Title: CertAnon
1CertAnon
- Anonymous WAN Authentication Service
- Approval Presentation
- Red Group
- CS410
- May 1, 2007
2Our Team
3Presentation Outline
- Problem Description
- Solution Description
- Process Description
- Solution Characteristics
- Marketing Plan, ROI
- Management Plan
- Milestones, Deliverables, Budgets
- Risk Management
- Conclusion
4Who is Chockalingam Ramanathan?
- Part of a group using stolen passwords to empty
investors accounts1 - Hit prominent brokers such as TD Ameritrade,
ETrade, and Charles Schwab - Resulted in more than 2 million in losses, which
were absorbed by the brokers - Fourth tech-intrusion case filed by the SEC since
December 2006
1. http//www.washingtonpost.com/wp-dyn/content/ar
ticle/2007/03/12/AR2007031201558.html
5Fraud Stats
- From 2005 20062
- 8.9 million victims of online fraud or identity
theft - Total losses to identity theft and online fraud
jumped from 54.4 billion to 56.6 billion - Mean resolution time per incident skyrocketed
from 28 to 40 hours per victim
2. http//www.verisignsecured.com/content/Default.
aspx?edu_stats_body.html
6Going Phishing
- Phishing sites are on the rise3
- Over 7 million phishing attempts per day
3. Anti-Phishing Working Group -
http//www.antiphishing.org/
7Consumers Online Activities
8Password Overload
9The Problem
- Single-factor password authentication is easily
compromised and endangers the security of online
accounts. - Username/Password paradigm is insecure7
- Management of multiple strong passwords is
difficult for individuals - Fraudulent online account access and associated
costs are increasing
7. http//www.schneier.com/crypto-gram-0503.html2
10The Endangered Password
- More online accounts more passwords
- Complexity of passwords is limited by the human
factor8 - Vulnerability is enhanced by the technology
factor - Dissemination is too easy
- Once compromised, a password is no longer
effective for authentication
8. http//www.schneier.com/blog/archives/2006/12/r
ealworld_passw.html
11CertAnon A New Proposal
- Anonymous WAN authentication service
- Used for any and all online accounts
- Strong two-factor authentication
- Limited information sharing
- Partner with online businesses
- Initial customers are Internet users
12Two-Factor Authentication9
- Something you know
- A single PIN
- Plus something you have
- Hardware token generating pseudo-random numbers
- Effectively changes your password every 60 seconds
9. RSA - http//www.rsasecurity.com/node.asp?id11
56
13RSA SecurID Users
14Two-Factor Acceptance
- Rolls Royce Bentley Motor Cars
- Uses RSA SecurID authentication
- Enables them to use the Internet securely as a
cost-effective and efficient extension to their
corporate network - ETrade Financial
- Provides retail customers the option to add
Digital Security ID to their Internet security
solution - Helps guard against unauthorized account access
15Reaching the Goal
- Build a WAN authentication service that permits
customers to securely access all of their online
accounts using a single access method - Build our website
- Write software modules for partner sites
- Develop testing portal
- Install authentication servers
- Distribute tokens
- Beta-testing, then go live!
16What Would It Look Like?
17(No Transcript)
18Who is Our Customer?
- Two sales channels
- Individual Internet user (211 million of them!)10
- Purchases CertAnon token for one-time fee of 50
- Obtaining a critical mass of customers makes
CertAnon a must have for online vendors - Could provide leverage to charge vendors on a
transaction basis in the future - Security-conscious businesses
- Purchase batches of tokens for redistribution to
their customers - Focus on those without proprietary solutions
10. Internet World Stats - http//www.internetworl
dstats.com/stats2.htm
19Marketing Strategy
- Offer software modules for customer integration
- Freely available to encourage adoption of the
service - Approach financial companies not already using a
two-factor authentication method - Bulk token sales
- Enable them to offer the same customer security
as larger competitors without the infrastructure
expense - Token reusability will encourage faster customer
adoption - Advertising strategies
- Internet advertising
- Computer shows/trade shows
- Promotional token giveaways
20ROI for Consumers
TBD RU Marketing Strategy
- Reduce/eliminate need for multiple passwords
- Avoid password theft, unauthorized account
access, and fraud - Information isnt stored on a card or device that
can be lost - Full passcodes not stored in a hackable database
that is a single point of failure
21ROI for Businesses
- Very low cost
- Avoid implementing a costly proprietary solution
- Improves security of customer base by moving more
people away from passwords - Reduces losses from fraud reimbursement
- Snaps into existing infrastructure with minimal
development - Customers who don't use CertAnon will be
unaffected
22Cons
- Reliance on a physical token
- Forgotten
- Broken
- Lost or stolen
- Inadequate for sight-impaired users
- Customer service coordination will need to be
handled carefully
23Competition Matrix
24Management Plan
25Team Communications
- Team meetings (via AOL AIM)
- Sunday/Tuesday 800 P.M.
