Concept for a cryptographic infrastructure for measurement components in smart grids
|
|
- Clemence Barnett
- 8 years ago
- Views:
Transcription
1 Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert Zisky 1
2 Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Dr. Norbert Zisky Head of WG 8.52 Datacommunication and -security Projects INSIKA (Intergrated security concept for OPT) On-Board Metering Committees EMRP JRP14 WG4 METROLOGY Task Force Smart FOR Grid SMART ELECTRICAL GRIDS EG Privacy and Security Smart Grid Coordination Group Sub Group Information Security DKE Information security Norbert Zisky 2
3 Content EU-Commission and European standardization mandat M/490 CEN/CENELEC/ETSI Smart Grid Coordination Security concepts measurement and grid control Conclusions Norbert Zisky 3
4 Personal view Security and privacy aspects are not in the scope /in mind of metrology mostly but: there is a need on it Missing: EU directive for protection of smart grids General security concept for European smart grids Compared with the clear decission from 2012: connector for e-cars type 2!!! Norbert Zisky 4
5 EU Principles and Activities 3. Energy package Energy and Climate package 20/20/20 Vision 2. Strategic energy report Towards a secure, sustainable and competitive European energy network (Nov. 2008) Statements on Smart Grids Directive 2009/72/EC vom Norbert Zisky 5
6 Task Force Smart Grid Expert groups 1 Functionalities for Smart Grids 2 Regulatory recommendations for data safety, data handling and data protection 3 Roles and responsibilities of actors involved in the Smart Grids deployment Norbert Zisky 6
7 Mandate M/490 CEN/CENELEC/ETSI Standardization Mandate to European Standardisation Organisations (ESOs) to support European Smart Grid deployment Norbert Zisky 7
8 Struktur SGCG Norbert Zisky 8
9 Status M/490 SGCG Overview Framework Document Smart Grid Smart Grid Framework Document (SGCG_Sec0036_DC).pdf, p. 16 First Set of Standards SGCG_Sec_0042_DC - First set of standard (draft) V1 0.pdf, Oct, 2nd 2012, p. 204 Sustainable Processes Report WG SP_ver0 65 (SGCG_Sec0033_DC).pdf Aug, 8 th 2012 p. 84 Reference Architecture: SGCG - RAWG - Reference Architecture TR v2.0.pdf Aug, 8 th 2012 p. 96 Information Security M490-SGCG-SGIS-DRAFT-V doc Oct, 31 st 2012, p. 46 Norbert Zisky 9
10 Standards, Standards. First Set of Standards draft: available in preparation CEN/CENELEC ETSI 60 CEN ITU 41 1 ISO 102 Sum 332!!!! 71 Norbert Zisky 10
11 Important Standards for SGIS IEC x-y IEC IEC x-y IEC IEC Substation automation Electricity metering DLMS/COSEM Security Security for industrial automation control systems Power systems data and communications security Vehicle-to-Grid Communication Interface ISO/IEC Security requirements for cryptographic modules Norbert Zisky 11
12 Development of security concepts Determine the system architecture Use case analysis Security analysis of the system environment Fixing security objectives/ security policiies Fixing security level Security concept and security services, organisational measures Fixing the residue risk Norbert Zisky 12
13 NIST logical reference model Source: NISTIR 7628 Guidelines for Smart Grid Cyber Security Norbert Zisky 13
14 Reference Architecture IEC TR Source: Final report of the CEN/CENELEC/ETSI JWG on Standards for Smart Grids, , Fig. 9 Norbert Zisky 14
15 Security terms Authentication provision of assurance that a claimed characteristic of an entity is correct Confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes Integrity property of protecting the accuracy and completeness of assets Non-repudiation ability to prove the occurrence of a claimed event or action and its originating entities Availability property of being accessible and usable upon demand by an authorized entity Source: ISO/IEC 27000:2012 Norbert Zisky 15
16 Protection objectives and security measures protection objective confidentiality integrity authenticity non-repudiation availability identifikation security measures encryption Hash, MAC, signatures signatures signatures techn. measures, redundancy password, challenge response Use of signatures based on symmetric or asymmetric crypto systems are state of the art for high level security solutions Norbert Zisky 16
