Title: Baltimore
1ITSA Awareness Day - September 27, 2000
University of Florida
The State of Public Key Infrastructures Today
2Enterprise Security
PKI
E-commerce Security
3Growth of e-Commerce
- Original Estimates of U.S. e-Commerce
- US7 Billion by 2000
- Real U.S. e-Commerce 1998
- US7B to 15B (varies by analyst)
4The growth of Internet / intranet security 1997 -
2001
(source Datamonitor)
5Benefits of e-Business
Single biggest benefit to companies surveyed
New markets /customers
Speed of response
Cost savings
Flexibility / adaptability
Simplificationof tasks
Source KPMG
6Why Security is Important . . .
On the Internet, no-one knows youre a dog
7The Role of e-Security
- Protective
- Protection of key assets - information,
reputation - Corporate governance - legal obligations
- Business enabling
- Creating new business opportunities - Internet
- Enabling new working practices - intranet
- e-Security underpins customer confidence in
- the organisation and the services it provides
8e- Security Creates Confidence
Confidence . . .
- . . . in the identity of an individual or
applicationAUTHENTICATION - . . . that information can be kept
privateCONFIDENTIALITY - . . . that information cannot be
manipulatedINTEGRITY - . . . that information cannot be
disownedNON-REPUDIATION
9Common e-Security Technologies
Authentication
Integrity
Non- repudiation
Confidentiality
ü
Anti-virus
ü
ü
Firewalls
ü
ü
Access Control
ü
Encryption
ü
ü
ü
ü
Public Key Infrastructure
10How Is Employee Authentication Achieved?
Forrester
11How Is Customer Authentication Achieved?
Forrester
12PKI is at the Center of e-Security
PKI
13A PKI Comprises . . .
Certificate Authority
Directory
PKI-enabled Applications
Security Policy
14Benefits of PKI - ( I )
- Users unknown to one another can communicate
securely provided that they have a chain of
trust via CA(s) - Reduces problems of securely distributing secret
keys - No need for pre-agreed key material
- Supports many to many relationships
15Benefits of PKI - ( II )
- Highly scalable
- Enables use of the same technology for a wide
range of applications - Standards based - so products can inter-operate
Enables cryptographic services to
secure applications over insecure networks and
hence enables electronic business
16An Analysts View
Given the growing importance of public key
cryptography to many applications from e-mail to
electronic commerce, a PKI is probably the most
critical information security investment a
company will make in the next three years.
Source Ira Machefsky, Giga Group
17UniCERT - Architecture
18ITSA Awareness Day - September 27, 2000
University of Florida
- Education Next?
- Initiatives by CREN and Educause underway
- Bridge Certificate Authority in nature
- Applications will drive use
- Course Registration
- Staff and Faculty Paperwork
- Healthcare
- Grades
- Student Elections
- Database Sharing