Standards Bodies’ Approach to Security, Privacy & Trust

Slides:



Advertisements
Similar presentations
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
Advertisements

OpenStand and IEEE 802 Konstantinos Karachalios Managing Director, IEEE-SA 17 November 2012.
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
MESA INTERNATIONAL Driving Operations Excellence Being a Board Member at MESA IT’S GOOD FOR YOU ! - AND US !
Agricultural Biotechnology Network for Regional Collaboration and Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview.
1 ITU/EBU Meeting of High-Level Experts on Competitive Platforms for the Delivery of Digital Content Participative web: User-created content Graham Vickery.
Strengthening the Strategic Cooperation between the EU and Western Balkan Region in the field of ICT Research Regional ICT R&D priorities, Jelena Pantelic,
Critical Role of ICT in Parliament Fulfill legislative, oversight, and representative responsibilities Achieve the goals of transparency, openness, accessibility,
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
OpenStand Principles for the modern paradigm for standards development.
AIAA’s Publications Business Publications New Initiatives Subcommittee Wednesday, 9 January 2008 Rodger Williams.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
Interoperability Framework Overview Health Information Technology (HIT) Standards Committee June 24, 2010 Presented by: Douglas Fridsma, MD, PhD Acting.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
An R&D Manager’s Perspective TechExpo October 5, 2004 Presented by: Veena Rawat.
Residential Industry Stakeholders Workshop Hosted by ASHRAE February 19 & 20, 2014 Crystal City Hilton Arlington, Virginia.
Symposium on Global Scientific Data Infrastructures Panel Two: Stakeholder Communities in the DWF Ann Wolpert, Massachusetts Institute of Technology Board.
Promoting excellence in social security Building on sector wide commonalities to enhance the benefits of Information.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
IP Offices and the Implementation of the WIPO Development Agenda: Challenges and Opportunities September 18, 2009 Geneva Irfan Baloch World Intellectual.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Faculty Councils Brad Whittaker Director, Research Services and Industry Liaison Strategic Research Plan.
Security of the Internet of Things: perspectives and challenges
DG Enterprise and Industry European Commission Standardisation Aspects of ICT and e-Business Antonio Conte Unit D4 - ICT for Competitiveness and Innovation.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
ANSI – ESOs meeting Washington February 2017
A policy framework for an open and trusted Internet
Visit Mendocino County: Strategic Direction 2017/ /20
HIMSS Standards Activities
Computer Security Activities in IEEE-SA
WORK PROGRAMME to support the implementation of the Recommendation
Dr. Frederic Surre City University of London; IEEE Standards Education
Paths to our Digital Future
International Relations Sector and IR-ECO Group
Summit 2017 Breakout Group 2: Data Management (DM)
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
IEEE Standards Association Tech Policy Work Overview
The importance of SMEs for ITU
ASSET - Automotive Software cyber SEcuriTy
Dr. Konstantinos Komaitis
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
Konstantinos Karachalios Managing Director, IEEE Standards Association
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
IEEE Standards Association IEEE 5G Steering Committee update March 2016 Draft V0.1 9/21/2018.
The Role of European Standards in Support of the Cybersecurity Act
Why the Multistakeholder Approach Works
Internet Interconnection
Karen Bartleson, President, IEEE Standards Association
Information Technology (IT)
Launch of Towards 2020 GWP Strategy.
IFX Forum Overview September 28, 2015 © Copyright IFX Forum, Inc
E-Commerce for Developing Countries (EC-DC)
The Role of Bilateral Donors in supporting capacity-building in the area of ICT Open Consultations on Financing Mechanisms for Meeting the Challenges.
IEEE EAB Strategy 19 June 2011 New Brunswick, NJ.
Outline of Presentation
Introduction to TransCelerate
IEEE Foundation: The Road Ahead
Privacy Recommendation PAR Proposal
2 From Alpha to Ω IEEE offers much more than a globally open, rules-based standardization ecosystem. For over 130 years, IEEE has been the place where.
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
The e-government Conference main issues
Konstantinos Karachalios, Managing Director IEEE-SA
Where Are We in the Industrial Revolution?
Open Internet Standards
Wrap-Up – NSF Site Visit 8 February 2010
League of Advanced European Neutron Sources
Space Coast chapter American society of safety professionals
Collaborative regulation in the digital economy
Presentation transcript:

Standards Bodies’ Approach to Security, Privacy & Trust Karen McCabe Senior Director of Technology Policy and International Affairs, IEEE Standards Association GSS Theme: “Security, Privacy and Trust in Standardization” GSS16, 24 October 2016 9/20/2018

