This document belongs to the dataroom of, Anti-Hack Jobs
, of which in turn, belongs to Australian based KangaBytes
as the owner and author of all content within this document.
The Anti-Hack Jobs
advisory, is to advise in respect to, how best to protect the data of your customers, from hacking events.
The use of these tips, requires a license. Please visit the online dataroom at www.kangabytes.tips/pass.html for this information.
This document focuses on facets of online accounts, of which aim to deny quick and easy access to the data within that account.
Nothing within this document, makes use of the password field in any way.
Rather, tips featured within this document, focus on other types of account settings of which, will always hamper the hacker in their respective ways.
When an account holder wants to change any of a list of settings, or, seeks to operate any of the account features, there will be a delay of time, before that change can take effect.
(Access) delay, the length of time, may be hours, days or weeks.
(Access) delay), the setting either is changed automatically, or can now be changed manually via an approve button.
The length of time, in the delay, should be at least, a few days, or can be as long as, one or two weeks.
The True Holder
has this (Access) delay
time, to detect this setting request, and, can then, take action to reverse this setting change request, before harmful impacts can result from that change.
Setting Change Delay
Means, the period of time after when the setting request has been made and, before the Delay Expiry
happens.
Delay Expiry
Means the moment of when, the Setting Change Delay
period of time has come to its end. This is the moment of time, at which, the setting request can be performed.
Delay Reversal
Means when, the True Holder
reverses a Delayed Setting
request.
Delayed Setting
Means, the setting change, of which is currently being delayed, due to an Setting Change Delay
event.
True Holderafter the time delay has gone past. This setting request shall not be activated by any other means.
True Holderhas activated the cancel button, during the time delay period.
AccessDelayitself
While logged in, the True Holder
enters an area of their account, and adjusts this setting.
Please read the page AccessDelays - Handy Tips.
This is where, you make the request to change any setting, or request a service, where that setting or service is subject to a AccessDelay
function.
The True Holder
goes into that area of the website, and puts in the new setting, as they currently do, for that same feature of their account.
Where the True Holder
is to find out that there is a request to adjust a setting, of which is subject to an AccessDelay
,
and of which is currently in progress, that True Holder
simply needs to activate a Delay Reversal
by activating a Cancel
button, to stop this setting change from happening.
Where the setting is 'auto', the setting change will happen, moments after when, the delay time has expired.
Otherwise, once the time of the delay has been reached, the True Holder
will be presented with an Approve or Ok button, to activate that change to that setting.
Setting Change Delaylength
The one setting that MUST be subject to a Setting Change Delay
is, the AccessDelay
setting itself.
Especially when the Setting Change Delay
is being reduced, there must be a delay, to the adjustment of the Setting Change Delay
,
the length of which MUST be, equal to the Setting Change Delay
length value/setting of which at that moment, being adjusted away from.
Whenever there is a request to adjust a setting associated with the Authentication process, such as the email address used to log in with,
you may need to accept both old and new email addresses until either the Delay Expiry
or Delay Reversal
happens.
Setting Change Delaysetting for all other settings, then, the
AccessDelayneeds to have its own form field.
AccessDelayworks with what, within your website.
True Holder, as the
True Holderenters their account. This MUST be, directly after the log in authentication stage.
True Holderis to land, once the Authentication process is complete. This box MUST always be shown here, including when there are no changes pending.
Delay Expirydate, and if that is past, then, perform the setting change as requested.
True Holderactivates the Approve, button, to finalise the approval process.
True Holderis logged in, and the request has not been cancelled.
True Holderactivates the Cancel, button.
AccessDelayfunction, you need three new table columns.
True Holderhas requested to, change the setting to.
Delay Expiryis due.
True Holderactivates the Approve button, and for each time the Approve Script is operated.
True Holderactivates the Cancel button, and for each time the Cancel Script is operated.
Whenever a hacker seeks to get into an account, and take over that same account, with the aim of locking out the True Holder
via the hacker adjusting the log in details.
When those same log in settings are subject to a Setting Change Delay
, the True Holder
has the option of, getting into their account, and, getting their access back before the true damage can be done.
This system will fail, whenever the True Holder
visits their account, less often than, what the delay length is.
The True Holder
MUST always be going to visit their accout, at least as often as, the shortest setting delays, of which their account has,
to ensure that, the True Holder
will always have enough of that time required, for the True Holder
to react to, any adverse setting request, when they happen.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
The True Holder
, is able to determine as to what their access needs are for their time inside their account, and,
are thereby, restricted to operate within only those areas of their account, for the length of this log in session.
