Title: CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
1CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
- Mr. In-Seop Lee
- KT/ITU-T SGÂ 2
2Importance of Network Security
Background
- Explosive growth of computers and network
- To protect data and resources
- To guarantee the authenticity of data
- To protect systems
Security aspects
Security Attacks An action that compromise the
information Security Mechanism Design to
protect,prevent,recover from attacks Security
Service Enhance the security of data,systems
3Relationship between security objectives
Treats
Security Requirements
Security services
Security algorithms
Security mechanisms
Security objectives
4CONCERNS OF I/T EXECUTIVES
5(No Transcript)
6SECURITY THREATS
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
AUTHENTICITY
7SECURITY REQUIREMENTS
8SECURITY SERVICES
Confidentiality
Protection of transmitted data
Authentication
Assuring that communication is authentic
Integrity
Assuring that message has originality
Non-repudiation
Preventing denying message
Access Control
Limit control the access
Availability
Automated or physical countermeasures
9MODEL FOR NETWORK SECURITY
10SIX LAYERSOF NETWORKSECURITY
11INTERCEPTION
Interception
Interception of communications occurs where a
private communication between two or
more parties, sent via a communications handling
system, is covertly monitored in order to
understand the content.
Background
In most developed countries, interception of
communications is used by the law enforcement,
security and intelligence agencies in their work
against serious crime and threats to national
security, including terrorism.
12INTERCEPTION
Role
- Interception plays a crucial role in helping law
- enforcement agencies to combat criminal
activity - It is also necessary to protect the human
rights, - that is,
- disproportionate, or unfettered, use of
interception - can have consequences for the rights of
- individuals
13Secure E-CommerceEXAMPLE
Security Trust
- Internet intrinsic
- not possess an unique control
- world wide
- changing traditional paper-based transactions
- not offering an adequate protection,mechanisms
14SECURE E-COMMERCESecurity Trust
For Buyer Merchant
Trust
Business Legal Relationships
IT Applications Systems
Correct Biz Legal trustworthy
Technical Protections
15STRUCTURING SOLUTIONS
Trust
Third party Interactions
Fraud Controls
IT Infrastructure
International Legislation
Insurance
Technology Management Policy
16TECHNICAL SOLUTIONS
Mechanisms - Verify the Actors Identity -
Authorize Access to Resources - Protect Privacy -
Keep Confident Sensitive Data
- Techniques
- - Firewall, SSL,VPN, IDS,
- - Authentication, Secure Applications
- (Web, DBMS, etc.),
- IPDR and Click Stream Analysis
Security Policy
17OPEN PROBLEMS ofE-COMMERCE(credibility,efficienc
y,solvency)
Goods Quality Quantity After-sales
assistance Privacy Safeguard
Buyers Solvency
Business Risk Involved
Risk Related to the Purchase
18TRUST SOLUTIONS
International Legislation
Customer Profile check
Payment Methods assessment
For Merchants to preserve the merchant public
reputation and credibility to guarantee the
payments to reduce the merchants economical
losses due to fraudulent orders.
Third Party Interactions
Insurance
19TRUST SOLUTIONS
International Legislation
Product Quality
Product Delivery
For Buyers - verification of process control -
process based on information
Third Party Interactions
Insurance
20RISK MANAGEMENT
- Managing risks
- - Scan environments identify risks
- Analyze risks prioritized
- Define the solution
21Conclusions
Thank you very much !!!