ict innovation
play

ICT-Innovation How digital sovereignty and it-security can help - PowerPoint PPT Presentation

ICT-Innovation How digital sovereignty and it-security can help pushing Europe forward Prof. Reinhard POSCH reinhard.posch@cio.gv.at DIGIT GITAL AL SO SOVERE EREIG IGNTY NTY HOW IS S IT EN ENDAGE GERED RED juri risdi sdiction


  1. ICT-Innovation How digital sovereignty and it-security can help pushing Europe forward Prof. Reinhard POSCH reinhard.posch@cio.gv.at

  2. DIGIT GITAL AL SO SOVERE EREIG IGNTY NTY – HOW IS S IT EN ENDAGE GERED RED juri risdi sdiction ction awar are e IT and d communica unication tion switc tching ing mobile le connections nections – floating ting cros oss s jurisdiction isdiction to redu duce ce cost push h noti tifica ication tion – always s on a leash sh cloud ud stor orage e – do we have e to fear ar about ut IPR docume cument nt colla labor boration tion – in the e cloud ud as you type certif tific icates tes and upda dates tes – who o contr trols s what t you use DEMOCRA OCRATIC TIC MODE ODEL L – GO GOVERA ERANCE NCE BY HUGE GE COM OMPANIES ANIES

  3. SA SAFE FE HA HARB RBOR OR SAFE HARB RBOR OR

  4. DIGITAL : AUSTRIA E ID ID – S ECURITY – MOBILE D EVICES CLOUD IS OF NTY - future IGNT - challenge storage ID – BASIS documents - collaboration SOVEREIG WEB SERVICES Tablet Handy Laptop PC ... eID identification signature encryption security services

  5. DIGITAL : AUSTRIA BIG PLAYER IN THE CLOUD – EU LEGISLATION CLOUD o eIDaS assigns control on electronic identity and supervision to member states not to cloud provider o technical and legal schemes with big PUBLIC CLOUDs need adjustments to comply with technical and legal requirements

  6. DIGITAL : AUSTRIA no se securit ity wit ithout id identit ity  before defending interests we need to know and identify the partners o multi factor identification o crypto based identification o robust against replay o simple for users o broad acceptance

  7. DIGITAL : AUSTRIA STORK – the root of f EU eID ID o assuming minimum security o mutual recognition – technology, legal o Interoperability – protocol o for administration and private sector model for eIDaS

  8. NO O SECURITY RITY WITHOUT THOUT HRDWAR WARE NO O SO SOVEREI EREIGNTY GNTY W/O O HW W SU SUPP PPOR ORT

  9. DIGITAL : AUSTRIA BASIC NEEDS MUST NOT FADE AWAY WITH CLOUD o user and services need to know about jurisdictions for data in rest and in transit  NOT YET EVIDENT IN PRACTICAL SITUATIONS o user and services need to make sure that they are the only ones having access to content  IMPORTANCE BECAME EVIDENT ALONG WITH RECENT SITUATIONS o law enforcement and interception may be needed on a national level  STILL UNSOLVED AND HARDLY EVER DISCUSSED FOR GOVERNMENT DATA CROSS BORDER

  10. DIGITAL : AUSTRIA PROVIDER INFRASTRUCTURE ENHANCEMENTS JURISDICTION MATTERS WITH LIABILITY DNSSEC + TLS w CLIENT CERTIFICATE COMPULRORY SECURITY SUITES o users need to keep control and possibly choice o relevant jurisdictions to be known at the time of communication o availability at all services to allow taking advantage o needed to assign responsibilities

  11. DIGITAL : AUSTRIA CLOUD : COMMUNICATION AND TRUST ADMINISTRATION SMEs EDUCATION (GOV) CLOUD BYOD = existing devices, PCs, laptops, tablets... HTML5 WEBSERVICES Open DATA SSO AVOID LOCAL MINIMUM FOCUS ON WEBAPPS PROCESSING AND DEVICE PROPERTIES STORAGE e.g: SAP DOCS MAIL/CAL ... Specific APPS SECURITY SERVICES ... STORAGE

  12. DIGITAL : AUSTRIA CRYPTO and CLOUD NATIONAL USABILITY AND INTERESTS HNDLING CONVENIENCE COMPLEXITY RESEARCH CRYPTO UNDER OPEN NATIONAL CRYPTO FOR CLOUD PROBLEMS / COMPANY CONTROL EUROPE COULD PLAY A COMPETENT ROLE COST/EFFICIENCY

  13. DIGITAL : AUSTRIA TECHNOLOGY – PRODUCTS – RULE LES implementation – cycle innovation regulation standards product } } industry pushing Industry to care to avoid hurdles for an as short as possible interval who empowers users to be able to minimize the time to standards??

  14. DIGITAL : AUSTRIA CLOUD AND RISK attack potential CLOUD damage = probability * value protection PROVISIONING USER

  15. in inno novatio tion n and nd dig igit ital al sover ereign eignty ty in indust ustry ry taking ing in inno novati tion on to o product oducts avoidi oiding ng the he sell lling ing to o over erseas seas in indus ustry try 4.0 .0

  16. Data protection? Security? Applications? Sovereignty? SOFTWARE HARDWARE

  17. DIGITAL : AUSTRIA THE FUTURE OF DOCUMENTS EDITING DOCUMENTS THE CHANGE IS ON THE WAY WHAT DOES THIS MEAN TO OTHER SYSTEMS ?

  18. DIGITAL : AUSTRIA documents – coll llaboration CLOUD group key(doc) documents security - service

  19. DIGITAL : AUSTRIA U SE SER – G OVERNANCE – C ONTROL security - service CLOUD Reduced Risk Content identity mobility

  20. DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT key per document security - service REDUCED RISK CONTENT CONTENT document per key key(Doc i ) ≠ key(Doc j ) falls i ≠ j

  21. DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT  calendar ( … tasks) SMIME  mail SMIME  documents SMIME  collaboration ?????? security has to be bound to identity in all cases! identity

  22. DIGITAL : AUSTRIA TTIP IP – SAFE HARBOR TTIP – WILL THE PUZZLE FIT? WHAT NOW we certainly need a closer look chaos or chance?

  23. SECURITY= STRENGTH * TAKE-UP If we miss out on one – we loose If we loose this formula – we loose the game

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend