentication and identification, access controls and the audit VeriSign’s certificate policies mainly on the endurance of digital certificates and key management enforcing the CIA. The details of the findings that meets the standard of FISMA according to the NIST are: Identification and Authentication for Rekey Requests: this security service addresses the IA-4 Identifier Management security control whereby it ensures user identifier to the intended party by distinctively verifying and identifying each user. The organization is enabled to manage these functionalities and in addition disabling users and enable decline to…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Greiblock Credit Union is one of the largest banks in the city of Chicago with over $5 billion in monetary holdings in the bank’s system at any given time. The company has over one hundred different branches located around the Midwest but is headquartered in Chicago city limits. With such a large business operation, it is obvious that the bank would need to take significant measures to ensure the money and information of their customers which they possessed was protected from any third-party access or from being leaked to the public. Most large companies like Greiblock Credit Union will outsource their IT services to a reputed security firm in order to allow them to focus solely on this issue however, Greiblock has determined that it would…

    • 267 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As a cyber-based attacking mechanism, identity spoofing can be used to accomplish a variety of tasks or goals. Notably, by assuming the identity of someone or something, a skilled attacker can gain access to some unauthorized area, by using forged credentials, or can even obtain useful details or information from other persons, based on information published within the CAPEC community (“CAPEC-151: Identity Spoofing,” 2017). As an example, an attacker who intercepts a communication between two parties, and assumes the identity of a one of the associated parties, may be able to deceive the opposing party into providing critical details, such as credentials. Likewise, identity spoofing can be used to accomplish goals relative to gaining access…

    • 234 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    When OpenID was first created and starting to be used by major companies as their go-to single sign-on solution, people were skeptical. Today, it is used just about everywhere and people do not usually think twice before using it to log into their favorite website. We will explore how the improvements OpenID has made over the years have caused it along with OAuth to become some of the most widely used cross-site authentication protocols. In this paper, we will also touch on what flaws still exist in these protocols and if their benefits outweigh those flaws. This work is relevant because OpenID Connect and OAuth are used so widely today, both internally for companies and for public-facing websites.…

    • 1871 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Authentication and Digital signatures INTRODUCTION This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense in a system and public networks. It is now common in many stores where credit card payment can be electronically signed using a stylus.…

    • 1445 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Ebay Research Paper

    • 2029 Words
    • 9 Pages

    Ebay Ebay is an online action service used to buy and sell items. The company uses an electronic platform to facilitate millions of transactions every day. Users seeking to purchase items make bids over a specific time period and the seller determines guidelines such as a minimum bid he or she is willing to accept. Payment is typically made electronically through PayPal and then the merchandise is shipped to the buyer.…

    • 2029 Words
    • 9 Pages
    Improved Essays