Tuesday, January 22, 2008

Security issues on E-government

Passwords

Although passwords are commonly used in relatively low-risk environments, they are inconvenient and inadequate for the high-value transactions and communications that travel across the Internet. Passwords are easy to break, and users often write down or share passwords, or forget them. In addition, different applications require new IDs and passwords. Moreover, passwords by themselves cannot provide often-required security services: They do not ensure privacy (through encryption); they cannot guarantee the integrity of stored or transmitted data (through digital signing); and they cannot legally prove that a party participated in a transaction (non-repudiation).

Personal Identification Numbers (PINs)

Because the user must provide an access token and a personal identification number (PIN), security is stronger than with a password alone. However, a PIN (on its own) cannot provide important security services such as privacy, data integrity, and non-repudiation.

Digital Certificates

Digital certificates are the preferred technology over passwords and PINs for securing electronic transactions of all types. Based on public key encryption, digital certificates serve as unique, unforgeable online credentials, authenticating the identity of each device or device user and identifying privileges and attributes for authorized access to private online information. In addition to being a superior mechanism for identity authentication, digital certificates provide the privacy, data integrity, and non-repudiation services that are not supported by passwords and PINs. In most applications, digital certificates reside on the user’s hard drive.

Smart Cards

Smart cards carry an embedded microchip that stores data and applications. Smart cards hold more information than magnetic stripe cards and can be programmed for a variety of applications. Multiple applications can reside on a single smart card, and applications can be added, deleted, or upgraded without reissuing the card.

Smart Cards with Digital Certificates

Smart cards that use digital certificates offer greater security, convenience, and portability for Internet-based business than other security solutions. Placing the digital certificate and key pair on the smart card provides more protection against theft or impersonation than if they were stored on the user’s hard drive, and requiring a PIN to access the user’s credentials on the smart card provides an added layer of protection if the smart card itself is lost or stolen. Networks, systems, and applications are much less likely to be compromised. In addition, by incorporating one or more identification certificates on the smart card, users can carry with them the appropriate credentials to access systems remotely, forever severing ties to a single workstation.

Smart Card Privacy

In addition to the security issues addressed by smart cards and PKI, the use of a smart card strengthens the ability of systems to protect individual privacy and guard against identity theft.

VeriSign Managed PKI

Digital certificates are based on Public Key Infrastructure-the architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system. This system uses a pair of mathematically-related keys to encrypt and decrypt confidential information and to generate and verify digital signatures. A public key infrastructure reduces the risks of fraud and other unauthorized access by enabling enterprises to authenticate employees, partners, customers, and other users; encrypt communications and transactions; offer secure online payment capabilities; and audit transactions. Extending the VeriSign managed PKI solution to incorporate digital certificates onto smart cards increases the level of authentication for users and provides mobility and confidence for conducting sensitive transactions from personal computers, wireless devices, and remote computer terminals. VeriSign managed PKI is a fully integrated service designed to secure intranet, extranet, email, virtual private network, and e-commerce applications.

Certification Authority

(CA) system for issuing, renewing, and revoking digital certificates, without having to build their own internal security infrastructure. Unlike software-only solutions or building a PKI in-house, the VeriSign managed PKI service lets organizations control certificate registration and policies, while VeriSign provides the back-bone of certificate processing. By leveraging the VeriSign certificate processing infrastructure, enterprises can implement a PKI solution in a matter of days, and can take advantage of VeriSign’s proven capability to offer trusted, scalable managed services. In Australia, VeriSign’s Managed PKI services are managed through the Regional Operations Centre (ROC) in Melbourne, Victoria. This world-class facility is security accredited to ‘Highly Protected’ by the Australian Security Intelligence Organization (ASIO) as part of the Commonwealth Government’s Gatekeeper scheme. VeriSign’s infrastructure is designed, evaluated, and audited by the leading authorities in the field, including ASIO, Defence Signals Directorate, Defence Science & Technology Organization (DSTO), and Ernst & Young. The infrastructure is backed by binding Service Level Agreements, a disaster recovery infrastructure, high-security facilities, screened personnel, and customer support.

