SMKI Recovery Procedure

Size: px
Start display at page:

Download "SMKI Recovery Procedure"

Transcription

1 - file formats Consultation opens: 23 September 2015 Consultation closes: 7 October 2015 Version: v1.0 Date: 23 September 2015 Author: Classification: Jonathan Jennings, Andy Barraclough DCC Public

2 Document Control Revision History Revision Date Summary of Changes Changes Marked Version Number 1.0 Issued for consultation No 1.0 Reviewers Name Title / Responsibility Release Date Version Number Approvals Name Signature Title / Responsibility Release Date Version Number DCC Public Page 2 of 9 Further Consultation

3 Contents 1 Executive summary Background File formats and usage Organisation Compromise Organisation Compromise Notification File Organisation Compromise Recovery Progress Files Other Compromises Other Compromise Notification File Other Compromise Recovery Progress Files Consultation questions How to respond Referenced Documents... 9 DCC Public Page 3 of 9 Further Consultation

4 1 Executive summary DCC is conducting a short further consultation on the, focusing solely on file formats required to support the. The SMKI Recovery Procedure (previously published for consultation in July 2015) has been updated to specify the formats of files that are required to ensure that information required to support recovery is transferred between affected Subscribers and DCC, and between DCC and the SMKI PMA. This consultation paper briefly summarises the proposed file formats to support the SMKI Recovery Procedure, asks questions to which we would welcome responses and informs stakeholders of how to respond, and by when. Following this consultation, and taking respondents feedback into account, DCC will update the, which includes the file formats. The SMKI Recovery Procedure will become a draft SEC Subsidiary Document and will be submitted to the Secretary of State for approval as being fit for inclusion in the SEC. On its approval, this document will become a SEC Subsidiary Document, forming part of the legal framework for enabling the roll-out of smart meters. DCC Public Page 4 of 9

5 2 Background An integral part of the security arrangements is the Smart Metering Key Infrastructure (SMKI), which provides a secure and effective means of ensuring that messages to and from Smart Metering Equipment are properly authenticated, provide integrity and, where applicable, provide non-repudiation through the use of public key cryptography and certificates. The addresses recovery from a Compromise, or suspected Compromise in respect of any Relevant Private Key listed immediately below: a) Private Keys associated with Organisation Certificates stored on Devices; b) the Contingency Symmetric Key; c) the Contingency Private Key; d) the Private Key associated with an Issuing OCA Certificate; e) the Private Key associated with a Root OCA Certificate; and f) the Private Key associated with a Recovery Certificate. A Compromise in the context of the means (extract from SEC 4.2): in relation to any Secret Key Material, that that Secret Key Material (or any part of it), or any Cryptographic Module within which it is stored, is accessed by, or has become accessible to, a person not authorised to access it. The sets out procedures in respect of: a) notification of a Compromise or the suspected Compromise of a Relevant Private Key or Contingency Symmetric Key associated with an Organisation Certificate or OCA Certificate held on a Device; b) the activities that may be required to recover (i.e. replace) affected Certificates on Devices; c) decisions required, in certain circumstances, by the SMKI PMA as to whether or not the Recovery Private Key or the Contingency Private Key should be used to recover from a Compromise; d) post-recovery actions (including reporting to the SMKI PMA); e) nomination, verification and appointment of Key Custodians for certain DCC Private Keys, along with the procedure for ceasing to be a Key Custodian; and f) periodic testing of the. DCC s consultation on the draft in July 2015 sought input on the degree to which the procedures are appropriate and will be effective. DCC has updated the drafting in response to the comments received as part of the consultation. Further background on the can be found in the previous consultation paper, which can be found at At the time of the July 2015 consultation, the specifications of the files required to support the (i.e. transfers to/from DCC) were not available. The file formats have now been added to the drafting of the, with the following file format specifications being introduced as Appendices B to E of the SMKI Recovery Procedure. General obligations in respect of file formats are provided in Appendix A of the. DCC Public Page 5 of 9

