Introduction to the Secure Component

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Internet Protocol Security (IP Sec)
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Windows 2003 and 802.1x Secure Wireless Deployments.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
Masud Hasan Secue VS Hushmail Project 2.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
November 10, 2010 Washington, D.C.. Criminal Matters Network Secure Component Communication tool with a focus on collaborative and secure work Secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
and File Security With GnuPG Matt Brodeur
Key management issues in PGP
Web Applications Security Cryptography 1
Cryptography: an overview
Basics of Cryptography
Security is one of the most widely used and regarded network services
Unit 3 Section 6.4: Internet Security
Secure Sockets Layer (SSL)
Criminal Matters Network
e-Health Platform End 2 End encryption
Chapter 5: The Art of Ensuring Integrity
Module 8: Securing Network Traffic by Using IPSec and Certificates
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Workspaces and Hypothetical Case
Course Overview and Install Procedure
PSC Group, LLc Office 365/SharePoint Online Migration traps and tricks
November 10, 2010 Washington, D.C.
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Criminal Law Network.
Module 8: Securing Network Traffic by Using IPSec and Certificates
IS4680 Security Auditing for Compliance
CS – E-commerce Technologies – Lecture 07
Install AD Certificate Services
Microsoft Virtual Academy
ONLINE SECURE DATA SERVICE
Public-Key, Digital Signatures, Management, Security
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
LAB 3: Digital Signature
Presentation transcript:

Introduction to the Secure Component Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Module 1 Introduction to the Secure Component May 5, 2010 Washington, D.C.

Module 1 Agenda Agenda, course objectives and recommendations Secure groupware Platform evolution Secure Communications System Security On-line course

Agenda and Course Objectives Module 1: Introduction to the Secure Component Module 2: Contacts and Messaging Module 3: Workspaces and Hypothetical Case Module 4: Course overview and install procedure Objectives: Familiarize new users with the tool Ensure the efficient use of the Secure Component tool Improve the communication and exchange of information among Central Authorities mutua y/o extradición.

Recommendations Please let us know as soon as you see a problem with the equipment utilized in the course All questions are valid questions Coffee Breaks Complete evaluation form at the end of the course Animación

Communication (Instant Messaging) What is Groupware? Communication (Instant Messaging) Common Goals and Objectives Information Sharing (Workspaces) Coordination Groupware Entorno se define primero con sus miembros y una meta en común Es colaborativo porque exige coordinación among sus miembros ;

Security (Enccryption) Secure Groupware Security (Enccryption) Common Goals and Objectives Communication (Instant Messaging) Information (Workspaces) Coordination Groupware

E-mail vs. Groove E-mail Message is not encrypted Message can be intercepted Message can be altered Message is not confidential Internet Attached documents are not encrypted Both message and attachments can be intercepted Both message and attachments can be altered Both message and attachments are not confidential

E-mail vs. Secure Groupware Message remains encrypted when stored in the hard drive and while in transit Internet Message is encrypted all the time Message can not be deciphered Message can not be altered If user is behind a firewall, OAS servers are used Authenticity, Integrity and Availability

Initial Considerations Facilitate communications among Central Authorities on Mutual Leal Assistance. Confidentiality of the information: No central database No OAS Member State has control over the application SG/OEA has no access to the information shared by the users Decision in 2003: Groove Networks *Institución, órgano o entidad pública designada por el gobierno de un Estado para representarlo ante las Authorities extranjeras, así como para tramitar, recibir y/o enviar las solicitudes de asistencia mutua y/o extradición.

Evolution of the Plataform 2003 – Implementation of Groove Networks 2005 – Microsoft acquires Groove Networks 2007 – Microsoft integrates Groove to Office 2007 2010 – Microsoft SharePoint Workspace 2010 Integration with content management platform

Evolution of the Plataform 2007- OEA/Microsoft agreement 2007 version available in: English Spanish French Portuguese Technology upgrade:

The SG/OAS has upgraded the current platform to its latest version Technology Upgrade New platform only works in 64-bit platforms 32 Migration to new 64-bit servers required MIGRATED Upgrade Windows 2000 to Windows 2003 64-bit UPGRADED The SG/OAS has upgraded the current platform to its latest version

Technology Upgrade Relay Server Management Server Groove 3.1 Windows 2000 32-bit Storage Area Network Windows 2003 64-bit Office Groove 2007 Relay Servers Management Server

Components of Groove within the OAS Infrastructure Public and Private components Microsoft Office Groove 2007 Groove Users Agregar Public and Private MLA Website

Secure Communications System Definition: The Secure Communications System is a software that allows groups of geographically separated individuals to work together securely over public networks such as the Internet. Security is always enabled and it is not optional.

Features Efficient use of the Network – Bandwidth optimization Synchronization – can be used off-line Security is always enabled Data encryption – local and while in transit Compatibility with MS Office applications User awareness Alerts Users decide who they share information with Easy to use

Security Authenticity, Integrity and availability of the information contained in the local hard drive and while in transit Authenticity: information is only available to the intended recipient Integrity: information is never altered or modified Availability: information is always available and ready to be used when desired Use of Certificate Authority (CA) and Public Key Infrastructure (PKI) High encryption standards used

“E-Learning” platform Available in English and Spanish On-line Course “E-Learning” platform MS Office Groove 2007 Available in English and Spanish Hacer ejercicio de Registro y que escriban su nombre de usuario en la evaluacion

Real Life Case Scenario State A requests urgent assistance to State B about the location of a witness State B needs to receive the formal assistance request to initiate the process of assistance The original request, sent via diplomatic channels, expired because State B received the request at a date later than the issued request How can we expedite and improve this process? Through the use of Secure Workgroup tools Hypothetical Case in Module 3 Revisar acentos

End OF Module 1 9

Questions?

Introduction to the Secure Component Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Module 1 Introduction to the Secure Component May 5, 2010 Washington, D.C.

Encryption Algorithms Feature Algorithm RSA 2048-bits Identity MARC4 192-bits Messages MARC4 256-bits Workspaces ESIGN 1536-bits Hard Disc AES 192-bits References: AES (Advanced Encryption Standard) is the new government-approved standard for a symmetric encryption algorithm, replacing DES. AES's original name was Rijndael and was developed by two Belgian cryptographers. http://csrc.nist.gov/encryption/aes/ ESIGN is a royalty-free, public-key signature algorithm developed in Japan. It is much faster than other signature algorithms, allowing us to digitally sign each delta with negligible performance impact. It was only recently made royalty-free and is now being standardized by IEEE. http://info.isl.ntt.co.jp/esign/ RSA stands for Rivest, Shamir and Adleman - after the three cryptographers who invented the first practical commercial public key cryptosystem. It is the most commonly used public key algorithm today. The RSA patent officially expired and entered the public domain on September 20, 2000 (although RSA Security preemptively waived their patent rights on September 6, 2000). http://www.rsasecurity.com/ ElGamal is another public key encryption algorithm that provides an alternative to RSA. PBKDF2 (Password-based key derivation function #2) is defined in RFC2898 and RSA's standard PKCS#5 v2.0. This algorithm provides a standard mechanism for deriving a secret key from a passphrase. It makes use of salts and iteration counts to increase the complexity of attack. http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5 Management Server AES 256-bits Relay Server ElGamal 1536-bits

Security