Interoperability Support systems Nationwide components (Estonia)

Size: px
Start display at page:

Download "Interoperability Support systems Nationwide components (Estonia)"

Transcription

1 Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications

2 ICT legislation (1) Personal Data Protection Act (1996) /2007 protects individuals fundamental rights and freedoms states that all citizens have a right to see the data that the public sector maintains about them Databases Act (1997)/ 2007 Sets out rules for the creation and maintenance of public sector databases Does not deal with the front office (use and services of databases) New law currently elaborated (merged to Public Information act)

3 ICT legislation (2) Public Information Act (2001) ensures the opportunity for all to access information intended for public use imposes an obligation for public authorities to maintain a website and a document register states that everybody must have free access to the internet at public libraries Identity Documents Act (2000) establishess the national ID card as the primary personal identification document

4 ICT legislation (3) Digital Signatures Act (2000) states that digital signature is equal to the handwritten one imposes an obligation on public sector institutions to accept digitally signed documents regulates the activities of Certification and Time-Stamping Service providers

5 ICT legislation. Government acts Registry of registries RIHA (1998) /2007 Classification system (2003) /2007 Data exchange layer (X-road) (2003) /2007 System of security measures (2004) /2007 The system of address details (2003) /2007 The geodetic reference system (2002)

6 EstIF : is a set of standards and guidelines aimed at ensuring the provision of services for public administration institutions, enterprises and citizens EstIF serves as: A guide for those who are drafting concepts for country-wide information systems; A guide for IT project managers in the public administration when they wish to draft concepts for the information systems of their institutions; A form of assistance in organising public procurements.

7 Objectives of the EstIF (1) to facilitate and implement the transformation of institutionally based public administration into a service-centred ones, allowing all citizens to communicate with the state without knowing anything about its hierarchical structure and division of roles; to reduce public sector IT spending through the extensive use of centrally developed solutions; to improve the interoperability of new IT projects through co-ordinated use of centrally developed infrastructure, middleware: public key infrastructure (PKI), data exchange layer X-Road, citizen s environment etc. and open standards;

8 Objectives of the EstIF (2) to improve the co-ordination and management of state information systems and to accelerate the development of IT solutions; to contribute to the co-development of the state information system; to allow autonomous development for all systems within the principles of organisational, semantic and technical interoperability; to ensure free competition in the area of public procurement.

9 The key principles of EstIF (1) The institutionally based approach should be replaced by service-centred one; Public services (including nested ones) are provided free of charge for public sector institutions and citizens; The development of information systems is based on an Internet-centred approach; Information systems provide and use services via a data exchange layer based on multilateral agreements; XML-based technologies are used to integrate of information systems and to present data; There is a move toward the more extensive use of open standards;

10 The key principles of EstIF (2) In developing information systems, open source based solutions are considered alongside proprietary ones; Access to public services should preferably be ensured via a web browser and by different channels and devices; All services requiring user authentication and authorization must exploit the secure X-Road environment; The authentication and authorization procedures of civil servants are based on the use of the Estonian ID card; As a temporary alternative, authentication mechanisms used by Internet banks can be used for authentication individuals; central and local government agencies co-operate in order to ensure the provision of information and services for citizens, officials or entrepreneurs at a single place and without the need to know anything about the subordinating system of the executive power or the division of roles therein.

11 Documents of EstIF (2) Estonian Interoperability framework (in Estonian, abridgement version in English) Estonian IT Architecture (in Estonian) Semantic Interoperability (in Estonian) Web Interoperability Framework (in Estonian) Information Security Interoperability Framework (in Estonian) Requirements for Database Semantic Descriptions and Service Descriptions (in Estonian) Interoperable Document Management Systems (in preparation, it is moving from Architecture to separate document) Interoperable Geoinformation Systems (in preparation, it is moving from Architecture to separate document, ) Open Source Software (in preparation, it is moving from EstIF to separate document)

12 EstIF. Information in English Estonian IT Interoperability Framework. Abridgement of version Uuno Vallner. The Estonian IT Interoperability Framework, Baltic IT & T Review, No 2(41), 2006, pp Internet: 6A4D002A0ADF.nsf/ BAC2256A4E002DC32C/E003 B13A1059C212C22571B7003ABD44 Nationwide Components of Estonia's State Information System. Dr Uuno Vallner, 6A4D002A0ADF.nsf/ BAC2256A4E002DC32C/C054 7F95C C B78AC (X-road)

13 What is differently in Estonia? We protect data not channels; PKI infrastructure; Evidentiary value of data; High availability; Confidentiality; Transparent usage of web services; Asynchronous mode in synchronous mode

14 What we protect: data or channels? The old problem: What we need to protect the king (person) or route (where king is moving)? We choose the king (data) Most attacks comes from inside We use public Internet, but data is crypted, signed. NATO, EU, IDABC decided to protect channels TESTA and S-TESTA do not add security

15 PKI infrastructure Persons are authenticated by: ID card (90% of citizens in age have ID card) mobile-id, replacement-id, additional-id (Not yet) Internet banking (citizens only): Roll of Banks: authentication and e-payment Soft Certificate (officials only) strongly not recommended

16 Evidentiary Value first priority In order to preserve the evidentiary value and integrity of the data, all outgoing messages are signed. Signing keys are registered with third party All incoming messages are logged. The message log is cryptographically protected. The intermediate hash values are periodically time-stamped by the X-Road central agency. This allows detecting the message log tampering attempts. Message receiver can later prove with the help of the X-Road central agency when and by whom was the message sent.

17 Availability --- the second priority In order to ensure the high availability of the system, X- Road is built as a distributed system, with minimal number of central services. The directory service is built on top of Secure DNS (DNS- SEC). The usage of well-proven DNS protocol and implementation provides very robust, scalable directory service with built-in caching and redundancy. Security extensions of the DNS (signed zones) ensure that the data cannot be tampered. All X-Road servers have their own local caching DNS server that ensures the availability of directory information even in case of (partial) network outage.

18 Confidentiality --- the third priority SSL protocol is used as a defence mechanism against external attackers. All exchanged data is encrypted. Two level access rights control mechanism is used as a defence mechanism against internal attackers. Two level access control mechanisms isolates the details of the authentication and access control mechanisms used internally by the organizations was biggest success factor of the X-Road because the impact to the existing systems was minimized.

19 Authentication We have two-level authentication: that of information systems and that of users. Every information system is authenticated by the certificate issued by certification authority of X-road Persons are authenticated by: ID card Internet banking (citizens only): Roll of Banks: authentication and e-payment Soft Certificate (officials only)

20 Authorization Two levels of authorization: information systems and users Groups of consumers Every institution (as user) is responsible for the authorization of its own users (before: service provider was responsible for the authorisation of users. It is similar to situation where alcohol factories are responsible for results of alcohol misuse) Service providers must open a new service in case any public institution should need (customers are owners of state registers)

21 The transparent usage of web-services X-Road server functions as a proxy to all services provided by other organizations, so all services appear to be behind the same URL. XMLRPC X-Road server XMLRPC service Client (SOAP) X-Road server X-Road protocol (secure) X-Road secure and transparent SOAP X-Road server SOAP service SOAP

22 Asynchronous mode Big amount of data (asynchronous mode) Multilateral approach: exists central repository of messages C2C: two secure signing portals (citizens can to each other send and receive documents) A2C: personal document handling systems (citizen can fill application, administrations report results) A2A: Document management systems exchange information without the use of paper and ordinary postal services.

23 Support systems Registrer of registers (RIHA) Classification systems System of addresses Data exchange layer (X-Road) Geodetic system Security measures system

24 NWC: Registry of registries First version (1999) Text database (TRIP engine), full text search, approximately 100 attributes Databases, objects, services, responsibility, classifications, standards, Second version (2004) MySQL (Later Postgres), more information about services; WSDL, service providers; customers; X-road connection information; persons; security. Third version (2007)

25 Example: Data about the Land Cadastre

26 Example: Sample WSDL

27 Existing registry of registries (ARR) Evolved into a web based system with a UDDI interface Information about registries, their X-road services, classifications Registration of registries limited Registry metadata inconsistently documented Difficult to see the big picture

28 Objectives for RIHA (the new registry of registries) Main objective is to create a integrated information system that would give a clear view of the state s registries and related services. Enhance technical, organizational and semantic cooperation in the public sector Collect data about Registries Services provided by registries (Service providers) Service consumers Classifications Enable coordinating agencies (RISO) to see the big picture and make informed decisions

29 Service providers Service consumers Main user groups Help desks (Service Desks) Coordinating agencies (RISO/RIA) Classification administrators (Statistical office of Estonia) Estonian Data Protection Inspectorate Citizens