About IEEE World’s Largest Professional Association Advancing Technology for Humanity 420,000+ Members 46 Technical Societies & Councils 160 Countries 1,600 Annual Conferences 3,900,000+ Technical Documents 175+ Top-cited Periodicals

IEEE Standards Association Mission: Provide a high quality, market-relevant standardization environment, respected worldwide An independent global community with an open standards development process Proven process produces results that reflect the collective, consensus view of participants and enables industry to achieve specific objectives and solutions Widely respected and aligns with the WTO and OpenStand principles IEEE Standards span a broad spectrum of technologies, such as Aerospace Electronics Broadband Over Power Lines Broadcast Technology Clean Technology Cognitive Radio Design Automation Aerospace Electronics Broadband Over Power Lines Broadcast Technology Clean Technology Cognitive Radio Design Automation Aerospace Electronics Broadband Over Power Lines Broadcast Technology Clean Technology Cognitive Radio Design Automation

Open Standards Development Standards have a critical role in helping to ensure security and privacy and enabling trust in ICTs To enable this role, a best practice is to work within a set of principles that provide a worldwide community for voluntary cooperation among interested parties and stakeholders, and enable technical excellence, global interoperability and innovation Principles Direct Participation Due Process Broad Consensus Balance Transparency Universal Openness Coherence Development Dimension

Value of Open Processes & Open Standards Open processes are a good practice from a security perspective as the review of multiple experts can discover potential flaws and improve the standards in development The transparency of open standards development promotes trust in platforms, services and products built upon and adhering to these standards Open standards enable privacy-and security-enhancing technologies to gain wide spread adoption as the promote interoperability Open standards fuel innovation that can advance solutions to the challenges of security, privacy and trust As we look our collective efforts to address security, privacy and trust challenges through the lens of standardization, to note is the value and impact of open standardization processes and open standards developed through these processes.

Path Forward Core functionality should be standardized to enable permissionless innovation above and below the standard Include a new generation of privacy, security and ethics professionals from across multi-disciplines in open standards development Build privacy, security and ethics into the open standards themselves to contribute to trust in ICTs and our growing global digital future Embrace a globally open and inclusive paradigm that will help ensure strong integration, interoperability and increased synergies along the innovation chain across national and regional boundaries Establish an integrated standards ecosystem framework that takes into account the current and anticipated future state of technology and its impact, the entry of developing economies and the impact of standards on policy and policy on standards

IEEE Standards Work in Security, Privacy and Trust

IEEE 802 Series IEEE 802.1ARce Secure Device Identity: Amendment 1: SHA-384 and P-384 Elliptic Curve IEEE 802.1AEcg MAC Security: Ethernet Data Encryption Devices IEEE P802E: Recommended Practice for Privacy Considerations for IEEE 802 Technologies IEEE 802.1Xbx Port-Based Network Access Control Amendment 1: MAC Security Key Agreement protocol (MKA) extensions

IEEE 1363 Series IEEE's center of cryptographic expertise, with a particular focus on public key algorithms Traditional Public-Key Cryptography (IEEE 1363 & IEEE 1363a) This includes digital signature and key establishment schemes Lattice-Based Public-Key Cryptography (IEEE 1363.1) This includes encryption (e.g. NTRUEncrypt) and digital signature (e.g. NTRUSign) schemes Password-Based Public Key Cryptography (IEEE 1363.2) This includes password-authenticated key agreement (e.g. EKE, SPEKE, SRP) and password-authenticated key retrieval (e.g. Ford & Kaliski) schemes Identity-Based Public Key Cryptography using Pairings (IEEE 1363.3) This includes techniques for identity-based cryptography using pairings Identity-Based Cryptographic Techniques Using Pairings (IEEE P1363.3/Cor 1) This includes techniques for algorithms to compute the pairings and specification of recommended elliptic curves

IEEE 1619 Series This family of standards specifies the XTS cryptographic mode of operation for the AES block cipher and an XML-based key archive format for block-oriented storage devices IEEE 1619 IEEE Standard for Cryptographic Protection of Data on Block- Oriented Storage Devices IEEE 1619.1 IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices IEEE 1619.2 IEEE Standard for Wide-Block Encryption for Shared Storage Media

IEEE 2600 Series The IEEE 2600 family of standards address the security needs of hardcopy devices using a generic compliance methodology (IEEE 2600) and using a Common Criteria based compliance methodology (IEEE 2600.1, 2600.2, 2600.3 and 2600.4) Intended to be used by hardcopy device manufacturers, purchasers, administrators, and end users More than 100 individuals from over three dozen organizations have participated in working group meetings, teleconferences, and email discussions

