1 / 12

Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int

Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security”. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484.

reya
Download Presentation

Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Arab Regional Workshop on“IP STRATEGIES AND IDN ISSUES”Damascus-Syria, 16-18 May 2006 “Cyber Security” Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484 The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership.

  2. “on the Internet, nobody knows you’re a dog…” Network Security: Creating trust in Critical IP-based infrastructures Danger can come from almost anywhere… Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development

  3. …Network Security: Creating trust in Critical network infrastructures!

  4. Convergence: Transport of Voice, video and Data on IP-based Networks

  5. SPAMS & Phishing Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group

  6. How security is provisioned for VoIP In an H.323 multimedia system, ITU-T Recommendation H.235 defines the security frameworkincluding specification of the security mechanisms and security protocols for H.323. H.235 was firstintroduced for H.323 Version 2 systems in 1998. Since then, H.235 has further evolved over time byconsolidating the offered security mechanisms, by adding more sophisticated security algorithms If available and suitable, existing security tools such as available Internetsecurity packages and standards (IPSec, SSL/TLS) can be (re)used in the context of H.235

  7. Security and e-Health : an e-prescription system in the UK

  8. At heart of the system is a security infrastructure that provides not only strong authentication (a PKI using public key certificates) but also strong authorisation in which the specific rights that medical professionals have are granted because of their roles stored in attribute certificates. ITU-T X.509 enable today more generalized and globalaccess to e-prescriptions

  9. Thank you for your Attention For more details: www.itu.int/itu-d Désiré KARYABWITE   IP Coordinator, E-Strategy Unit, Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484

More Related