1 / 15

TTA activity on C yber Security and Protection of PI/PII/LI

TTA activity on C yber Security and Protection of PI/PII/LI. 1 4 July, 200 8 Heung-youl Youm, Sun Kim TTA, Korea. Submission Date: July 1, 2008. Highlight of Current Activities(1/4).

annice
Download Presentation

TTA activity on C yber Security and Protection of PI/PII/LI

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TTA activity on Cyber Security and Protection of PI/PII/LI 14 July, 2008 Heung-youl Youm, Sun Kim TTA, Korea Submission Date:July1, 2008

  2. Highlight of Current Activities(1/4) • TC 5 is aLead Technical Committeeon information security that is responsible for developing various standards and guidelines and coordinating security activities across all Technical Committees. • Project Group(PG) 501/5, Information Security Infrastructure • PG 502/5, Personal Information Protection & Identity management • PG 503/5, Cyber Security • PG 504/5, Application Security & IS Certification • PG 505/5, Telebiometrics • PG 506/5, Digital Right Management • PG (Project Group) 502 in TTA is now developing standards or guidelines for protecting Personal Information (PI), PII (Personally Identifiable Information) and LI (Location Information) in Korea.

  3. Highlight of Current Activities(2/4) Position & Role of each PG in TC5 Users PG505/5: Telebiometrics PG506/5: DRM • Interoperable transmission of Biometric information • Biometric information protection system • Emigration/Immigration control system /Smart Card/IC cards • Unauthorized Copy Protection • DRM for ensuring IPR • Interoperable DRM PG501/5 : Information SecurityInfrastructure PG504/5: Application Security & IS certification PG502/5: Private Information Protection & IdM • Application Service Security • Common Criteria/Information Security Management System • Trusted Cryptographic Module • Domain-specific security (IPTV, RFID/USN) • Protection of Privacy Information, Personal Identifier Information • User/application/ network-level Identity Management • Cryptographic algorithm/Key management • Pubic Key Infrastructure • Authentication/Access control PG503/5: Cyber Security • Internet/NGN security • Vulnerability Information Sharing/Incident Handling • SPAM/Traceback/Digital Forensic

  4. Highlight of Current Activities(3/4) Organizational structure for the standardization Before January 2008 After January 2008 TC1: Common Infrastructure TC5: Information Security PG.501 Information Security Infrastructure PG.101 Information Security Infrastructure PG.502 Personal Information Protection & IdM PG.102Internet Security PG.503 Cybersecurity PG.103Telebiometrics PG.504Application security& IS certification PG.110 Digital Right Management PG.505Telebiometrics PG.506Digital Right management New PG Continuation of existing PG

  5. Highlight of Current Activities(4/4) • Achievements and current activities for protection of PI/PII/LI • Upstream contribution to the ITU-T SG17 • ITU-T X.1171, Framework for Protection of Personally Identifiable Information in Applications and ServicesUsing Tag-Based Identification; Consented April 2008, under LC resolution process • ITU-T X.rfpg, Guideline on protection for personally identifiable information in RFID application Under development • ITU-T X.idif, User Control enhanced digital identity interchange framework, Under development • Domestic achievements • TTAS.KO-12.0053, Privacy Management Model for based on Life Cycle of Personal Information, Approved December 2007 • TTAS.KO-12.0054, Framework for internet-Personal Identification Number Service, Approved December 2007 • TTAS.KO-12.0055, Massage Format for internet-Personal Identification Number Service, Approved December 2007 • Downstream adoption • TTAS.KO-12.0051, The Platform for Privacy Preference, Approved December 2007 adopted from W3C • TTAE.IF-RFC3693, Geopriv Requirements, Approved December 2007 adopted from IETF • TTAE.IF-RFC3694, Threat Analysis of the Geopriv Protocol, Approved December 2007 adopted from IETF

  6. Strategic Direction • TTA’s standardization activities in the area will be carried out in coordination with global SDOs, especially ITU-T. Especially, TTA PG502 will focus on developing standards or guidelines in the following areas: • the ID management; • protection of personal information and personally identifiable information; • and protection of location information. • TTA will focus on carrying out three types of activities: upstream activities, downstream adoption and domestic activities: • For the upstream contribution, TTA continues to submit to ITU-T the contribution in this area; • For the downstream adoption, TTA continues adopt the suitable international standards developed by global SDOs to complement domestic standards; • For the local contribution, TTA continues to develop domestic standards which are closely related to Korea’s regulation.

  7. Challenges(1/2) • Nowadays, a series of hacking incidents result in a massive leakage of personal information stored in the web-based companies from a hacking incidents: • For instance, Auction, a subsidiary of the world’s largest on-line auction company e-Bay, Korea’s number one ofon-line company with 18 million registered users, leaked personal information of more than ten million registered users due to a hacking incident in early February 2008. More than 90 percent of the information outflow was of names, registered IDs and resident registration numbers on April 2008. • A lot of applications such as Location-based services, navigation applications, emergency services and other location-dependent services need geographic location information about a target (such a user, resource or other entity). There is a need to securely gather and transfer location information for location services, while at the same time protect the privacy of the individuals involved.

  8. Challenges(2/2) • The widespread deployment of identification tags (including RFID tags) can give rise to concerns of privacy infringement because of the abilities of RFID technology to automatically collect (and process) data, with the possible disclosure of such data to the public (deliberately or accidentally). • The web site request the user to submit the resident registration number when a user signs up for the web site. Indeed, the resident registration number contains many privacy relevant information such asbirth year, birth date and month, sexuality, and birth place. Therefore, leakage of this information always results in the privacy infringement. Therefore, a new ID management system should be developed for web site not to request a user to submit the resident registration number.

