As Developing Countries work on their policies, strategies, legislation and infrastructure deployment,

advertisement
13th Subregional Telecommunication Meeting
for Cambodia, Lao P.D.R, Myanmar and
Vietnam
Yangon, 4-6 October 2006
Addressing Challenges to the
Information Society
Building Trust and Security
Alexander NTOKO
Chief, E-Strategies
ITU Telecommunication Development Bureau (BDT)
! "
#
$!
Agenda
As Developing Countries
work on their policies,
strategies, legislation and
infrastructure deployment,
security and trust must be
part of the initial design
stages …
! "
#
$!
A Transaction-based E-government Infrastructure
But how do we get governments, businesses and citizens
to conduct critical government transactions online?
1. Threats
2. Framework
3. Strategies
4. ICTs @Work
5. CA Challenges
! "
#
$!
! "
#
$!
As many countries embark on the e-government
bandwagon, governments, citizens and businesses are
asking many questions – Can we trust these systems?
• Receiving online submissions to renew
national identity cards:
G: Am I dealing with the owner of the identity card?
C: How do I know this is really a government site?
• Submitting confidential bids for government
procurements:
G: Is the bid from a registered company?
B: Can my competitors see my bid?
• Transmitting sensitive government documents
online.
G: Can an unauthorized person view the document?
G: How can access control be ensured?
! "
#
$!
• Issuing birth certificates and land certificates
via the Internet:
G: Can a citizen modify his or her date of birth?
G: What if she changes the size of her land or uses this
to make another land certificate?
• Conducting online elections via the Internet –
e-voting:
C: Can someone know whom I voted for?
G: How do we guarantee that a citizen votes only
once?
G: Is this vote from a registered voter?
! "
#
$!
Overview of the challenges
Unsolicited Communications
Online Fraud
Unauthorized Access to Information
Destruction of Critical Information
Identity Theft
Invasion of Privacy
Some Challenges
to Users
! "
#
$!
! "
#
$!
AGENDA
MALWARE
PHISING
SPAM
TRENDS
! "
MALWARE
#
$!
! "
Viruses
o
$!
Viruses
Are Viruses new? The Brain Virus.
What is a virus?
o
#
o
Virus (n.) Code written with the express intention of
replicating itself. A virus attempts to spread from
computer to computer by attaching itself to a host
program. It may damage hardware, software, or
information.
Just as human viruses range in severity from Ebola
to the 24-hour flu, computer viruses range from the
mildly annoying to the downright destructive. The
good news is that a true virus does not spread
without human action to move it along, such as
sharing a file or sending an e-mail.
! "
#
$!
The first computer virus for Microsoft DOS was
apparently written in 1986 and contains unencrypted
text with the name, address, and telephone number
of Brain Computer Services, a store in Lahore,
Pakistan. This virus infected the boot sector of
5¼ inch floppy diskettes with a 360 kilo byte
capacity. Robert Slade, an expert on computer
viruses, believes the Brain virus was written as a
form of advertising for the store in Pakistan.
A variant of the Brain virus was discovered at the
University of Delaware in the USA during Oct 1987
where the virus destroyed the ability to read the
draft of at least one graduate student's thesis.
! "
#
$!
Worms
What is a worm?
o
o
Trojans
What is a Trojan?
Worm (n.) A subclass of virus. A worm
generally spreads without user action and
distributes complete copies (possibly
modified) of itself across networks. A worm
can consume memory or network bandwidth,
thus causing a computer to stop responding.
Because worms don't need to travel via a
"host" program or file, they can also tunnel
into your system and allow somebody else to
take control of your computer remotely.
Recent examples of worms included the
Sasser worm and the Blaster worm.
! "
#
o
o
o
Remember the Trojan horse appeared to be a
gift, but turned out to contain Greek soldiers
who overtook the city of Troy.
Trojan (n): A computer programs that
appear to be useful software, but instead
compromises your security and cause a lot of
damage.
A recent Trojan came in the form of an email message that included attachments
claiming to be Microsoft security updates,
but turned out to be viruses that attempted to
disable antivirus and firewall software.
$!
! "
#
$!