Many Others IEEE 1609.2 Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages - Certificate Management IEEE P1609.2a Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages Amendment - Certificate Management IEEE 1667 Discovery, Authentication and Authorization in Host Attachments of Storage Devices IEEE 1735 Recommended Practice for Encryption and Management of Electronic Design Intellectual Property (IP) IEEE 1735/Cor 1 Recommended Practice for Encryption and Management of Electronic Design Intellectual Property (IP) - Corrigendum 1: Correction to Rights Digest Description IEEE PC37.249 Guide for Categorizing Security Needs for Protection and Automation Related Data Files

Industry Connections Security Group (ICSG) Malware MetaData Exchange Format (MMDEF) XML schema V1.2: Describes files containing malware, as well as clean files MMDEF-B: Describes behavioral aspects of malware Software Taggant System for identifying malware creators Cryptographically secure marker added to obfuscated files created by commercial software distribution packaging programs (packers) Legitimate packers often abused by malware creators to create many, difficult-to-detect variants of their malware Taggants identify specific packer users’ license keys, enabling blacklisting of malicious packer users (malware creators) System components: Open source software library Public Key Infrastructure (PKI) management service Blacklist of malicious packer users

ICSG, continued Clean-file Metadata Exchange (CMX) Shared, continually growing repository of information (metadata) related to clean software files New metadata added by software developers, even prior to release of the corresponding software Helps reduce number of false positives detected by anti-virus software when more aggressively searching for malware IEEE Anti-Malware Support Service (AMSS) Provides shared services supporting the entire computer security industry Enables individual security companies and the industry as a whole to respond more effectively and efficiently to contemporary malware threats Initially consists of two main services: CMX and Taggant System Managed and administered by IEEE-SA (Professional Services)

IEEE Internet Initiative Mission To provide a collaborative platform for advancing solutions and informing global technology policymaking through a consensus of sound technical and scientific knowledge in the areas of Internet governance, cybersecurity, and privacy. SEGUE to 3i (background for creation of Ethics Programs)

IEEE Internet Initiative A multi-domain and multi-discipline community that connects technologists and policymakers from around the world to foster a better understanding of, and to improve decisions affecting, Internet governance, cybersecurity, and privacy issues. Provides a neutral, respected forum to help ensure trustworthy technology solutions and best practices in guiding Internet policymaking. Focused on building trust and confidence in the internet and its technology underpinnings, and advancing solutions to provide meaningful and ethical internet access and use to all the world’s citizens. The IEEE Internet Initiative is rooted in IEEE’s mission to advance technology for the benefit of humanity. Its focus is on the development, adoption and use of trustworthy technologies and solutions that enable digital inclusion and the internet to foster innovation for economic and societal growth, and to promote participation of technologists, policy makers and other stakeholders in a global “internet policy partnership.” Launched in 2014, it served as the inspiration and launch point for the AI and ethics in technology work at the IEEE—noting that to ensure trustworthy technologies—their development and use—that it is imperative to address the critical dimensions of ethical and human values as we work to find and advance solutions for providing meaningful internet access and use that are safe, secure and ethical.

Ethics, Society & Technology (EST) Ad Hoc Committee IEEE Focus on Technology Ethics A Dual Effort Initially Focused on AI/Autonomous Systems Ethics, Society & Technology (EST) Ad Hoc Committee IEEE TechEthics™ program oversight Broad charter to consider tech ethics concerns across all technologies Focused on debate and discussion with output being events, articles, white papers, etc. to inform good policy and decision making This is the opening up and widening of the discussion, bringing in all voices in the conversation Focus will be on a variety of technology areas. First area of focus is AI/autonomous systems. TechEthics is about expanding the discussion to include all viewpoints, with particular attention to all possible audiences, including general public. Complementary SA activity is about engaging industry and others to narrow the conversation to achieve consensus on key points that might lead to standards and other such items. Global Initiative for Ethical Considerations in the Design of Autonomous Systems IEEE Industry Connections group Develop consensus among participants Develop Standards This is narrowing of the discussion, driving towards consensus, delivering tangible outputs that directly shape behavior, practice, policy and more

IEEE-SA Global Ethics Initiative -Mention GIECDAS, re: more specific focus on standards and ethical tech

IEEE P7000™ Segue to P7000 to provide a specific example of Standardization in the Ethics space for technology -This is the first Standard of its kind, re: ethics for IEEE since the org began, etc

Thank You Karen McCabe k.mccabe@ieee.org