<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>authentication &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/tag/authentication/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 10 Aug 2020 17:49:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>authentication &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Should I protect my possessions or my identity?</title>
		<link>https://telegrid.com/protect-my-possessions-or-my-identity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-my-possessions-or-my-identity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 22:09:10 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=969</guid>

					<description><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to think about how much I pay each month to protect my physical possessions.  Then I wondered why I am willing to pay so much to protect a $500 TV but nothing to protect my digital identity.  This begged the question, if I had to choose, should I protect my possessions or my identity?</p>
<p>I believe that in order to answer this question properly we must make three comparisons:</p>
<ol>
<li>The average loss for a home burglary versus the average loss for an identity theft</li>
<li>The probability of a home burglary versus the probability of an identity theft</li>
<li>The cost of a home security system versus the cost of identity theft protection</li>
</ol>
<p>In its report on <a href="https://ucr.fbi.gov/crime-in-the-u.s/2014/crime-in-the-u.s.-2014/offenses-known-to-law-enforcement/burglary">Crime in the United States</a>, the FBI found that in 2014 the average dollar loss per burglary offense was $2,251.  This is higher than the average dollar loss for identity theft over the same time frame which was $1,343 according to the <a href="http://www.bjs.gov/content/pub/pdf/vit14.pdf">Department of Justice</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>However, when considering the number of occurrences, identity theft is far more likely than a burglary.  The DoJ reported 17.6 million cases of identity theft, or 7% of all US residents above the age of 16, in 2014.  This was 10 times more than the 1.7 million burglaries that were reported over the same time period by the FBI.</p>
<p>In terms of cost it is difficult to gauge exact figures based on the multitude of offerings for both home security systems and identity theft protection.  However, it seems that identity theft protection is the same or less per month than a home security system.</p>
<p>I understand that a home security system also provides the intangible value of personal protection and that there is no value that you can put on peace of mind.  However, I could counter that the majority of burglaries happen between the hours of 10AM and 3PM, when the homeowner is not home, and therefore personal protection has no inherent value.</p>
<p>So, should I protect my possessions or my identity? Based on this very simple statistical comparison it seems that, if I had to choose, I should protect my digital identity before I protect my physical possessions.  What would you pay to protect?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does the death of the CAC mean the death of PKI?</title>
		<link>https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=does-the-death-of-the-cac-mean-the-death-of-pki</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 18 Jul 2016 20:08:30 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[common access card]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[public key infrastructure]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=516</guid>

					<description><![CDATA[<p>The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years.  If there is no more CAC how can the DoD maintain its PKI?</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><meta name="keywords" content="common access card, common access cards, cac future, cac going away, authentication, authorization, public key infrastructure, military pki" /></p>
<p>Last month the Department of Defense Chief Information Officer Terry Halvorsen made a bold call for the <a href="http://federalnewsradio.com/defense/2016/06/dod-plans-bring-cac-cards-end/">replacement of Common Access Cards</a> within the next two years.  Common Access Cards, or CACs, are credit-card-sized smartcards used to provide Two-Factor Authentication (2FA) to DoD networks.  This method of access requires two out of three of the following items:</p>
<ul>
<li>Something the user knows</li>
<li>Something the user has</li>
<li>Something the user is</li>
</ul>
<p>A CAC – “something a user has” &#8211; in conjunction with a PIN – “something a user knows” – provides the required 2FA.  The issue Mr. Halvorsen has with CACs is that they do not work well in a tactical environment.  As he said, “It’s really hard to issue CAC cards &#8230; when people are dropping mortar shells on you and you need to get in your systems.”</p>
<p>So what will we use instead of CACs?  Mr. Halvorsen mentions Biometrics as part of the solution.  Biometrics, or “something the user is”, includes physical characteristics like fingerprints or behavioral characteristics like how many times a user misspells Halvorsen in a blog post (purely hypothetical).  I discussed some of the security concerns surrounding Biometrics in a <a href="http://telegrid.com/2016/05/assured-identity-giving-apps-the-finger/">previous post</a> but the biggest issue seems to be with public key cryptography.  In public key cryptography the user maintains a secured private key and shares a public key with the world.  The private key is stored on the CAC and is unlocked with a PIN as part of the DoD Public Key Infrastructure (PKI).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>If there is no more CAC, does that mean there is no more private key?  We can derive passwords from Biometrics, for instance fingerprints have enough entropy for the equivalent strength of a <a href="http://lukenotricks.blogspot.com/2009/04/on-entropy-of-fingerprints.html">13 character password</a>, but it is not public key cryptography.  If there is no more public key cryptography how can the DoD maintain its PKI?</p>
<p>I believe this highlights a very interesting debate on the difference between authentication and encryption.  If we look back at the earliest days of authentication, passwords were often sent in the clear (e.g., Password Authentication Protocol (PAP)).  It was assumed that the channel would be encrypted and all information, including passwords, would be encrypted by the channel.  Authentication was merely used for authorization and accounting.  It was not until we moved from point-to-point networks to the Internet that we combined authentication and encryption in PKI.  Is Mr. Halvorsen telling us that we no longer need PKI?</p>
<p>I do not believe this is the case because at a <a href="http://federalnewsradio.com/reporters-notebook-jason-miller/2016/06/halvorsen-firing-effect-calling-end-cac/">luncheon</a> following the CAC elimination comment Mr. Halvorsen made a point of recognizing the need for PKI.  As he said, “I want to make it clear, when we replace the CAC card, it will be public-key infrastructure.”   Mr. Halvorsen suggested using Derived Credentials in conjunction with Biometrics to simplify authentication and maintain PKI.  Derived Credentials is a software-based version of the CAC contained in an electronic device such as a smartphone.  In that architecture Biometrics would unlock the electronic device while a user’s certificate and associated private key would be stored in the Derived Credentials.</p>
<p>Derived Credentials is intriguing because it heralds the ability to Bring Your Own Device (BYOD).  The only issue is current policy (i.e., NIST 800-157) which requires that credentials issued at Level of Assurance (LOA) 4 be kept in a hardware cryptographic module that has been validated to FIP 140-2 Level 2.  This means you may need a special hardware solution which is an issue for BYOD.</p>
<p>The moral of the story is that the DoD is now committed to changing how users authenticate themselves and that we should expect to see big changes in the next few years.  This will make it difficult for the Government to purchase devices or applications that have a fixed authentication mechanism.  Perhaps this is the reason we are seeing so much interest in applications that allow a flexible authentication mechanism, like TELEGRID’s <a href="http://telegrid.com/authentication-authorization/">SMRTe</a>.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Your Password Worth $10?</title>
		<link>https://telegrid.com/is-your-password-worth-10?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-your-password-worth-10</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 10 Jun 2016 17:27:30 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[password management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=502</guid>