6 File Organisation Compromise Notification File (Appendix B) Organisation Compromise Recovery Progress File (Appendix C) Other Compromise Notification File (Appendix D) Other Compromise Recovery Progress File (Appendix E) Purpose Notification of affected Certificates / Devices / anchor slots for Organisation Compromise (methods 1 to 3 in the ), where the affected Subscriber is not DCC Notification of progress (success or failure) of replacement of affected Certificates on Devices for Organisation Compromise (methods 1 to 3 in the SMKI Recovery Procedure), where the affected Subscriber is not DCC Notification of affected Certificates / Devices / anchor slots for non-organisation Compromise (all but methods 1 to 3 in the ) plus methods 1 and 3 where DCC is the affected Subscriber Notification of progress (success or failure) of replacement of affected Certificates on Devices for non-organisation Compromise (all but methods 1 to 3 in the ) plus methods 1 and 3 where DCC is the affected Subscriber 3 File formats and usage When a Compromise occurs, files are required to be provided: a) from affected Subscribers to DCC; b) from DCC to affected Subscribers; c) from DCC to Responsible Suppliers (where not the affected Subscriber); and d) from DCC to the SMKI PMA. There are four file formats: a) two support methods 1-3, the Organisation Compromise Notification File and the Organisation Compromise Recovery Progress File (see section 3.1 below); and b) two support the remaining procedures, the Other Compromise Notification File and the Other Compromise Recovery Progress File (see section 3.2 below). 3.1 Organisation Compromise In conjunction with the DSP, DCC has developed an Organisation Compromise Notification File and corresponding Organisation Compromise Recovery Progress File. The Organisation Compromise Notification File will be used, where the affected Subscriber is not the DCC, to support notification of affected Devices/Certificates (for methods 1 to 3) and replacement Certificates (for method 3). The Organisation Compromise Recovery Progress File is used to report on the replacement or failure of attempts to replace affected Certificates on Devices for methods 1 to 3 (where the affected Subscriber is not the DCC). DCC Public Page 6 of 9

7 3.1.1 Organisation Compromise Notification File DCC has provided a set of slides along with this consultation, which describe: a) the elements comprising the name of the Organisation Compromise Notification File (slide 3); b) the fields within each Organisation Compromise Notification File (slide 4); c) when the Organisation Compromise Notification File is used to exchange information with DCC (slides 15, 17-19); and d) which fields will be populated for each relevant procedure (slides 26, 28, 29) Organisation Compromise Recovery Progress Files DCC has provided a set of slides along with this consultation, which describe: a) the elements comprising the name of the Organisation Compromise Recovery Progress File (slide 6); b) the fields within each Organisation Compromise Recovery Progress File (slide 7); c) when the Organisation Compromise Recovery Progress File is used to exchange information with DCC (slides 15, 17-19); and d) which fields will be populated for each relevant procedure (slides 26, 28, 29). Q1 Do you agree that the proposed structure of the Organisation Compromise Notification File and Organisation Compromise Recovery Progress File will support the efficient and effective recovery from an Organisation Compromise? If not, please provide a rationale for your answer. 3.2 Other Compromises In conjunction with the DSP, DCC has developed two files to support notification and progress reporting for other (i.e. not Organisation and not DCC) Compromises. The files to be used are the Other Compromise Notification File and corresponding Other Compromise Recovery Progress File. The Other Compromise Notification File will be used by DCC to support notification of affected Devices/Certificates and/or replacement Certificates, depending on the nature of the procedure. The Other Compromise Recovery Progress File is used (by a Subscriber or DCC) to report on the replacement or failure of attempts to replace affected Certificates on Devices, for procedures what do not relate to a single Organisation compromise Other Compromise Notification File DCC has provided a set of slides along with this consultation, which describe: a) the elements which make up the name of the Other Compromise Notification File (slide 9); b) the fields contained within each Other Compromise Notification File (slide 10); c) when the Other Compromise Notification File is used to exchange information with DCC (slides 16, 20-24); and d) which fields will be populated for each relevant procedure (slide 27, 30, 31). DCC Public Page 7 of 9

