FAQ: (Data) security and privacy

Size: px
Start display at page:

Download "FAQ: (Data) security and privacy"

Transcription

1 Shockwave Traffic Jams A58 FAQ: (Data) security and privacy The strength of the shockwave traffic jam service developed in the project Shockwave Traffic Jams A58 is that the participants receive customized in-car advice. However, this personalized service requires a lot of data. This involves highly specific data about the participants vehicles, for example: their location, speed, direction, etc. Which issues come into play here in terms of (data) security and privacy? And how does Shockwave Traffic Jams A58 deal with those issues? About Shockwave Traffic Jams A58 The Province of Noord-Brabant is the contracting authority for the project Shockwave Traffic Jams A58, which is part of the Ministry of Infrastructure and the Environment s programme Beter Benutten (Optimising Use). In this project, businesses, government and knowledge institutions cooperate to introduce cooperative systems and services. To this end, 34 roadside beacons equipped with WiFi-P have now been installed along the A58 motorway between Tilburg and Eindhoven. With suitable equipment, they enable wireless communication in passing cars. The first service to run on this system is the shockwave traffic jam service: based on detailed information about congestion and shockwave traffic jams along the test route, participants receive personalized in-car speed advice. This enables them to better anticipate situations ahead that are not yet visible, enabling them to move through the traffic quickly and more easily. (DATA) SECURITY Which issues come into play in terms of (data) security? When data are used, and certainly when they are transmitted, three types of data security threats come into play. The first involves the question of whether the authenticity is safeguarded. For example: as the user of an in-car service, can I trust that the information on the screen of my device truly originates with my service provider? 1 Secondly, there is the issue 1 Of course, the other parties involved in the chain face similar problems - for example, the service provider itself (do the data that are fed back to the service provider really come from its users?), the traffic control centre, etc. Here, only examples with the end user are discussed.

2 of integrity. Is the advice appearing on my screen correct? Have the data been knowingly or unknowingly changed? And thirdly, there may be concerns regarding the availability. Will the service be available when I want to use it? Or will there be a problem, somewhere in the chain, with collecting or sharing data, and will that lead to a breakdown of the service? 2 Can these issues be prevented? There is no such thing as 100% (data) security. Accordingly, the aim of security measures is to reduce risks to an acceptable level. What is acceptable will differ for each individual application. Obviously, a service that takes over some or all of the task of driving entails greater risks and must therefore be secured much more tightly than a service that only provides information or advice. What are the specific security risks in the project Shockwave Traffic Jams A58? Those risks are small, because the service being offered is an advisory service. The worst thing that can happen is wrong advice being displayed on the screen of the device in the car (e.g. advice to reduce speed while that is not necessary), or that no advice whatsoever is shown for a brief period. In both of these cases, the driver will be in the middle and quite able to take his own decision. Such problems are undesirable, obviously, if only because each issue is harmful to the trust placed in - and by the same token: the success of - the cooperative system and the shockwave traffic jam service. Which (data) security approach was chosen for Shockwave Traffic Jams A58? Shockwave Traffic Jams A58 is a joint development and test project for ITS. This is why it was decided to acquire experience with sophisticated (data) security measures. These are suitable for the shockwave traffic jam service but are meant in particular for the future and for services yet to be developed. The most important measure is that all communication transmitted by roadside stations and cooperative equipment in vehicles is digitally signed. This guarantees the integrity and authenticity of the communication - in other words, it ensures that the data are, in fact, sent on by and originate with a reliable source without being changed. The signing and verification process is called Public Key Infrastructure, or PKI (more details are given below the next question). To maintain optimal availability, the Shockwave Traffic Jams A58 system runs on quality servers with high uptime. How does this PKI system work? Every system in Shockwave Traffic Jams A58 that transmits wireless messages - i.e. the 2 The security issues regarding data storage - are the data inaccessible to unauthorized parties? are discussed in the section about Privacy. 2

