Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques...

57
Egyptian E - Signature and Its role in W orkflow Automation for S mart Ports Dr. Sherif Hazem VP Electronic Transactions Security, ITIDA

Transcript of Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques...

Page 1: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Egyptian E-Signature and

Its role in Workflow

Automation for Smart Ports

Dr. Sherif Hazem

VP Electronic Transactions Security, ITIDA

Information Technology

Industry Development Agency

Smart Village, Building (B121)

Cairo – Alexandria Desert Road

Giza, Egypt, PO BOX 12577

Ehab MostafaVP Global Trade & Industry

Development Group

(+202) 3534 5151

(+202) 3534 5150

[email protected]

Bio

Page 2: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

The Need For Authentication Systems and PKI

Problem Definition ??

Page 3: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Bank Hackers Steal $300 Millions via MalwareBy DAVID E. SANGER and NICOLE PERLROTH

FEB. 14, 2015

“The goal was to mimic their activities,” said Sergey Golovanov of

Kaspersky, about how the thieves targeted bank employees.Credit Raphael Satter/Associated Press

Page 4: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Cyber Threats (Phishing) Allover The World

Page 5: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Technical Solutions to The Problems at a Hand

Page 6: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Authentication Systems

• The most common forms of authentication systems can be :

1. Shared Secrets (Passwords)

Page 7: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

1. Shared Secrets -Passwords(One Factor Authentication) Examples

Page 8: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

1.Shared Secrets -Passwords(One Factor Authentication) Examples Cont..

Page 9: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Attacks on Password Techniques :Password Cracking

Page 10: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Attacks on Password Techniques :Keystroke Logger

Page 11: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Authentication Systems

• The most common forms of authentication systems can be classified into three main classes:

2. Time Based Password (One Time Password)

Page 12: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

2. Time-Based -One Time Password (Two Factor Authentication)

Page 13: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Samples of Phishing Attack on OTPCitibank Phish Spoofs 2-Factor Authentication

Page 14: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Continue…

Page 15: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Continue…

Page 16: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Continue..

Page 17: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Authentication Systems

• The most common forms of authentication systems can be classified into three main classes:

3. Digital Certificate and PKI (E-Signature)

Page 18: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

E-Signature and PKI Systems & Human Digital Identity

Page 19: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Electronic Signature

Electronic Signature means an electronic symbol, attached to a document and executed or adopted by a person with the intent to sign the document

• Source: Electronic Signatures in Global and National Commerce Act (E-Sign)

Page 20: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

What is Meant by An Electronic Signature ?

Page 21: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Continue….Private Key

Public Key

Digital Certificate

Private Key

Public Key

Digital Certificate

Page 22: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Egyptian Government Efforts

• In April 2004, Egypt passed the Law 15 Regulating Electronic

Signatures (or the “E-Signature Law”)

• The E-signature Law also established the E-signature regulatory

authority, officially known as the Information Technology

Industry Development Agency (ITIDA).

• The E-Signature Law supports E-commerce in Egypt by

enabling Egyptians to use the Internet and to enter into contracts

securely by making the Internet a legally viable medium for

online sales, without the need to sign the document physically.

Page 23: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

E-Signature Infrastructure Establishment Time-Based Progress

• April 2004 : The president issued the e-signature Law

• May 2005:The E-signature Executive Directives was published

• May 2005-February 2006: Inviting companies to apply for e-

signature license and approving 4 Licenses.

• May 2006: Publishing the Root CA RFP.

• February 2007: Start working with G&D vendor in preparing the

site and installing hardware and software.

• September 2009: Inauguration of the Root CA main site with

attendance of the prime minister and minister of communication and

advanced technology

Page 24: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

E-Signature Infrastructure Establishment Time-Based Progress

• January 2010: SNS obtained a work permit and get connected to

Egyptian Root CA main site.

• August 2010: Egypt Trust and MCDR obtained E-signature work

permits form ITIDA and connected to Egyptian Root CA main site.

• May 2012: Starting the deployment phase of E-signature applications

with 12 pilot projects in different sectors in the government , Banking,

and financial sectors

• June 2012: Governmental CA accomplished their infrastructure and

obtained E-signature work permits form ITIDA and connected to

Egyptian Root CA main site.

• August 2013: Inaugurating the E-signature Competence Center

Page 25: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA Roles in E-Signature

National ROOT Certification Authority

CSP 1 CSP 3CSP 2

operates

Certifies

GOV CA

Signature key holders (end users)

Signature key holders (gov employees)

I s s u e s

Country XYCross

recognition

Page 26: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ROOT CA Main Site Achievements

Page 27: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Achievements……

• Root CA main trust center with 6 IT fortified rooms and more than 40 different

types of servers and security equipments has been implemented to operate 24/7

by 100% highly trained Egyptian staff.

• Three private CSPs are ISO 27001 certified and passed ITIDA audit (financial,

legal and technical).

• The Three deployed private CSPs have been securely connected to the Root

CA main trust center to maintain a copy of all the issued digital certificates

and CRLs to maintain client rights in case of disaster and are ready to issue

digital certificate private sector under the hood of Egyptian Root CA.

Page 28: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Pictures from Reality..& Practical Success Stories

Page 29: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

E-Signature Products

• Home made E-signature tools are ready to be used

– (Egyptian Smart Token (with and without Fingerprint)).

– Infrastructure Software Components have been implemented

inside ITIDA E-Signature Lab to work with different types of

Operating systems ( MS-Windows, Linux, Unix Solaris 10 OS).

– E-Signature Applications (Desktop, Web, and Mobile).

Page 30: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

E-Signature Tools

Egyptian Smart TokensEgyptian

National IDs

Crypto-Micro-SD Crypto-Sim CardNational IDs

Readers

Page 31: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Fortified Room Door Sample

Page 32: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

IT Room assembly -step by step

Installation of IT systems

Page 33: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 34: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Practical Success Stories

Page 35: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Success Stories Samples Cont….

Page 36: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Damietta PortDocuments Management Work Flow

Page 37: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Damietta PortDocuments Management Work Flow

Page 38: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Egypt Post

Documents Management Work Flow

Page 39: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w

Page 40: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w…

Choose certificate to sign with

Page 41: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w…

Adding a comment

Page 42: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w…

Signing the added comment

Page 43: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w…

View signed comments (1)

Page 44: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

ITIDA members document work flow s/w…

Viewing comments (2)

Page 45: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 46: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 47: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 48: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 49: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 50: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication
Page 51: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Digital Signatures Desktop Management

Page 52: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

SSL Trusted Websites

Page 53: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Detection of Faked Sites

Page 54: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Smart Token Software

Page 55: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Mobile Stock Application Demo

Page 56: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Questions

????

Page 57: Egyptian E-Signature and Its role in Workflow Automation ... · Attacks on Password Techniques :Password Cracking. Attacks on Password Techniques :Keystroke Logger. Authentication

Thank you

Information Technology

Industry Development Agency

Smart Village, Building (B121)

Cairo – Alexandria Desert Road

Giza, Egypt, PO BOX 12577

Ehab MostafaVP Global Trade & Industry

Development Group

(+202) 3534 5151

(+202) 3534 5150

[email protected]

Bio