ISSE/SECURE 2007 Securing Electronic Business Processes (eBook)

Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
eBook Download: PDF
2007 | 2007
XVIII, 446 Seiten
Vieweg & Teubner (Verlag)
978-3-8348-9418-2 (ISBN)

Lese- und Medienproben

ISSE/SECURE 2007 Securing Electronic Business Processes -
Systemvoraussetzungen
53,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes.
The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.

Prof. Dr. Norbert Pohlmann is Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen, Germany.
Prof. Dr. Helmut Reimer is Senior Partner, TeleTrusT, Germany.
Dipl.-Math. Wolfgang Schneider is Deputy Institute Director, Fraunhofer Institute SIT, Germany.

Prof. Dr. Norbert Pohlmann is Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen, Germany. Prof. Dr. Helmut Reimer is Senior Partner, TeleTrusT, Germany. Dipl.-Math. Wolfgang Schneider is Deputy Institute Director, Fraunhofer Institute SIT, Germany.

Contents 6
Preface 12
About this Book 14
Welcome 16
Microsoft: A Trustworthy Vision for Computing 18
Legal, Technical and Social Aspects of Security 20
Regulating Information Security: A Matter of Principle? 22
Abstract 22
1 Introduction 22
2 Working with rules 22
3 Making rules 25
4 Information security: to serve and protect? 27
5 What’s law got to do with it? 28
6 A Working Group 29
7 Regulatory Principles 30
8 Conclusions 35
References 35
ISTPA Operational Analysis of International Privacy Requirements 37
1 Introduction and Background 37
1.1 The ISTPA Privacy Framework 37
1.2 Drivers for Framework Analysis and Revision 40
2 The Analysis of Privacy Principles 40
2.1 Overview 40
2.2 Selected International Laws and Directives 41
2.3 Study Methodology and Key Findings 42
2.4 Illustration of Sub-Components 42
2.5 Additional Findings and Observations 43
3 Conclusion and Next Steps for Using the Analysis 44
The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet 45
1 Introduction 45
2 A brief summary of the evolution of Internet laws in addressing crime and terrorism 46
2.1 Introduction 46
2.2 The origin of the Internet and the impact and consequences of the commercialization of the Internet 47
2.3 The phases of evolution of Internet legal regulation 47
2.4 The ‘driving force’ behind the evolution of Internet legal regulation 49
3 Privacy and security on the Internet 50
3.1 Introduction 50
3.2 The European Union and United States of America’s approach to Internet privacy and security 52
3.3 Effect of Internet state control of information on Internet 3.3 privacy and security 54
4 Conclusion 54
References 55
Data Encryption on File Servers 57
1 Introduction 57
2 Why Encrypt Files on Central File Servers? 57
3 Possible Solutions 59
4 Microsoft Encrypting File System 59
4.1 EFS Principles 59
4.1.1 EFS Certificates 60
4.1.2 User Profiles 60
4.1.3 File Sharing 60
4.2 General EFS Recommendations 61
5 Decru DataFort 61
5.1 Storage Encryption Processor 61
5.2 Cryptainer™ Storage Vaults 62
5.3 Levels of Virtualization 62
5.4 Clustering 63
6 Utimaco SafeGuard LAN Crypt 63
6.1 SafeGuard LAN Crypt Main Features 63
6.2 Keys and Algorithms 64
6.3 Encryption Rules 65
6.4 Transparent encryption 66
6.5 Encryption Profiles 66
7 Different Solution Approaches 66
7.1 Database encryption 66
7.2 Enterprise Rights Management 66
7.3 SAN encryption 67
8 Conclusion 67
Setting up an Effective Information Security Awareness Programme 68
1 Introduction 68
2 Organising an effective security awareness programme 69
3 Organising an awareness programme in practice 72
3.1 Defining objective and scope 72
3.2 Setting up the project plan 73
3.3 Obtaining senior management commitment 73
3.4 Preparing the deliverables 74
3.5 Program roll-out 74
3.6 Tracking the programme and its effectiveness 76
3.7 Results 76
4 Conclusion 77
References 77
Saferinternet.pl Project – Educational Activities for Internet Safety in Poland 78
1 Introduction 78
1.1 Conferences and trainings 79
1.2 Child in The Web – Social Campaign 79
1.3 Sieciaki.pl – educational project for children 80
1.4 Safer Internet Day in Poland 80
1.5 The National Coalition for Internet Safety 81
1.6 The Consultation Committee 81