VeriSign Certificate Issuance Solutions for Smart Card Providers

VeriSign, the leading provider of Internet trust services, offers scalable, flexible, and customizable solutions for embedding certificates into smart cards. The VeriSign solutions for small-, medium-, and large-volume certificate issuance are device agnostic, and support multiple processes including key generation and certificate issuance. By allowing enterprises to outsource all or a portion of the certificate issuance process, VeriSign solutions make it easier and faster to produce and integrate certificates onto smart cards for a range of Purposes-from mobile phones to banking, healthcare, and national ID cards. The range of offerings allows enterprises to choose an appropriate level of control in the process of key generation and certificate issuance. In addition, enterprises can leverage the expertise of VeriSign’s Professional Services Organization to provide seamless integration with existing systems and services.

VeriSign High-Volume Certificate Issuance Solution

VeriSign provides a platform that enables certificates to be generated in batch volumes for incorporation into smart cards and other devices. The platform, based on VeriSign’s carrier-class, 24x7 digital certificate architecture and industry-leading outsourced managed services, is currently the only offering that enables smart card providers to scalable integrate digital certificates into the device manufacturing/card production process. VeriSign can integrate with various device manufacturing systems or card management systems via the XML key management specification (XKMS) standard interface or through direct integration. By using the VeriSign platform, enterprises can centrally generate digital certificates in volumes based on their scheduled production quantities. The VeriSign platform provides scalability and reliability with little effort or resources expended by the enterprise. Keys are virtually impossible to break and because they are generated before the cards are branded and printed, this helps the issuer catch potential problems with key or certificate generation before the cards are embossed and personalised.

VeriSign Medium-and Low-Volume Certificate Issuance Solution
Medium-and low-volume certificate issuance solutions are ideal for enterprises or situations that require limited numbers of certificates to be flexibly issued at any given time including for the introduction of pilot programs, the issuance of security badges, or the handling of exceptions such as lost cards. For example, a bank may want to distribute smart cards to a specific number of customers for financial and banking applications. In this scenario, the bank utilises a smart card vendor’s card management system (CMS) located at the bank to manage the customer data. The CMS sends a certificate request along with the public key to VeriSign for the generation of certificate. VeriSign generates the certificate and sends it back to the CMS. The CMS combines additional user data, keys, and the certificate into a file which is forwarded to a personalisation system where the smart cards are produced and distributed. The certificate enrolment process can also be initiated directly by the end user, in which case the enrollment information and key generation occurs at the user’s workstation and smart card reader. This information (along with the public key) is then approved by a central administrator within the user’s organisation, sent to VeriSign for certificate issuance and the certificate is then issued to the end-user and incorporated onto the smart card. The CMS also facilitates post issuance services for the smart card, whereby a user may update information or add new information to their card via a standard web interface operated by the central administrator or organisation.

Passport to Convenience and Security

When used with PKI services, smart cards strengthen security and unlock the door to tremendous levels of convenience. The inherent portability of smart cards allows them to go wherever users go, allowing enterprises to expand their customer base, offer new services electronically, and manage security more confidently and efficiently. Financial institutions, government agencies, colleges and universities, and wireless services are rapidly adopting smart cards with digital certificates to provide their customers with a convenient, multi-purpose passport to a wide range of applications and services.

Financial Services

Customers expect easy access to a broad range of services from their financial institutions, and they demand high standards of security, convenience, and value. Credit cards and debit cards offer convenience but they also are subject to fraud. In addition, financial institutions now have to compete with telecommunications, software, and other industries that include smart card technology in their products. Smart cards with a PKI solution help financial institutions retain existing customers as well as attract new customers. For example, banks can offer consumer smart cards that not only incorporate credit, cash, and debit services within the same card; but also enable customers to make Web-based purchases, carry multiple currencies on a single card, and pay for transportation. Using smart cards, banks can dynamically adjust credit lines to reflect the unique risk profile of each customer. The opportunities among corporate customers are equally compelling. To engage in high-value, business-to-business e-commerce requires the capability to electronically verify identities among financial institutions and businesses, as well as to protect sensitive data. In addition, enterprises must be able to eliminate the risk of transaction repudiation. When used with an integrated Identrus solution (see sidebar), smart cards allow banks and other financial institutions to leverage their traditional role as trusted third parties to offer their corporate customers a secure, convenient framework for electronically verifying the identity of their trading partners around the world. Corporate customers can shorten the negotiation and transaction lifecycles using smart cards with VeriSign digital certificates to check credit and identity; encrypt sensitive data; and digitally sign business documents, payments, and agreements.