30 Service providers will be able to: Apply to join the X-Road Register existing registries Update registry metadata Post semantic information for databases and services Register new services including web services Initiate negotiations for creation of a new registry View users of a service and inform them of impending outages/changes

31 Service Consumers will be able to: Apply to join the X-Road See a complete view of state registries and the information stored within them See a complete view of existing services and apply for permission to use them Request creation of a new service See an integrated view of monitoring and statistical information Find appropriate contact information for registries Register complex services (web services that call other web services)

32 Help desks will be able to: View interdependencies of services Track reported errors to originating service/registry and find appropriate contact information for the registry Compare promised service availability to actual service availability

33 Coordinating agencies will be able to: View a complete picture of the state s registries and services Complete list of registries and their associated services Complete list of users of a particular web service Integratated with monitoring and usage statistics system Use RIHA to assist with the administration of the X-Road

34 Statistical office will be able to: View existing classifications and their administrators View registries using particular classifications Register new classifications

35 Data Protection Inspectorate will be able to: Examine the existence and use of delicate data in registries

36 Citizens will be able to: View a complete list of registries and associated services Obtain contact information for registries

37 The classification system In order to understand, process and categorize data in information systems in a standardised way, data need to be classified and tagged. The use of classifications facilitates the standardisation of data, enables information exchange between information systems (data providers and data receivers), and allows the comparison and analysis of the published data.

38 The address system The system of address details is a set of common principles, which ensures a standardised identification of address objects both in their location and in different information systems, and allows the comparison of addresses submitted at different times and based on different principles.

39 The geodetic system The geodetic system consists of: the geodetic reference system; the system of plane rectangular co-ordinates; the height system; the gravimetric system.

40 The system of security measures The objective of the system is to define an unequivocal procedure for the specification of security requirements for information systems; a procedure for determining, pursuant to security requirements, security classes; and a procedure for the selection of security measures according to security classes.

41 The address system The system of address details is a set of common principles, which ensures a standardised identification of address objects both in their location and in different information systems, and allows the comparison of addresses submitted at different times and based on different principles.

42 Nationwide components (NWC) Estonian government agencies are all responsible for the development and maintenance of their information systems, and they all must keep in mind the general principles of the state s IT interoperability framework. In order to ensure interoperability and a multilateral approach, the public sector assumes responsibility for the development and maintenance of several central and nationwide components of these systems. There are two types of nation-wide information systems in Estonia witch are developed and managed centrally: the common single point of entry Infrastructure and support systems which refer to agreements among state information systems and the relevant middleware.

43 NWC: PKI infrastructure (2002) Contains two certificates: 1) one for authentication 2) for giving digital signature Types of eid instruments: ID card (2007: 90% of citizens in age have ID card) mobile-id, replacement-id, additional-id (2007) Internet banking (citizens only): Roll of Banks: authentication and e-payment Soft Certificate (officials only) strongly not recommended

44 ID card - fields of application As a regular ID As an authentication tool for e-services both in the public and the private sector For giving digital signature As an ID-ticket for public transport For transfer money in Internet Bank As a loyal customer card As a door card In evoting

45 NWC: Interoperability of document management systems Do not use scanners Do not use ordinary post Cases must be transferred from one systems to other without additional entry All document management systems need to have an interface with the central document exchange point

46 NWC: Interoperable geoinformation systems (2007) The interoperability of geoinformation systems means that relevant services are easy to use, and digital maps are accessible for all authorized users and for other information systems. It must be possible for all agencies, enterprises and citizens to use digital maps which have been developed by the public sector on the bases on open GIS standards; It must be possible to use geoinformation data sources to provide new e-services through open interfaces, and to add to the existing e-services links to geoinformation services, all without any significant additional costs; Authorized use of data has to be ensured (e.g. objects falling into the Category I of nature conservation are only accessible for authorized users).

47 NWC: Trust environment X-road (2002) X-Road allows information systems to use the common data exchange environment as well as the common set of interfaces and common authentication system. Joining an information system with X-Road saves money and considerably increases the efficiency of data exchange among state agencies and in communications between the local residents and the state. Number of queries made via the X-Road in million

48 Institutional Databases Banks X-road backoffice Taxing system Services AS TS Population registry Services AS TS Vechiles registry Services AS TS Other AS TS Banks auth. payment services AS TS X-road cert.center Server II (Backup) Server I HELPDESK Monitoring Central Registry of Institutional Databases AS TS X-road (over Internet) Citizens Portal TS AS KIT Citizens Portal Enterpreneur Portal TS AS EIT Enterpreneur Portal Riik.ee (public servants) TS AS AIT AIT AIT Public Servant Portal (ametnikuportaal) (ametnikuportaal) National ID-Cart Certification Center Centralizes systems developed by Government Cert. Center

49 Case police (traffic) Police vehicles have been equipped with positioning devices and with mobile workstations which enable integrated queries in the databases of Police and: Citizen and Migration Board Estonian Motor Vehicle Registration Centre Estonian Traffic Insurance Fund Control centre knows where is patrol car Patrolling police officer has computerized map

50 X-road --- open source software X-Road servers are built on a base of GNU/Debian Linux. All the additional software is packaged as Debian packages that can be installed and maintained using standard Debian tools. In addition self-contained installation CD is provided that installs and configures minimal GNU/Debian Linux and X-Road software with minimal user intervention. X-Road servers have minimal user-interface for maintenance and configuration tasks. All keys, including the top-level certification keys can be changed on the fly, without interruptions to the system operations and with minimal user intervention X-road software is OSS for everybody, but it is restricted to use changed software in live environment without security audit.

51 NWC: Single point entry Ensures access to information provided by the constitutional institutions, as well as central and local government agencies; Presents, in a balanced manner, the functions of all state institutions; Offers an English and a Russian version to provide a balanced and adequate overview of Estonia s state structures to the rest of the world.

52 NWC: Information portal This portal is freely accessible and contains information about the rights and obligations of Estonian citizens, as well as about services which are provided to them by public sector institutions. The information is relevant both for permanent residents and foreign residents who are interested in having a better understanding of the Estonian way of life. The information portal ensures access to information provided by state institutions throughout the citizen s life cycle and by thematic fields

53 NWC: Personal portal Having passed authentication, the citizen portal allows citizens to use personal secure environment Public sector institutions are obliged to provide e-services that require authentication and are targeted at citizens and the private sector (express services, notification services etc.) via the citizen portal. Besides, respective links to the citizen portal should additionally be published on their own websites.

54 NWC: Personal portal. Secure The secure area. Each local resident has his or her own address, which is recorded on the citizens ID card and can be used to send signed and encrypted E- mail. The system does not, however, support boxes for users. Each resident must declare an address to which mail is to be forwarded so as to redirect the address that has been provided trough the national ID card

55 NWC: Personal document management system The personal document management system allows people to fill in forms and then forward them to the relevant institutions. The institutions process the forms and report the results to the personal document management system from which the form has been submitted. People can trace the proceeding of their case through various institutions. No user is allowed to monitor someone else s case.

56 NWC: Direct services The direct services area allows people to view the data which the government has collected about them. They can also receive e-services which do not involve specific institutions. Direct services are produced through the X- road.

57 Databases Users Pension Insurance Register of Social Insurance Board Citizen Portal Citizen Population Register IS of Health Insurance Fund X-Road MISP IS of Tax & Customs Board Civil servant Students Register Parental benefit & Family benefits in Internet

58 NWC: Notification services There is an area for notification services: breaks in electricity or water deliveries; expiration of a period of validity etc.

59 NWC: Personal document management system The personal document management system allows people to fill in forms and then forward them to the relevant institutions. The institutions process the forms and report the results to the personal document management system from which the form has been submitted. People can trace the proceeding of their case through various institutions. No user is allowed to monitor someone else s case.

60 NWC: Personal area for signing The secure documents area allows the user to sign documents and then send them. These facilities are based on DigiDoc software, which was developed by the Centre for Certification and financed by the private sector project.

