© 1998-2004 ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 1 Building Trust and Security for E-government Dubai, United Arab.

Slides:



Advertisements
Similar presentations
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Internet Protocol Security (IP Sec)
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Secure Communication Architectures.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Computer Science Public Key Management Lecture 5.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
© ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 ICTs – Challenges and Opportunities for Africa Alexander NTOKO Chief,
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Trust and Confidence for Critical E-government Services.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 UNECE Capacity Building Workshop on Trade Facilitation Implementation: October 2004 Electronic PostMark (EPM) Security & Authentication for eTrade Documents.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
TAG Presentation 18th May 2004 Paul Butler
SSL Certificates for Secure Websites
TAG Presentation 18th May 2004 Paul Butler
Security in ebXML Messaging
NAAS 2.0 Features and Enhancements
E-Commerce for Developing Countries (EC-DC)
ITU Telecommunication Development Bureau (BDT)
Presentation transcript:

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 1 Building Trust and Security for E-government Dubai, United Arab Emirates November 2004 Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau (BDT) E-government and IP Symposium for the Arab Region

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 2 Agenda 1.Threats 2.Framework 3.Strategies

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 3 A Transaction-based E-government Infrastructure But how do we get governments, businesses and citizens to conduct critical government transactions online?

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 4 As many countries embark on the e-government bandwagon, governments, citizens and businesses are asking many questions – Can we trust these systems? Receiving online submissions to renew national identity cards: G: Am I dealing with the owner of the identity card? C: How do I know this is really a government site? Submitting confidential bids for government procurements: G: Is the bid from a registered company? B: Can my competitors see my bid? Transmitting sensitive government documents online. G: Can an unauthorized person view the document? G: How can access control be ensured?

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 5 Issuing birth certificates and land certificates via the Internet: G: Can a citizen modify his or her date of birth? G: What if she changes the size of her land or uses this to make another land certificate? Conducting online elections via the Internet – e-voting: C: Can someone know whom I voted for? G: How do we guarantee that a citizen votes only once? G: Is this vote from a registered voter?

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 6 It is mostly about TRUST Having firm integrity in something or somebody An entity A, can be said to trust another entity B when A makes the assumption that B will behave exactly as A expects. In addition to privacy, security and policies, knowing whom you are dealing with is vital for building trust.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 7 Technology Framework for Online Trust Five (5) Key Requirements – The big 5! This list is NOT exhaustive and but constitutes vital elements for trust. o Data Confidentiality Information accessed only by those authorized. o Data Integrity No information added, changed, or taken out. o Strong Authentication Parties are who they pretend to be. o Non-repudiation Originator cannot deny origin or transaction. o Infrastructure of trust Automating the verification of digital credentials.

Technology Framework for Online Trust 1. Digital Envelope Combines the high speed of symmetric encryption (e.g., AES Rijndael) and the key management convenience of public key encryption encryption. Includes PSE (Smartcards, Mega-brid, USB tokens), biometrics, Hardware Security Modules etc “ Digital Envelope ” One time encryption Key Recipient ’ s Public Key

Technology Framework for Online Trust 2. Digital Signature Signer’s Private Key Signed Document Encrypted Digest Hash Algorithm Digest Combines Hash Algorithms (FIPS-180), Key Exchange, Public Key Encryption to provide Data integrity, Non- repudiation and Certificate-based Authentication. Digital credentials are established using ITU-T X.509 Digital Certificate Standard

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 10 Technology Framework for Online Trust 3. Digital Certificate ITU-T X.509 creates the framework for establishing digital identities – A key component for establishing security and trust for ICT applications in public networks (such as the Internet)

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 11 Industry Solutions for Online Trust and Security

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 12 Public Key Infrastructure (PKI) and Industry Solutions for Trust o It’s Not about waging a technology war (PKI vs Non-PKI) but combining technologies and policies for total solutions. o Combines various industry solutions and standards – PKCS, PSE (Smart Cards, tokens Megabrid), OCSP Transponders, HSMs, CA, RA and Content Validation Software. o Enables security and trust to be built on comprehensive and interoperable solutions with appropriate policies ensuring national sovereignty and enforceable legislation. o Most highly rated e-government countries have PKI as an important component of their e-government strategy.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 13 Building Online Trust For E-Government Digital Signature – Issues and Challenges o Acceptance of Digital Signatures Across Multi- Jurisdictional PKI Domains (at the National, Regional and Global Levels). o Adopting Policies for Generic Identity Certificates (PKI) and the relationship with Attribute Certificates (Privilege Management Infrastructures). o Elaborating Harmonized and Technology Neutral E-Legislative Framework and Enforcement Mechanisms.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 14 Cross Certification o A CA issues a certificate to another CA. This is applied to Strict Hierarchy (Root CAs) o Establishment of Trust Relationship between CAs (Chain of Trust). o Could result in Trust Cascades (A>B and B>C should not imply A>C). o Trust relationship could be Mutual (Horizontal Trust relationship) or Unilateral (Vertical Trust relationship – Root CAs).

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 15 Bridge Certificate Authority o A CA acts as a bridge between CAs in different PKI domains. o Each CA establishes a Trust Relationship with the Bridge CA. o The absence of direct relationships between CAs avoids overheads related to the establishment of direct trust relationships between co-operating CAs.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 16 Cross Recognition o No trust relationship on cross certification between CAs. o Requires a mutually trusted and recognized third party. o CA-CA Interoperability is achieved through the licensing or auditing by a mutually agreed authority.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 17 Accreditation Certificate o A combination of cross-certification and cross recognition. o Involves the creation of an accreditation CA. o Public Key of each CA is signed by accreditation CA. o Used in Australia in the Gatekeeper Accreditation CA. o Requires high level government structure and control to create hierarchy (e.g., government-wide PKI).

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 18 Certificate Policy – Plays an important role in the implementation of some of these initiatives o Certificate Policy (CP) – A Named set of rules that indicate the applicability of a certificate to a particular community and/or class of applications of common security requirements.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 19 Policy Mappings Extension Allows a certification authority to indicate that certain policies in its own domain can be considered equivalent to certain other policies in the subject certification authority's domain. ITU-T X509: CA-CA Policy Interoperability

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 20 ITU-T X.509: Preventing Trust Cascades Policy Constraints extension Ability for a certification authority to require that explicit certificate policy indications be present in all subsequent certificates in a certification path. Ability for a certification authority to disable policy mapping by subsequent certification authorities in a certification path.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 21 Strategy for E-Signatures and CAs Online Trust and Security for e-Government Needs to be part of a comprehensive policy framework dealing with other e-services

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 22 What could be the Role of Governments in fostering e-government deployment and use? o National/Regional Policies for the Management of Public IP Resources to ensure fair and equitable allocation of. Internet Protocol Addresses Domain Names (under ccTLDs) o Creating an Enabling Environment for E- Applications (e.g.,): Accreditation of Certification Authorities Control and Enforcement Mechanisms (Spam, Spim, Phishing and Data privacy legislations). Harmonized Regional Framework E-Legislation o Active Role in Implementing e-government.

© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 23 For e-government to move from simple web- based systems for disseminating government information to transaction-based services for critical applications, citizens, governments and businesses must all have TRUST in the solutions. Thank You for your attention For further information: Web: CONCLUSION