Slide 1 EC-DC © 2000 - ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,

Slides:



Advertisements
Similar presentations
ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
Advertisements

© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
Global e¦security WISeWorld2000 The WISeKey Global Trusted Infrastructure By Carlos Moreira President & Cofounder WISekey.
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategy Unit ITU Telecommunication Development Bureau Seminar.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
International Telecommunication Union ITU-D Overview.
International Telecommunication Union Report on the Facilitation of WSIS Action Line C2 Document ALC2C4C6/3/03-E Emamgholi Behdad Chief of Projects and.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
3SKey 3SKey.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
© Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Head, E-Strategy Unit Telecommunication Development Bureau A Multi-Lateral.
© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 1 Building Trust and Security for E-government Dubai, United Arab.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
August 2004 Providing Industry-wide Security and Identity Management Solutions.
Lecture 23 Internet Authentication Applications
WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Juan A. Avellán Chief Legal Officer WISeKey S.A. Regulatory Considerations for the Establishment of a Global Public Key Infrastructure.
Telecommunication Development Bureau ITU and ICT Development Trieste, 9 February 2004 Hamadoun I. Touré Director BDT.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
NEW CoEs STRATEGY. CoE CoEs Network Why? Changing sector environment New capacity building responses When? WTDC-10 Resolution 73 What? New CoEs strategy.
Public Key Infrastructure Ammar Hasayen ….
© ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 ICTs – Challenges and Opportunities for Africa Alexander NTOKO Chief,
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
The Internetworked E-Business Enterprise
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Trust and Confidence for Critical E-government Services.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Internet Security for Small & Medium Business Week 6
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development SECRET 1 PRESENTATION TO THE PORTFOLIO COMMITTEE ON COMMUNICATIONS:
ITU events of relevance to IP address management discussion APNIC Community Consultation - IPv6 and ITU Chair: Masato Yamanishi.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Consumer Agenda at the International Telecommunications Union (ITU) Onica N. Makwakwa, Head Consumers International Office for Africa.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
The World Bank Working for a World Free of Poverty.
Drs. Hans Pruim Chief Business Partnerships and Information Services Small and Medium Enterprises Branch UNIDO UNIDO and TELEWORK.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
NEW CoEs STRATEGY. CoE CoEs Network Why? Changing sector environment New capacity building responses When? WTDC-10 Resolution 73 What? New CoEs strategy.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
International Telecommunication Union 8 th Arab Telecom and Internet Forum May 2006 Muscat, Oman The Role of the Private Investments in LDC ‘s Development.
BDT, Havana 8-9 February, 2011 World Telecommunication Development Conference May to 4 June 2010, Hyderabad, India Programme 1 Resolution 47 Riccardo.
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau ITU.
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
Information Society and Development Applying Information and Communication Technologies (ICT) in the Finnish development co-operation.
ICT Indicators Egypt Profile Eng. Hesham Baraka Director of Information Center (NTRA) Dr. Nagwa Elshnawy Director of Strategic Planning ( ITIDA ) Presented.
ITU Perspective: The ITU Development Sector and the Information Society Désiré Karyabwite IP Coordinator / E-STrategies International Telecommunication.
In relation to WSIS Plan of Action – Internet Governance
Public Key Infrastructure (PKI)
E-Commerce Lecture 6.
CompTIA Security+ Study Guide (SY0-401)
“Engines of Global Connectivity and Development”
E-Commerce for Developing Countries (EC-DC)
HIMSS National Conference New Orleans Convention Center
ITU Telecommunication Development Bureau (BDT)
PKI (Public Key Infrastructure)
Presentation transcript:

Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja, Nigeria September, 2000 Alexander NTOKO Project Manager, ITU Electronic Commerce ITU Telecommunication Development Bureau (BDT) Web: ITU Electronic Commerce For Developing Countries (EC-DC)

Slide 2 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. Agenda The Agenda A B2B Technology Strategy for Developing Countries Problems The Problems The Requirements The Strategy The Technology The Solutions The Framework The Status

Slide 3 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Problems Poor and Expensive ICT infrastructure E-Payment Absence of E-Security, E-Payment and E-Trust Services to Local Businesses High Access Cost for E-Business Technologies Rapidly Evolving. No Single Entity Holding All the Answers to Puzzle - Alliances Are KEY + Several Others Beyond Scope of Presentation

Slide 4 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Strategy Initially Target Business Sectors With Partners in Industrialized Countries Form Local, National and Regional Cooperatives Then Forge Alliances Strategic Partners Separate e-Payments, e-Security and e-Trust Components - Asymmetrical Shared Model To Reduce Entry Cost, Use as Much as Possible Existing Infrastructures and Services to Build Generic, Scaleable and Multi-platform Solutions

Slide 5 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Technology Public Key Infrastructure (PKIX) - The set of hardware, software, people and procedures needed to create, manage, store, distribute and revoke certificates based on public-key cryptography. Public-Key Virtual Private Networks ITU-T X.509 Digital (Identity) Certificates Software and Hardware Authentication Certification and Registration Authorities Attribute and Validation Authorities (OCSP,CLR) Multi-Platform E-Business Portal Technology

Slide 6 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. Components of PKI-based solution

Slide 7 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Solutions PKI can be used as Technology for E-business and other services in developing countries to provide: Multi-platform, generic and scalable services Generic and multi-purpose e-payments Strong security and verifiable chain of trust Asymmetrical component-based services

Slide 8 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Framework Assist in Building the E-business Infrastructure Build Local Capacity in E-business Technologies Address E-business Policy and Regulatory Issues Neutral and Non-Exclusive Alliances with Industry ITU Electronic Commerce For Developing Countries (EC-DC)

Slide 9 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. The Status Launched at the ITU WTDC in Malta - March Activities in capacity building, policies and strategies. More than $5 million already invested by industry partners. Participation of several ICT companies - Oracle, Baltimore, MCI Worldcom, NCP, Celo, ValiCert, Entegrity, Vitress, HP, Datamatics, WISeKey, Rainbow, WTC,... Service roll-out for 101 countries (25 from Africa) and more than 170 organizations scheduled for One of the largest deployment of e-business infrastructure.