1.7 Research 82
2 Conclusions 83
Is Cyber Tribalism Winning Online Information Warfare? 84
1 Introduction 84
1.1 Social elements: 85
1.2 Economic Elements: 85
1.3 Political Elements: 85
1.4 Security Elements: 85
2 The shift 86
2.1 Physical vs. Virtual Environments 86
3 The Issues 86
4 Costs Implications 87
5 The challenges 87
5.1 Revealing Cyber Identities Techniques, countermeasures 5.1 for meeting challenges and weaponry 87
5.1.1 Personalisation 87
5.1.2 Personalisation Tools and Information retrieval 88
5.1.3 Predictive statistical models for information retrieval 88
5.1.4 Subscriber and Mass Emailing Networks 88
5.1.5 Chat rooms 89
5.1.6 SMS (Short message Service or Simple Messaging Service) 89
5.1.7 Cyber language 89
5.1.8 Online Gamers 89
6 Who is winning the war? 90
7 Conclusions 90
References 91
Phishing Across Interaction Channels: Methods, Experience and Best Practice 92
1 Banking channels – not only the internet 92
2 Phishing the aim and fundamental steps 93
2.1 Why strong authentication is not enough 93
2.2 Channel specific challenges of strong authentication 94
2.3 A technical social engineering phishing attack 95
2.4 User awareness – a call for security ergonomics 96
2.5 Strength in depth – Securing the transaction 97
2.6 Transaction data authentication 97
3 Conclusion 99
References 100
IT-Security Beyond Borders – an Assessment of Trust Levels Across Europe 101
1 Trust – and “wheel of distrust” 101
1.1 Declining Trust 102
1.2 The Wheel of Distrust 104
1.3 Consequence of “wheel of distrust” 106
2 Danish IT-security policy frame 107
2.1 Problems identified by the working group 108
2.2 Overview over solutions suggested. 109
3 Conclusion 110
Analyzing and Improving the Security of Internet Elections 112
1 Introduction 112
2 Overview of Internet Election Systems 113
2.1 The SERVE system 113
2.2 The Estonian Internet election system 114
2.3 The proposed Polish Internet election system 115
2.4 Research on new Internet election protocols 115
3 Security Analysis of Internet Elections 115
3.1 General requirements of Internet elections’ security 115
3.2 General vulnerabilities of Internet elections 116
3.3 Vulnerabilities and attacks on the Internet election software 116
3.4 Vulnerabilities and attacks on the Internet election execution environment 117
3.5 Infrastructure vulnerabilities 117
4 Methods For Improving Internet Election Security 118
4.1 Distribution of operating systems and applications on Live-CD 118
4.2 Virtual machines on voter hosts 118
4.3 Remote execution of voting applications 119
5 Conclusion 119
6 References 120
Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure 121
1 Introductory information 121
2 Threats and Chosen Remote Access Mechanics 122
3 Inteligent Network Access Protection 125
3.1 Network Access Protection (NAP) 125
3.1.1 Action scenarios 126
3.1.2 NAP Platform Components 126
3.2 Terminal Services 127
4 Conclusion 128
References 128
“Private Investigation” in the Computer Environment: Legal Aspects 129
1 Introduction to the problem 129
2 Gathering evidence by private individuals in the light of the Polish law 130
3 Available methods 130
4 Evidential value of the collected information 131
5 Criminal and civil liability for actions that contravene the law 131
6 Conclusion 132
Identity, Information Security and Rights Management 134
Design Rationale behind the Identity Metasystem Architecture 136
1 Introduction 136
1.1 The Challenge: A Ubiquitous Digital Identity Solution for 136
1.2 Practical Considerations 136
1.3 Architecture of a Proposed Solution 137
2 Identity Problems on the Internet and an Overview of the Proposed Solution 137
2.1 The Internet’s Problems are often Identity Problems. 138
2.2 “InfoCard” and the Identity Metasystem 138
2.3 Roles within the Identity Metasystem 139
2.4 Claims-Based Identities and InfoCards 139
2.5 Putting the User in Control 140
2.6 Authenticating Sites to Users 140
2.7 Authenticating Users to Sites 142
2.8 Protocols Behind the Identity Metasystem 143
3 Design Decisions behind the Identity Metasystem 143
3.1 Protocol . Payload 143
3.2 Identity Selector . Identity Provider 143