8 3.2.2 Other Compromise Recovery Progress Files DCC has provided a set of slides along with this consultation, which describe: a) the elements which make up the name of the Other Compromise Recovery Progress File (slide 12); b) the fields contained within each Organisation Compromise Recovery Progress File (slide 13); c) when the Other Compromise Recovery Progress File is used to exchange information with DCC (slides 16, 20-24); and d) which fields will be populated for each relevant procedure (slide 27, 30, 32). Q2 Do you agree that the proposed structure of the Other Compromise Notification File and Other Compromise Recovery Progress File will support the efficient and effective recovery from the procedures in the that do not relate to recovery from an Organisation Compromise (methods 1 to 3, where DCC is not the subject of the Compromise)? If not, please provide a rationale for your answer. Q3 Do you agree that the, amended following the July 2015 consultation and issued as part of this consultation, is fit for purpose and is suitable for inclusion in the SEC? If not, please provide a rationale for your answer. DCC Public Page 8 of 9

9 4 Consultation questions Q1. Do you agree that the proposed structure of the Organisation Compromise Notification File and Organisation Compromise Recovery Progress File will support the efficient and effective recovery from an Organisation Compromise? If not, please provide a rationale for your answer. Q2. Do you agree that the proposed structure of the Other Compromise Notification File and Other Compromise Recovery Progress File will support the efficient and effective recovery from the procedures in the SMKI Recovery procedure that do not relate to recovery from an Organisation Compromise (methods 1 to 3 where DCC is not the subject of the Compromise)? If not, please provide a rationale for your answer. Q3. Do you agree that the, amended following the July 2015 consultation and issued as part of this consultation, is fit for purpose and is suitable for inclusion in the SEC? If not, please provide a rationale for your answer. 4.1 How to respond Please provide responses by 7 October 2015 to DCC at contact@smartdcc.co.uk. If you have any questions about the consultation documents, please contact contact@smartdcc.co.uk. Consultation responses may be published on our website Please state whether all, or any part, of your consultation response is confidential. Please note that responses in their entirety (including any text marked confidential) may be made available to the Department of Energy and Climate Change (DECC) and the Gas and Electricity Markets Authority (the Authority). If you have questions about our approach to consultations, please contact our Regulation Manager at richard.sullivan@smartdcc.co.uk. 5 Referenced Documents Document Title Issue Dated Smart Energy Code SEC /07/2015 (consultation document) version 16/09/2015 (consultation document) Initial consultation version 01/07/2015 Table 1 Referenced Documents DCC Public Page 9 of 9

SMKI Recovery Procedure

SMKI Recovery Procedure SMKI Recovery Procedure Consultation open: 1 July 2015 Consultation closes: 29 July 2015 DCC Public Page 1 of 55 Contents 1 Introduction... 3 1.1 Purpose & Interpretation...3 1.2 Scope...3 2 Overview of

More information

Smart Metering Implementation Programme: Testing Baseline Requirements Document

Smart Metering Implementation Programme: Testing Baseline Requirements Document Smart Metering Implementation Programme: Testing Baseline Requirements Document 10 th August 2015 Testing Baseline Requirements Document Technical and Procedural requirements for demonstrating the testing

More information

Section Development History/Status Origin Link (to relevant. documentation) SEC stage 4 consultation. SEC Stage 4 consultation Content first proposed

Section Development History/Status Origin Link (to relevant. documentation) SEC stage 4 consultation. SEC Stage 4 consultation Content first proposed SECTION O development version [This is a development version of Section O. It contains: The designated content (currently SEC4.5 as at 28 th September 2015) Black text Content that has been concluded on

More information

Consultation on DCC Enduring Release Management Policy. Consultation opens: 18 September 2015

Consultation on DCC Enduring Release Management Policy. Consultation opens: 18 September 2015 Consultation on DCC Enduring Release Management Policy Consultation opens: 18 September 2015 Consultation closes: 16 October 2015 Classification: DCC Public Table of Contents 1 Introduction... 4 1.1 Objective...

