We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySeth Garza
Modified over 2 years ago
© Siemens NV/SA, October 2004 Communications Network and Information Security Report ICTSB/NISSG Stefan Goeman
© Siemens NV/SA, October 2004 Communications Background Existing NIS-Report from 2003 The new EU Report Communication form the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions: A strategy for a Secure Information Society – Dialog, partnership and empowerment A lot of new developments in Network and Information Security
© Siemens NV/SA, October 2004 Communications My Expertise Each member of the team has some specific expertise. In my case, this is: ICT Industry, Telecom, ISP Authentication protocols Web Service Security Identity Management E-government Belgium eID card Digital Rights Management
© Siemens NV/SA, October 2004 Communications ICT Industry, Telecom and ISPs Web Services Security (WS-Sec): E-buisiness environment is based on Web Services. Therefore security for web services is necessary (i.e. securing SOAP messages end-to-end) The following specifications make up WS-Sec 1.1 OASIS standard: WS-Security Core Specification 1.1 Username Token Profile 1.1 X.509 Token Profile 1.1 SAML Token Profile 1.1 Kerberos Token Profile 1.1 Rights Expression Language (REL) Token Profile 1.1 SOAP with Attachments (SWA) Profile 1.1 SOAP: SIMPLE Object Access Protocol
© Siemens NV/SA, October 2004 Communications ICT Industry, Telecom and ISPs IETF is an important contributor to security standardization. With respect to network security, following specifications are important, and included in the report: IPsec protocol suite: (IETF IPsec work group is concluded) RFC4301: Security architecture for the Internet Protocol. RFC4302: Authentication Header security protocol. RFC4303: Encapsulating Security Payload protocol. RFC4306: The Internet Key Exchange (IKEv2) protocol. … TLS protocol suite: RFC4346: The Transport Layer Security (TLS) Protocol Version 1.1 RFC4366: Transport Layer Security (TLS) Extensions RFC4492: ECC Cipher Suites for Transport Layer Security (TLS) RFC4279: pre-Shared Key Ciphersuites for TLS … Protocols for securing the infrastructure: DNS security, ENUM security, security of routing protocols (BGP, OSPF)
© Siemens NV/SA, October 2004 Communications Identity (and Privacy) Management Form an end-users point of view, identity and privacy management is (becoming) very important! Two initiatives: Industry for a, not really standardization bodies. Rely on other standards Liberty Alliance Project: Industry forum defining specifications in the area of identity management (single-sign-on, privacy management via pseudonyms, … ) and Identity based web services Based on Web Services specifications: The web services specifications are more loosely coupled, but it is possible to realize identity management based on specifications like: WS-Federation Currently not included in the report SAML: Security Assertion Markup Language
© Siemens NV/SA, October 2004 Communications E-government Belgium eID card PKI-based solution: eID card contains 2 certificates. E-government applications: Request official documents via the Internet (birth certificate, …) Fill in and sign your tax form. Access to your own personal information (https://www.mijndossier.rrn.fgov.be)https://www.mijndossier.rrn.fgov.be Will replace the electronic health insurance card (SIS card) … Other applications (not related to e-government): Secure chat boxes Libraries Hotel room reservation … Currently not yet included in the report
© Siemens NV/SA, October 2004 Communications Digital Rights Management Currently not in scope of new NIS-Report Many proprietary systems available (Apple iTunes, Windows Media DRM, …) and only few standards available: OMA DRM v1 and v2 In general DRM system all do more or less the same thing. The differences lie in details like content formats and rights expression languages OMA: Open Mobile Alliance
© Siemens NV/SA, October 2004 Communications Contributions to the report Providing the context for security for Next Generation Networks Evolution from SS7 based telco systems (closed systems) to VoIP (SIP-based) telco systems (more open systems) Providing an update of section 9.4 on Network Encryption: Updates on IPsec Updates on TLS Inclusion of Web Services Security
Network and Information Security Report – ICTSB/NISSG Dr. Angelika Plate.
Internet Protocol Security (IP Sec). Securing Intranets and Extranets at all levels.
CEN/ETSI NISSG Project Network & Information Security Public Consultation 28 th June 2006 Ted Humphreys (Team Leader)
Copyright © 2003 Jorgen Thelin / Cape Clear Software Identity, Security and XML Web Services Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Services and Identity Management Prof. Sasu Tarkoma.
ITU-TSG16 ITU-T Standardization Seminar – Madrid, December 2002 H.323 and some Security-related issues – a presentation in two parts Simão Ferraz.
(2-Tier) (n-Tier) (Component) (Business Components)
Analysing and testing - ETSI initiatives on analysing and testing interoperability in Grids Julian Gallop ETSI Specialist Task Force 331 on ICT Grid Interoperability.
Copyright OASIS, 2001 OASIS Recent Technical Developments John Borras Office of e-Envoy Cabinet Office UK Government June 2003.
GSC: Standardization Advancing Global Communications Telecommunication Security Herbert Bertine Chairman, ITU-T SG 17 SOURCE:ITU-T TITLE:ITU-T Security.
Telecommunication Security Herbert Bertine Chairman, ITU-T Study Group 17 SOURCE:ITU-T TITLE:Telecommunication Security AGENDA ITEM: CONTACT: [Insert Document.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
ICANN meetings, June Status Report on PSO Protocol Council Activities Actions and Decisions for the November 2001 – June 2002 period Azucena.
OGSA Security Profile 2.0 (a.k.a. Express Authentication Profile) DUANE MERRILL October 18, 2007.
Meeting Etiquette Please announce your name each time prior to making comments or suggestions during the call Remember: If you are not speaking keep your.
Active Directory Federation Services How does it really work? John Craddock
Co-operation and promotion of Information Resources in Science and Technology Beijing Oct Norman Paskin DOI SYSTEM AND ITS APPLICATIONS International.
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Internet Evolution, Governance and the Digital Object Architecture Workshop on SCORM Sequencing and Navigation Gaithersburg, Maryland February 23, 2005.
RESEARCH AREAS IN ICT Saif Bin Ghelaita Director of Technologies & Standards TRA UAE.
Enabling Interoperable Secure Web Services Bret Hartman, DataPower Technology July, 2004.
11-Feb-14HL7 Working Group Meeting – October 2002 XML Web Services Standards Roberto Ruggeri Healthcare Technical Strategist Microsoft.
Grid Security Alvaro Arenas e-Science Centre, RAL, UK CoreGRID Summer School 2006.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 4: There’s more to it than RACF.
The eHealth platform as a secure and efficient data transfer tool in the health sector Frank Robben General manager eHealth platform Sint-Pieterssteenweg.
Med-e-Tel, April 2 nd, 2009 CEN ISSS eEHIC CWA Pantelis Angelidis – on behalf of the CEN/ISSS/WS & PT.
© 2016 SlidePlayer.com Inc. All rights reserved.