Government

When used with a PKI, smart cards enable governments to safely provide citizens, employees, suppliers, and partners quick access to critical programs and information while reducing operating costs and improving customer satisfaction. Citizens can obtain smart cards that allow them to access confidential information, obtain benefits electronically, and pay for government services. For example, using a single card, a citizen might look up his or her military records, receive a medical insurance benefit, or pay a road toll. Employees can use cards for procurement, travel expenses, or accessing classified data. To provide better service and reduce costs, several agencies of the United States government-including the General Services Administration (GSA), Department of Defense, and the Veterans Health Administration-are beginning to implement ambitious smart card programs. The US Government uses smart cards for multiple purposes, including easy portability of military and civilian medical data, military personnel records, and financial entitlements data including purchasing authority and phone calling card services. More recently the government has explored using smart cards to store private keys and digital certificates, often with other data to create multi-purpose cards.

Wireless Applications and Services

Wireless applications are changing the face of the Internet. Users can use digital phones, personal digital assistants, and pagers to transfer money, access medical records, make travel reservations, and more. But before engaging in wireless transactions, users must be confident that they can reliably identify and authenticate each other, as well as protect information from interception or tampering. When used with VeriSign digital certificates, the smart card’s portability makes it the ideal mechanism for ensuring security in wireless applications. Although digital certificate-embedded smart cards are rapidly becoming the medium of choice for providing a single point of secure access to broad applications, their adoption is still in its infancy. Like the Internet itself, smart card applications and technologies will become more sophisticated as issuers and users begin to understand and expand the ways in which smart card technology can be applied to secure transaction exchange.The key to remaining ahead of the curve in this exciting new world is a PKI infrastructure that provides the scalability, stability, and interoperability to grow with an organisation as it adds new applications and services.As the leader in managed PKI services and as an innovator in smart card solutions,VeriSign provides products with proven scalability,reliability, and interoperability for enterprises poised to take the next step in the digital revolution.

26 comments:

essay best said...

Excellent article! Glad you bought some light on this rather important matter. Security breach seems to have become so much easier now. We have to get more smart to bypass hackers and keep ourselves safe.

Harry Oscar said...

You definitely put a brand new spin on a topic that’s been discussed for many years.
Wonderful stuff
crackphilia

Shoaib Amin said...


Good blog! Is your theme custom made or did you download it from somewhere?
A design like yours with a few simple adjustements would
really make my blog shine.
Please let me know where you got your theme.
copy protect full crack
windows 10 crack
wondershare filmora crack
cyberlink powerdvd ultra crack

M. Irfan said...

like the helpful info you supply on your articles. I’ll bookmark your weblog and check again right here frequently. I am slightly certain I will learn lots of new stuff right right here! Good luck for the following!
convertx to dvd crack
tuxera ntfs crack
camtasia studio crack

chabdullah said...

Your method of describing the whole thing in this piece of writing is actually pleasant
every one be able to without difficulty know it, Thanks
a lot
avg internet security crack
tarma installmate crack
ytd video downloader pro crack
wondershare photo recovery crack
4ukey android unlocker crack

Muzamil Ansari crack said...

Your writing skills greatly impressed me, as well as the clever blog structure. Is it a payment issue or do you change it yourself? However, if you stop writing in high quality, it's hard to see a good blog these days.

Abdullah said...

Great post! We are linking to this great article on our
site. Keep up the great writing.
eset internet security crack
vmix pro crack
reloader activator crack
ezdrummer crack

Asif Raza said...



This is very attention-grabbing, You’re an overly skilled blogger.
I’ve joined your feed and look ahead to seeking more of your great post.
Additionally, I have shared your site in my social networks

phonerescue crack
anno 1800
lucky patcher
dxo photolab elite
whatsapp business apk

Junaid Khan said...
This comment has been removed by the author.
Syed Muhammad Ali Shah said...


I really love your blog.. Great colors & theme.
Did you develop this website yourself? Please reply
back as I’m hoping to create my own site and would love to know
where you got this from or just what the theme is named.
Thank you!
luminar photo editor crack

Azhar hussain said...


If you are looking for bloggers, please let us know.
Your position is very good, I think I have a great advantage.
If you want to lose weight, I'm happy.
Write something on your blog in exchange for my link.
If interested, write to me, thanks!
light image resizer crack

Azhar hussain said...


I like the result, I found what I wanted and you completed the 4-day hunt!
May God grant your husband health and a good day. day

traktor pro

Jordan Leonard said...

After studying many of the sites on your website, I also like your blogging
style. I have bookmarked it in my bookmark site
list and will check again soon as well. Please take a look
at my website and let me know what you think.
adobe photo shop cc crack
emeditor professional crack
musify crack
bulk image downloader crack
ccleaner pro crack

chabdullah said...

Great job for publishing such a beneficial article.
Your blog information isn’t only useful but it is additionally creative with high content too.
Thanks..
outbyte pc repair crack
outbyte pc repair crack

8899536 said...

Its genuinely strong for you from a general viewpoint all window programming establishment. This site is tangling its article are major and vivifying. I appreciated and bookmark this site on my chrome. This is the place where you can get all break programming in like manner present in clear way.
https://cracksmad.com/

8899536 said...

Its truly solid for you from an overall perspective all window programming foundation. This site is tangling its article are major and vivifying. I appreciated and bookmark this site on my chrome. This is where you can get all break programming in like way present in clear manner.
/https://chlicensekey.com

8899536 said...

Its really solid for you on a focal level all window programming foundation. This site is tangling its article are squeezing and confounding. I appreciated and bookmark this site on my chrome. This is where you can get all break programming in like way present in clear manner.
https://cracksmad.com/

Kashif ch said...


One should only enjoy it twice.
Memorial Day of the Year.
The other is the wedding day, the day of life.
Both are the most valuable and memorable. foxit reader crack
neat video crack
red gate net reflector pro crack
final cut pro x crack

Unknown said...



I think this is one of the most important pieces of information.
My. I am delighted to study your article.
But I want to comment on a few common issues: the site tastes great, the articles are really cool. poweriso crack
hotspot shield
eset smart security premium crack
iperius backup full crack

Unknown said...



Hmm! Thank! I need to constantly write similar content on my website. May I post some of your posts on your site?


It's very interesting, you are a good blogger. We have added your channel and are waiting for more
great posts. Also, we have shared the site on social media! imtoo ipad mate platinum
wise care 365
diskdigger crack
regrun reanimator crack

Unknown said...




optimum! I want to do an internship editing a website, how can I subscribe?
For blogs? This account helped me close the deal.
I'm a little familiar with your post, it offers a clear and vivid concept. driver booster pro crack
safe exam browser
origin pro crack
balabolka with crack

Unknown said...


insofta cover commander crack
write some content for your blog in exchange for a link back to mine.
Please send me an email if interested. Thanks!





wondershare recoverit

M. Irfan said...

Spot on with this write-up, I really believe this website needs a
great deal more attention. I’ll probably be back again to read through more, thanks for the advice!
adobe after effects cc crack
free netflix downloader crack
rstudio crack

https://onecracks.com/ said...


I'm really impressed with your writing skills, as smart as the structure of your weblog.
loaris-trojan-remover-crack
musify-crack
macdrive-pro-crack

Yousaf said...

I loved it as you can find through this site.
The sketch is beautiful and your written material is stylish.
Yet, you'll be an anxiety-like feeling about the you'd like to do.
The following will be the content. Absolutely, definitely will come more formerly.
The same applies frequently in the event you are able to shield this particular hike.
microsoft office 2007 crack

Unknown said...

I'm going to Brussels.
I will be grateful if you will continue to do so in the future.
Most people will benefit from your writing.
Hooray, I'm still visiting, how are you all?
winzip pro crack
kontakt crack
exif pilot crack