					<description><![CDATA[<p>Every day there are new headlines about stolen passwords.  Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/is-your-password-worth-10">Is Your Password Worth $10?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I heard about a million dollar website idea (that you <strong>SHOULD NOT DO</strong> because you will go to prison).  The idea is to create a website called www.freetendollars.com (I checked and the name is still available).  The website asks users to create an account with an email and password and in turn they will receive ten dollars in the mail.  That’s it.</p>
<p>So how do you make a million dollars?  Simple, you take that email and password and use it to break into the victim’s bank account and steal their money.  If you do not have enough information you wait until they try to relog in to www.freetendollars.com, perhaps to find out where their ten dollars is, and whatever password they try tell them it is wrong.  Then just wait as they try every iteration of password they can remember.  When that is done prompt them for security questions that they never answered but probably forgot about.  Before you know it you will have their bank account password, home security alarm code, first dog’s name, and street they grew up on.  The beauty is that you never even sent them ten dollars!</p>
<p>How often will this work?  Roughly 60% of the time based on <a href="http://www.inc.com/will-yakowicz/infographic-95-percent-share-6-passwords-with-friends.html">studies</a> showing the number of people who reuse passwords on multiple sites.  It is not just current passwords that are an issue but even old passwords can come back to haunt us.  Just ask <a href="http://techcrunch.com/2016/06/06/zuckerbergs-twitter-pinterest-linkedin-accounts-hacked/">Mark Zuckerberg</a> whose LinkedIn password from 2012 recently allowed hackers to access his current Twitter and Pintrest accounts.  The truth is that even when we change our passwords we usually only change one number or character.  <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes">A study by UNC</a> found that “for 17% of the accounts they studied, knowing a user’s previous password allowed them to guess their next password in fewer than 5 guesses.”</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>To combat password risk, industry has made an effort to consolidate the number of places where your password is kept.  Single Sign On technologies, based on protocols like SAML and OAuth, have spread rapidly including the ubiquitous “Connect with Facebook” button.  While this does reduce the number of attack vectors it doesn’t solve the problem.  We have also seen a move to Public Key Infrastructure (PKI) with some truly amazing technologies like storing public keys in the <a href="https://onename.com/">Bitcoin blockchain</a>.  But the basic problem still remains that relying on only one form of identification is risky especially when your private key is stored in a smartcard, phone, or other object your 4 year old can put in the toilet.</p>
<p>The best solution is Multi Factor Authentication (MFA).  MFA consists of something you know (e.g., password, pin), something you have (e.g., smartcard, phone) and something you are (e.g., fingerprint).  By providing 2 out of the 3 factors users are securely authenticated.  While there are logistical issues with moving to MFA I believe they have more to do with the infrastructure than with users.  One good example is the delay given to <a href="http://money.com/4040808/credit-card-chip-fraud-emv/">gas stations</a> to install hardware for chip and pin credit card readers.  For software applications it should be simpler but there is still the cost of software redesigns.</p>
<p>What we really need is technology that MFA enables applications and devices that are not MFA capable today.  This is currently available in the TELEGRID-developed <a href="http://telegrid.com/authentication-authorization/">SMRTe</a>, a Unified Authentication and Authorization Manager that sits in front of applications and devices and enables MFA.  With the <a href="http://telegrid.com/authentication-authorization/">SMRTe</a> we can securely authenticate users with MFA without the logistical headache of rewriting code.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/is-your-password-worth-10">Is Your Password Worth $10?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
