View
58
Download
0
Category
Preview:
DESCRIPTION
Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security”. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484. - PowerPoint PPT Presentation
Citation preview
Arab Regional Workshop on“IP STRATEGIES AND IDN ISSUES”
Damascus-Syria, 16-18 May 2006
“Cyber Security”
The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership.
Désiré KARYABWITEIP Coordinator
E-Strategy Unit Email: desire.karyabwite@itu.int
Tel: +41 22 730 5009 Fax: +41 22 730 5484
04/25/23 2
Network Security: Creating trust in Critical IP-based infrastructures
“on the Internet, nobody knows you’re a dog…”
Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development
Danger can come from almost anywhere…
04/25/23 3
04/25/23 4
…Network Security: Creating trust in Critical network infrastructures!
04/25/23 5
Convergence: Transport of Voice, video and Data on IP-based Networks
04/25/23 6
04/25/23 7
SPAMS & Phishing
Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.
By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group
04/25/23 8
How security is provisioned for VoIPIn an H.323 multimedia system, ITU-T Recommendation H.235 defines the security framework including specification of the security mechanisms and security protocols for H.323.
H.235 was first introduced for H.323 Version 2 systems in 1998. Since then, H.235 has further evolved over time by consolidating the offered security mechanisms, by adding more sophisticated security algorithms
If available and suitable, existing security tools such as available Internet security packages and standards (IPSec, SSL/TLS) can be (re)used in the context of H.235
04/25/23 9
Security and e-Health : an e-prescription system in the UK
04/25/23 10
At heart of the system is a security infrastructure that provides not only strong authentication (a PKI using public key certificates) but also strong authorisation in which the specific rights that medical professionals have are granted because of their roles stored in attribute certificates.
ITU-T X.509 enable today more generalized and global access to e-prescriptions
04/25/23 11
Désiré KARYABWITE
IP Coordinator,
E-Strategy Unit,
Email: desire.karyabwite@itu.int
Tel: +41 22 730 5009 Fax: +41 22 730 5484
Thank you for your Attention
For more details: www.itu.int/itu-d
04/25/23 12
Recommended