Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
3SKey 3SKey.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
AAI and universities Roles and functions. The Smart Card Architect Objectives zBuild a secure Authentication and Authorization Infrastructure between.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Bill Maaske CIO AZ Secretary of State
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 10: Authentication Guide to Computer Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
F. Guilleux, O. Salaün - CRU Middleware activities in French Higher Education.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
DIGITAL SIGNATURE.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Using Public Key Cryptography Key management and public key infrastructures.
Electronic Signatures: Streamlining the Sales Process Shawn Hickey – Manager of Product Management Grant Ramsey, J.D. – Solutions Manager, Contracts Perceptive.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
Electronic Filing Systems for Campaign and Finance Reports Subcommittee Report on Security and Authentication in Filing Systems Information Network of.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
ESign Aashutosh.
TAG Presentation 18th May 2004 Paul Butler
The Changing Face of Digital Identity
Digital Signature.
Class 3 Digital Signature Certificate Noida
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
جايگاه گواهی ديجيتالی در ايران
ALIO ARCHIVE ANDREW DANIEL.
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services

Topics  Requirements of State Agencies  Risk Assessment  Digital vs. Electronic Signatures  PKI  Available Technologies

Requirements of State Agencies  Act 722 of 2007: State agencies are required to use or permit the use of electronic signatures by June 2009.

Risk Assessment for Business Process 1. Importance of identity verification for trusted person 2. Importance of knowing person who signed was person validated in #1 3. Importance that document has not changed since it was signed

Digital vs. Electronic Signatures  Electronic Signature: An electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.

Digital vs. Electronic Signatures  Digital Signature: A type of electronic signature that relies on a public key infrastructure (PKI) to provide a unique identifier and link the signature to the record, authenticating both the signer and the document.

Public Key Infrastructure

Available Technologies  Low Level Validation  Self-Generated Certificate  Available in Word and Acrobat for Free  Image of Wet Signature  User scans signature and pastes into document  Signature on Electronic Tablet  User signs document on screen without special signature software

Available Technologies  Medium Level Validation  Certificate Purchased from Public CA  ~$20/year  Easy for third parties to acquire  Difficult to manage with large number of users  Wet-Signature with Trusted Method ~$300/device~$100/license Software such as IntegriSign

Available Technologies  Medium Level Validation  Internal CA  Requires significant policy and technical setup  Requires SAS70 audit and root signing if to be trusted outside organization  Automates distribution and management of large number of user certificates to user devices such as PC or smart card  Certificate price decreases as use increases

Available Technologies  High Level Validation  Same methods as medium level, but the CA or root signer requires more documentation to validate identity  This typically costs more due to higher risk and bond coverage

Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services