! "
#
$!
How do worms and other viruses spread?
By Executing the Code.
Virtually all viruses and many worms
cannot spread unless you open or run
an infected program.
o Many of the most dangerous viruses
were primarily spread through e-mail
attachments—the files that are sent
along with an e-mail message.
o The virus is launched when you open
the file attachment (usually by doubleclicking the attachment icon).
o
! "
#
PHISING
$!
Phishing
What is Phishing?
o
o
o
o
Phishing (also called brand spoofing or carding)
is a technique for acquiring your personal
information and subsequently committing fraud
in your name, including stealing your identity.
About 10 years old but attacks are increasing
more sophisticated.
It's a form of cyber-crime growing faster than
the ability of the police or courts to deal with it.
"phishing" originated from the word “fishing”.
Like in real fishing, scammers lure victims
using baits to divulge information that is used
for fraudulent purposes.
! "
#
$!
Phishing
How is phishing perpetrated?
o
o
o
Authentic-looking - In a typical phishing attempt,
you will receive an authentic-looking email message
that appears to come from a legitimate business.
Mostly via Email - The majority of phishing
currently is conducted by email, but it is also possible
for you to be phished by mail, telephone or even in
person.
But spreading to other applications - Instant
Messaging -The latest and most rapidly growing
threat is through the use of Instant Messaging (IM),
which can also be used for identity theft as well as
spreading viruses and spyware.
! "
#
$!
Phishing
Who perpetrates it?
Phishers are scam artists. They send out
millions of emails, realizing that even if only
a few recipients give them enough
identifying information, they can profit from
the resulting fraud.
Who is affected by phishing?
o Popular targets are users of online banking
services and auction sites. Any Internet
Users who’s email has been made availeable
on any public forum. But it does not end
there..
o
! "
#
$!
What is SPAM?
Unsolicited e-mail.
o Unsolicited e-mail, often of a commercial
nature, sent indiscriminately to multiple
mailing lists, individuals, or newsgroups;
junk e-mail.
o To indiscriminately send unsolicited,
unwanted, irrelevant, or inappropriate
messages, especially commercial advertising
in mass quantities. Noun: electronic "junk
mail".
o
! "
#
SPAM
! "
#
$!
Some methods used by Spammers
The battle for combating spam is an ongoing
one with an increasingly sophisticated level of
finding ways to send unsolicited messages to
recipients worldwide. Some of the common
spammer tactics include:
• Dictionary attacks
• Email and DNS Spoofing
• Social Engineering and Urban legends/Hoaxes
• Message Board and Chat Room Mining
• Open Proxies and Mail Relaying
• Chain Letters
• Always-On Broadband connections
$!
! "
#
$!
! "
#
$!
SPAM – Constantly Evolving
TRENDS
Spam is not only growing, but is evolving to
become broader threat to Internet security
! "
#
$!
General TRENDS
General TRENDS
Increasing and becoming more malicious
Exploiting Current Fears and Events
Spammers exploit bird flu fears
through offers for online purchases
of Tamiflu the only know medicine
that deals with the human version of
the avian flu.
Victims of Katrina also experienced
an increase in identity theft
! "
#
$!
Number of Attacks – Reports show increasing
number of new viruses and variants. A global
pandemic.
Nature of Attacks - This indicates a trend
toward more malicious use of such software by
criminals.
Use of Spy ware for ID Theft - Growing % of
Spyware now reported to be aimed at stealing
identity.
Adapting to Security Strategies - Worms that
exploit security strategies based on
"impenetrable firewall" and e-mail filtering to
protect an otherwise insecure internal network.
! "
#
$!
General TRENDS
As it expands to other platforms, it’s more difficult to detect
Expansion to Mobile - New type of phishing could hit
mobile phone users. Mophophishing is where hackers
send out fake banking applications to unsuspecting
mobile phone users. The users then type their account
details into the application thinking they were accessing
their accounts when they were actually sending their
personal details back to the hacker.
Difficulties in Spotting Attacks - Spotting a phishing
email is relatively straightforward, the user need only
examine the source code of an HTML email and inspect
the domain name and path of any link to verify its
authenticity.
