Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int

Post on 23-Mar-2016

58 views 0 download

description

Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security”. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484. - PowerPoint PPT Presentation

Transcript of Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int

Arab Regional Workshop on“IP STRATEGIES AND IDN ISSUES”

 Damascus-Syria, 16-18 May 2006

“Cyber Security”

The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership.

Désiré KARYABWITEIP Coordinator

E-Strategy Unit Email: desire.karyabwite@itu.int

Tel: +41 22 730 5009 Fax: +41 22 730 5484

04/25/23 2

Network Security: Creating trust in Critical IP-based infrastructures

“on the Internet, nobody knows you’re a dog…”

Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development

Danger can come from almost anywhere…

04/25/23 3

04/25/23 4

…Network Security: Creating trust in Critical network infrastructures!

04/25/23 5

Convergence: Transport of Voice, video and Data on IP-based Networks

04/25/23 6

04/25/23 7

SPAMS & Phishing

Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.

By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group

04/25/23 8

How security is provisioned for VoIPIn an H.323 multimedia system, ITU-T Recommendation H.235 defines the security framework including specification of the security mechanisms and security protocols for H.323.

H.235 was first introduced for H.323 Version 2 systems in 1998. Since then, H.235 has further evolved over time by consolidating the offered security mechanisms, by adding more sophisticated security algorithms

If available and suitable, existing security tools such as available Internet security packages and standards (IPSec, SSL/TLS) can be (re)used in the context of H.235

04/25/23 9

Security and e-Health : an e-prescription system in the UK

04/25/23 10

At heart of the system is a security infrastructure that provides not only strong authentication (a PKI using public key certificates) but also strong authorisation in which the specific rights that medical professionals have are granted because of their roles stored in attribute certificates.

ITU-T X.509 enable today more generalized and global access to e-prescriptions

04/25/23 11

Désiré KARYABWITE  

IP Coordinator,

E-Strategy Unit,

Email: desire.karyabwite@itu.int

Tel: +41 22 730 5009 Fax: +41 22 730 5484

Thank you for your Attention

For more details: www.itu.int/itu-d

04/25/23 12