Loading in 2 Seconds...
Loading in 2 Seconds...
Arab Regional Workshop on “IP STRATEGIES AND IDN ISSUES” Damascus-Syria, 16-18 May 2006 “Cyber Security”. Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: email@example.com Tel: +41 22 730 5009 Fax: +41 22 730 5484.
Arab Regional Workshop on“IP STRATEGIES AND IDN ISSUES”Damascus-Syria, 16-18 May 2006 “Cyber Security” Désiré KARYABWITE IP Coordinator E-Strategy Unit Email: firstname.lastname@example.org Tel: +41 22 730 5009 Fax: +41 22 730 5484 The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the EPFL, ITU or its membership.
“on the Internet, nobody knows you’re a dog…” Network Security: Creating trust in Critical IP-based infrastructures Danger can come from almost anywhere… Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development
…Network Security: Creating trust in Critical network infrastructures!
SPAMS & Phishing Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group
How security is provisioned for VoIP In an H.323 multimedia system, ITU-T Recommendation H.235 defines the security frameworkincluding specification of the security mechanisms and security protocols for H.323. H.235 was firstintroduced for H.323 Version 2 systems in 1998. Since then, H.235 has further evolved over time byconsolidating the offered security mechanisms, by adding more sophisticated security algorithms If available and suitable, existing security tools such as available Internetsecurity packages and standards (IPSec, SSL/TLS) can be (re)used in the context of H.235
At heart of the system is a security infrastructure that provides not only strong authentication (a PKI using public key certificates) but also strong authorisation in which the specific rights that medical professionals have are granted because of their roles stored in attribute certificates. ITU-T X.509 enable today more generalized and globalaccess to e-prescriptions
Thank you for your Attention For more details: www.itu.int/itu-d Désiré KARYABWITE IP Coordinator, E-Strategy Unit, Email: email@example.com Tel: +41 22 730 5009 Fax: +41 22 730 5484