! "
#
Not specific to a Particular OS.
Not limited to any Platform
Affects services across all Sectors
Knows No Geographical or Time barriers
More and more Sophisticated
Everyone is Concerned and Affected
They are all Related
$!
! "
e-security threats… Spam, Phishing etc
o
The battle for combating spam is an ongoing
one with an increasingly sophisticated level of
finding ways to send unsolicited messages to
recipients worldwide. Some of the common
spammer tactics include:
1.
2.
3.
4.
5.
6.
7.
Dictionary attacks
Email and DNS Spoofing
Social Engineering
Message Board and Chat Room Mining
Open Proxies and Mail Relaying
Chain Letters
Random Strings of Text and characters
! "
$!
$!
e-security threats…Spam, Phishing etc
o
o
o
#
#
Reliance on filters using databases of known
spammers, string processing of email headers, reverse
look-ups and similar solutions will not scale as
spammers will continue to look for and find backdoor solutions through the refinement of their tactics.
Spam does not only cause loss of revenue and time
for email recipients and companies but also reduces
trust and confidence in email transactions.
One element common to spam is that spammers try to
hide their identities using some of the tactics already
enumerated above. The issue of establishing the
identities of parties to email transactions should be a
key component of any strategy aimed at combating
spam and enforcing anti-spam and cyber crime
legislation.
! "
#
$!
Knowing whom you are dealing with…
Having firm integrity in something or somebody
e-security threats… Spam, Phishing etc
•
An entity A, can be said to trust another entity B when A makes
the assumption that B will behave exactly as A expects.
"One of the core problems with spam is
we don'
t know, Yahoo doesn'
t know, the
user doesn'
t know ... if it really came
from the party who it says it came from,"
Brad Garlinghouse, vice president for
communication products at Yahoo, said.
"What we'
re proposing here is to reengineer the way the Internet works with
regard to the authentication of e-mail."
In addition to privacy, security and policies, knowing
whom you are dealing with is vital for building trust.
! "
#
$!
What TRUST is NOT
! "
#
$!
Technology Framework for Trust and Security
Five (5) Key Requirements – The big 5!
This list is NOT exhaustive and but constitutes vital elements for trust.
o
o
o
o
o
Not transitive (cannot be passed from
person to person)
Not distributive (cannot be shared)
Not associative (cannot be linked to
another trust or added together)
Not symmetric (I trust you does not
equal you trust me)
Not self-declared (trust me – why?)
Data Confidentiality
o
•
•
#
No information added, changed, or taken out.
Strong Authentication
o
•
Parties are who they pretend to be.
Non-repudiation
o
•
Originator cannot deny origin or transaction.
Infrastructure of trust
o
•
! "
Information accessed only by those authorized.
Data Integrity
o
Automating the verification of digital credentials.
$!
How can we enhance security and trust?
! "
#
$!
Technology Framework for Trust and Security
Symmetric Encryption - Data Confidentiality
Confidentiality
Encryption
Who am I dealing with?
Authentication
Message integrity
Message Digest
Non-repudiation
Digital Signature
Third party evidence of authenticity
Certificate
Trusted certificate
Certification Authorities
)
*
) +% ,
!
/
! "
#
$!
! "#$$
-
!
%& '
(
*
.
Technology Framework for Trust and Security
Digital Envelope – Data Confidentiality
Technology Framework for Trust and Security
Public Key Encryption System – Data Confidentiality
4
3
0 12)
3
0 1 !
“ *
!
3
12)
3
Combines the high speed of symmetric encryption (e.g., AES
Rijndael) and the key management convenience of public key
encryption encryption. Includes PSE (Smartcards, Mega-brid, USB
tokens), biometrics, Hardware Security Modules etc
Technology Framework for Trust and Security
Digital Signature – Non-Repudiation
Technology Framework for Trust and Security
Message Digest – Data Integrity
*
160, 256, 384 or 512 bit
representation (thumb
print) of document
5
.
*
”
’
Each user has 2 keys: what one key encrypts,
only the other key in the pair can decrypt.
Public key can be sent in the open.
