© 1998-2003 ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, 20-21 October.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategy Unit ITU Telecommunication Development Bureau Seminar.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 1 Building Trust and Security for E-government Dubai, United Arab.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
© ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 ICTs – Challenges and Opportunities for Africa Alexander NTOKO Chief,
Multimedia Communication and Information Logistics for AFTER-SALES AND PRODUCT LIFE- CYCLE SUPPORT Click to edit Master title style
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Trust and Confidence for Critical E-government Services.
Secure Electronic Transaction (SET)
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Digital Signatures, Message Digest and Authentication Week-9.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Using Public Key Cryptography Key management and public key infrastructures.
Digital Signatures and Digital Certificates Monil Adhikari.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Copyright BRISA 2001ITU —Multimidia in the 21st CenturyJun 5, 2001 Security Requirements for Business Communication HENRIQUE DE CONTI.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau ITU.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
ITU Perspective: The ITU Development Sector and the Information Society Désiré Karyabwite IP Coordinator / E-STrategies International Telecommunication.
TAG Presentation 18th May 2004 Paul Butler
In relation to WSIS Plan of Action – Internet Governance
TAG Presentation 18th May 2004 Paul Butler
NAAS 2.0 Features and Enhancements
E-Commerce for Developing Countries (EC-DC)
ITU Telecommunication Development Bureau (BDT)
Presentation transcript:

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October 2003 Building Trust and Confidence For ICT Applications Krastu MIRSKI and Alexander NTOKO ITU Telecommunication Development Bureau (BDT)

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 2 Agenda for Presentation 1.Barriers to E-Applications 2.Technology Framework 3.Regional Initiatives 4.ITU Activities/Initiatives

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 3 Growing Demand for Online Security

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 4 Knowing whom you are dealing with is central to building online trust

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 5 For Trust in E-Applications, We need at least the Following Features: o Data Confidentiality Information accessed only by those authorized o Data Integrity No information added, changed, or taken out o Strong Authentication Parties are who they pretend to be o Non-repudiation Originator cannot deny origin or transaction o Infrastructure of trust Automating the checking of identities

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 6 Certificate-Based Identity Verification/Management is a Vital Technology Component for Online Trust ITU-T X A key component for establishing trust for e- applications in public networks (such as the Internet). Most B2C e-business solutions are built on HTTPS based on Server-side certificate authentication for security and trust.

Technology Framework - Digital Signature Signer’s Private Key Signed Document Encrypted Digest Hash Algorithm Digest Digital Signature techniques using encryption, message digest and digital certificates are important technology elements for online trust.

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 8 Digital Signature - Solutions Guarantees: o Data Integrity for E-Application Transactions. o Data Confidentiality when Combined with Encryption Algorithms. o Non-Replay in Combination with Content Validation (Time Stamps). o Positive Authentication of Parties. o Content Non-repudiation or Non-deniability for E-Application Transactions. (How to enforce anti-spam and data privacy laws?)

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 9 Digital Signature – Issues and Challenges o Acceptance of Digital Signatures Across Multi-Jurisdictional PKI Domains. o Adopting Policies for Generic Identity Certificates (PKI) and Attribute Certificates (PMI). o Elaborating Harmonized and Technology Neutral E-Legislative Framework and Enforcement Mechanisms. o CA-CA Inter-Domain Interoperability Across National Boundaries.

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 10 Strategy for E-Signatures and CAs Trust and Security for e-Business Needs part of a much broader and comprehensive policy framework dealing with e-applications/services

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 11 What could be the Role of Governments? o National/Regional Policies for the Management of IP Resources. Internet Protocol Addresses Domain Names (under ccTLDs) o Enabling Environment for E-Applications. Accreditation of Certification Authorities Control and Enforcement Mechanisms (e.g., Spam, Data privacy). Central Role in Generic Digital Credentials. Harmonized Regional Framework E-Legislation

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 12 Recent ITU Activities in Europe& CIS Region within the E-Strategies Programme o Sub-Regional Seminar for ICT Development for the Information Society in Uzbekistan – October o Internet Symposium for Europe and CIS States in Russia – September o E-agriculture project for a rural community in the Kyrgyz Republic – September o National Seminar for E-Business Strategies for Azerbaijan – August o E-Government projects in Bulgaria and Georgia using digital certificates, biometrics and public key infrastructure – August o Secure E-business infrastructure WTC, Turkey – Q

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 13 ITU Activities – Global View

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 14 Thank You for Your Attention For further information: Web: