Concept for a cryptographic infrastructure for measurement components in smart grids
|
|
|
- Clemence Barnett
- 9 years ago
- Views:
Transcription
1 Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert Zisky 1
2 Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Dr. Norbert Zisky Head of WG 8.52 Datacommunication and -security Projects INSIKA (Intergrated security concept for OPT) On-Board Metering Committees EMRP JRP14 WG4 METROLOGY Task Force Smart FOR Grid SMART ELECTRICAL GRIDS EG Privacy and Security Smart Grid Coordination Group Sub Group Information Security DKE Information security Norbert Zisky 2
3 Content EU-Commission and European standardization mandat M/490 CEN/CENELEC/ETSI Smart Grid Coordination Security concepts measurement and grid control Conclusions Norbert Zisky 3
4 Personal view Security and privacy aspects are not in the scope /in mind of metrology mostly but: there is a need on it Missing: EU directive for protection of smart grids General security concept for European smart grids Compared with the clear decission from 2012: connector for e-cars type 2!!! Norbert Zisky 4
5 EU Principles and Activities 3. Energy package Energy and Climate package 20/20/20 Vision 2. Strategic energy report Towards a secure, sustainable and competitive European energy network (Nov. 2008) Statements on Smart Grids Directive 2009/72/EC vom Norbert Zisky 5
6 Task Force Smart Grid Expert groups 1 Functionalities for Smart Grids 2 Regulatory recommendations for data safety, data handling and data protection 3 Roles and responsibilities of actors involved in the Smart Grids deployment Norbert Zisky 6
7 Mandate M/490 CEN/CENELEC/ETSI Standardization Mandate to European Standardisation Organisations (ESOs) to support European Smart Grid deployment Norbert Zisky 7
8 Struktur SGCG Norbert Zisky 8
9 Status M/490 SGCG Overview Framework Document Smart Grid Smart Grid Framework Document (SGCG_Sec0036_DC).pdf, p. 16 First Set of Standards SGCG_Sec_0042_DC - First set of standard (draft) V1 0.pdf, Oct, 2nd 2012, p. 204 Sustainable Processes Report WG SP_ver0 65 (SGCG_Sec0033_DC).pdf Aug, 8 th 2012 p. 84 Reference Architecture: SGCG - RAWG - Reference Architecture TR v2.0.pdf Aug, 8 th 2012 p. 96 Information Security M490-SGCG-SGIS-DRAFT-V doc Oct, 31 st 2012, p. 46 Norbert Zisky 9
10 Standards, Standards. First Set of Standards draft: available in preparation CEN/CENELEC ETSI 60 CEN ITU 41 1 ISO 102 Sum 332!!!! 71 Norbert Zisky 10
11 Important Standards for SGIS IEC x-y IEC IEC x-y IEC IEC Substation automation Electricity metering DLMS/COSEM Security Security for industrial automation control systems Power systems data and communications security Vehicle-to-Grid Communication Interface ISO/IEC Security requirements for cryptographic modules Norbert Zisky 11
12 Development of security concepts Determine the system architecture Use case analysis Security analysis of the system environment Fixing security objectives/ security policiies Fixing security level Security concept and security services, organisational measures Fixing the residue risk Norbert Zisky 12
13 NIST logical reference model Source: NISTIR 7628 Guidelines for Smart Grid Cyber Security Norbert Zisky 13
14 Reference Architecture IEC TR Source: Final report of the CEN/CENELEC/ETSI JWG on Standards for Smart Grids, , Fig. 9 Norbert Zisky 14
15 Security terms Authentication provision of assurance that a claimed characteristic of an entity is correct Confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes Integrity property of protecting the accuracy and completeness of assets Non-repudiation ability to prove the occurrence of a claimed event or action and its originating entities Availability property of being accessible and usable upon demand by an authorized entity Source: ISO/IEC 27000:2012 Norbert Zisky 15
16 Protection objectives and security measures protection objective confidentiality integrity authenticity non-repudiation availability identifikation security measures encryption Hash, MAC, signatures signatures signatures techn. measures, redundancy password, challenge response Use of signatures based on symmetric or asymmetric crypto systems are state of the art for high level security solutions Norbert Zisky 16
17 Security classes Level of security 1. Trusted by information theory 2. Strong cryptografy 3. Well investigated 4. Less investigated 5. Not open ( security by obscurity ) Norbert Zisky 17
18 Critical components and elements All sensors and actors which show the grid state or influence them e. g. : measurement devices, switches, controller, energy management systems, persons Thesis 1: a system is so strong only as it weakest link is distinction in protection classes is not optimal Thesis 2: Bigger grid areas can be disturbed by many small attacks to non important elements Thesis 3: The need for grid state information and the confidentiallity is opposite Thesis 4: Availability can not ensured by IT-security measures Norbert Zisky 18
19 Security concept approach End-to-End-Security on a functional level, Clear assignment of functions to components Data encryption if needed No pattern approval of distributed components Each component/each element has an unique identity at the same defined security level Main security requirement: Nobody has access to the secret elements!!! Norbert Zisky 19
20 Security concept smart grid end-to-end security process A in component X prozess B in component Y information source action CIA Information target reaction Norbert Zisky 20
21 Security concept realization System wide uniquie data elements, authenticated data exchange between processes with strong cryptography PDU (AES, ECDSA) Use of smart card or cryptocontroller Key management with PKI Data encryption with ECDH, TLS Security depends on crypto measures in general EU Certified CA and RA with unique policies for smart grid Norbert Zisky 21
