ICTWG-ECPRD SEMINAR 2006 INFORMATION SECURITY ISSUES AT THE CHAMBER OF DEPUTIES Carlo Simonelli Head of Unit – ICT Systems and User Support ICT Department.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Data Ownership Responsibilities & Procedures
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
PKI and . Considerations Behind Firewall System Security On the Internet –Simple Mail Transfer Protocol (SMTP)
Information Security Policies and Standards
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
EIRB Training IRB Committee Member A Paperless IRB System.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Internet Security for Small & Medium Business Week 6
Forms Management: Compliance, Security & Workflow Efficiencies.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
PKI Development Forum Jim Lowe, Campus Information Security Officer Brian Rust, Communications April 17, 2008.
WA SECURES Training Spring Welcome As a volunteer of the Department of Health Emergency Operations Center or RSS Task Force you must be prepared.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
Note1 (Admi1) Overview of administering security.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
Working with HIT Systems
ICT Infrastructure Used By Organisations Additional Exercise ANSWERS.
Chapter 2 Securing Network Server and User Workstations.
Data Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Getting started with VendorVision Getting started with VendorVision Congratulations on using VendorVision! To get started, go to the VendorVision.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer,
Oncology Patient Enrollment Network OPEN OPEN Documentation Lucille Patrichuk OPEN Implementation Manager OPEN Conference September 18, 2008.
1 1 Patented QR code solutions James Wu We Simplify Security.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Identity and Access Management
Network Security (the Internet Security)
IS4680 Security Auditing for Compliance
Module 8: Securing Network Traffic by Using IPSec and Certificates
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
ICT meeting Business needs
Secure Enterprise Technology Initiatives e-Provisioning Group
Taewan kang, Kevin huangfu
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security Awareness Training: System Owners
Final HIPAA Security Rule
Operating Systems Security
السلوك التنظيمى المعاصر
Installation & User Guide
Module 8: Securing Network Traffic by Using IPSec and Certificates
How To Repair PDF File After Disk Crash???. What is PDF file..??? PDF file is portable document file. This file format is used during the exchange .
Lawson Employee Self-Service Portal
Presentation transcript:

ICTWG-ECPRD SEMINAR 2006 INFORMATION SECURITY ISSUES AT THE CHAMBER OF DEPUTIES Carlo Simonelli Head of Unit – ICT Systems and User Support ICT Department – Chamber of Deputies Vilnius, 6th October

OVERVIEW  Information System Security  “Documento programmatico sulla sicurezza dei dati” (Programmatic Data Security Document)  Risk analysis carried out for the Programmatic Data Security Document  Other contents of the Document  Internet redundant links  Projects for improving information system security 2

INFORMATION SYSTEM SECURITY  Information System Security at the Chamber of Deputies during the past years  Security procedures difficult to be implemented 3

PERSONAL DATA PROTECTION CODE  Internet, Electronic mail and always- on era required more effort in information security  Implementing “Personal Data Protection Code” (Decreto Legislativo n. 196, 2003) 4

PROGRAMMATIC DATA SECURITY DOCUMENT  First edition of “Documento programmatico sulla sicurezza dati” (Programmatic Data Security Document)  The “Register of IT systems” is a prerequisite  The two parts of the Document 1.Analytic review of all data treatments 2.Rules for managing personal and sensitive data and general instruction to protect the information systems 5

RISK ANALYSIS AND ASSESSMENT  ISO/IEC (now ISO/IEC 27799:2005) and other information security standards  Risk exposure level established for 51 data bases with sensitive data and for 77 data bases with personal data  Activities this year on sensible data 6

BENEFITS OF THE DOCUMENT  Joint activities improving information security  Important managing procedures ­Procedures for managers and employees ­Duration of data stored online and offline ­Who is in charge of deleting data ­Managing backups and logs ­Data ciphering ­Password characteristics and expiration ­Training of managers and employees 7

IMPROVING INTERNET LINK SPEED AND AVAILABILITY 8

IMPROVING INFORMATION SYSTEM SECURITY  PKI system for digital signatures  Smart cards for strong authentication of employees  New projects ­MPs VPN SSL authentication and profiling; use of tokens ­Protocol 802.1x for administrative user workstation connection 9