Republic of Sudan Ministry of Telecoms & Information Technology National Committee for Digital Certification ELECTRONIC ID IN ONLINE ADMISSION FOR UNIVERSITIES.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Ghana e-health framework
Steps towards E-Government in Syria
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
PKI services in the Public Sector of the EU Member States Objectives and Methodology of the survey Prof. Sokratis K. Katsikas University of the Aegean,
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
EPermits IT Subcommittee Meeting September 6, 2013.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
2-Jun-15 1 ACCESSING ON LINE SERVICES PROTECTED BY THE ITALIAN EID GIOVANNI MANCA National Center for Information technology in Public Administration (CNIPA)
Alabama Geospatial Office Established May 2007 Mike Vanhook State GIS Coordinator.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-region Gabrovo Document interchange between regional administration, municipalities within the region and de-concentrated state administrations for administrative.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Nikolay Vassilev, CFA Minister of State Administration and Administrative Reform Republic of Bulgaria Nikolay Vassilev, CFA Minister of State Administration.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Public Key Infrastructure Ammar Hasayen ….
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
THE ROLE OF CIVIL REGISTRY TO ACTIVATE THE ELECTRONIC AUTHENTICATION
On-Line Information Systems Choice, Criteria and Design ESTELLA ADAMIDOU, ARISTEA – ALEXANDRA PRIGKOU MSc in Finance and Financial Information Systems.
Payment Gateways for e-Government services 24 May 2007
EGovernment Services in Poland Today & in The Future Dariusz Bogucki Ph.D, IDA II, National Co-ordinator National Registers Department, Ministry of Internal.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
E-GOVERNMENT IN VIETNAM Ph.D Tran Cong Yen Deputy Director Information and Communication Technology Center Ministry of Science and Technology, Vietnam.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Configuring Directory Certificate Services Lesson 13.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
ICT/ICM Status in Jordan Hesham Athamneh & Jordan Team.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
Workshop IV Current Developments in Digital Trust.
CITU e-government A Corporate IT Strategy for Government Sue Broyd Central IT Unit Cabinet Office MAY 2000.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Strategy and experience of Spain in interoperability for eGovernment.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
Bulding blocks of e- government Ingmar Pappel. Bulding blocks of e-government  Personal Code  Digital Identity  Digital signature  X-Road  Organizations.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Efficient and secure transborder exchange of patient data
ESign Aashutosh.
Digitising Civil Registration and Vital Statistic
U.S. Federal e-Authentication Initiative
Pooja programmer,cse department
The Swedish strategy on eGovernment
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 PALAU Efrecia R. Kazuma.
Presentation transcript:

Republic of Sudan Ministry of Telecoms & Information Technology National Committee for Digital Certification ELECTRONIC ID IN ONLINE ADMISSION FOR UNIVERSITIES PRESENTER 1 :(Eng : Aboud Mohamed Hussin) PRESENTER 2 :(Eng: Mohamed Ahmed Osman) ORGANIZATION :(Ministry of Higher Education & Scientific Research )

Before 1973 the admission was responsible for institutes and universities (No unified policy rule ). Before 1973 the admission was responsible for institutes and universities (No unified policy rule ). In 1973 the unified admission committee was established. In 1973 the unified admission committee was established. In 1975 the Act of Higher Education organized the unified admission for institutes and universities. In 1975 the Act of Higher Education organized the unified admission for institutes and universities. Manual procedures were used to complete work during this period. Manual procedures were used to complete work during this period. ADMISSION DEVELOPMENT HISTORY

ADMISSION DEVELOPMENT HISTORY... In 1993 Admission office applied the decision of Higher Education Council to use computer applications in admission functions. In 1993 Admission office applied the decision of Higher Education Council to use computer applications in admission functions. Admission Department provided different platforms of applications and databases to implement admission functions. Admission Department provided different platforms of applications and databases to implement admission functions. In 2000 admission web site established to get the students informed of their results online. In 2000 admission web site established to get the students informed of their results online.

MANUAL FORM OF ADMISSION The students receive the form after pay form’s fees. The students receive the form after pay form’s fees. the form submitted to admission office after filled by student before deadlines. the form submitted to admission office after filled by student before deadlines. Before submission student must show valid identity (personal card, passport ). Before submission student must show valid identity (personal card, passport ). The form shall submit to admission office by student himself. The form shall submit to admission office by student himself.

THE DEVELOMENT OF INTAKE( )

TECHNICAL REASONS FOR ESTABLISHING ONLINE ADMISSION APPLICATION In addition to previous reasons ( increasing Numbers of students ) there are technical reasons : In addition to previous reasons ( increasing Numbers of students ) there are technical reasons : -E-government project and good infrastructures of electronic services. -All states are connected by fiber optical Networks encouraging admission online applications.

TECHNICAL REASONS FOR ESTABLISHING ONLINE ADMISSION APPLICATION …. Sudanese universities information Network (SUIN) project which connecting universities with fiber optical network, supplying all universities with high bandwidth internet services. Sudanese universities information Network (SUIN) project which connecting universities with fiber optical network, supplying all universities with high bandwidth internet services.

CHALLENGES SUPPOSED TO FACE THE ONLINE APPLICATION privacy and security of online applications effected the trust and continuity. privacy and security of online applications effected the trust and continuity. Interaction of the students with the new system of admission. Interaction of the students with the new system of admission. Low awareness with electronic services. Low awareness with electronic services. E-payment service not available in Sudan. E-payment service not available in Sudan.

THE IMPORTANCE OF E-ID IN ONLINE ADMISSION The previous slide shows the need of electronic ID regarding privacy and security in exchanging information between students and admission office. The previous slide shows the need of electronic ID regarding privacy and security in exchanging information between students and admission office. Taking a look of how the operation going on… Taking a look of how the operation going on…

FLOW OF THE SYSTEM login Form Id Secret code Serial No Admission DB Secondary certificate DB System DB Student choices printable PDF report (ST data and choices) H.D.D Exit

THE IMPORTANCE OF USING PUBLIC KEY INFRUSTRUCTURE(PKI) IN ONLINE ADMISSION Using digital certificates between students and admission office with trusted third party (TTP) enabling authenticated data exchange (No need for secret codes). Using digital certificates between students and admission office with trusted third party (TTP) enabling authenticated data exchange (No need for secret codes). Using digital certificates increase the security of the admission web site and getting more Confidence. Using digital certificates increase the security of the admission web site and getting more Confidence.

THE IMPORTANCE OF USING PUBLIC KEY INFRUSTRUCTURE(PKI) IN ONLINE ADMISSION…… Integrity of Data : same data entered by student is saved in admission’s DB. Integrity of Data : same data entered by student is saved in admission’s DB. The student will be able to pay his fees online by e-payment method after building the public key infrastructure (PKI). The student will be able to pay his fees online by e-payment method after building the public key infrastructure (PKI).

OTHER EDUCATIONAL SERVICES SUPPOSED TO BE PRESENT AFTER APPLYING PKI : Increasing of online educational services. Increasing of online educational services. Authentication of certificates issued from universities and institutes. Authentication of certificates issued from universities and institutes. increasing of trusted transactions among universities. increasing of trusted transactions among universities.

REFERENCES : PAPER : The Development of Admission System For Sudan Higher Education Institutes. PAPER : The Development of Admission System For Sudan Higher Education Institutes. By : Eng: Waleed M. Elmubarak, Eng : Mohamed Ahmed Osman. PAPER : Digital Certification PAPER : Digital Certification By : Dr. Ezzeldin Kamil Ameen By : Dr. Ezzeldin Kamil Ameen

THANK YOU