3 roadside beacons and the cooperative devices in the vehicles - gets two types of digital keys : secret keys for those beacons and devices, and a public key that is accessible to anyone via a database. The issue and registration of the sets of keys is closely supervised. Let s say a service provider wants to transmit speed advice. Prior to transmission, the service provider signs this message with his secret key: based on the content of the message, the key generates a digital signature. As soon as a cooperative device in a car receives this speed advice, it will look for the public key of the transmitting roadside beacon. This public key can be used to verify the signature under the message: was that signature in fact generated with the proper secret key (= is the sender who it says it is), and does it match the content of the message? If an OK comes back, the cooperative car device knows that both authenticity and integrity are okay. If a false comes back, then either the sender is not who it says it is or the message has been altered. Does the PKI system in Shockwaves Traffic Jams A58 use encryption to render messages unreadable? No, it does not. The reason is very simple: at the heart of a cooperative system lies cooperation and the free exchange of data between the various components within the system (i.e. between the car devices themselves, and between those devices in the cars and the roadside beacons). Data encryption is diametrically opposed to that principle and, moreover, serves no purpose whatsoever for a collective application like speed advice. For example, this means that speed advice from the service provider or location and speed data from the vehicles can be read in principle by anyone. This does not pose any problem for security as long as no incorrect or unwarranted messages are sent - but it does raise some privacy issues, of course. For this, see the section Privacy further down. What about (data) security when more services become available on the cooperative system? Whether the existing measures still adequately address any (new) risks will have to be determined with each new service. Where necessary, additional security will need to be provided. PRIVACY Which issues come into play in terms of privacy? Data are collected and stored about the individual cars, for example, such as their location and time. Certain information is also shared with third parties. These are the first risks: are the data inaccessible for unauthorized parties and is it ensured that no privacy-sensitive information is shared? Then there is the fact that the communications are not encrypted, for the sake of the open and collective nature of the cooperative system. Theoretically, this means that someone else could also receive and read the messages. 3

4 How are the privacy risks of storing and sharing (vehicle) data minimized? All the source data collected for the project Shockwave Traffic Jams A58 are stored on servers in server parks, which are tightly secured, both physically and digitally. In terms of traffic information, the collected data are interesting for third parties because they provide a detailed picture of the speed and stability of traffic flows, for example. To prevent third parties from being able to zoom in on individual cars, the data are only offered in aggregated form. However, as it is virtually impossible to aggregate all the different starting points and destinations, the head and tail of each individual trip can be removed. This way, no information about individual trips can be shared. All messages can be intercepted and read. What are the resulting, specific privacy risks and how are they countered? There are no privacy issues attached to the data distributed by service providers via the roadside systems: those data concern speed advice and warnings similar to the ones that can be shown on variable message signs. This is different with the data trail left behind by the on-board units. Even though each separate message presents no problems a certain vehicle A was driving at location x at point in time t it would be a problem if all communications from a cooperative vehicle were intercepted and projected on a map: this would reveal a route. This would allow insight into the travel behaviour of individual vehicles (and thus of the user/driver). While that risk does not seem very large, the cooperative system of Shockwave Traffic Jams A58 is already prepared for tight measures that will tackle this problem. For example, the onboard units have various digital identities for signing the messages. Using multiple identities makes it much harder for third parties to recognise a sender based on the messages sent. The on-board units can change their unique ID ( MAC-address ) every five minutes, meaning that they never transmit the same ID for longer than a few consecutive minutes. 3 The cooperative system itself will not know which ID belongs to which vehicle, either, in that event. In its turn, this makes it impossible to follow the on-board units themselves. What about privacy when more services become available on the cooperative system? That will need to be examined for each new application: which (new) data are collected, stored and shared, and to what extent does this present a (new) privacy risk? With the current system of secure data storage and aggregating data, a solid foundation has already been laid for the protection of privacy. In addition, the cooperative system is already prepared for the removal of trip heads and tails and for changing MAC-addresses, which steps up privacy protection quite considerably as well. 3 Many devices have a fixed MAC address, but the on-board units do not. That has everything to do with the communication technology used (WiFi-P), which is based on connectionless communication. Contrary to mobile communications, messages are only sent, so there is no need to establish a connection. That makes it easy to switch IDs. 4

5 Security and privacy measures according to European standards All (data) security and privacy measures applied in the Shockwave Traffic Jams A58 project dovetail with European frameworks as adopted by ETSI, the European Telecommunications Standards Institute. Accordingly, rather than creating new concepts, the Shockwave Traffic Jams A58 project has translated existing concepts into practice. Valuable knowledge and experience has been gained in the process: many of the concepts had not been applied on such a large scale. Obviously, being in line with existing concepts and agreements is important with a view to the future. If extra security and privacy measures become necessary because more extensive applications are introduced, the security and privacy system from the Shockwave Traffic Jams A58 project will not need to be fully adapted. In that event, the existing system can easily be expanded. 24 May 2016 More information: Trudy van de Westelaken, communication advisor for the Shockwave Traffic Jam A58 project: info@spookfiles.nl. 5

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

A simple tscheme guide to securing electronic transactions

A simple tscheme guide to securing electronic transactions A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly

More information

The Benefits of the thawte ISP Program

The Benefits of the thawte ISP Program The Benefits of the thawte ISP Program Earn additional revenue by reselling thawte digital certificate products... 1. Overview 2. Who Should Join? 3. The ISP Program what are the Benefits? 4. How can you

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

CallRail Healthcare Marketing. HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software

CallRail Healthcare Marketing. HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software CallRail Healthcare Marketing HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software Healthcare 2015 HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software

More information

Strong Security in Multiple Server Environments

Strong Security in Multiple Server Environments White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users

Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users INTRODUCTION What does the code of practice cover? The code of practice gives practical guidance

More information

Network Security. Chapter 14. Security Aspects of Mobile Communications

Network Security. Chapter 14. Security Aspects of Mobile Communications Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication

More information

TETRA Security for Poland

TETRA Security for Poland TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant brian@warrensystems.co.uk

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

As simple as e-mail and as secure as postal mail.

