désiré karyabwite ip coordinator e-strategy unit email: [email protected]

12
Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security” The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: [email protected] Tel: +41 22 730 5009 Fax: +41 22 730 5484

Upload: reya

Post on 23-Mar-2016

61 views

Category:

Documents


0 download

DESCRIPTION

Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security”. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: [email protected] Tel: +41 22 730 5009 Fax: +41 22 730 5484. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

Arab Regional Workshop on“IP STRATEGIES AND IDN ISSUES”

 Damascus-Syria, 16-18 May 2006

“Cyber Security”

The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership.

Désiré KARYABWITEIP Coordinator

E-Strategy Unit Email: [email protected]

Tel: +41 22 730 5009 Fax: +41 22 730 5484

Page 2: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 2

Network Security: Creating trust in Critical IP-based infrastructures

“on the Internet, nobody knows you’re a dog…”

Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development

Danger can come from almost anywhere…

Page 3: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 3

Page 4: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 4

…Network Security: Creating trust in Critical network infrastructures!

Page 5: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 5

Convergence: Transport of Voice, video and Data on IP-based Networks

Page 6: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 6

Page 7: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 7

SPAMS & Phishing

Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.

By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group

Page 8: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 8

How security is provisioned for VoIPIn an H.323 multimedia system, ITU-T Recommendation H.235 defines the security framework including specification of the security mechanisms and security protocols for H.323.

H.235 was first introduced for H.323 Version 2 systems in 1998. Since then, H.235 has further evolved over time by consolidating the offered security mechanisms, by adding more sophisticated security algorithms

If available and suitable, existing security tools such as available Internet security packages and standards (IPSec, SSL/TLS) can be (re)used in the context of H.235

Page 9: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 9

Security and e-Health : an e-prescription system in the UK

Page 10: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 10

At heart of the system is a security infrastructure that provides not only strong authentication (a PKI using public key certificates) but also strong authorisation in which the specific rights that medical professionals have are granted because of their roles stored in attribute certificates.

ITU-T X.509 enable today more generalized and global access to e-prescriptions

Page 11: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 11

Désiré KARYABWITE  

IP Coordinator,

E-Strategy Unit,

Email: [email protected]

Tel: +41 22 730 5009 Fax: +41 22 730 5484

Thank you for your Attention

For more details: www.itu.int/itu-d

Page 12: Désiré KARYABWITE IP Coordinator  E-Strategy Unit     Email: desire.karyabwite@itu.int

04/25/23 12