Private key is never transmitted or shared.
0 1 !
3
.
• Used to determine if document has changed.
• Currently based on FIPS 180-2 approved algorithms
(SHA-1, SHA-256, SHA-384 and SHA-512).
• Produces 160, 256, 284 or 512 bit “digests”.
• Infeasible to produce a document matching a digest
• A one bit change in the document affects about half the
bits in the digest.
Verifying the Digital Signature
for Authentication and Integrity
5
*
*
.
*
.
*
2
Combines Hash Algorithms (FIPS-180), Key Exchange,
Public Key Encryption to provide Data integrity, Nonrepudiation and Certificate-based Authentication. Digital
credentials are established using ITU-T X.509 Digital
Certificate Standard based on FIPS 186-x standards.
Digital Signature
Guarantees:
o Integrity of document
One bit change in document changes the digest
o
Authentication of sender
o
Non-repudiation
Signer’s public key decrypts digest sent and
decrypted digest matches computed digest
Only signer’s private key can encrypt digest that
is decrypted by his/her public key and matches
the computed digest. Non-repudiation
prevents reneging on an agreement by
denying a transaction.
! "
#
$!
Technology Framework for Trust and Security
Digital Certificates - Establishing Digital Credentials
Industry Solutions for Online Trust and Security
ITU-T X.509 creates the framework for establishing digital
identities – A key component for establishing security and trust for
ICT applications in public networks (such as the Internet)
! "
#
$!
! "
#
$!
#
$!
Public Key Infrastructure (PKI)
and Industry Solutions for Security & Trust
It’s Not about waging a technology war (PKI vs Non-PKI) but
combining technologies and policies for total solutions.
o Combines various industry solutions and standards – PKCS,
PSE (Smart Cards, tokens, Megabrid), OCSP Transponders,
HSMs, CA, RA and Content Validation Software.
o Enables security and trust to be built on comprehensive and
interoperable solutions with appropriate policies ensuring
national sovereignty and enforceable legislation.
o Most highly rated e-government countries have PKI as an
important component of their e-government strategy.
o
! "
#
$!
ICTs@Work:e-government
E-government Project in
Bosnia & Herzegovina.
Other operational projects have
been implemented in countries
in Latin America, Asia and
Europe.
ICTs@Work
! "
Cybersecurity - Solutions implemented in projects:
Certificate-based authentication using ITU-T X.509 V.3
o
Using ICTs to increase
efficiency and enhance
business processes.
o
Addressed rather
complex needs in
business flow-processes
(e.g., license issuing,
work-flow automation
and information
processing).
o
Implemented using
local expertise and the
strong commitment of
CRA management and
technical Team.
! "
#
$!
ITU-T X.509 creates the framework for establishing digital
identities – A key component for establishing security and trust for
ICT applications in public networks (such as the Internet)
! "
#
$!
Cybersecurity - Solutions implemented in projects:
Automating identity verification and management
CA-2
Root
CA-1
RA
RA
Certification
Authority
(A)
Certification
Authority
(B)
[Certificate]
Valid
Revok
ed
(CRL)
Certificate Request
Registration
Authority
Registration
Authority
Registration
Authority
Registration
Authority
Certificate Request
o
PKI including Certificate Authority, Registration Authorities
and related policies and procedures (CPS and CP) for
identity verification and management taking into account
national policies and national sovereignty issues.
! "
#
$!
Cybersecurity - Sample Project – Georgia
Securing communication within government networks
Challenge: Government of Georgia
embarks on a project to convert paper
documents (including restricted ones)
into digital format to facilitate
dissemination of government
information to citizens. Senior officials
plan to electronically sign official
correspondences. How can access to
these documents be controlled? How is
the integrity of these official electronic
correspondences ensured?
Solution: Implementation of public key infrastructure providing strong
certificate-based authentication including fingerprint biometrics, data integrity
using FIPS-approved digest algorithms, e-signature and data confidentiality
based on both public key and symmetric encryption. Solutions built on
existing infrastructure to ensure seamless integration. Funding and
implementation by ITU.
! "
#
$!