- Additional meetings as needed
- Meetings with Professor Brunelle as needed
- Meetings with Technical Advisors as needed
- Google Group for document management and messaging
26Phase 0 Gantt Chart
27Phase 1 Gantt Chart
28Phase 1 Major Components
29Phase 1 Development WBS
30Phase 1 Organizational Chart
31Phase 1 Staffing Budget
32Phase 1 Resource Budget
33Phase 2 Gantt Chart
34Phase 2 Organizational Chart
35Phase 2 Staffing Budget
36Phase 2 Resource Budget
37Phase 3 Gantt Chart
38Phase 3 Organizational Chart
39Phase 3 Staffing Budget
40Phase 3 Resource Budget
41Total Project Cost
42Break Even Analysis
43Funding Plan
- SBIR Funding Agency National Science Foundation
- Phase 1 100,000 max, 52k planned
- Phase 2 750,000 or two years, 183k planned
- Phase 3
- Venture capital investment
- Small business loan
- Revenue from token sales
44Risk Management Plan
- Identify project risks
- Determine the phase that the risk is in
- Categorize risks according to probability and
impact - Reduce risks before or as they happen with
mitigation actions - Continue to reevaluate risks during all phases
- Watch for new risks
45Risks and Mitigation
(1-Low to 5-High)
46Evaluation Plan
- Time
- Measured against baseline project plan
- Cost
- Measured against budget plan by phase
- Scope
- Measured against requirement document
- Quality
- Measured by customer adoption rate and
satisfaction
47Evaluation Phases
- Phase 0
- Idea developed
- Project website developed
- Funding secured
- Phase 2
- Product design
- Software module development
- Software module testing
- Integration testing
- Finished product
- Phase 1
- Prototype design
- Working prototype
- Initial customer demonstration
- Phase 3
- First sale completed
- Product released
- Marketing plan developed
- Successful marketing
- New contracts acquired
48Conclusion
- Available, affordable, and proven technology
- Targets a large and growing market
- Benefits consumers and online businesses
- Scaleable service
- Manageable project scope, achievable milestones
49References
- 3 Indicted in Online Brokerage Hacking Scheme.
Washington Post. 13 Mar. 2007. Carrie Johnson.
2 Apr. 2007 lthttp//www.washingtonpost.com/wp-dyn/
content/article/2007/03/12/AR2007031201558.htmlgt. - Internet Penetration and Impact. Pew/Internet.
April 2006. Pew Internet American Life
Project. 28 Jan. 2007 lthttp//www.pewinternet.org
/pdfs/PIP_Internet_Impact.pdfgt. - Internet Statistics Compendium - Sample.
E-consultancy.com. 9 Jan. 2007.
E-consultancy.com LTD. 28 Jan. 2007
lthttp//www.e-consultancy.com/publications/downloa
d/91130/internet-stats-compendium/internet-stats-c
ompendium-January-2007-SAMPLE.docgt. - Internet World Stats. Internet World Stats.
10 Mar. 2007. Internet World Stats. 22 Apr.
2007 lthttp//www.internetworldstats.com/stats2.htm
gt. - Online Banking Increased 47 since 2002.
ClickZ Stats. 9 Feb. 2007. The ClickZ Network.
15 Feb. 2007 lthttp//www.clickz.com/showPage.html?
page3481976tablegt.
50References (cont.)
- Phishing Activity Trends Report for the Month
of November, 2006. Anti-Phishing Working Group.
Nov. 2006. Anti-Phishing Working Group. 28
Jan. 2007 lthttp//www.antiphishing.org/reports/apw
g_report_november_2006.pdfgt. - Real-World Passwords. Schneier on Security.
14 Dec. 2006. Bruce Schneier. 28 Jan. 2007
lthttp//www.schneier.com/blog/archives/2006/12/rea
lworld_passw.htmlgt. - RSA SecurID Authentication. RSA Security.
2007. RSA Security, Inc. 28 Jan. 2007
lthttp//www.rsasecurity.com/node.asp?id1156gt. - RSA Security Password Management Survey. RSA
Security. Sep. 2006. Wikipedia. 15 Feb. 2007
lthttp//www.rsa.com/products/SOM/whitepapers/PASSW
_WP_0906.pdf gt. - Share of Time Spent Online. ClickZ Stats. 27
Feb. 2007. The ClickZ Network. 28 Feb. 2007
lthttp//www.clickz.com/img/Share_of_Time.htmlgt.
51Appendix
- Abstract
- SBIR Document
- Management Plan
- Evaluation Plan
- Resource Plan
- Marketing Plan
- Funding Plan
- Staffing Plan
- Risk Management Plan
- Hardware Specifications
- Work Breakdown Structure
- Additional Diagrams