Upload
branden-page
View
213
Download
0
Embed Size (px)
Citation preview
• OTPS
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile banking - Security
1 One-time password (OTPs) are the latest tool used by financial and banking service providers
in the fight against cyber fraud., Mobile payments Instead of relying on traditional
memorized passwords, OTPs are requested by consumers each time they want to perform
transactions using the online or mobile banking interface. When the request is received the
password is sent to the consumer’s phone via SMS. The password is expired once it has been
used or once its scheduled life-cycle has expired.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
SMS Banking - Push and pull messages
1 Instead of relying on traditional memorized passwords, OTPs are
requested by consumers each time they want to perform transactions using the online or mobile banking
interface
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password
1 On the downside, OTPs are difficult for human beings to
memorize
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - How OTPs are generated and distributed
1 OTP generation algorithms typically make use of pseudorandomness or
randomness. This is necessary because otherwise it would be easy to predict future OTPs by observing
previous ones. Concrete OTP algorithms vary greatly in their
details. Various approaches for the generation of OTPs are listed below:
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - How OTPs are generated and distributed
1 * Based on 'time-synchronization' between the authentication server
and the client providing the password (OTPs are valid only for a short
period of time)
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - How OTPs are generated and distributed
1 * Using a mathematical 'algorithm' to generate a new password 'based on
the previous password' (OTPs are effectively a chain and must be used
in a predefined order).
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - How OTPs are generated and distributed
1 There are also different ways to make the user aware of the next OTP to use. Some systems use special electronic security tokens that the user carries and that generate OTPs and show
them using a small display. Other systems consist of software that runs on the user's
mobile phone. Yet other systems generate OTPs on the server-side and send them to the user
using an out-of-band channel such as SMS messaging. Finally, in some systems, OTPs are printed on paper that the user is required to
carry.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Mathematical algorithms
1 Each new OTP may be created from the past OTPs used. An example of this type of algorithm, credited to Leslie Lamport, uses a one-way function (call it f). The one-time
password system works by starting with an initial seed s, then
generating passwords
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Text messaging
1 A common technology used for the delivery of OTPs is text
messaging
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Mobile phones
1 The computing power and storage required for OTPs is usually
insignificant compared to that which modern camera-phones and smartphones typically use
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Hardcopy
1 those OTPs are typically called TANs (for 'transaction authentication numbers')
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Comparison of OTP implementations
1 The cheapest OTP solutions are those that deliver OTPs on paper, and those that generate OTPs on an
existing device, without the costs associated with (re-)issuing
Proprietary hardware|proprietary electronic security tokens and SMS
messaging.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - Comparison of OTP implementations
1 Whether or not OTPs are time-synchronized is basically irrelevant
for the degree of vulnerability, but it avoids a need to re-enter passwords if the server is expecting the last or next code that the token should be
having because the server and token have drifted out-of-sync.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - OTPs versus other methods of securing data
1 An OTP system can only use truly random OTPs if the OTP is generated by the authenticator and transmitted (presumably out-of-band) to the user;
otherwise, the OTP must be independently generated by each party, necessitating a repeatable,
and therefore merely pseudo-random, algorithm.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
One-time password - OTPs versus other methods of securing data
1 OTPs should therefore not be disclosed to any third parties, and
using an OTP as one layer in layered security is safer than using OTP
alone; one way to implement layered security is to use an OTP in
combination with a password that is memorized by the user (and never transmitted to the user, as OTPs
often are)https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
King Syze - Union Terminology, In Death Reborn and fifth AOTP album (2014-present)
1 The album is confirmed to be released on 25 March
2014.[https://twitter.com/KINGSYZE/status/442357229023678465 King
Syze: Download my new single Due Process here
http://kingsyze.bandcamp.com/ #unionterminology #march25th
#aotpseasonbegins] (8 March 2014
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
2005–06 Arsenal F.C. season
1 On the final day, they beat Wigan Athletic 4–2 at Highbury; Tottenham Hotpsur's defeat at West Ham United F.C.|West Ham United meant Arsenal
secured fourth place
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
History of Eastern Orthodox Churches in the 20th century - The Patristic Age and the Biblical canon
1 [http://www.ccel.org/c/charles/otpseudepig/aristeas.htm The Letter
Of Aristeas], R.H. Charles-Editor, Oxford: The Clarendon Press, 1913
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Street art - Europe and Asia
1 Artists who have gained recognition include Niels Shoe Meulman,
Ottograph, Max Zorn (artist)|Max Zorn, Mickey, DHM, X Streets
Collective,[http://offtrackplanet.com/featured/otps-guide-to-street-art-
amsterdam/ OTP's Guide to Street Art, Off Track Planet, 20 October 2011] Bustart, Mojofoto, Mark Chalmers and collective CFYE.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Second Mile - Revenue and major donors
1 http://notpsu.proboards.com/index.cg
i?board=generalaction=displaythread
=50 The charity paid its CEO $133,000 a year, and his wife
received about $100,000 a year.[http://www.msnbc.msn.com/id/45286426/ns/us_news-crime_and_courts/t/penn-state-assistant-coach-i-did-right-thing/ Penn State assistant
coach: 'I did the right thing' (MSNBC, 11/14/11)]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Genealogy of Jesus - Luke's genealogy
1 This count also agrees with the seventy generations from Enoch
(ancestor of Noah)|Enoch[http://www.ccel.org/c/charles/otpseudepig/enoch/ENOCH_1.H
TM#10_12 1 Enoch 10:11–12]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Psalm 23 - Metrical versions
1 Other metrical versions to emerge from the Protestant Reformation include those from The Bay Psalm Book (1640) and a version influenced by Sternholm published in the
Scots Metrical Psalter|Scottish Psalter (1650).[http://www.ccel.org/ccel/anonymous/scotpsalter.p24.html Scottish Psalter and Paraphrases] at CCEL The latter version is
still encountered, with modernized spelling, in many Protestant hymns
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
War in Heaven - Motif
1 * A refusal to bow down to mankind on the occasion of the List of first men or women in mythology and religion|
creation of man as in the Armenian, Georgia (country)|Georgian, and Latin versions of the Life of Adam and
Eve.Sections 14-15 of the [http://micro5.mscc.huji.ac.il/~armenia/website/ Armenian,][http://www.pseudepigrapha.com/pseudepigrapha/TheBook
OfAdam.htm Georgian], and [http://www.ccel.org/c/charles/otpseudepig/adamnev.htm
Latin] versions of the Life of Adam and Eve A similar view is held in Islam|Islamic tradition, in which Devil (Islam)|Iblis
refuses to bow down to Islamic views on Adam|Adam.Quran [http://www.cmje.org/religious-texts/quran/verses/007-
qmt.php#007.011 7:11-12]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Vidding - Content
1 This lead to the inevitable creation of a whole new vocabulary currently in use amongst vidders which includes terms such as shipwars and OTPs.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
For More Information, Visit:
• https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Art of Servicehttps://store.theartofservice.com