More information

(SEC4.0) and (SEC4.1) indicates when new sections and appendices were added to the SEC. Section Title Section Title Definitions and Interpretation

(SEC4.0) and (SEC4.1) indicates when new sections and appendices were added to the SEC. Section Title Section Title Definitions and Interpretation . Key SEC Section headings Active Sections Active Sections varied by Section X Inactive but designated Sections Blank sections and (SEC4.1) indicates when new sections and appendices were added to the

More information

Incident Management Policy

Incident Management Policy Incident Management Policy Draft SEC Subsidiary Document DCC Public 01 July 2015 BASELINED VERSION 1 DEFINITIONS Term Black Start CPNI Code of Connection Crisis Management Disaster HMG Incident Party Interested

More information

Certification Practice Statement (ANZ PKI)

Certification Practice Statement (ANZ PKI) Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority

More information

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version) Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature

More information

Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF

Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF 6th Floor Dean Bradley House 52 Horseferry Road London SW1P 2AF T +44 (0)20 7706 5100 F +44 (0)20 7706 5101 info@energynetworks.org

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework

Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework Introduction The Citizens Advice service provides free, independent, confidential and

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

Incident Management Policy

Incident Management Policy Incident Management Policy Author: DCC Date: 9th May 2014 Page 1 of 10 Contents 1 Incident Management Policy 3 1.1 Incident Management Policy General Provisions 3 1.2 Pre-requisites to log an Incident

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

Committee on National Security Systems

Committee on National Security Systems Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

DCC Release Management Strategy

DCC Release Management Strategy DCC Release Management Strategy Version 1 24/03/2015 DRAFT Document Control Version Number Date Version 1 24/03/2015 Initial Draft for publication Documentation Approval Name Role Date Signature Dave Broady

More information

Certificate Policy. SWIFT Qualified Certificates SWIFT

Certificate Policy. SWIFT Qualified Certificates SWIFT SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities

More information

Smart Meters Programme Schedule 5.2. (Software) (CSP North version)

Smart Meters Programme Schedule 5.2. (Software) (CSP North version) Smart Meters Programme Schedule 5.2 (Software) (CSP North version) Schedule 5.2 (Software) (CSP North version) Amendment History Version Date Status v.1 Signature Date Execution copy SCHEDULE 5.2 SOFTWARE

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)

Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version) Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Data Communications Company (DCC) price control guidance: process and procedures

Data Communications Company (DCC) price control guidance: process and procedures Guidance document Contact: Tricia Quinn, Senior Economist Publication date: 27 July 2015 Team: Smarter Metering Email: tricia.quinn@ofgem.gov.uk Overview: The Data and Communications Company (DCC) is required

More information

Investment & Performance Board (IPB)

Investment & Performance Board (IPB) Investment & Performance Board (IPB) Date of IPB meeting: 18 December 2014 Title of paper: To be presented by: Cleared by: (name Adviser & Director) Classification: Junior Electricity Supply Licence Update

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Private Patient Policy. Documentation Control

Private Patient Policy. Documentation Control Documentation Control Reference Date approved Approving Body Trust Board Implementation Date July 2009 NUH Private Patient and Supersedes Overseas Visitor Policy Private Patient Advisory Group, Consultation

More information

CORPORATE RECORDS MANAGEMENT POLICY

CORPORATE RECORDS MANAGEMENT POLICY 1.1 Introduction Derbyshire County Council is dependent on its records to operate efficiently and to account for its actions. This policy defines a structure for Derbyshire County Council to ensure that

More information

E-MEX Panel Update March 2014

E-MEX Panel Update March 2014 222/10 EMR Panel Update Meeting Name BSC Panel Meeting Date 20 March 2014 Purpose of paper Summary For Information This paper is the Panel s monthly update on ELEXON s appointment as the Settlement Agent

More information

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy Version: 1.0 Issued: August 2014 Status: Final PEXA Certification Authority Certificate Profile 1. Introduction Property

More information

SEC Guidance I Processing of Service Requests, Responses and Alerts

SEC Guidance I Processing of Service Requests, Responses and Alerts Overview Communications with Devices comprising Enrolled Smart Metering Systems will be managed through the submission of Service Requests by users of the DCC s Enrolment and Communications Services (

More information

Competition and Markets Authority Energy market investigation: Notice of possible remedies Response of Smart DCC Ltd

