Security Manual / FAQ
Security Manual / FAQ
USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
WHAT KIND OF SECURITY THREATS / ATTACKS DO WE NEED PROTECTION FROM?
Network Level Attacks Phishing: Fraudulent acquisition of sensitive information of Bank's users such as usernames, passwords etc. by masquerading as a trustworthy entity in an electronic communication. Pharming: Redirection of Bank's user traffic to another, bogus website using one or multiple fraudulent techniques. Man-in-the-Middle Attack (MITM): A form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. Replay Attack: A Replay Attack is a breach of security in which messages from an authorized user who is logging into an Application are captured by an attacker and resent (replayed) at a later time. Session Hijacking: Session hijacking is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network. Device Level Attacks Man-in-the-Browser Attack (MITB): A security attack where the perpetrator installs a Trojan horse on a victim's computer that's capable of modifying that user's Web transactions as they occur in real time. Man-on-the-Machine Attack (MOTM): Man-on-the-machine refers to malicious software in the user's access device such as Trojans, key-loggers etc. that have been installed to capture and transmit sensitive data. The network level attack vectors apply to all e-channels while device level attacks vary from device to device, most of them targeted to steal or manipulate information. The security challenge is to protect the users from all of these attacks without hampering the usability of the solution.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
AUTHENTICATION is a process by which one verifies a mutually agreed SECRET (login/password or biometric). If these credentials are compromised, then it is as good as giving the keys to your bank vault or safe to a thief yourself. Both Identity and Authentication require APRIORI knowledge. If Identity is localized, it can easily be stolen, no matter how many attributes/absolute labels are assigned to it.
WHAT IS SSL?
SSL = Secure Socket Layer. SSL allows a secure connection between your web browser and a web server. This secure information 'tunnel' was developed by Netscape Communications and was based on encryption algorithms developed by RSA Security. SSL was widely adopted by numerous companies for other client/server uses other than web surfing.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
SSL has two distinct entities, server and client. The client is the entity that initiates the transaction, whereas the server is the entity that responds to the client and negotiates which cipher suites are used for encryption. In SSL, the Web browser is the client and the Web-site server is the server. Because SSL is built into all major browsers and Web servers, simply installing a digital certificate, or Server ID, enables SSL capabilities. However, in a SSL handshake the verification that happens is only to check the authenticity of the digital certificate.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
The VeriSign subscriber agreement prohibits customers from using a certificate on more than one physical server or device at a time, unless the customer has purchased the Licensed Certificate Option. When private keys are moved among servers by disk or by network-accountability, and controls decrease, and auditing becomes more complex. By sharing certificates on multiple servers, enterprises increase the risk of exposure and complicate tracing access to a private key in the event of a compromise.
CAN ANYONE DOWNLOAD THE VERISIGN SECURE SEAL FOR THEIR WEBSITE?
The VeriSign Secured Seal is available for display on any Web page within a domain secured by a VeriSign SSL Certificate. Whether you are a new or existing customer, you can download and install the VeriSign Secured Seal on your server. A JavaScript verifies your common name and displays the seal. When site visitors click on the seal, they receive a dynamically generated verification page specific to your certificate. However, most internet users do not know how to check this or simply dont take the trouble of doing so every time they transact online. Going a step further, considering that the Secured Seal can be displayed on a website in less than an hour, what really prevents a cyber fraudster from altering the contents of his website immediately thereafter and launching phishing attacks on unsuspecting users.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
WHAT IS RELATIVE IDENTITY MUTUAL AUTHENTICATION & ENCRYPTION PROTOCOL?
Relative Identity (Rel-ID) Mutual Authentication & Encryption protocol, also called RMAP, is a revolutionary and cutting-edge technology (developed at Unikens Innovation Centre in India) for secure communications and secure data exchange over the Internet. It is based on asymmetric encryption algorithms (that were born after the Diffie-Hellman paper on Cryptography was published in 1976). No longer is identity absolute (based on individual entities alone), but defined in terms of a relationship of two entities with respect to a specific context & need. In addition to the three facets of IDENTITY (which can easily be stolen or compromised today), we have introduced a fourth element of WHO YOU KNOW. This Relative Identity or Mutual and Distributed Identity framework IDs the link / relationship between two entities and splits it (mathematically) in to two or more parts. When you identify the link, you identify both end-points hence, Mutual Authentication. RMAP integrates IDENTITY with ENCRYPTION, making it one of the most robust protocols for internet security today that has the ability to ward off most known malware, spyware attacks and threats such as Phishing, Man-In-The-Middle (MITM) and Man-In-The-Browser (MITB) attacks, Key-loggers, Screenscrapers, Trojans, etc. This is possible with the unique combination of a Secure Browser + Secure Desktop + Secure end-to-end encrypted channel between the users PCs and the banks servers.
WHATS THE DIFFERENCE BETWEEN REL-ID, A 40-BIT, AND A 128-BIT SSL CONNECTION?