3.3 Identity Selector . Metadata Store 144
3.4 Guarantee Separation of Contexts 144
3.5 Facilitate “Data Rejection” 144
3.6 Claims . “Trust” 145
3.7 Human Token . Computational Token 145
3.8 Auditing . Non-auditing Identity Providers 145
3.9 Authentication Goes Both Ways 145
3.10 Predictable, Protected Human Communication 145
4 Status and Plans 146
5 Conclusions 146
References 147
6 Appendix A – The Laws of Identity 6 148
Federated ID Management – Tackling Risk and Credentialing Users 149
1 Federation 149
1.1 What is it? 149
1.2 Why the TSCP is interested in Federation 150
2 First Problem – Credentialing 150
2.1 Common Policy is the Beginning 150
2.2 One Size Does Not Fit All 151
2.3 Already a Risk Reduction 151
3 Federation Sets the Stage for Scalability 151
3.1 Federation Introduces a New Set of Policies 151
3.2 Federation Policy and Attribute Profiles 152
3.3 Radical Shift for Access Control 152
3.4 Data Tagging Enables Claims Awareness 153
4 Technology 153
5 Conclusion – Through Federation to Scalable Compliance 154
References 154
Information Security Governance for Executive Management 155
1 Information Security Governance Definition 155
2 The Information Security Governance Framework 157
3 Information Security Governance and Executive Management 158
4 Illustrative Matrix of Outcomes and Directives 163
5 Conclusion 164
References 165
Model Driven Security for Agile SOA-Style Environments 166
1 Unmanageable security 166
2 Model driven development 168
3 MDA Tool Chain 170
4 SecureMDA™ model driven security 171
5 TrustedSOA™ model driven security for SOA 173
6 Conclusion 174
7 Acknowledgements 175
References 175
The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them 176
1 Roles and provisioning 176
2 The business aspects 178
3 Solution and case study 180
4 Conclusion 184
A Security Architecture for Enterprise Rights Management 185
1 Introduction 185
2 ERM in enterprises 186
3 Market Solutions 186
4 Turaya Security Kernel – Concepts and Terms 189
5 Solution 190
6 Proof of concept 194
7 Conclusion 195
References 196
Rights Management Technologies: A Good Choice for Securing Electronic Health Records? 197
1 Introduction 197
2 EHR Security and Privacy Requirements 198
3 Traditional Solutions 200
4 Rights Management Technologies 202
5 Rights Management Technologies in the Healthcare Domain 203
6 Conclusions 205
7 References 206
Case Studies from Fuzzing Bluetooth, WiFi and WiMAX 207
1 Introduction 207
2 Case Studies 210
3 Conclusions 214
Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit 215
1 Introduction 215
2 Related Work 216
3 VoIP usage scenarios 216
4 Spit – a threat arising from VoIP 218
5 “Spit on” SPIT 219
6 Conclusions and further work 224
References 225
Modeling Trust Management and Security of Information 226
1 Introduction 226
2 Access control 226
3 Trust Management (TM) 230
4 Conclusion 235
References 235
Smart Tokens, eID Cards, Infrastructure Solutions and Interoperability 236
Infrastructure for Trusted Environment: In Search of a Solution 238
1 The Problem of Trust Establishment 238
2 Background: Trusted Computing and TPM 240
3 Other Environments 241
4 Trusted Intermediaries: Economics and Technology 243
5 Conclusions: Infrastructure for Trusted Computing 245
References 245
Integrity Check of Remote Computer Systems Trusted Network Connect 247
1 Introduction 247
2 Trusted Network Communications 249
3 Trusted Network Connect 250
4 Alternative Approaches 252
5 Critical Consideration 253
6 Conclusion 255
References 256
Technical Guidelines for Implementation and Utilization of RFID-based Systems 257
1 Project Description 258
2 Considerations for the Implementation of Technical Guidelines 259
3 Structure of the Technical Guideline 264
4 Explanation of the security concept 264
5 Conclusion 268
References 269
High Density Smart Cards: New Security Challenges and Applications 270
1 Introduction 271
2 Smart Card Platform Security 273
3 Applications 275
4 Conclusion 278
ID Cards in Practice 279
1 Travel Documents In Accordance with ICAO 9303 279
2 Registered Traveller Programs for “Fast Lane” Process 282
3 Comparison between Travel Documents According to ICAO and Registered Traveller Programs 284