With Session Needs
, the True Holder
, makes their selection, from within the log in page, as the True Holder
is in the process of, gaining access into their account.
As, other areas of the website/account area have access closed to them, nobody can get into those area(s) of the online account, and therefore, no hacker is able to get in to those areas either,
despite the fact that, the True Holder
is at that moment, making use of another area or feature of their online services.
True-Holder
True-Holderdoes,
true-user, gets presented with, a list of jobs of which they want to do whilst they are logged in.
True-Holdersimply selects from this list, as part of their log in process.
The True Holder
will then, perform whater tasks/jobs of which their Session Needs
will permit the True Holder
to perform.
Should the True Holder
seek to work within an area of their account, of which are closed/blocked by their current session requests, then, that True Holder
will need to log out, and then log back in, with a different
Session Needs
request.
ENUM Optionsin the following page of this document).
Session Needsis, when the log in request has been fully authenticated.
Full Access (Session)
This is the first of the two most important Session Needs
settings, of which there are.
Under this mode, all features and functions are switched on, with full access, to the account user/operator.
Read Only (Session)
This is the second of the two most important Session Needs settings of which there are.
This is where, the account user, is permitted to only read from the account. Nobody is permitted to change any settings, send messages/emails, make purchases or payments of any kind.
The only possible non-read activity there can be, is to send help messages.
Update Only (Session)
True Holderhas access to every account feature, service and function.
There are many handy ways, in which some websites may be able to combine Session Needs
with other tips of mine, such as ModeCode
.
Session Needs
, is focused on, the setting you make, as you start a new session, and, you decide what you want, at that moment. Whereas ModeCode
, are preset settings, made some time before the respective session.
Full Access
Your website MUST still have available, the full account access option, for those users of who have a lot to do. This means, to have a checkbox or button, of which is clearly marked, 'Full Access', and will always grant full access to every feature and area of a persons online account.
Read Onlysetting
One of the most handy restrictions to have, is to have a Read Only option.
This setting, will prevent any risks associated with, somebody sending a payment from a bank account, or to place a large order in an online retailer.
True-holderis online, that hacker will be limited to, only the specific job(s) of which the
True-holderhas selected to do.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
Where a hacker has followed their way in, right behind the True Holder
, as the True Holder
enters their account, the hacker can still inflict damage to the area(s) of which the True Holder
has selected as their Session Needs
for that session.
A ModeCode
, is set, and becomes associated with a specific list of account access features and areas, of which in turn is to enable the True Holder
to log into their account,
without any disclosure of what their account access requirements are.
True holderto set their
ModeCodeto each of these.
True holderhas the ability to, select a custom combination of access needs for each
ModeCodethey set.
Session Needs
Compared with Session Needs
, the True Holder
selects their needs for that session, as they are doing their other authentication matters to start that log-in session with.
Where as with ModeCode
, the True Holder
enters a code during log in, and that code corresponds to, a pre-set list of access needs.
A True Holder
may be able to have one ModeCode
for when they are at home, and another ModeCode
for when they out and about.
True userwill also need to, put in their
ModeCodeinto a third input field too.
ModeCodes with, as well as, what types of access of which, that code is to be associated with.
ModeCodethey want with that respective access combinations.
ModeCodeto be set for that selection.
ModeCode.
ModeCodeagainst each of the
ModeCodes for that user.
ModeCode, to the log in register, of which will in turn, control the access staus of the respective website areas or zones.
ModeCode.
ModeCodes per customer/account, then, you need to have four sets of these columns on each row. One of these column sets, is as shown in the following list.
ModeCode.
ModeCode. This column needs to match whatever you use for the actual access controls for a log in session.
You need to work out, what your website will do, where a log in request is made, without there being a ModeCode
provided.
TimeCyclepasswords
With TimeCycle
passwords, you may say that, specific settings/features can only used on particular days when, the TimeCycle
password gets used.
The main area of focus here is, where a hacker is watching a True Holder
, with the aims of accessing that account while the True Holder
is logged in.
As with other tips in this document, the hacker will be restricted in what they can do, as, various areas will remain logged out.
Such as, where the True Holder
is there to read only, the Hacker shall be Logged Out in respect to wanting to write anything within the account.
The one main difference with Session Needs
is, the hacker has no way of knowing, as to what areas of the account, will be logged in or out, as,
the hacker will not be able to read the contents of a log-in form, as can happen with the Session Needs
advisory.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
Passwords
Where a hacker is able to get in, and get the passwords from that account, that same hacker is just as able to get the ModeCode
s too.