Most banks require 128-bit encryption for online banking because 40-bit encryption is considered to be relatively weak. 128-bits is about 309 septillion times (309,485,000,000,000,000,000,000,000) larger than 40-bits. As an analogy, sending information without encryption is like sending a postcard through post the contents are visible to practically anyone who wants to see it. Using 40-bit encryption is like sending it in a plain white envelope. 128-bits could then be equated to using a security envelope that is printed to prevent it from being see-through. Relative to these strengths, Rel-ID encryption can be compared to encasing your data in a lead-lined, 12-inch thick titanium safe that is being transported by an armored tank with a convoy of a hundred armed guards. In other words, nothing short of military-grade security!
LIMITATIONS OF VERISIGN 128-BIT SSL CERTIFACTES FOR USERS OF WINDOWS 2000 AND OLDER BROWSER VERSIONS
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
Many users are still using Windows 2000 and older versions of Internet Explorer which do not support VeriSigns SSL certificates using 128-bit encryption. Certain IE browser versions from 3.02 to 5.23 and Netscape browser versions from 4.02 to 4.72 fall in this category. IE versions prior to 3.02 and Netscape versions prior to 4.02 are not capable of 128-bit encryption with any SSL Certificate. With Rel-ID and TruBank, there is no such limitation as it uses an independent, stand-alone, dedicated and secure browser, which can only connect with the banks servers and none other.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
Device binding: Device binding ensures that only authorized access devices (PCs & Laptops) can access Banks network blocking any other device not authorized for access. Common Security Infrastructure: The VPSI is a secure network infrastructure that can be used by Bank for its employees as well as its agents for connecting to any application of Bank securely without having to implement separate security infrastructure for each application or set of users. Uniken offers a Virtual Private Secure Internet solution to banks and enterprises under the VPSI Core brand name. VPSI Core enables Bank to transform the user's PC/Laptop into a Secure Access Device and the normal Internet into a secure private network to provide a fundamentally new private communication channel.
VPSI uses a secure tunneling infrastructure to create an On-Demand Secure Client Side Computing Environment, which...
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
switches between secure and normal mode on demand is built-in with 2-Factor Authentication binds the user, device and software together VPSI can be used for Mobile Banking, Secure Automated and Encrypted File Transfers, Online Credit/Debit Card Transactions, and deployment options can be either Cloud-Based or On-Premise.
WHAT IS TRUBANK?
TRUBANK is our custom-application based on the Rel-ID Mutual Authentication and Encryption Protocol that banks can use to offer secure internet banking to their customers. TRUBANK can be deployed either at the banks' premises or be cloud-based, and it can be offered for both corporate as well as retail customers. For more details about the product, please take a look at the TRUBANK brochure on our website (www.uniken.com)
HOW DOES TRUBANK CONDUCT MUTUAL AUTHENTICATION & OFFER END-TOEND ENCRYPTION?
Rel-ID Mutual Authentication Protocol is one of a kind True Mutual Authentication protocol, which is a zero-transmit protocol (where none of the information is transmitted in wire or otherwise). TRUBANK uses the same technology to ensure no confidential data is compromised during the transmission. The Rel-ID framework ensures that the entire Network Traffic remains encrypted between all network nodes, including client, web servers, application servers and database servers, both over the Internet and within the bank's internal network.
HOW DOES TRUBANK LINK THE DEVICE TO THE INTERNET BANKING CUSTOMER ID & PASSWORD?
The user logs into his Internet Banking account using the browser and then the customer is notified to download the TRUBANK application (software) and activate it. The device activation key is sent to the customer using an out of band method such as a SMS or a PIN Mailer. This is a onetime activation process only. Once the device is activated, it gets bound to the hardware e.g. laptop or USB drive. The device Username and the Internet Banking Username are the same, and once the customer launches the device and logs into it the Internet Banking page is already pre-populated with the Username.
CAN TRUBANK BE 'CORRUPTED' OR 'POISONED' AT THE CUSTOMERS' PC TO RE-DIRECT TRAFFIC TO FRAUDSTER'S SITE?
TruBank cannot be 'corrupted' or 'poisoned'. Once TruBank is activated on the customers' PC, there can be no Man-In-The-Middle (MITM) attacks to re-direct traffic anywhere. Such an MITM attack is theoretically only possible during the activation process, where in addition to knowing the username, password, verification and activation keys, the hacker has to even know the exact time when the customer is activating the application for the first time which is a rare possibility.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71
Security Manual
HOW DOES TRUBANK WORK IN THE SCENARIO THAT MULTIPLE CUSTOMERS USE THE SAME PC AND TRUBANK APPLICATION TO ACCESS THEIR SEPARATE INTERNET BANKING ACCOUNTS?
The same device (PC) can be allowed to be accessed by multiple users. Each user who will use the device would need to activate it individually using his Internet Banking Username. The pin for the device for each user could be different. The activation process is similar to individual user activation.
Corporate Office : 16302 Turnbury Oak Drive, Odessa, Florida 33556. USA | Ph : 1-813-943-3552 Innovation Center : Shrileela Plaza, Survey # 115, 1st Floor, Baner Road, Pune - 411045. INDIA | Ph: 91-20-66427970 / 71