Competition and Markets Authority Energy market investigation: Notice of possible remedies Response of Smart DCC Ltd Competition and Markets Authority Energy market investigation: Response of Smart DCC Ltd 05 August 2015 DCC Public Page 1 of 7 1 Executive summary 1. Smart DCC Ltd, known as the Data and Communications

More information

How To Prepare A Configuration Change Change Request For The Tfnsw Cmaac

How To Prepare A Configuration Change Change Request For The Tfnsw Cmaac Guide TfNSW Configuration Management and Asset Assurance Committee Submissions Guide Important Warning This document is one of a set of standards developed solely and specifically for use on public transport

More information

Guidance document for EMIS Web EPS Release 2 deployment

Guidance document for EMIS Web EPS Release 2 deployment Guidance document for EMIS Web EPS Release 2 deployment Crown Copyright 2011 Contents Guidance document for EMIS Web EPS Release 2 deployment... 1 1 Introduction... 4 1.1 Background... 4 1.2 Purpose...

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Smart Meters Programme Schedule 4.1

Smart Meters Programme Schedule 4.1 Smart Meters Programme Schedule 4.1 (Contractor Solution) (SMKI version) V1.1 1 Schedule 4.1 (Contractor Solution) This Schedule 4.1 (Contractor Solution) is formed of the following parts: Part A Introduction

More information

Trustis FPS PKI Glossary of Terms

Trustis FPS PKI Glossary of Terms Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate

More information

Updated SIT1 functionality (annex to SIT Approach Document) request for SEC Panel approval

Updated SIT1 functionality (annex to SIT Approach Document) request for SEC Panel approval To: SEC Panel 2 nd Floor, Ibex House 42 47 Minories London EC3N 1DY 15 th July 2015 Dear colleague, Updated SIT1 functionality (annex to SIT Approach Document) request for SEC Panel approval Purpose This

More information

NHS COUNTER-FRAUD AND SECURITY MANAGEMENT

NHS COUNTER-FRAUD AND SECURITY MANAGEMENT Restricted Appendix 17 Adult and Community Services County Hall, Colliton Park Dorchester Dorset DT1 1XJ Direct Line: 01305 22 Fax: 01305 224325 Minicom: 01305 267933 We welcome calls via text Relay NHS

More information

Smart Meters Programme Schedule 1 (Interpretation and Definitions) (CSP Central version)

Smart Meters Programme Schedule 1 (Interpretation and Definitions) (CSP Central version) Smart Meters Programme Schedule 1 (Interpretation and Definitions) (CSP Central version) Schedule 1 (Interpretation and Definitions) (CSP Central version) Amendment History Version Date Status v.1 Signature

More information

DNSSEC Policy and Practice Statement.amsterdam

DNSSEC Policy and Practice Statement.amsterdam DNSSEC Policy and Practice Statement.amsterdam Contact T +31 26 352 55 00 support@sidn.nl www.sidn.nl Offices Meander 501 6825 MD Arnhem Mailing address Postbus 5022 6802 EA Arnhem May 24, 2016 Public

More information

DATA Protection Act - A Review of Version 7

DATA Protection Act - A Review of Version 7 DATA PROTECTION ACT POLICY Version 7.0 Document owner Director ICT Document author and enquiry point Alison Moss, IT Security & Access Manager Date of document June 2010 Version 7.0 Document classification

More information

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Memorandum of Understanding

Memorandum of Understanding Memorandum of Understanding between Department for Business, Innovation and Skills and United Kingdom Accreditation Service Page 1 of 13 Contents 1 Purpose... 3 2 Background... 3 3 Scope of activity...