References 284
Large Scale Fingerprint Applications: Which Technology Should be Used? 285
1 Introduction 285
2 Applications & Projects
3 Standards 290
4 Requirements & Recommendations
5 Assessment 294
References 294
From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe 295
1 Introduction 295
2 The eCard-API-Framework 296
3 Towards a comprehensive eID-framework for Europe 303
4 Conclusion 304
References 304
Making Digital Signatures Work across National Borders 306
1 Introduction 306
2 DNV’s Position and Role 307
3 The Challenges to the RP 307
4 The RP’s Risk Situation 308
5 Risk Management by use of a VA 310
6 The VA Services 313
7 Conclusion 314
References 315
Financial Fraud Information Sharing 316
1 Introduction 316
2 OATH and Transaction Fraud Information Sharing 317
3 IODEF 318
4 THRAUD 319
5 Conclusion 324
References 324
Enterprise Key Management Infrastructure 325
1 Introduction 325
2 Requirements 326
3 Enterprise Key Management Infrastructure (EKMI) 327
4 Conclusion 331
Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays 332
1 Introduction 332
2 Physical Unclonable Functions, Fuzzy Extractors and Helper Data Algorithms 334
3 PUF Constructions 335
4 Offline HW/SW Authentication for FPGAs 337
5 Conclusion 339
References 339
Security Evaluation and Testing – Past, Present and Future 341
1 The Past 341
2 The Present (More or Less) 343
3 The Future 344
4 Polishing the Crystal Ball 345
5 Conclusion 346
References 347
Economics of Security and PKI Applications 348
Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach 350
1 Introduction 350
2 A Holistic Approach to Information Security 353
3 Case Study 355
4 Conclusions and Future Work 357
References 358
EKIAS – Success Criteria of PKI Implementations 359
1 The Project 359
2 Results 360
3 Recommendations 364
4 Conclusion 365
References 365
Embedded PKI in Industrial Facilities 366
1 Session Abstract 366
2 Enrolment and Certificate Lifecycle Management 372
3 Conclusion 373
References 373
SIM-enabled Open Mobile Payment System Based on Nation-wide PKI 374
1 Introduction 374
2 Public Key Cryptosystems 376
3 Open Mobile Payment Platform based on FINEID 379
4 Conclusion 383
References 385
Evidence Record Syntax – a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data 386
1 Introduction 386
2 Problem and Solution 387
3 Technical Details 387
4 Security by Renewal 389
5 Data 391
6 Conclusion 393
References 393
PKI and Entitlement – Key Information Security Management Solutions for Business and IT Compliance 395
1 Introduction 395
2 Mapping of Business and Compliance-related IT Requirements to PKI and Entitlement 396
3 Deployment of PKI and Entitlement at Siemens 399
4 Conclusion 404
References 404
Future Diffusion of PKI-Technology – A German Delphi Study 405
1 Introduction 405
2 Explanation of PKI and Innovation Theory 406
3 Evaluation of a PKI Diffusion Model 407
4 Conclusion 413
References 414
Acknowledgements 414
The Introduction of Health Telematics in Germany 415
1 Applications 415
2 Unlimited Possibilities – Open Platform Basis 417
3 Conclusion 419
The German Identity Card - Concept and Applications 420
1 Introduction 420
2 Concepts 421
3 Applications 422
4 Conclusions 423
References 423
Infrastructure for Identification and Identity Documents 424
1 Passport offices in Germany 424
2 The Application Process 425
3 Conclusion 429
The Security Infrastructure of the German Core Application in Public Transportation 430
1 Background and Goals 430
2 Advantages of the security infrastructure for users 431
3 Anatomy of the security infrastructure 432
4 Security Level of the Security Infrastructure 436
5 Conclusion 437
References 437
Applications of Citizen Portals 438
1 Introduction 438
2 Key elements of the Directive 439
3 Summary of important regulations 439
4 Implementation of the EU Service Directive 442
5 Conclusion 445
References 445
Virtual Post Office in Practice 446
1 Introduction 446
2 The Virtual Post Office 447
3 The Online Service Computer Interface 448
4 Application Scenarios 450
5 E-Mail vs. OSCI 451
6 IT Infrastructure of the DRV Bund 452
7 Conclusion 455
References 455
Index 456