17 Security classes Level of security 1. Trusted by information theory 2. Strong cryptografy 3. Well investigated 4. Less investigated 5. Not open ( security by obscurity ) Norbert Zisky 17
18 Critical components and elements All sensors and actors which show the grid state or influence them e. g. : measurement devices, switches, controller, energy management systems, persons Thesis 1: a system is so strong only as it weakest link is distinction in protection classes is not optimal Thesis 2: Bigger grid areas can be disturbed by many small attacks to non important elements Thesis 3: The need for grid state information and the confidentiallity is opposite Thesis 4: Availability can not ensured by IT-security measures Norbert Zisky 18
19 Security concept approach End-to-End-Security on a functional level, Clear assignment of functions to components Data encryption if needed No pattern approval of distributed components Each component/each element has an unique identity at the same defined security level Main security requirement: Nobody has access to the secret elements!!! Norbert Zisky 19
20 Security concept smart grid end-to-end security process A in component X prozess B in component Y information source action CIA Information target reaction Norbert Zisky 20
21 Security concept realization System wide uniquie data elements, authenticated data exchange between processes with strong cryptography PDU (AES, ECDSA) Use of smart card or cryptocontroller Key management with PKI Data encryption with ECDH, TLS Security depends on crypto measures in general EU Certified CA and RA with unique policies for smart grid Norbert Zisky 21
22 Data modeling Syntax and semantic of meter data including signatures - all data objects should be identifiable individual e.g. OBIS-codes as a good approach - good experiences with coding (Basic Encoding Rules) - creating of hierachical data objects Data verification based on unique data models e. g. XML structures!! problems, if real time requirements Norbert Zisky 22
23 Data modeling example Signed_billing_data /A-XDR- coded sbd_type ::= SEQUENCE { billing_data billing_data_type billing_data_sig auth_data_type } billing_data_type ::= SEQUENCE { begin_cp date_time -- time start charging end_cp date_time -- time end charging counter_values SEQ. value_type -- meter values. meter_id VisibleString -- meter ID } auth_data_type ::= SEQUENCE { signature sig_type -- signature certificate_info certificate_info_type -- certificate identification } Norbert Zisky 23
24 Public key infrastructure Example Need for trusted systems Root-CA Controls Root-CA meters Root-CA Management CA controls manufacturer CA meter manufacturer DAS controls meter Controls certificates Meter certificates Norbert Zisky 24
25 DAS authorisiation for control linked with a meter control meter DAS Authorisation Request Authorisation Response control ID meter ID random number time control signature control authorisation request authorisation result +/- signature DAS time meter signature meter Norbert Zisky 25
26 Results of the EMRP project Task 4.4 Generic security concept Proposal for a cryptographic infrastructure Test PKI for measurement and control components First approach for an operational concept for trusted measurements Current work: Implementing and testing laboratory components Changing the security platform smart card secure complex microcontoller Norbert Zisky 26
27 Conclusion Many activities of the EU-Kommission for coordination of smart grids Important standardization mandates M/441, M/490 M/468 with special issues IT security Smart grids needs complete and system wide security concepts Sensors and actors have to support a end-to-endsecurity based on strong cryptographic measures and trusted infrastructures Norbert Zisky 27
28 Many Thanks! Norbert Zisky 28
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
More informationSecure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
More informationSmart Grid Information Security
CEN-CENELEC-ETSI Smart Grid Coordination Group Date: 2014-12 Secretariat: CCMC CEN-CENELEC-ETSI Smart Grid Coordination Group M490-SGCG-SGIS-Intermediate-Report-V1.pdf 1 Contents Page 2 3 4 5 6 7 8 9 10
More informationAn Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
More informationInformation Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationEntschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?
Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationCryptography in Metrology
Cryptography in Metrology Experiences, Applications and new Developments Norbert Zisky Content Metrology needs security Secure electronic exchange of measurement data Secure bidirectional communication
More informationCRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
More informationHow To Protect Your Network From Attack
Liste von ausgewählten Cybersecurity-Normen, -Standards und -Richtlinien mit Smart-Grid-Relevanz: Advanced Security Acceleration Project Smart Grid (ASAP-SG): Entwicklung von Security Anforderungen für
More informationSafeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
More informationWorld Summit on Information Society (WSIS) Forum 2013. 16 May 2013
World Summit on Information Society (WSIS) Forum 2013 Toolkit for creating ICT-based services using mobile communications for e- government services 16 May 2013 Hani Eskandar ICT Applications coordinator
More informationDIN/DKE Roadmap GERMAN
DIN/DKE Roadmap GERMAN S TA N D A R D I Z AT I O N R O A D M A P I T- S E C U R I T Y Ve r s i o n 2 Ve r s i o n 1 Contents Contents 1 0 Foreword to 2 nd edition 2 1 Introduction 2 1.1 General 2 1.2 IT
More informationVolker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationDanske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
More informationSECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
More informationInformation Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
More informationInformation Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
More informationCyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB frank.hohlbaum@ch.abb.com Switzerland Two trends are currently changing
More informationUNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric
More informationSecurity of smart grid communication protocols
Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationGENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
More informationElectronic Registration Identification (ERI)
Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationDefending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationInformation Security Standards in Critical Infrastructure Protection
Information Security Standards in Critical Infrastructure Protection Berlin 11/11/2015 Alessandro Guarino StudioAG Introduction Computers everywhere! ICT Technologies pervasive even in very analog settings:
More informationA Draft Framework for Designing Cryptographic Key Management Systems
A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationPublic-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationCloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
More informationData Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
More informationPKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
More informationSSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
More informationHow encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationBEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ) ) ) ) ) )
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Rulemaking on the Commission s Own Motion to Improve Distribution Level Interconnection Rules and Regulations for Certain
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationSecure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea sntdvl@yahoo.com, taihoonn@paran.com Abstract: The overall
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationSafety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationSMKI Recovery Procedure
- file formats Consultation opens: 23 September 2015 Consultation closes: 7 October 2015 Version: v1.0 Date: 23 September 2015 Author: Classification: Jonathan Jennings, Andy Barraclough DCC Public Document
More informationTechnical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer s.beirer@gai-netconsult.de Sichere ebusiness
More informationFuture directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
More informationStrengths and Weaknesses of Cybersecurity Standards
Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium firstname.lastname@esat.kuleuven.be April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationSERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More informationDigital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom nickpope@secstan.com 2 Universitat Politècnica de Catalunya Barcelona,
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationKey Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
More informationComputer and Network Security
Computer and Network Security R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Introduction to Computer and Network Security
More informationSMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
More informationRESEARCH AND DEVELOPMENT ISSUES FOR CYBER SECURITY IN THE SMART GRID
Energy Research and Development Division FINAL PROJECT REPORT RESEARCH AND DEVELOPMENT ISSUES FOR CYBER SECURITY IN THE SMART GRID Prepared for: Prepared by: California Energy Commission California State
More information1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationInternet of Things - Internet of the Future" Workshop in Oslo 2012 02 01
Internet of Things - Internet of the Future" Workshop in Oslo 2012 02 01 The IoT Value Creation Network, Norway Project in the VERDIKT-program The Research Council of Norway Today s Focus CEN and Internet
More informationChapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
More informationImproving smart grid security using smart cards
Master Thesis Improving smart grid security using smart cards Author: Marlon Baeten marlon@utf8.nl Supervisors: dr. ir. Erik Poll dr. Bárbara Vieira August 20, 2014 Abstract The rapid changes in the electrical
More informationNetwork Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015
Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,
More informationPrivacy Management Standards: What They Are and Why They Are Needed Now
ITU-T Q10/17 Identity Summit Geneva December 10, 2010 Privacy Management Standards: What They Are and Why They Are Needed Now John Sabo Director Global Government Relations Chair, OASIS IDtrust Member
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationSECURELY CONNECTING INSTANT MESSAGING SYSTEMS FOR AD HOC NETWORKS TO SERVER BASED SYSTEMS
SECURELY CONNECTING INSTANT MESSAGING SYSTEMS FOR AD HOC NETWORKS TO SERVER BASED SYSTEMS Philipp Steinmetz Introduction Motivation for Tactical Instant Messaging Bandwidth-efficient Silent information
More informationCryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
More informationSnow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
More informationHow can the Future Internet enable Smart Energy?
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY
More informationETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
More informationHungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548
More informationIT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationOctober 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
More informationAn introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010
An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature
More informationCyber Security for Protection Related Data Files
IEEE PSRC H18 Report October 7 th, 2011 Cyber for Protection Related Data Files Report to the PSRC Main Committee from WG H-18 Working Group Members Amir Makki, Chair Stephen Thompson, Vice Chair Mark
More informationConsulting International
NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International fcleve@xanthus-consulting.com
More informationCryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)
Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI) 1024431 Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationNEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
More informationSection 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
More informationInnovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationPRIVACY AND DATA SECURITY MODULE
"This project has been funded under the fourth AAL call, AAL-2011-4. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which
More informationSecurity (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationJTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
More information2012 ISO TC46/SC4/WG11 N246
RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of
More informationTELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationArkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
More informationDesign and Implementation of a Secure Online Lottery System
Design and Implementation of a Secure Online Lottery System Pramote Kuacharoen Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118
More information