Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.

Slides:



Advertisements
Similar presentations
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Advertisements

Government of CanadaGouvernement du Canada Government On-Line Chief Information Office Treasury Board of Canada Secretariat September 2001.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Page 1 ©2000 Bull Major Challenges in e-Government Value System in modern IS’s for Public services Claude Boulle, European Affairs FP 6 Consultation Meeting.
Meeting Business Needs - Ontario Business Connects Presentation to PSSDCMay 14, 2001.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Public Key Infrastructure Ammar Hasayen ….
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 10: Authentication Guide to Computer Network Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: Author: Cristina Nucuta.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Confidential © IDA Singapore APEC-OECD Cooperative Initiative on Regulatory Reform February 2001 Singapore.
Government of CanadaGouvernement du Canada Putting it all Together Clustering Information & Services around Client Needs Peter Oberle Office for Government.
Government of CanadaGouvernement du Canada Governments Without Boundaries Serving Citizens in a Digital World Presentation to e-Governance Task Force.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Government of CanadaGouvernement du Canada Service Transformation through Government On-Line Helen McDonald Director General, Office of the Chief Information.
Internet Security for Small & Medium Business Week 6
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
John Grant Chief General Manager National Office for the Information Economy Canberra, Australia The Government OnLine Strategy.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Building Security into Your System Bill Major Gregory Ponto.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
15 th Annual Canadian IT Security Symposium May 12-15, 2003 Ottawa Congress Centre Presentation at the 3 rd Annual Privacy and Security.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
UNDERSTANDING INFORMATION MANAGEMENT (IM) WITHIN THE FEDERAL GOVERNMENT.
Electronic Banking & Security Electronic Banking & Security.
Shared Services and Third Party Assurance: Panel May 19, 2016.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Governments Without Boundaries Serving Citizens in a Digital World
Supervision of Insurance Market Conduct in Canada
Wendy Birkinshaw, A/Director, Service Transformation
Presentation transcript:

Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime Minister Jean Chrétien First Annual Privacy and Security Workshop November 10, 2000 Security and Government On-Line Getting the Model Right Government of Canada PKI Secretariat

Origin of Government On-Line Initiative “The Government will become a model user of information technology and the Internet. By 2004, our goal is to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on line, at the time and place of their choosing.” (1999 Throne Speech)

PARTNERSHIPS inter-jurisdictional sites and services based on client needs 2004 and beyond Tier Three ELECTRONIC SERVICE DELIVERY key government services on-line secure transactions electronic filing electronic payments December 2004 Tier Two ON-LINE PRESENCE information on programs and services access to key forms on-line a revamped Government of Canada portal December 2000 Tier One Government On-Line Targets

GOC PKI Secretariat Role To encourage the implementation of policies, technologies and governance processes in support of secure electronic service delivery and Government On Line. To contribute to Canada’s position as a trusted partner in the new global economy by helping to promote an e-commerce-friendly environment.

Secure Electronic Service Delivery  As electronic transactions increase in complexity and sensitivity, so too do the requirements for privacy and security  Secure Electronic Service Delivery (SESD) is a critical component of the Government On-Line Initiative

Strategy Development

Typical Federal Services and Associated Security Requirements  Information publishing - anonymous browsing - digitally signed content  Application for program or service, updates and account review - confidentiality - authentication - authorization - non-repudiation - secure end-to-end automated processes

Access to Public Information Paid Publications Tax Filing / Benefit Applications Corporate Form Filing Access and Changes to Information TYPICAL ON-LINE SERVICES SECURITY ENABLERS Public Key Infrastructure PINs, Passwords, Shared Secrets SSL Services / Security Matrix Unrestricted access

Security Options  Browsing options - https  Authentication options - SSL/PINs on a program- by-program basis - PKI across programs  Inclusive approach possible  Options not mutually exclusive

Canadians’ Expectations of Electronic Service Delivery  They want to use the Internet to access government services  Government must deliver services in a secure and trusted environment  Government must ensure the security and privacy of personal information by using the best available solutions

Security Concerns  Private information becoming public  Malicious or inadvertent changes to information  Information ending up in the wrong hands  Information theft and fraud

Policy Framework  Privacy Act - Code of Fair Information Practices authorized program direct collection and informed consent “consistent” use right of correction  Treasury Board Policy on Privacy and Data Protection  Privacy Impact Assessment

PKI and Secure Electronic Service Delivery Issues Privacy  Collection and sharing of information between government services - registration, directory  Naming of certificates - “distinguished names” - how to prevent data linking and inference  Single or multiple certificates  No key back up

More PKI and SESD Issues Portability  Accessibility  Across jurisdictions? Privilege Management  Addressing the need for distributed privilege management  Distinguishing between identity and authority Communications  Public perception and trust

Guiding Principle of SESD Development To fully respect privacy principles while collecting and using personal information for registration, service requests and help-desk purposes

Getting the Model Right By...  Meeting Canadians’ expectations of Secure Electronic Service Delivery  Supporting departmental services requirements  Building electronic service delivery partnerships with the public and private sectors  Influencing technology development  Communicating effectively

Security and Confidentiality in the Digital World Government of Canada PKI

For more information  TBS/CIOB/PKI Web site:  GOC PKI Secretariat  Brenda Watkins (613)