Electronic Filing Systems for Campaign and Finance Reports Subcommittee Report on Security and Authentication in Filing Systems Information Network of.

Slides:



Advertisements
Similar presentations
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Safe Script CA Digital Certificate Enrollment Guide With
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Copyright © 1999, Financial Services Technology Consortium. All rights reserved. FSML and Echeck Milton M. Anderson Financial Services Technology Consortium.
What’s New, Improved or Just Maybe Different! Presented by: Lisa Huppertz, CM/ECF Coordinator.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Department of Labor HSPD-12
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Bill Maaske CIO AZ Secretary of State
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Electronic and Digital Signatures
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
DIY eTranscripts: A Guide to Building your own Electronic Transcript and Certified Document Solution Kristin Schuette Associate Registrar for Technology.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
NHS Dental Services Darren Boelema Customer Liaison Manager.
INDUSTRY FILING LETTER OF APPLICATION PAT GOULDEN AND PHIL NELSON.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
1 Welcome to GE! The attached presentation has been put together to assist you in completing your required I-9 form through the use of our I-9 wizard.
PCT-SAFE and e-Services developments Webinar September 7/
PKI interoperability and policy in the wireless world.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
New Web Portal for Digital (PKI) Submissions 1. What is PKI? PKI stands for Public Key Infrastructure For the purpose of the Federal Register, it allows.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
By Kovtunenko Inna. Payment risks Protection measures Safety rules.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
E-Government “Get your Level 2 eAuthentication!” Go to:
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
CertifiedMail …when privacy matters ™. What CertifiedMail empowers you to achieve Secure …simplified. End-to-end secure messaging From any sender.
DIGITAL SIGNATURE.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Session 64 Digital Signatures Presented by: Bob Peterson, P.E. Engineering Technology Systems.
Session 52-1 Session 52 E-Signature: Implications of the E-SIGN Legislation for Student Aid 1.
Vendor Master Record Registration To Register New or Update an Existing Supplier Registration
Creating and Using Your FSA ID: An Overview
Beavercreek High School BYOD Student Training: Wi-Fi Login and Authentication Portal.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
Creating and Using Your FSA ID: An Overview
Creating and Using Your FSA ID: An Overview
Creating and Using Your FSA ID: An Overview
Creating and Using Your FSA ID: An Overview
Welcome.
How To Create Cox New Account?
Registration for Atrezzo Connect Provider Portal
Creating and Using Your FSA ID: An Overview
Registration for Atrezzo Connect Provider Portal
Creating and Using Your FSA ID: An Overview
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
U.S. CUSTOMS AND BORDER PROTECTION OFFICE OF TRADE
Employee Self-Service (ESS) Portal
Presentation transcript:

Electronic Filing Systems for Campaign and Finance Reports Subcommittee Report on Security and Authentication in Filing Systems Information Network of Arkansas Bob Sanders, General Manager Karl Hills, Director of Technology Blain Purtle, Security Analyst

Topics How user authentication works Risks and mitigation strategies Approaches in other states

The Filing Process: Paper

Notaries provide user validation in paper filing

The Filing Process: Electronic

Types of keys: Login & password Two-factor authentication PIN code Digital certificate / PKI

The Filing Process: Electronic The Key: Grants access Uniquely tied to the filer Logs access and actions taken

The Filing Process: Electronic User Validation is critical: Notary or in-person issuance Mailed form Wet signature

The Filing Process: Electronic

IP Address: Browser signature:

The Filing Process: Electronic notice / receipt

The Arkansas Electronic Records and Signatures Act “Electronic signature” means an electronic or digital method executed or adopted by a party with the intent to be bound by or to authenticate a record, which is unique to the person using it, is capable of verification, is under the sole control of the person using it, and is linked to data in such a manner that if the data are changed the electronic signature is invalidated. Act 718 of 1999

Risks & Strategies RiskMitigation Strategy Bad actor impersonates a filer at issuance State is the gate keeper Notary or in-person issuance Key is lost/stolen/compromised End-to-end encryption Password complexity Rotation schedule Two-factor (SMS, other) System is compromised; polluted with fraudulent data Already a risk with paper systems Notification to filer for any change Electronic forensics to aid investigation Immutable logs Notification settings are changed or disabled. State is the gate keeper Re-validate when changing notification or address settings.

Approaches in Other States Michigan: Signature form. Follows Federal rules. Tennessee: Signature form. Rhode Island: System generates paper filing which is then submitted with electronic filing. Indiana: Signature form. South Carolina: Signature and SSN required 98,000 filings over 9 years. No reports of fraud.

Questions