ict innovation
play

ICT-Innovation How digital sovereignty and it-security can help - PowerPoint PPT Presentation

ICT-Innovation How digital sovereignty and it-security can help pushing Europe forward Prof. Reinhard POSCH reinhard.posch@cio.gv.at DIGIT GITAL AL SO SOVERE EREIG IGNTY NTY HOW IS S IT EN ENDAGE GERED RED juri risdi sdiction


  1. ICT-Innovation How digital sovereignty and it-security can help pushing Europe forward Prof. Reinhard POSCH reinhard.posch@cio.gv.at

  2. DIGIT GITAL AL SO SOVERE EREIG IGNTY NTY – HOW IS S IT EN ENDAGE GERED RED juri risdi sdiction ction awar are e IT and d communica unication tion switc tching ing mobile le connections nections – floating ting cros oss s jurisdiction isdiction to redu duce ce cost push h noti tifica ication tion – always s on a leash sh cloud ud stor orage e – do we have e to fear ar about ut IPR docume cument nt colla labor boration tion – in the e cloud ud as you type certif tific icates tes and upda dates tes – who o contr trols s what t you use DEMOCRA OCRATIC TIC MODE ODEL L – GO GOVERA ERANCE NCE BY HUGE GE COM OMPANIES ANIES

  3. SA SAFE FE HA HARB RBOR OR SAFE HARB RBOR OR

  4. DIGITAL : AUSTRIA E ID ID – S ECURITY – MOBILE D EVICES CLOUD IS OF NTY - future IGNT - challenge storage ID – BASIS documents - collaboration SOVEREIG WEB SERVICES Tablet Handy Laptop PC ... eID identification signature encryption security services

  5. DIGITAL : AUSTRIA BIG PLAYER IN THE CLOUD – EU LEGISLATION CLOUD o eIDaS assigns control on electronic identity and supervision to member states not to cloud provider o technical and legal schemes with big PUBLIC CLOUDs need adjustments to comply with technical and legal requirements

  6. DIGITAL : AUSTRIA no se securit ity wit ithout id identit ity  before defending interests we need to know and identify the partners o multi factor identification o crypto based identification o robust against replay o simple for users o broad acceptance

  7. DIGITAL : AUSTRIA STORK – the root of f EU eID ID o assuming minimum security o mutual recognition – technology, legal o Interoperability – protocol o for administration and private sector model for eIDaS

  8. NO O SECURITY RITY WITHOUT THOUT HRDWAR WARE NO O SO SOVEREI EREIGNTY GNTY W/O O HW W SU SUPP PPOR ORT

  9. DIGITAL : AUSTRIA BASIC NEEDS MUST NOT FADE AWAY WITH CLOUD o user and services need to know about jurisdictions for data in rest and in transit  NOT YET EVIDENT IN PRACTICAL SITUATIONS o user and services need to make sure that they are the only ones having access to content  IMPORTANCE BECAME EVIDENT ALONG WITH RECENT SITUATIONS o law enforcement and interception may be needed on a national level  STILL UNSOLVED AND HARDLY EVER DISCUSSED FOR GOVERNMENT DATA CROSS BORDER

  10. DIGITAL : AUSTRIA PROVIDER INFRASTRUCTURE ENHANCEMENTS JURISDICTION MATTERS WITH LIABILITY DNSSEC + TLS w CLIENT CERTIFICATE COMPULRORY SECURITY SUITES o users need to keep control and possibly choice o relevant jurisdictions to be known at the time of communication o availability at all services to allow taking advantage o needed to assign responsibilities

  11. DIGITAL : AUSTRIA CLOUD : COMMUNICATION AND TRUST ADMINISTRATION SMEs EDUCATION (GOV) CLOUD BYOD = existing devices, PCs, laptops, tablets... HTML5 WEBSERVICES Open DATA SSO AVOID LOCAL MINIMUM FOCUS ON WEBAPPS PROCESSING AND DEVICE PROPERTIES STORAGE e.g: SAP DOCS MAIL/CAL ... Specific APPS SECURITY SERVICES ... STORAGE

  12. DIGITAL : AUSTRIA CRYPTO and CLOUD NATIONAL USABILITY AND INTERESTS HNDLING CONVENIENCE COMPLEXITY RESEARCH CRYPTO UNDER OPEN NATIONAL CRYPTO FOR CLOUD PROBLEMS / COMPANY CONTROL EUROPE COULD PLAY A COMPETENT ROLE COST/EFFICIENCY

  13. DIGITAL : AUSTRIA TECHNOLOGY – PRODUCTS – RULE LES implementation – cycle innovation regulation standards product } } industry pushing Industry to care to avoid hurdles for an as short as possible interval who empowers users to be able to minimize the time to standards??

  14. DIGITAL : AUSTRIA CLOUD AND RISK attack potential CLOUD damage = probability * value protection PROVISIONING USER

  15. in inno novatio tion n and nd dig igit ital al sover ereign eignty ty in indust ustry ry taking ing in inno novati tion on to o product oducts avoidi oiding ng the he sell lling ing to o over erseas seas in indus ustry try 4.0 .0

  16. Data protection? Security? Applications? Sovereignty? SOFTWARE HARDWARE

  17. DIGITAL : AUSTRIA THE FUTURE OF DOCUMENTS EDITING DOCUMENTS THE CHANGE IS ON THE WAY WHAT DOES THIS MEAN TO OTHER SYSTEMS ?

  18. DIGITAL : AUSTRIA documents – coll llaboration CLOUD group key(doc) documents security - service

  19. DIGITAL : AUSTRIA U SE SER – G OVERNANCE – C ONTROL security - service CLOUD Reduced Risk Content identity mobility

  20. DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT key per document security - service REDUCED RISK CONTENT CONTENT document per key key(Doc i ) ≠ key(Doc j ) falls i ≠ j

  21. DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT  calendar ( … tasks) SMIME  mail SMIME  documents SMIME  collaboration ?????? security has to be bound to identity in all cases! identity

  22. DIGITAL : AUSTRIA TTIP IP – SAFE HARBOR TTIP – WILL THE PUZZLE FIT? WHAT NOW we certainly need a closer look chaos or chance?

  23. SECURITY= STRENGTH * TAKE-UP If we miss out on one – we loose If we loose this formula – we loose the game

Recommend


More recommend