Infrastructure for Identification and Identity Documents (S. 405-406)

Walter Landvogt
Bundesdruckerei GmbH
Systems House Solution Development
landvogt@bdr.de Abstract
The introduction of the new German biometric passport on 1st - quirements for the technical systems at the local passport authorities and the computing departments of the city administration. The capturing of biometric information and the process of assuring the usability of biometric data for the biometric information to the central production facilities of Bundesdruckerei. The identity document application process and the common level of security for the technical environment. However, the local administration bears responsibility for the concrete organization of the process and the kind and type of technical system.

1 Passport  ,officies Germany

From a total of 12.400 communities in Germany about 5.300 provide local administration services which run necessary local infrastructural tasks and services for the citizens. Smaller communities in the the administration of the registration data and the enrolment and issuing of passports and identity documents. The two services a closely related, since they are typically based on a single software system that manages the registration database as well as the passport and identity document database. To provide a documents may be applied for and will be delivered to the applicant.

As the local administrations have to bear the cost of purchasing and maintenance for the technical equipment they make their own decision for a software product for registration and passport purposes and for wide range of different requirements concerning the performance of the software for registration and passport enrolment have led to a wide variety of systems and architectures in use.

2 The Application Process

Passports and identity documents are being manufactured at the central high security production facili- application records to the production server. Whereas in the past the passport data records had been mailed on paper formulas to Bundesdruckerei with the introduction of the biometric passport a change has taken place. Nowadays the electronic application process has become standard since the software systems being used at the local authorities have integrated standard software modules for the necessary digitalisation process for portrait photo and the applicant’s signature. By 1st of November 2007 the - gerprints and the digital acquisition of the based way to deliver the biometric information to the passport production.

2.1 Registration ,and Passport Application Software and Biometric Modules

Since the introduction of the new passport the software products were adapted to the new demands. At states each software product had a regional focus. Even more, administration software often had been developed an operated by computing centres, which were part of the state administration and designed business processes to the needs of their regional customers. Thus infrastructures can be found, where the the registration application.

On the other hand personnel computer based registration applications were The passport and identity document application process is above the registration data. For the application process a record set from the registration database is being taken and enriched by passport or - tration software the mandatory digital application process and the acquisition of the increase the requirement to handle multimedia data formats: video streams are transmitted from the multimedia data was not very common for administration software and the software systems and databases were not prepared for managing it.

Erscheint lt. Verlag 18.12.2007
Zusatzinfo XVIII, 446 p.
Verlagsort Wiesbaden
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte biometrics • Business Process • Corporate Governance • Critical Infrastructure • cryptography • data protection • Identity Management • Information Privacy • Information Security • IT Security • PKI • privacy • Risk Management • security • service-oriented computing • Smart cards • Spam • trusted computing
ISBN-10 3-8348-9418-4 / 3834894184
ISBN-13 978-3-8348-9418-2 / 9783834894182
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99