Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.

Slides:



Advertisements
Similar presentations
Existing tools for cooperation – WG 2 1 Regional Policy Dialogue Capacity building seminars WORKING GROUP MEETINGS HIGH LEVEL SEMINAR SERIES 4 working.
Advertisements

Financing of OAS Activities Sources of cooperation Cooperation modalities Cooperation actors Specific Funds management models and resources mobilization.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Secure Communication Architectures.
E-Government Internal Perspectives. Assessing the Trend “Is there a trend towards e-government? I think there is. Is it a strong trend? I wouldn’t say.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
João N. Veiga Malta Electronic Government Procurement Program Coordinator Inter-American Development Bank João N. Veiga Malta Electronic.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Policy for Transforming Teaching & Learning through ICTs in South Africa Seugnet Blignaut Seugnet Blignaut
1 Kuwait Central Agency for information technology.
Enhancing Institutional and Administrative Capacity case: POLAND
AfDB - EBRD Joint conference in procurement reform in North Africa and SEMED Countries Marrakech 22 and 23 April 2013 Jordan Delegation 22-23/4/2013.
Internal Auditing and Outsourcing
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
Company LOGO Workshop on Macedonian e-Gov project and best UE practices (Slovenian experience) Skopje Blagica Andreeva Ministry of Information.
Strengthening the Strategic Cooperation between the EU and Western Balkan Region in the field of ICT Research Regional ICT R&D priorities, Jelena Pantelic,
TTBIZLINK PROJECT MINISTRY OF TRADE, INDUSTRY, INVESTMENT & COMMUNICATIONS.
Part of a Broader Strategy
Emergency Management Information System - EMIS
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
A Comparative Study on the e-Commerce Laws of Taiwan and the Philippines September 20, 2006 John C.T. Ko & Regina Rose N. Regidor for Taiwan for the Philippines.
Business Systems Development SDLC and introduction to the Microsoft Solutions Framework Team and Process Models.
UNCITRAL United Nations Commission on International Trade Law EIGHTH REGIONAL PUBLIC PROCUREMENT FORUM TIRANA, ALBANIA, MAY , 2012 E-procurement:
Development of Management Information System for the Forestry Sector in Viet Nam F O R M I S II Annual Work Plan 2014 Tapio Leppänen Chief Technical Adviser.
Summary of the initial audit of the Prozorro Project UKRAINE Mr ADAM JONCZYK, EBRD Consultant 27th of May 2015, Kiev.
Payment Gateways for e-Government services 24 May 2007
X-Road – Estonian Interoperability Platform
Ministry of Transport, Information Technology and Communications
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
E-GOVERNMENT IN VIETNAM Ph.D Tran Cong Yen Deputy Director Information and Communication Technology Center Ministry of Science and Technology, Vietnam.
Understanding & Use of the Internet E-government Spring 2011 G. F Khan, PhD.
Technical Assistance to Business Registration Reform in Viet Nam Presentation to the DPG-PSD Dar es Salaam Nilgün Taş Chief, Competitiveness, Upgrading.
E-Procurement An Architectural Framework Approach December 10, 2008.
John Grant Chief General Manager National Office for the Information Economy Canberra, Australia The Government OnLine Strategy.
SUPPORT TO THE ESTABLISHMENT OF THE ACADEMY OF POLICE SCIENCES IN SYRIA Project Overview UNDP Syria April 2009.
Online Government ECUADOR Herlinda Sabando comercio8micip.gov.ec Carlos Vera Quintana Public FTAA.ecom/inf/141/Add.1 June 4, 2002 Original:
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
Government of India Department of Electronics and Information Technology Ministry of Communications and Information Technology.
TOWARDS BETTER REGULATION: THE ROLE OF IMPACT ASSESSMENT COLIN KIRKPATRICK IMPACT ASSESSMENT RESEARCH CENTRE UNIVERSITY OF MANCHESTER, UK UNECE Symposium.
Dr Aniyan Varghese eGovernment Unit eGovernment Unit Directorate General Information Society Dr Aniyan Varghese eGovernment.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
PUBLIC PROCUREMENT INFORMATION TECHNOLOGIES IN THE REPUBLIC OF TAJIKISTAN PUBLIC PROCUREMENT AGENCY UNDER THE GOVERNMENT OF THE REPUBLIC OF TAJIKISTAN.
Governance e-Transformation Launch of Moldova-India Dialogue & Collaboration Chisinau January 21, Governance e-Transformation Launch of Moldova-India Dialogue.
Promoting excellence in social security Building on sector wide commonalities to enhance the benefits of Information.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Governance Readiness in Europe UN E-participation index 2008.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
The Federal eGovernment of the United Arab Emirates the United Arab Emirates(20/06/2012) 1.
Transforming Procurement E- GP Planning and change management Action Plan for E- GP implementation in Kenya Jerome Ochieng Public Procurement Oversight.
PARTNERSHIP OPPORTUNITIES IN THE DEVELOPMENT OF E-SYSTEMS OF LAND GOVERNANCE IN KENYA 1 A Paper Presented at the Land Governance and Poverty Conference.
E-Procurement : Towards Transparency and Efficiency in Public Service Delivery.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 04/06/2009.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
L-030-3(5) Prepared by: Eng Kok Siong Copyright 2010 All Rights Reserved Government Policies Module Putrajaya Boulevard (Artist Impression) Year.
Dr Ama Eyo Lecturer and Public Procurement Specialist Institute for Competition and Procurement Studies, Bangor University, North.
CIRAZ Key factor in Smart Specialization Strategy implementation
Electronic Government and IT Policy Unit
“Everyone can access”.
E-Commerce for Developing Countries (EC-DC)
HIMSS National Conference New Orleans Convention Center
Qatar’s Gateway to the 21st Century
Presentation transcript:

Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication Infrastructure MINISTRY OF INFORMATION AND COMMUNICATIONS Symposium on buiding an Electronic Authentication Infrastructure for the deployment of online public services and administration reform

NCDSA ROOTCA  2 Introduction of an effort of Viet Nam in building a nation-wide infrastructure for effectively securing electronic transactions Agenda 1.Introduction 2.Electronic transactions trend 3.Business requirements for an electronic Authentication Framework 4.Outline an Electronic Authentication system 5.Conclusion Agenda

NCDSA ROOTCA  3 Demand for electronic transactions Increasing trend of electronic transactions Communication channel between state agencies and society E-commerce and commercial support activities International agreements Effort of Viet Nam in e-government development Vietnam’s rank in terms of the e-gov readiness index improved E-government: …where Internet and related technologies has the potential to transform the structures and operation of government (UN). Transactions between the administration and its citizens, private sector going to be online

NCDSA ROOTCA  4 The information security requirements for electronic transactions Confidential/ P rivacy A uthentication I ntegrity N on-repudiation Without information security measures: PAIN Modern ways to secure electronic transactions Information security for electronic transactions

NCDSA ROOTCA  5 Some major PKI projects: Toward e-government development Ongoing PKI projects E-Tax, E-custom: MOF E-Banking: VSB E-Certificate of Origin, Chemistry registration: MOIT E-Intellectual Property: MOST E-Procurement: MPI Others projects in the IT application plan 2010 Integrated system Document sharing

NCDSA ROOTCA  6 Multi Factor Tokenc Very High High Average Standard Low A mouse click Knowledge- based Pin/Password - PKI Cost Level of authentication Levels of Authentication Information security requirement: case by case High: Payment in a commercial deal Low: Transportation fee payment Banking electronic transactionsc Not every transaction requires all PKI properties The common requirement is authentication Criteria to select appropriate measures

NCDSA ROOTCA  7 Lesson from abroad The reference countries USA Australia Singapore Other countries The concepts: Authentication principles and the mechanism to facilitate these principles Electronic Authentication Framework (NeAF) and Infrastructure to facilitate the framework (NeAS)

NCDSA ROOTCA  8 Toward a nation-wide electronic authentication framework Goals Protect investment Facilitate simple solutions for applications encompassing authentication functions Easy the technology upgrade Scope Scope: Concentrate on the government activities

NCDSA ROOTCA  9 NeAF: Project In the framework of WB Project: Consultancy on a PKI scheme to support e-Government development and on a Proposal for the National e-Authentication Framework With cooperation of leading international and regional Information security vendors Tentative finish date: 2011

NCDSA ROOTCA  10 NeAF: Project organization Supporting team work leaded by NCDSA (AITA, MIC) Our mission: Determine appropriate objectives Support and assistant Technology and knowledge transfer (to action) Monitor the quality

NCDSA ROOTCA  11 NeAF: Objectives Develop a proposal for the national e- Authentication framework that consists of: Principles and methodologies Technologies, policies, procedures, and assessment framework for electronic transactions in e-Government development and socio-economic development. Architecture, main technical specification of authentication service components, and their interface specifications. Develop the capacity to build up expertise for e- Authentication.

NCDSA ROOTCA  12 NeAF: Issues Manage the risks associated with the online transactions in the future e-Government of Vietnam and e-Commerce Considering all authentication risk factors Help determine the appropriate authentication methods for each electronic transaction type Deliver an outline design for the electronic authentication system based on the framework For futute investment proposal

NCDSA ROOTCA  13 NeAF: Reference Address most issues that have occurred in authorizing electronic transactions in IT advanced countries The reference countries are USA, Canada, Australia and Singapore. The international experience from the work being conducted under the STORK and PEPPOL projects relating to adoption of PKI in electronic IDs and public procurement processes in the EU will be specially interested in. The designs’ reference countries are USA, Canada, and Australia.

NCDSA ROOTCA  14 NeAF: Feature requirements Main Issues for National e-Authentication Framework and electronic Authentication system Risk Management Security Privacy Disclosure Requirements Complaints Handling Standards

NCDSA ROOTCA  15 NeAF: Feature requirements ( cont. ) Main Issues for National e-Authentication Framework and electronic Authentication system Scalability Balance Principles Authentication assurance levels Approach Cost- Effectiveness Integration

NCDSA ROOTCA  16 Implementation: Model and components National Electronic Authentication System: Provide authentication services to agencies and public electronic transactions. Federated Authentication Model: With multiple types of credentials Components Application Service Providers Credential Service Providers: Support 3 rd parties End Users Authentication scenario assertion-based certificate-based

NCDSA ROOTCA  17 CSP(s) Ministry A Website Branh B Portal Operation Model of NecAS User(s) Select the level of authentication based on business requirements Credential type A Credential type B

NCDSA ROOTCA  18 Provide user authentication services to state agencies’ public websites, focus on: Key agencies Only administrative public services Performance requirements for the 1 st phase Able to serve around concurrent 100 authentication requests. Not every access needs authentication. National Authentication Systems ( Phase I )

NCDSA ROOTCA  19 To extend in the future to cover all public services Promote PPP Extending capabilities and integrated technologies Implement multiple types of credential Improving performance National Authentication Systems ( Phase II )

NCDSA ROOTCA  20 Conclusion Data sharing requires information security and authentication NeAF and NeAS help efficient development of e- gov applications that need authentication Firm infrastructure invested by government and PPP are needed

Thank you very much! National Centre of Digital Signature Authentication (AITA, MIC) Tel: