Скачать презентацию Document No GSC 16 -PLEN-08 Source ETSI Contact Скачать презентацию Document No GSC 16 -PLEN-08 Source ETSI Contact

855fce656e205dbc226ba1731a31a9f0.ppt

  • Количество слайдов: 7

Document No: GSC 16 -PLEN-08 Source: ETSI Contact: Mike Sharpe Source: Charles Brookson (OCG Document No: GSC 16 -PLEN-08 Source: ETSI Contact: Mike Sharpe Source: Charles Brookson (OCG /SECURITY Chair) GSC Session: PLEN Agenda Item: 6. 3 Security activities in ETSI Presenter: Mike Sharpe, ETSI VP ESP (ETSI Standardization Projects) Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC 16 -PLEN-08 Security activities (1) • Next Generation Networks (NGN) – To comply GSC 16 -PLEN-08 Security activities (1) • Next Generation Networks (NGN) – To comply with regulation (including privacy, LI, DR) – To protect the core and its services (e. g. IPTV, IMS (with 3 GPP)) – To protect access technologies (e. g. for RFID, Io. T) • GSM/UMTS – IMEI (International Mobile Equipment Identity) against theft – FIGS (Fraud Information Gathering System) against fraud – Priority access - Location services • 3 GPP – Evolved Packet Core / Long Term Evolution (EPC/LTE) – Common IP Multimedia Subsystem (IMS) – Femtocell Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 2

GSC 16 -PLEN-08 Security activities (2) • TETRA (Trunked Radio) – Mobile radio communications GSC 16 -PLEN-08 Security activities (2) • TETRA (Trunked Radio) – Mobile radio communications for specialist users (e. g. Public safety services (bluelight services)) – Featureset combining Mutual Authentication, Encryption, Anonymity for any terminal service • Lawful Interception and Data Retention – Delivery of intercepted and retained data: • to support criminal investigation, counter terrorism – Supported by “how to intercept”, “how to retain” activity in NGN [see also under GTSC 9 Cybersecurity presentation] • Electronic Signatures – Digital accounting, Registered EMail (REM) – Electronic signatures in PDF documents – Extended Validation Certificates Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 3

GSC 16 -PLEN-08 Security activities (3) • Algorithms – Security algorithms for GSM, GPRS, GSC 16 -PLEN-08 Security activities (3) • Algorithms – Security algorithms for GSM, GPRS, EDGE, UMTS, TETRA, DECT, 3 GPP … – Confidentiality and integrity algorithms (UMTS, LTE) – ZUC (Zu Chongzhi) algorithm for LTE • RFID – RFID Security and Privacy by design – RFID as gateway for the future “Internet of Things” (Io. T) • Intelligent Transport Systems – Collaboration of vehicles to improve safety, economy – Work in areas of privacy and integrity • Smart Cards – Work extended with USIM Card and UICC Platform – Global roaming, Secure financial transactions, M 2 M communications Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 4

GSC 16 -PLEN-08 Security activities (4) • Quantum Key Distribution (QKD) – Quantum Cryptography GSC 16 -PLEN-08 Security activities (4) • Quantum Key Distribution (QKD) – Quantum Cryptography environment for ICT networks – Security assurance requirements • Emergency Communications/Public Safety – GSM onboard aircraft – GSM e. Calls – GSM Direct Mode Operations (DMO) Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 5

GSC 16 -PLEN-08 Future Challenges • Open issues – Privacy / Identity Management, Cyber GSC 16 -PLEN-08 Future Challenges • Open issues – Privacy / Identity Management, Cyber security, Metrics, … • Critical importance for human society! – Role of security standardization within the global picture • Critical importance for security organisations – Technical, operational and human interoperability (across borders) – Innovation to foster interoperability of security solutions Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 6

GSC 16 -PLEN-08 ETSI Security Workshop • Yearly event hosted at ETSI HQ Next: GSC 16 -PLEN-08 ETSI Security Workshop • Yearly event hosted at ETSI HQ Next: 7 th Workshop: 18 -19 January 2012 www. etsi. org/securityworkshop ETSI Security White Paper • 3 rd Edition (December 2009) available at: • www. etsi. org/securitywhitepaper • 4 th Edition to be published end 2011 Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All 7