As simple as e-mail and as secure as postal mail. Stay up-to-date Page 1 The advantages of De-Mail for individuals, businesses and Page 2 government agencies Unencrypted, unprotected, unverified what does that mean? Page 3 Encrypted, protected, verified

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

Manufacturers versus Component Part and Raw Material Suppliers: How to Prevent Liability By Kenneth Ross *

Manufacturers versus Component Part and Raw Material Suppliers: How to Prevent Liability By Kenneth Ross * Manufacturers versus Component Part and Raw Material Suppliers: How to Prevent Liability By Kenneth Ross * Introduction One of the more perplexing and potentially dangerous areas of product liability practice

More information

Corporate and Payment Card Industry (PCI) compliance

Corporate and Payment Card Industry (PCI) compliance Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented

More information

HKIHRM HR PROFESSIONAL STANDARDS MODEL

HKIHRM HR PROFESSIONAL STANDARDS MODEL HKIHRM HR PROFESSIONAL STANDARDS MODEL Creating Values For You and For Organisations Setting Standards Recognising s ABOUT HKIHRM The Hong Kong Institute of Human Resource Management (HKIHRM) is the leading

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

An Introduction to HIPAA and how it relates to docstar

An Introduction to HIPAA and how it relates to docstar Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10. Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web

More information

Notes on Network Security - Introduction

Notes on Network Security - Introduction Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

An Introduction to Cryptography and Digital Signatures

An Introduction to Cryptography and Digital Signatures An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through

More information

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001

Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 I. Introduction. Traffic Engineering and Highway Safety Division Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 The New

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all

More information

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

Chapter 7 Information System Security and Control

Chapter 7 Information System Security and Control Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

Identifying Broken Business Processes

Identifying Broken Business Processes Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The

More information

HF Markets Ltd PRIVACY POLICY

HF Markets Ltd PRIVACY POLICY HF Markets Ltd PRIVACY POLICY PRIVACY POLICY This privacy statement covers the website www.hotforex.com, and any related sub-domains that are registered and operated by the HF Markets Ltd. 1. Introduction...

More information

Security Management. Security is taken for granted until something goes wrong.

Security Management. Security is taken for granted until something goes wrong. Security Management Security Management Security is taken for granted until something goes wrong. Concerns about security have existed for as long as has mankind. The most obvious manifestation of this

More information

Copyright 2005-2007 MyPW LLC.

Copyright 2005-2007 MyPW LLC. Simple & Secure Authentication It's common knowledge that most people use the same or similar passwords wherever they have an online account. Because of this, it can only take one security breach for Identity

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used? Privacy Policy The Friends of the Public Garden ("FoPG" or "We") is a non-profit corporation and the owner and operator of www.friendsof thepblicgarden.org (the "Website"), which is intended to supply

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

SCRIPT: Security Training

SCRIPT: Security Training SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department

More information

The public official, an implicit model for the certification of private documents

The public official, an implicit model for the certification of private documents The electronic legal document and the French Commercial Court Registrars, public and ministerial officials Pascal Beder Greffier associé du tribunal de commerce de Paris/Associate Registrar of the Commercial

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

PRIVACY POLICY. I. Introduction. II. Information We Collect

PRIVACY POLICY. I. Introduction. II. Information We Collect PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g. EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

PRIVACY POLICY. Introduction

PRIVACY POLICY. Introduction PRIVACY POLICY Introduction Thomas & Darden Inc. ( Company or We ) respects your privacy and is committed to protecting it through our compliance with this policy. This policy describes the types of information

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information

Mentoring YOUR ROAD MAP TO SUCCESS. By Nona Chigewe

Mentoring YOUR ROAD MAP TO SUCCESS. By Nona Chigewe Mentoring YOUR ROAD MAP TO SUCCESS By Nona Chigewe 28 CERTIFIED June 2012 ORGANIZATIONS AND THEIR EMPLOYEES HAVE ONE VITAL purpose in common: both are striving to accomplish a life-changing, impactful

More information

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL

More information

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address

More information

A RESPONSIBLE, COLLABORATIVE AND AGILE ORGANISATION

A RESPONSIBLE, COLLABORATIVE AND AGILE ORGANISATION 44 NZ Transport Agency Statement of intent 215 19 A RESPONSIBLE, COLLABORATIVE AND AGILE ORGANISATION In order to deliver our desired targets and results effectively and efficiently, we continue to invest

