Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to the Secure Component

Similar presentations


Presentation on theme: "Introduction to the Secure Component"— Presentation transcript:

1 Introduction to the Secure Component
Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Module 1 Introduction to the Secure Component May 5, 2010 Washington, D.C.

2 Module 1 Agenda Agenda, course objectives and recommendations
Secure groupware Platform evolution Secure Communications System Security On-line course

3 Agenda and Course Objectives
Module 1: Introduction to the Secure Component Module 2: Contacts and Messaging Module 3: Workspaces and Hypothetical Case Module 4: Course overview and install procedure Objectives: Familiarize new users with the tool Ensure the efficient use of the Secure Component tool Improve the communication and exchange of information among Central Authorities mutua y/o extradición.

4 Recommendations Please let us know as soon as you see a problem with the equipment utilized in the course All questions are valid questions Coffee Breaks Complete evaluation form at the end of the course Animación

5 Communication (Instant Messaging)
What is Groupware? Communication (Instant Messaging) Common Goals and Objectives Information Sharing (Workspaces) Coordination Groupware Entorno se define primero con sus miembros y una meta en común Es colaborativo porque exige coordinación among sus miembros ;

6 Security (Enccryption)
Secure Groupware Security (Enccryption) Common Goals and Objectives Communication (Instant Messaging) Information (Workspaces) Coordination Groupware

7 E-mail vs. Groove E-mail Message is not encrypted
Message can be intercepted Message can be altered Message is not confidential Internet Attached documents are not encrypted Both message and attachments can be intercepted Both message and attachments can be altered Both message and attachments are not confidential

8 E-mail vs. Secure Groupware
Message remains encrypted when stored in the hard drive and while in transit Internet Message is encrypted all the time Message can not be deciphered Message can not be altered If user is behind a firewall, OAS servers are used Authenticity, Integrity and Availability

9 Initial Considerations
Facilitate communications among Central Authorities on Mutual Leal Assistance. Confidentiality of the information: No central database No OAS Member State has control over the application SG/OEA has no access to the information shared by the users Decision in 2003: Groove Networks *Institución, órgano o entidad pública designada por el gobierno de un Estado para representarlo ante las Authorities extranjeras, así como para tramitar, recibir y/o enviar las solicitudes de asistencia mutua y/o extradición.

10 Evolution of the Plataform
2003 – Implementation of Groove Networks 2005 – Microsoft acquires Groove Networks 2007 – Microsoft integrates Groove to Office 2007 2010 – Microsoft SharePoint Workspace 2010 Integration with content management platform

11 Evolution of the Plataform
2007- OEA/Microsoft agreement 2007 version available in: English Spanish French Portuguese Technology upgrade:

12 The SG/OAS has upgraded the current platform to its latest version
Technology Upgrade New platform only works in 64-bit platforms 32 Migration to new 64-bit servers required MIGRATED Upgrade Windows 2000 to Windows bit UPGRADED The SG/OAS has upgraded the current platform to its latest version

13 Technology Upgrade Relay Server Management Server Groove 3.1
Windows 2000 32-bit Storage Area Network Windows 2003 64-bit Office Groove 2007 Relay Servers Management Server

14 Components of Groove within the OAS Infrastructure
Public and Private components Microsoft Office Groove 2007 Groove Users Agregar Public and Private MLA Website

15 Secure Communications System
Definition: The Secure Communications System is a software that allows groups of geographically separated individuals to work together securely over public networks such as the Internet. Security is always enabled and it is not optional.

16 Features Efficient use of the Network – Bandwidth optimization
Synchronization – can be used off-line Security is always enabled Data encryption – local and while in transit Compatibility with MS Office applications User awareness Alerts Users decide who they share information with Easy to use

17 Security Authenticity, Integrity and availability of the information contained in the local hard drive and while in transit Authenticity: information is only available to the intended recipient Integrity: information is never altered or modified Availability: information is always available and ready to be used when desired Use of Certificate Authority (CA) and Public Key Infrastructure (PKI) High encryption standards used

18 “E-Learning” platform Available in English and Spanish
On-line Course “E-Learning” platform MS Office Groove 2007 Available in English and Spanish Hacer ejercicio de Registro y que escriban su nombre de usuario en la evaluacion

19 Real Life Case Scenario
State A requests urgent assistance to State B about the location of a witness State B needs to receive the formal assistance request to initiate the process of assistance The original request, sent via diplomatic channels, expired because State B received the request at a date later than the issued request How can we expedite and improve this process? Through the use of Secure Workgroup tools Hypothetical Case in Module 3 Revisar acentos

20 End OF Module 1 9

21 Questions?

22 Introduction to the Secure Component
Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Module 1 Introduction to the Secure Component May 5, 2010 Washington, D.C.

23 Encryption Algorithms
Feature Algorithm RSA 2048-bits Identity MARC4 192-bits Messages MARC4 256-bits Workspaces ESIGN 1536-bits Hard Disc AES 192-bits References: AES (Advanced Encryption Standard) is the new government-approved standard for a symmetric encryption algorithm, replacing DES. AES's original name was Rijndael and was developed by two Belgian cryptographers. ESIGN is a royalty-free, public-key signature algorithm developed in Japan. It is much faster than other signature algorithms, allowing us to digitally sign each delta with negligible performance impact. It was only recently made royalty-free and is now being standardized by IEEE. RSA stands for Rivest, Shamir and Adleman - after the three cryptographers who invented the first practical commercial public key cryptosystem. It is the most commonly used public key algorithm today. The RSA patent officially expired and entered the public domain on September 20, 2000 (although RSA Security preemptively waived their patent rights on September 6, 2000). ElGamal is another public key encryption algorithm that provides an alternative to RSA. PBKDF2 (Password-based key derivation function #2) is defined in RFC2898 and RSA's standard PKCS#5 v2.0. This algorithm provides a standard mechanism for deriving a secret key from a passphrase. It makes use of salts and iteration counts to increase the complexity of attack. Management Server AES 256-bits Relay Server ElGamal 1536-bits

24 Security


Download ppt "Introduction to the Secure Component"

Similar presentations


Ads by Google