Cybersecurity -Sample Project – Bulgaria
Building Security and Confidence in Government Services
Challenge: Securing communication
between government officials and
providing security for IP-based
interconnection of three (3) government
agencies. Main cyber security challenges
included providing solutions for
authentication, data integrity, data
confidentiality and non-repudiation.
Solution: Now in its third phase, Phase I provided solutions for
certificate-based authentication of government officials,
confidentiality in the transmission of sensitive documents and nonrepudiation through e-signatures. In Phase II three government,
agencies were interconnected using PKI-enabled Virtual Private
Networks as a cost-efficient way to use the Internet for sensitive egovernment services. Project funding and coordinating the design and
implementation was provided by ITU/BDT. Phases I and II are
operational and Phase III is expected to be operational in Q2 2005
! "
#
$!
ICTs@Work:e-Trust
• Global
Asymmetrical
Trust Model and
technology
strategy based on
Public Key
Infrastructure
(PKI), Privilege
Management
Infrastructure and
related PMI and
PKI-enabled
applications.
! "
#
$!
Cybersecurity - Sample Project – Paraguay
Securing the transmission of sensitive documents
Challenge: Clients of CONATEL
needed secure IT solutions to transmit
confidential data (reports) to
CONATEL. To address this
requirements, the solutions should
ensure the integrity of data, preserve
the confidential nature of the
documents, ensure that both sender and
receiver are certain of the identities of
each other.
Solution: After a careful assessment of the security and trust requirements and
discussions with the management and IT professionals of CONATEL,
ITU/BDT assisted in the design and development of a public key infrastructure
providing solutions for identity management, non-repudiation, data integrity
and strong encryption. Technology components including digital signature,
biometric authentication, cryptographic token interfaces were built on the
existing infrastructure for a seamless integration. Funded and implemented by
ITU/BDT this project has increased the efficiency in the business processes of
CONATEL and provides security and trust solutions for communicating with it
clients (operators and service providers).
! "
#
$!
Cybersecurity - Sample Project –Turkey
Building security and trust for the Health Sector
Challenge: 81 provinces, 90,000 doctors, 1200 hospitals and 70+ million
inhabitants to be connected through an ICTs health platform as part of
national the health transformation project. In addition to several other
technological, policy, regulatory and institutional challenges, there are
security and trust issues to be addressed. e.g., Transmission of sensitive
medical records, authenticating doctors, patients, healthcare professionals and
institutions, ensuring patient-doctor confidentiality, integrity, privacy and
ownership of EPRs and protecting critical infrastructure and data.
Solution (First Phase): Secure health information system enabling citizens,
medical institutions, health insurance and health care professionals
participating in Phase I to use information technologies to store, access and
disseminate sensitive health data national wide. Funding is provided by
Government of Turkey. Launched at WSIS I, ITU is providing expertise for
the coordination and implementation.
! "
#
$!
ICTs@Work:e-government
ICTs@Work:e-business
o
Assisting countries in the design, development
and implementation of e-business solutions.
o
Operational projects in Africa, Asia, Europe,
Latin America and Arab Region.
Increasing government transparency, enabling transaction-based egovernment services, secure document transmission between
government agencies, online payment based on e-currency for
government services, PKI-based e-signatures and digital
certification. Implemented by ITU and funded by European
Community and ITU.
! "
#
$!
ICTs@Work:e-payment
Assisting in the design, development and
implementation of infrastructure for credit
card-based e-payments solutions for ecommerce and e-government transactions.
o
Projects implemented in countries such as
Brazil, Morocco (US$2,5 million), South
Africa and Venezuela.
! "
#
$!
o
Providing a forum for
exchanging best practices
in the implementation of ehealth projects.
o
Developing guidelines and
elaborating strategies at
global level in fostering ehealth services.
o
Working with industry
partners, international
organizations (WHO, ESA)
and governments to assist
developing countries in ehealth projects.
ITU Experts Meeting on E-heath – June 2004 Tokai University, Japan
$!
ICTs@Work:e-medicine
o
#
ICTs@Work:e-health
o
o
! "
! "
#
$!
ICTs@Work:e-education
Using ICTs to bring
access to medical
services such as remote
diagnostics and teleradiology.