61 Thank you for your attention!

X-Road. egovernment interoperability framework

X-Road. egovernment interoperability framework X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected

More information

Cost- Effective e- Government for Developing Countries

Cost- Effective e- Government for Developing Countries Cost- Effective e- Government for Developing Countries Gerhard Pohl Director Operations Development Gateway Foundation Global Conference on E- Government March 22, 2006 1 Digital Opportunity One Billion

More information

EDI legal aspects in Estonia

EDI legal aspects in Estonia EDI legal aspects in Estonia Sharing the experience: einvoicing Riga, ECR Baltic seminar, April 15, 2010 Taavi Valdlo Department of State Information Systems Ministry of Economic Affairs and Communications

More information

eauthentication in Estonia and beyond Tarvi Martens SK

eauthentication in Estonia and beyond Tarvi Martens SK eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

The Estonian ID Card and Digital Signature Concept

The Estonian ID Card and Digital Signature Concept The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3

More information

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548

More information

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic

More information

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Technical Interoperability Standard for Data Mediation Protocols

Technical Interoperability Standard for Data Mediation Protocols Technical Interoperability Standard for Data Mediation Protocols TITLE: Technical Interoperability Standard for Data Mediation Protocols / TÍTULO: Norma Técnica de Interoperabilidad de Protocolos de intermediación

More information

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information

More information

Processo Civile Telematico (On-line Civil Trial)

Processo Civile Telematico (On-line Civil Trial) Processo Civile Telematico (On-line Civil Trial) By Giulio Borsari Italian Ministry of Justice IT Department via Crescenzio 7/c Rome Phone +39 051 4200210 (alt. +39 06 68620209) Fax +39 051 4200200 giulio.borsari@giustizia.it

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Apigee Gateway Specifications

Apigee Gateway Specifications Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption

More information

A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED

A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED A Signing Proxy for Web Services Security Dr. Ingo Melzer RIC/ED What is a Web Service? Infrastructure Web Service I. Melzer -- A Signing Proxy for Web Services Security 2 What is a Web Service? basic

More information

Solution & Design Architecture

Solution & Design Architecture Solution & Design Architecture Agenda Key Requirements Independence to ULBs Workflow : Administrator Activities Solution To Address Key Requirements Flexibility in selection of services Application Usage

More information

SharePoint 2010 Interview Questions-Architect

SharePoint 2010 Interview Questions-Architect Basic Intro SharePoint Architecture Questions 1) What are Web Applications in SharePoint? An IIS Web site created and used by SharePoint 2010. Saying an IIS virtual server is also an acceptable answer.

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Access Control Policy Document Status Security Classification Version 1.0 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention Change

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

OECD workshop on digital identity management BELGIAN approach

OECD workshop on digital identity management BELGIAN approach OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

ESTONIA ESTONIA. Estonian E-Health solutions overview (extra-curricular addition for the Tirana seminar on information exchange) Hannes Astok

ESTONIA ESTONIA. Estonian E-Health solutions overview (extra-curricular addition for the Tirana seminar on information exchange) Hannes Astok Estonian E-Health solutions overview (extra-curricular addition for the Tirana seminar on information exchange) Hannes Astok Based on the presentation of Mr Madis Tiik The Chairman of the E-Health Foundation

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Department of Industry and Science

Department of Industry and Science Services Catalogue Department of Industry and Science Contents 1 Introduction 2 VANguard Services 2 About the VANguard Services Catalogue 2 Contact Details 2 2 VANguard Services 3 User Authentication Service

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

XML Signatures in an Enterprise Service Bus Environment

XML Signatures in an Enterprise Service Bus Environment XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany Eckehard.Hermann@softwareag.com Dieter Kessler Research

More information

REDCap General Security Overview

REDCap General Security Overview REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Building a portal for citizens in Norway with secure authentication and single sign on. Dag Efjestad

Building a portal for citizens in Norway with secure authentication and single sign on. Dag Efjestad Building a portal for citizens in Norway with secure authentication and single sign on Dag Efjestad Norway 4.600.000 citizens Everyone has an unique id 75 % has a pc and 60% use it every day 60 % has Internet

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

Control and management of privileged users

Control and management of privileged users Control and management of privileged users The secure solution for monitoring and recording privileged users Visulox The complete Access Management Solution ToolBox Solution GmbH, established in 2003,

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

REGULATIONS COMPLIANCE ASSESSMENT

REGULATIONS COMPLIANCE ASSESSMENT ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

OFFICIAL STATE GAZETTE Nº 25 Friday 29 January 2010 Sect. I. Page 8139

OFFICIAL STATE GAZETTE Nº 25 Friday 29 January 2010 Sect. I. Page 8139 OFFICIAL STATE GAZETTE Nº 25 Friday 29 January 2010 Sect. I. Page 8139 I. GENERAL PROVISIONS MINISTRY OF THE PRESIDENCY 1331 Royal Decree 4/2010, of January 8th, which regulates the National Interoperability

More information

Security Measures for the BOJ Open Network for Electronic Procedures on the Foreign Exchange and Foreign Trade Law

Security Measures for the BOJ Open Network for Electronic Procedures on the Foreign Exchange and Foreign Trade Law Security Measures for the BOJ Open Network for Electronic Procedures on the Foreign Exchange and Foreign Trade Law Prepared by the Balance of Payments Division, International Department Bank of Japan October,

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...