More information

Dundalk Institute of Technology Change Control Procedure

Dundalk Institute of Technology Change Control Procedure Dundalk Institute of Technology Change Control Procedure 1 Revision History Date of this revision: 07 Dec 2015 Date of next revision: 07 Dec-2016 Revision Number v1.0.1 Revision Summary of Changes Date

More information

Archived NIST Technical Series Publication

Archived NIST Technical Series Publication Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated

More information

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11. Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric

More information

The Role of the Primary Treating Medical Practitioner

The Role of the Primary Treating Medical Practitioner The Role of the Primary Treating Medical Practitioner The Role of the Primary Treating medical Officer 1 Please note This information is for guidance only and is not to be taken as an expression of the

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Network Certification Body

Network Certification Body Network Certification Body Scheme rules for assessment of railway projects to requirements of the Railways Interoperability Regulations as a Notified and Designated Body 1 NCB_MS_56 Contents 1 Normative

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Transnet Registration Authority Charter

Transnet Registration Authority Charter Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/

More information

Standard conditions of the Electricity Distribution Licence

Standard conditions of the Electricity Distribution Licence Gas and Electricity Markets Authority ELECTRICITY ACT 1989 Standard conditions of the Electricity Distribution Licence Standard conditions of the Electricity Distribution Licence 30 October 2015 SECTION

More information

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS. Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,

More information

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc. CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8

More information

Spotlight on the SEC Seminar. 23 rd October 2015 10:00 15:00

Spotlight on the SEC Seminar. 23 rd October 2015 10:00 15:00 Spotlight on the SEC Seminar 23 rd October 2015 10:00 15:00 Welcome Jill Ashby Head of Code 10:00 10:10 Gemserv 2 Housekeeping Gemserv 3 Speakers Today Jill Ashby Alys Garrett David Barber George McGregor

More information

Co-operative Energy, Co-operative House Warwick Technology Park, Warwick CV34 6DA.

Co-operative Energy, Co-operative House Warwick Technology Park, Warwick CV34 6DA. Terms and Conditions May 2014 Co-operative Energy: General Terms and Conditions for Domestic Customers Only Applicable from 1st June 2014. Co-operative Energy Limited is a limited liability company registered

More information

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation Quality Assurance and Enhancement Documentation 1.0 Introduction 2.0 Standard Format 3.0 Programme Approval Form 4.0 Validation Documentation 5.0 Response to Conditions 6.0 Definitive Document 7.0 Programme

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

BOARD CHARTER Link Administration Holdings Limited ("Company") ABN 27 120 964 098

BOARD CHARTER Link Administration Holdings Limited (Company) ABN 27 120 964 098 1. Role of the Board BOARD CHARTER Link Administration Holdings Limited ("Company") ABN 27 120 964 098 This Board Charter sets out the principles for the operation of the board of directors of the Company

More information

ARTL PKI. Certificate Policy PKI Disclosure Statement

ARTL PKI. Certificate Policy PKI Disclosure Statement ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: utilities.commission@nt.gov.au Website:

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities

GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities Office of Government Procurement Building Control (Amendment) Regulations 2014 Procurement

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Access and Use of the Victoria University Relationship Management Database (RMD) Policy

Access and Use of the Victoria University Relationship Management Database (RMD) Policy Management Database (RMD) Policy Public Affairs Policy Group 1. Purpose: This policy outlines the principles and operational issues associated with allowing individuals to view, record, extract, or use

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Access Control Policy Document Status Security Classification Version 1.0 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention Change

More information

An Introduction to Cryptography and Digital Signatures

An Introduction to Cryptography and Digital Signatures An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through

More information

BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS

BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION RS BR IBBS-2.1-2007 MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS GUIDELINES FOR SELF-ASSESSMENT OF CONFORMITY OF INFORMATION

More information

Information Security Management System (ISMS) Policy

Information Security Management System (ISMS) Policy Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Smart Meters Programme Schedule 5.3. (Escrow) (CSP North version)

Smart Meters Programme Schedule 5.3. (Escrow) (CSP North version) Smart Meters Programme Schedule 5.3 (Escrow) (CSP North version) Schedule 5.3 (Escrow) (CSP North version) Amendment History Version Date Status v.1 Signature Date Execution Copy SCHEDULE 5.3 ESCROW 1.