Interconnecting
ambulatory services in
two remote areas in
Venezuela and enabling
access to medical
specialist located in the
capital city (Caracas).
ITU's e-health activities include the implementation of telemedicine projects in several countries
including Mozambique, Malta, Nicaragua, Georgia, Myanmar, Senegal, Bhutan, Uganda and Ukraine.
There are ongoing and planned projects for several countries such as Cameroon, Ethiopia, Kenya,
Haiti, Rwanda, Venezuela, Sudan, Turkey, Mauritania, Bulgaria, Zimbabwe, Guinea, Lebanon,
Tajikistan, Uzbekistan and Latvia.
! "
#
$!
I n t e rn e t@ Sc h o o l s P ro je c t in
Toumboucktu, Mali providing
Internet access to more than 700
students in a very remote areas 1000
km from the capital city (Bamako).
Ongoin g project in Senegal
launched in June 2005.
o
Enabling youths to
access a wide
range of
information via the
Internet.
o
Enhancing
knowledgebuilding and
ensuring active
participation of
youths in the
information
society.
! "
#
$!
ICTs@Work:e-agriculture
ICTs@Work:e-environment
o
Using ICTs applications
and infrastructure to
enhance agricultural
activities in Madaniyat
village in rural
Kyrgyzstan.
o
Providing solutions to
access information on
better farming methods
and up-to-date
information on the price
of produce and business
partners.
! "
#
ITU e-employment
and e-business project
for the association of
business entrepreneurs
in Africa (ASAFE).
As a supporting
organization for the
industry-led Global eSustainability Initiative
(GeSI), undertaking
activities with UNEP
aimed at addressing the
environmental effects of
telecom and ICTs.
Global e-Sustainability o Working with Member
Initiative Supply Chain
States to develop
Working Group
strategies on the use of
Benchmarking Report
telecommunications and
ICTs for the protection of
the environment.
$!
ICTs@Work:e-employment
o
o
! "
#
$!
ICTs@Work: Connecting Island Communities
o
Enabling African
business women and
youths in Cameroon to
use ICTs for eemployment.
o
Improving social
conditions by
increasing income
through the
provisioning of ICTenabled remunerated
remote translation and
document processing
services.
o
Establishing shared
access to rural and remote
communities in Pacific
Island States.
o
In June 2005 launched a
project to implement 20
Multi-Purpose
Community Centers in
Solomon Islands and
Western Samoa.
o
Providing Internet Access
(Email and Web) + ecommerce, e-agriculture
and e-government
solutions to rural
population.
With Prime Minister of Western Samoa
at Launch of Project – June 2005
Map of Guarda Canal Province, Solomon
Islands showing locations for MCTs
! "
#
$!
Legislative Framework for ICTs
#
$!
National and Regional Policies
o
Assisting Member
States in establishing
harmonized elegislation for 4 Latin
American States
(ASETA).
o
Providing assistance
to individual states
(Burkina Faso, Cape
Verde, Mauritania,
Mongolia and
Tanzania) to
elaborate national
legislation on ICTs.
! "
! "
#
$!
o
Bringing together
Member States to
address regional
policies and strategies
for ICTs (eapplications, Internet
and e-Security) (e.g., IP
Symposia for Africa,
Americas, Asia Pacific,
and Europe and Arab
Region leading to
Kigali and Moscow and
Dubai Declarations
ITU E-government and IP Symposium for 22 Arab
States in Dubai (UAE) – 22-25 November 2004
! "
#
$!
Cross Certification
Certificate
Authority
Challenges
! "
#
o
A CA issues a certificate to another CA. This
is applied to Strict Hierarchy (Root CAs)
o
Establishment of Trust Relationship between
CAs (Chain of Trust).
o
Could result in Trust Cascades (A>B and B>C
should not imply A>C).
o
Trust relationship could be Mutual
(Horizontal Trust relationship) or Unilateral
(Vertical Trust relationship – Root CAs).
$!
! "
#
$!