22 Data modeling Syntax and semantic of meter data including signatures - all data objects should be identifiable individual e.g. OBIS-codes as a good approach - good experiences with coding (Basic Encoding Rules) - creating of hierachical data objects Data verification based on unique data models e. g. XML structures!! problems, if real time requirements Norbert Zisky 22
23 Data modeling example Signed_billing_data /A-XDR- coded sbd_type ::= SEQUENCE { billing_data billing_data_type billing_data_sig auth_data_type } billing_data_type ::= SEQUENCE { begin_cp date_time -- time start charging end_cp date_time -- time end charging counter_values SEQ. value_type -- meter values. meter_id VisibleString -- meter ID } auth_data_type ::= SEQUENCE { signature sig_type -- signature certificate_info certificate_info_type -- certificate identification } Norbert Zisky 23
24 Public key infrastructure Example Need for trusted systems Root-CA Controls Root-CA meters Root-CA Management CA controls manufacturer CA meter manufacturer DAS controls meter Controls certificates Meter certificates Norbert Zisky 24
25 DAS authorisiation for control linked with a meter control meter DAS Authorisation Request Authorisation Response control ID meter ID random number time control signature control authorisation request authorisation result +/- signature DAS time meter signature meter Norbert Zisky 25
26 Results of the EMRP project Task 4.4 Generic security concept Proposal for a cryptographic infrastructure Test PKI for measurement and control components First approach for an operational concept for trusted measurements Current work: Implementing and testing laboratory components Changing the security platform smart card secure complex microcontoller Norbert Zisky 26
27 Conclusion Many activities of the EU-Kommission for coordination of smart grids Important standardization mandates M/441, M/490 M/468 with special issues IT security Smart grids needs complete and system wide security concepts Sensors and actors have to support a end-to-endsecurity based on strong cryptographic measures and trusted infrastructures Norbert Zisky 27
28 Many Thanks! Norbert Zisky 28
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
Smart Grid Information Security
CEN-CENELEC-ETSI Smart Grid Coordination Group Date: 2014-12 Secretariat: CCMC CEN-CENELEC-ETSI Smart Grid Coordination Group M490-SGCG-SGIS-Intermediate-Report-V1.pdf 1 Contents Page 2 3 4 5 6 7 8 9 10
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Cryptography in Metrology
Cryptography in Metrology Experiences, Applications and new Developments Norbert Zisky Content Metrology needs security Secure electronic exchange of measurement data Secure bidirectional communication
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
How To Protect Your Network From Attack
Liste von ausgewählten Cybersecurity-Normen, -Standards und -Richtlinien mit Smart-Grid-Relevanz: Advanced Security Acceleration Project Smart Grid (ASAP-SG): Entwicklung von Security Anforderungen für
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
DIN/DKE Roadmap GERMAN
DIN/DKE Roadmap GERMAN S TA N D A R D I Z AT I O N R O A D M A P I T- S E C U R I T Y Ve r s i o n 2 Ve r s i o n 1 Contents Contents 1 0 Foreword to 2 nd edition 2 1 Introduction 2 1.1 General 2 1.2 IT
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric
Security of smart grid communication protocols
Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
Electronic Registration Identification (ERI)
Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Information Security Standards in Critical Infrastructure Protection
Information Security Standards in Critical Infrastructure Protection Berlin 11/11/2015 Alessandro Guarino StudioAG Introduction Computers everywhere! ICT Technologies pervasive even in very analog settings:
A Draft Framework for Designing Cryptographic Key Management Systems
A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
SMKI Recovery Procedure
- file formats Consultation opens: 23 September 2015 Consultation closes: 7 October 2015 Version: v1.0 Date: 23 September 2015 Author: Classification: Jonathan Jennings, Andy Barraclough DCC Public Document
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness
Future directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
Strengths and Weaknesses of Cybersecurity Standards
Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium [email protected] April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Computer and Network Security
Computer and Network Security R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 [email protected] Introduction to Computer and Network Security
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015
Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
How can the Future Internet enable Smart Energy?
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
Cyber Security for Protection Related Data Files
IEEE PSRC H18 Report October 7 th, 2011 Cyber for Protection Related Data Files Report to the PSRC Main Committee from WG H-18 Working Group Members Amir Makki, Chair Stephen Thompson, Vice Chair Mark
Consulting International
NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International [email protected]
Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)
Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI) 1024431 Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
2012 ISO TC46/SC4/WG11 N246
RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Design and Implementation of a Secure Online Lottery System
Design and Implementation of a Secure Online Lottery System Pramote Kuacharoen Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118