More information

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation Facilitate Business Continuity Planning and disaster recovery for a Overview This unit is suitable for those working in risk management roles who have responsibility for facilitating business continuity

More information

Advanced Topics in Cryptography and Network Security

Advanced Topics in Cryptography and Network Security Advanced Topics in Cryptography and Network Security Breno de Medeiros Department of Computer Science Florida State University Advanced Topics in Cryptography and Network Security p.1 Class Reference Sheet

More information

Smart energy for business. Our approach to engaging microbusinesses in the smart meter roll-out

Smart energy for business. Our approach to engaging microbusinesses in the smart meter roll-out Our approach to engaging microbusinesses in the smart meter roll-out Executive Summary Hello Thanks for taking the time to read this paper which outlines our approach to engaging microbusinesses with smart

More information

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework.

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework. Gatekeeper Public Key Infrastructure Framework 1 October 2007 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright.

More information

Office of Inspector General

Office of Inspector General INFORMATION TECHNOLOGY: The Bureau of the Public Debt s Certificate Policy Statement Should Be Updated OIG-03-009 October 24, 2002 Office of Inspector General ******* The Department of the Treasury Contents

More information

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature

More information

PUBLIC. Response to consultation on EMR data flows

PUBLIC. Response to consultation on EMR data flows PUBLIC Response to consultation on 28 April 2014 CONTENTS INTRODUCTION... 3 1. Background... 3 2. ELEXON s proposal to the CfD Counterparty... 3 RECOMMENDATION TO DECC ON MECHANISMS FOR PARTIES TO EXCHANGE

More information

Corporate Credit Card Policy and Procedures

Corporate Credit Card Policy and Procedures PROCUREMENT & PAYMENT SERVICES CORPORATE FINANCE FINANCE CHIEF EXECUTIVES Corporate Credit Card Policy and Procedures Version Control Version: 3 Date of Last Update: 11/08/14 PURPOSE/BACKGROUND To set

More information

Schedule 13 - NHS Counter Fraud and Security

Schedule 13 - NHS Counter Fraud and Security 1. In this Schedule 13: Schedule 13 - NHS Counter Fraud and Security 1.1 CFSMS means the Special Health Authority established by the Counter Fraud and Security Management Service (Establishment and Constitution

More information

CSCI 4541/6541: NETWORK SECURITY

CSCI 4541/6541: NETWORK SECURITY 1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10

More information

Insurer audit manual

Insurer audit manual Insurer audit manual Disclaimer This publication may contain work health and safety and workers compensation information. It may include some of your obligations under the various legislations that WorkCover

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

Switching project. Target Operating Model and updated project governance. Ciaran MacCann and Andrew Wallace 3 November 2014

Switching project. Target Operating Model and updated project governance. Ciaran MacCann and Andrew Wallace 3 November 2014 Switching project Target Operating Model and updated project governance Ciaran MacCann and Andrew Wallace 3 November 2014 Contents 1. Update on road map for reform 2. Review approach and undertake gap

More information

ADELAIDE BRIGHTON LIMITED ACN 007 596 018

ADELAIDE BRIGHTON LIMITED ACN 007 596 018 ADELAIDE BRIGHTON LIMITED ACN 007 596 018 CONTINUOUS DISCLOSURE POLICY 1 Introduction This policy sets out Adelaide Brighton Limited s (the Company) practice in relation to continuous disclosure. This

More information

APPLICATION FORM. 5. Are you the owner of the premises? YES/NO (Circle your answer)

APPLICATION FORM. 5. Are you the owner of the premises? YES/NO (Circle your answer) Application No. Government Scheme to provide Emergency Humanitarian Support to Small Businesses 2015 (For small businesses adversely affected by flooding arising from Storm Desmond covering the period

More information

Department: Corporate Secretariat

Department: Corporate Secretariat RESPONSIBLE PERSON POLICY Department: Corporate Secretariat 1 Contents Overview 3 General Principles 4 Fitness 4 Propriety 4 Policies: 4 Entity needs and fitness analysis 4 Identifying responsible person

More information

ACADEMIC POLICY FRAMEWORK

ACADEMIC POLICY FRAMEWORK ACADEMIC POLICY FRAMEWORK Principles, Procedures and Guidance for the Development & Review of Academic Policies [V.1] Page 2 of 11 TABLE OF CONTENTS 1. FRAMEWORK OVERVIEW... 3 2. PRINCIPLES... 4 3. PROCESS...

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information