ETSI Security activities Charles Brookson Chairman OCG Security Source: ETSI GTSC-1 Agenda item 7.1.6 For: Information GSC-8 060.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
1 Why ETSI is the place to bridge EU and LA initiatives on e-administration Francisco Da Silva Chairman of the Kick Off Meeting Sophia Antipolis,
Fostering worldwide interoperabilityGeneva, July 2009 Overview of Security work in ETSI Presenter: Mike Sharpe, VP ETSI ESP Source: Charles Brookson,
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GTSC-9 Summary Glenn Parsons, GTSC-9 Chair, ISACC Document No: GSC16-CL-04 Source: GTSC-9 Contact:
UIC ERTMS World Conference Istanbul, 2 April 2014 Robert Sarfati – SYSTRA UIC Operators Group Chairman GSM-R is becoming IP ready Robert SARFATI Operators’
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
Geneva, Switzerland, September 2014 ETSI TC Cyber Charles Brookson Chairman ETSI TC Cyber Zeata Security Ltd and Azenby Ltd ITU.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
UIC ERTMS Conference, Istanbul Apr 2014 Evolution of the Railways Communication System Developments on the Succession of GSM-R Piero Petruccioli.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Progress of CCSA’s Standardization Activities Hequan WU, Chairman of the Council CCSA Document.
World Class Standards © ETSI 2007 All rights reserved ETSI Tomorrow’s World Today.
Security and LI; ETSI’s role in standards
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
Mike McCurry Health Market Development An Introduction to Monad in Healthcare.
Jeju, 13 – 16 May 2013Standards for Shared ICT Cybersecurity Activities in ETSI Presenter: Adrian Scrase ETSI Chief Technical Officer (CTO) Document No:
1 Secure User Plane Location Ileana Leuca Director Technology Architecture & Standards.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Chapter 4 Application Level Security in Cellular Networks.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Security activities in ETSI Presenter: Mike Sharpe, ETSI VP ESP (ETSI Standardization Projects) Document.
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on NGN in CCSA Duo LIU Deputy Secretary General of CCSA Global Standards.
INTERNATIONAL TELECOMMUNICATION UNION Telecommunications Development Bureau (BDT) REGIONAL OFFICE FOR AFRICA NETWORK DEVELOPMENT.
International Telecommunication Union ETSI Security Standardization Dr. Carmine Rizzo CISA, CISM, CISSP, ITIL, PRINCE2 ITU-T Workshop on “New challenges.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Technology Architecture & Standards Group © 2002 AT&T Wireless Services, Inc. AT&T WIRELESS — CONFIDENTIAL & PROPRIETARY Use pursuant to Company instructions.
Doc.: IEEE ban Submission May 2007 John Farserotu Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Services – a perspective on building applications Richard Swale ETSI TIPHON Wg1 chair VoIP Technologist BTexaCT ITU Workshop on IP Networking and Mediacom.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
ANSI – ESOs meeting Washington February 2017
RSA Conference Europe 2000 Welcome to RSA Conference Europe 2000
New Generation of Digital Enhanced Cordless Telecommunications
Security Activities in ETSI
Stephanie Montgomery, Vice President, Technology and Standards
Bruno Chatras, ETSI TC TISPAN Vice-Chairman
SOURCE: TIA TITLE: TIA Update on NGN End-to-End QoS AGENDA ITEM:
ETSI Standardization Activities on M2M communications
High Intelligent Network (Smart Pipe)
Dirk Weiler, chairman of the board, ETSI
Glenn Parsons, GTSC-9 Chair, ISACC
Update on Security and LI activities in ETSI
Security Activities in ETSI
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
TTA Standardization Activities since GSC10
E-business & E-commerce
E-Commerce for Developing Countries (EC-DC)
EMTEL OCG Adhoc Group GSC9_joint_xxx 06/12/2018 GSC-9, Seoul 1 SOURCE:
Standardization activities on NGN in CCSA
ETSI role in Identity Management and Identification Systems
Home Networking in ETSI
Home Networking in ETSI
ETSI Activities Related to IP and Multimedia
Security and Lawful Intercept (LI)
Cybersecurity Activities in ETSI
Security and Lawful Intercept (LI)
Home Networking in ETSI
Didier Chauveau ETSI OCG ECN&S Chairman ETSI Board Vice Chairman
ETSI Standardization Activities on Smart Grids
PPSO (GRSC) Update: Standards Work on Lawful Interception
GTSC-4 Chair: Anil Kripalani Secretary: Henry Cuschieri
NGN including enhancements towards Future Networks in ETSI
Stephanie Montgomery, Vice President, Technology and Standards
Name of Speaker, Title and Organization
Glenn Parsons, GTSC-9 Chair, ISACC
Presentation transcript:

ETSI Security activities Charles Brookson Chairman OCG Security Source: ETSI GTSC-1 Agenda item For: Information GSC-8 060

GTSC#1- April 2003, OTTAWASlide 2 Security activities ETSI has, since inception, has taken the lead in setting security standards. Started GSM, which included authentication, anonymity and customer privacy. –The first full worldwide deployment of encryption and smart cards. Other security standards include DECT, Video standards, Multimedia IP such as TIPHON, and subsequent mobile and fixed services

GTSC#1- April 2003, OTTAWASlide 3 External bodies EC 3GPP OMA etc Security working methods ETSI OCG Security is co-ordinated for new issues by discussion group ETSI Board ETSI working groups

GTSC#1- April 2003, OTTAWASlide 4 Lawful interception ETSI LI is defining overall standards to cover the delivery of intercepted material in the Technical Committee LI Each individual technology contributes towards the delivery specification Standards supporting LI include Mobile, Internet.

GTSC#1- April 2003, OTTAWASlide 5 Algorithms ETSI SAGE ETSI SAGE has developed algorithms to meet the requirements of ETSI work groups. Recent work has been to produce algorithms for – 3GPP (Kasumi and Milenage), –new security to improve GSM (A5/3, G Milenage) and GPRS (GEA3). SAGE also continuously reviews the published literature to ensure that existing algorithms withstand new types of attack.

GTSC#1- April 2003, OTTAWASlide 6 Electronic Signatures and Infrastructures To meet the requirements of business and commerce. –By providing a secure framework Supporting the Digital Signatures Directive within Europe. –Provides standards for an open environment. –Influence early developments.

GTSC#1- April 2003, OTTAWASlide 7 Mobile security 3G continues in new areas such as Digital Rights Management, Wireless LANs and security within and between networks. TETRA is now a mature standard, as is GSM for the Railways (GSM-R). Smart card work continues within the Smart Card Platform group, which is defining the UICC platform for 3GPP and 3GPP2, and the card application toolkit.

GTSC#1- April 2003, OTTAWASlide 8 The future challenges Convergence of conventional switched telephony and IP solutions. Terminal devices are also becoming smarter, opening the possibility of attack We are noticing an increase in legislation worldwide, driven by security concerns over the last two years.