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

OSI Seven Layers Model Explained with Examples

OSI Seven Layers Model Explained with Examples OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Computers and Society: Security and Privacy

Computers and Society: Security and Privacy 1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1

More information

DARTFISH PRIVACY POLICY

DARTFISH PRIVACY POLICY OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity

More information

Explain how Employee Performance is Measured and Managed

Explain how Employee Performance is Measured and Managed Explain how Employee Performance is Measured and Managed For this last section of my report I will be discussing how employee performance can be both managed and measured. In addition to this, I will also

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

What is a SSL VPN and How Does it Work?

What is a SSL VPN and How Does it Work? Acceleration of Data through SSL Virtual Private Networks Rob Jansen University of Minnesota, Morris 600 East Fourth Street Morris, MN 56267 (123) 456-7890 jans0184@morris.umn.edu ABSTRACT A Virtual Private

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Building Customer Confidence through SSL Certificates and SuperCerts

Building Customer Confidence through SSL Certificates and SuperCerts Building Customer Confidence through SSL Certificates and SuperCerts Contents 1. Overview 2. Why SSL? 3. Who needs an SSL certificate? 4. How to tell if a website is secure 5. Browser warnings 6. What

More information

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION Summary November 2009 On August 24, 2009, the Department of Health and Human Services (HHS) published an interim final rule (the Rule ) that

More information

No more nuisance phone calls! Internet Control Panel & Weblink Guide

No more nuisance phone calls! Internet Control Panel & Weblink Guide No more nuisance phone calls! Internet Control Panel & Weblink Guide truecall Ltd 2009 2 Contents Welcome! 3 Weblink 4 Your Internet Control Panel 5 Frequently asked questions 15 Support/Data Protection

More information

Starter PKI Program. Get the timesaving convenience of a thawte. multiple digital certificate account... 2. What is the Starter PKI Program?

Starter PKI Program. Get the timesaving convenience of a thawte. multiple digital certificate account... 2. What is the Starter PKI Program? The Starter PKI Program Get the timesaving convenience of a thawte multiple digital certificate account... 1. Overview 2. What is the Starter PKI Program? 3. Starter PKI the Benefits 4. How does it all

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Introductions 1 min 4

Introductions 1 min 4 1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

STB- 2. Installation and Operation Manual

STB- 2. Installation and Operation Manual STB- 2 Installation and Operation Manual Index 1 Unpacking your STB- 2 2 Installation 3 WIFI connectivity 4 Remote Control 5 Selecting Video Mode 6 Start Page 7 Watching TV / TV Guide 8 Recording & Playing

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER?

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER? 1 www.e-safecompliance.com MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER? Based on Gartner Worldwide spending on information security will reach $71.1 billion

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Getting Started Guide

Getting Started Guide Page 2 of 9 Introduction This guide is designed to provide you with the information you need to complete your Payment Gateway account set up and begin processing live payment transactions. As a quick overview,

More information

Understanding and Integrating KODAK Picture Authentication Cameras

Understanding and Integrating KODAK Picture Authentication Cameras Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.

More information

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

tell you about products and services and provide information to our third party marketing partners, subject to this policy; WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses

More information

Transport Layer Security (TLS) About TLS

Transport Layer Security (TLS) About TLS Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

HIPAA SECURITY AWARENESS

HIPAA SECURITY AWARENESS April, 2005 HIPAA SECURITY AWARENESS Department of Mental Health, Mental Retardation, and Substance Abuse Services What is HIPAA? HIPAA means Health Insurance Portability and Accountability Act It is a

More information

Participants Manual Video Seven The OSCAR Coaching Model

Participants Manual Video Seven The OSCAR Coaching Model Coaching Skills for Managers Online Training Programme Part One Fundamentals of Coaching Participants Manual Video Seven The OSCAR Coaching Model Developed by Phone: 01600 715517 Email: info@worthconsulting.co.uk

More information

To start using your phone as a navigation device, tap the TomTom button in the Windows Mobile start menu.

To start using your phone as a navigation device, tap the TomTom button in the Windows Mobile start menu. TomTom NAVIGATOR 1. Before you start... Before you start... Setting up To start using your phone as a navigation device, tap the TomTom button in the Windows Mobile start menu. To set up your navigation

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Secure Networking Using Mobile IP

Secure Networking Using Mobile IP Secure Networking Using Mobile IP Alexandros Karakos and Konstantinos Siozios Democritus University of Thrace eepartment of Electrical and Computer Engineering GR-671 00 Xanthi, GREECE Abstract. The increasing

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information