  9. Next Steps/Actions • TTA will continue to contribute to global SDO activities by submit contributions to the ITU-T SG17 activities in this area, especially in the protection of private information. • TTA will support to develop the domestic standards for the protection of PI, PII and location information which have regulation implications in this area. • Recently, Korea government requests a web site with more than certain number of registered users to use an i-PIN (Internet - Personal identification number) when a user signs up for a web site, which is a Korean-type ID management system. Its aim is to replace resident registration number with new i-PIN, which is real pseudorandom and has no private information about a user. Therefore, TTA will develop the domestic standards for next model of i-PIN system to overcome the current drawbacks.

  10. Proposed Resolution - Summary • There is still much room for developing global standards to protect privacy infringements of users or targets, especially PI (Personal Information), PII (Personally Identifiable Identifier) and location information. • Therefore, it is necessary for global SDOs to strength the activities to develop a set of standards or guideline in order to protect private information, PII, and location information from various cyber attacks. In addition, it is required to consider the privacy infringement effects when new IT protocols or services are introduced, designed or standardized.

  11. Supplemental Slides

  12. Relationship between the PG and Global SDOs ITU-T SG17, SG13 and others Q.D/17 Directory Services, Directory Systems, and Public-key/Attribute Certificates TTA TC 5 Q.I/17 Telecommunications Systems Security Project PG 501 Information Security Infrastructure Q.J/17 Security Architecture and Framework PG502 Private Information Protection &IdM Q.K/17 Cybersecurity Q. L/17 Identity Management Architecture and Mechanisms PG503 Cybersecurity Q. M/17 Telecommunications Information Security Management PG504 Application security and CC Q. N/17 Telebiometrics PG505 Telebiometrics Q. O/17 Security Aspects of Ubiquitous Telecommunication Servicess PG506 Digital Right management Q. P/17 Secure Application services Q. Q/17 Countering Spam by Technical Means Q. T/17 Service Oriented Architecture Security Q.15/13 NGN security and Network IdM ISO/IEC JTC1/SC17, SC27, SC31, SC37 IETF Security Area

  13. Summary of Achievements in area of Protection of PI/PII/LI since GSC12(1/3) • Upstream contribution to the ITU-T SG17 • ITU-T X.1171, Framework for Protection of Personally Identifiable Information in Applications and ServicesUsing Tag-Based Identification; Consented April 2008, under LC resolution process • This Recommendation describes a number of Personally Identifiable Information (PII) infringements for applications and services using tag-based identification, and requirements for PII protection. In addition, this Recommendation provides a framework for PII protection service based on PII policy profile. • ITU-T X.rfpg, Guideline on protection for personally identifiable information in RFID application Under development, • This Recommendation recognizes that as RFID greatly facilitates the access and dispersion of information pertaining specifically to the merchandise that individuals wear and/or carry, it also creates an opportunity for the same information to be abused for tracking an individual's location or invading their privacy in a malfeasant manner. For this reason the Recommendation provides guidelines and best practices regarding RFID procedures that can be used by service providers to gain the benefits of RFID while attempting to protect personal identifiable information. • ITU-T X.idif, User Control enhanced digital identity interchange framework, Under development, • This Recommendation defines a framework that covers how global interoperable digital identity interchange can be achieved and how an entity’s privacy is enhanced by providing an entity more control over the process of identity interchange. In addition, the Recommendation defines the general and functional requirements of the framework that should be satisfied. Based on the requirements, a framework is defined with basic functional building blocks for identity interchange and enhancing entity control.

  14. Summary of Achievements in area of Protection of PI/PII/LI since GSC12(2/3) • Domesticcontribution • TTAS.KO-12.0053, Privacy Management Model for based on Life Cycle of Personal Information, Approved December 2007 • This standard describes basic definitions related with personal information and classifies personal information by importance. And this standard suggests security requirements that help IT service provider to manage personal information securely, when they collect, store, use and destroy personal information. Moreover, this standard describes various privacy infringement causes and measures. • TTAS.KO-12.0054, Framework for internet-Personal Identification Number Service, Approved December 2007 • This standard informs definition and function of components of -PIN service framework that Authentication Agency offers to ISP. In addition to that, this shows the whole process of -PIN service. • TTAS.KO-12.0055, Massage Format for internet-Personal Identification Number Service, Approved December 2007 • This standard defines the message format for inbound and outbound personal information which is proposed by Authentication Agency to ISP, among i-PIN Service stake holders , which are user, ISP and Authentication Agency.

  15. Summary of Achievements in area of Protection of PI/PII/LI since GSC12(3/3) • Downstream adoption • TTAS.KO-12.0051, The Platform for Privacy Preference, Approved December 2007 adopted from W3C • This standard based on W3C P3Pv1.1. It defines the Policy syntax and semantics, Compact policy and Data schema in P3P. • TTAE.IF-RFC3693, Geopriv Requirements, Approved December 2007 adopted from IETF • The standard defines the security requirements for providing privacy of location object which gathered and transferred by location-based and location-dependent services. • TTAE.IF-RFC3694, Threat Analysis of the Geopriv Protocol, Approved December 2007 adopted from IETF • This document analyzes threats against geopriv protocol and architecture for geopriv protocol for location-based and location-dependent services. Some security properties about theses threats are enumerated as a reference for Geopriv requirements.

More Related