Bridge Certificate Authority
Cross Recognition
A CA acts as a bridge between CAs in
different PKI domains.
o Each CA establishes a Trust Relationship
with the Bridge CA.
o The absence of direct relationships
between CAs avoids overheads related to
the establishment of direct trust
relationships between co-operating CAs.
o
No trust relationship on cross certification
between CAs.
o
Requires a mutually trusted and recognized
third party.
o
CA-CA Interoperability is achieved through
the licensing or auditing by a mutually
agreed authority.
o
! "
#
$!
Accreditation Certificate
! "
#
$!
Certificate Policy – Plays an important role
in the implementation of some of these initiatives
o
A combination of cross-certification and cross
recognition.
o
Involves the creation of an accreditation CA.
o
Public Key of each CA is signed by accreditation CA.
o
Used in Australia in the Gatekeeper Accreditation CA.
o
Requires high level government structure and control
to create hierarchy (e.g., government-wide PKI).
! "
#
o
$!
Certificate Policy (CP) – A Named set of
rules that indicate the applicability of a
certificate to a particular community
and/or class of applications of common
security requirements.
! "
#
$!
ITU-T X509: CA-CA Policy Interoperability
Policy Mappings Extension
Allows a certification authority to indicate
that certain policies in its own domain can
be considered equivalent to certain other
policies in the subject certification
authority's domain.
! "
#
o
o
#
National/Regional Policies for the
Management of Public IP Resources to
ensure fair and equitable allocation of.
• Internet Protocol Addresses
• Domain Names (under ccTLDs)
Creating an Enabling Environment for EApplications (e.g.,):
• Accreditation of Certification Authorities
• Control and Enforcement Mechanisms (Spam,
Spim, P/Vhishing and Data privacy legislations).
• Harmonized Regional Framework E-Legislation
o
#
$!
Strategy for E-Signatures and CAs
Online Trust and Security for e-Government Needs to be part of a
comprehensive policy framework dealing with other e-services
$!
What could be the Role of Governments in
fostering e-government deployment and use?
o
! "
Acceptance of Digital Signatures Across MultiJurisdictional PKI Domains (at the National,
Regional and Global Levels).
Adopting Policies for Generic Identity
Certificates (PKI) and the relationship with
Attribute Certificates (Privilege Management
Infrastructures).
Elaborating Harmonized and Technology
Neutral E-Legislative Framework and
Enforcement Mechanisms.
! "
o
Policy Constraints extension
Ability for a certification authority to
require that explicit certificate policy
indications be present in all subsequent
certificates in a certification path.
Ability for a certification authority to
disable policy mapping by subsequent
certification authorities in a certification
path.
$!
Building Online Trust For E-Government
Digital Signature – Issues and Challenges
o
ITU-T X.509: Preventing Trust Cascades
Active Role in Implementing e-government.
! "
#
$!
! "
#
$!
ITU Development Activities in E-government
Activities undertaken within the past three years.
o
o
o
o
o
o
Projects using trust technologies (encryption, digital
certificates, biometrics, smart cards/USB tokens)
implemented in Bulgaria, Burkina Faso, Cambodia,
Cameroon, Ecuador, Georgia, Paraguay, Peru, Senegal,
Turkey, Vietnam and Zambia.
Ongoing Projects in Barbados, Bhutan, Kyrgyz
Republic, Jamaica and Rwanda.
Workshops/Seminars on technology policies in Africa,
Asia, Arab Region, Latin America and World.
Assistance to ASETA, Burkina Faso, Cape Verde and
Mongolia to elaborate legislation for e-signatures.
Policy analysis, guidelines and best practices.
Multi-lateral and self-regulatory framework launched World e-Trust Memorandum of Understanding.
! "
#
$!
ITU WTDC E-Strategies Programme
An Overview of Related Projects and Activities
CONCLUSION
For ICT applications to deliver services aimed at
reducing the social divide, enhancing basic
services in health, educational, commercial and
government sectors, citizens, governments and
businesses must all have TRUST in the
technologies and the solutions.
Thank You
for your attention
For further information:
Web: http://www.itu.int/ITU-D/e-strategy
Email: e-strategy@itu.int
! "
#
$!
! "
#
$!
Download