More information

Government Service Bus

Government Service Bus Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Brief summary Integrated Portfolio Management of Public Services

Brief summary Integrated Portfolio Management of Public Services www.pwc.ee Brief summary Integrated Portfolio Management of Public Services Government Office March 2014 Brief summary of the study Integrated Portfolio Management of Public Services The study Integrated

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

MIGRATIONWIZ SECURITY OVERVIEW

MIGRATIONWIZ SECURITY OVERVIEW MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...

More information

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper

More information

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet SEC Ensuring a secure Internet What is SEC? SEC is an extension of the Domain Name System (), that ensures the authenticity and integrity of the data in replies. Technical measures have been implemented

More information

E-Government Practices and Future Direction in Sweden

E-Government Practices and Future Direction in Sweden E-Government Practices and Future Direction in Sweden Annika Bränström Director General, Swedish Companies Registration Office Chairman, Swedish egovernment Delegation Deputy Chairman, Swedish eidentification

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

SPANISH NATIONAL INTEROPERABILITY FRAMEWORK = ESQUEMA NACIONAL DE INTEROPERABILIDAD

SPANISH NATIONAL INTEROPERABILITY FRAMEWORK = ESQUEMA NACIONAL DE INTEROPERABILIDAD SPANISH NATIONAL INTEROPERABILITY FRAMEWORK = ESQUEMA NACIONAL DE INTEROPERABILIDAD Royal Decree 4/2010, of January 8th, which regulates the National Interoperability Framework within the e-government

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

The GlobalCerts TM SecureMail Gateway TM

The GlobalCerts TM SecureMail Gateway TM Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID. Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host

More information

e- Estonia - 10 years of experience

e- Estonia - 10 years of experience e- Estonia - 10 years of experience Lessons learned Jüri Voore, Estonian Cer;fica;on Centre PROJECT MILESTONES o First ideas in 1997 o Law on personal iden;fica;on documents: Feb, 1999 o Digital Signature

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

GEC4. Miami, Florida

GEC4. Miami, Florida GENI Security Architecture GEC4 Stephen Schwab, Alefiya Hussain Miami, Florida 1 Outline Overview of Security Architecture Draft Work in progress Observations About Candidate Technologies Considerations

More information

Royal Mail Business Integration Gateway Specification

Royal Mail Business Integration Gateway Specification FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail

More information

Electronic and Digital Signatures

Electronic and Digital Signatures Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as

More information

CIO Survey. Karel De Vriendt

CIO Survey. Karel De Vriendt CIO Survey Karel De Vriendt Thursday, June 19, 2008 Purpose of the CIO survey Provide input to and define priorities for: European Interoperability Strategy European Interoperability Framework Architectural

More information

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7 Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.

More information

MS-50412 - Implementing Active Directory Federation Services 2.0 for Windows Server 2008

MS-50412 - Implementing Active Directory Federation Services 2.0 for Windows Server 2008 MS-50412 - Implementing Active Directory Federation Services 2.0 for Windows Server 2008 Table of Contents Introduction Audience Prerequisites At Course Completion Student Materials Course Outline Introduction

More information

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2)

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) Additional Financing of Food and Nutrition Social Welfare Project (RRP MON 42322) UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) 1. This document

More information

Securing and Accelerating Databases In Minutes using GreenSQL

Securing and Accelerating Databases In Minutes using GreenSQL Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

XN--P1AI (РФ) DNSSEC Policy and Practice Statement

XN--P1AI (РФ) DNSSEC Policy and Practice Statement XN--P1AI (РФ) DNSSEC Policy and Practice Statement XN--P1AI (РФ) DNSSEC Policy and Practice Statement... 1 INTRODUCTION... 2 Overview... 2 Document name and identification... 2 Community and Applicability...

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)

Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 1 ebxml Case Study 2 3 4 5 Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October 2003 6 7 8 9 10 11 12 13 14 15 16 17 Document identifier: (Word)

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information