14
M E N T C O M M U N I C A T I O N S S E C U R I T Y B M E N T C O M M U N I C A T I O N S S E C U R I T Y B e-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

Embed Size (px)

Citation preview

Page 1: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

e-GovernmentInformation Security

Jay GardenINFOSEC Assessments

Government Communications Security Bureau

Page 2: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

Government Online Services• Treasury’s Crown Financial IS• Land Information NZ• FoRST• Health Intranet• irFile• … many more on the way

– information– transactions– voting / referendums

Page 3: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

E-Government Initiatives

• SSC E-Government Unit• SENSITIVE and IN-CONFIDENCE• Secure Electronic Environment

(SEE)– SEE Mail (gateway-gateway secure

mail)– SEE Key (public key certificates)

Page 4: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

SEE Overview

INTERNET

SSC

DPM&CTreasury

CertificateStoreCertification

Authority

Page 5: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

SEE Key

• Public Key Infrastructure– authentication within Government– development of the framework, not

the Certification Authorities– much more that just cryptography– certificates for citizens ?

Page 6: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

E-Government Initiatives

• SSC E-Government Unit• SENSITIVE and IN-CONFIDENCE• Secure Electronic Environment

(SEE)– SEE Mail (gateway-gateway secure

mail)– SEE Key (public key certificates)

• National Information Infrastructure

Page 7: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

National Information Infrastructure

• Integrity & availability of critical systems– utilities: power, water, telecomms– emergency services– transport– finance– government

• Most components not controlled by Govt– Some are out of the country

• Coordination rather than control

Page 8: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

E-Government Initiatives

www.e-government.govt.nz

Page 9: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

INFOSEC Technologies

• Firewalls• Intrusion Detection• Vulnerability assessment• Authentication tokens, biometrics, single

sign-on, remote access• Public key - digital signatures and

encryption• Content filtering

Page 10: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

Enigma• Combination of

– rotor selection, wiring and position

– plugboard configuration

• Rotor advances with each keystroke

Page 11: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau
Page 12: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

Enigma• Combination of

– rotor selection, wiring and position– plugboard configuration

• Rotor advances with each keystroke

• 3 rotors - 3.28 x 10114 combinations

• ~1080 atoms in the visible universe !!

• 4 rotors - 2.33 x 10145 combinations

Page 13: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

Breaking Enigma

• Overconfidence led to procedures not being followed– Weak and reused keys– known plaintext attacks

• Lessons equally applicable to current COMSEC and COMPUSEC mechanisms

Page 14: E-Government Information Security Jay Garden INFOSEC Assessments Government Communications Security Bureau

G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U G O V E R N M E N T C O M M U N I C A T I O N S S E C U R I T Y B U R E A U

QUESTIONS?

www.gcsb.govt.nz