SlideShare une entreprise Scribd logo
1  sur  61
PKI & Personal Digital Certificates,
  The Key to Securing Sensitive
   Electronic Communications




        MATC
    April 22, 2010
    Nicholas Davis
Overview
Why is electronic privacy such a hot
topic these days?
Watch video
What is a digital certificate?
What is PKI?
Why are these technologies important?
Trusted Root Authorities
Using digital certificates for email encryption
Key Escrow, the double edged sword
Integrating digital certificates into email for
security
New uses for digital certificates
How is PKI related to SSL?
Using certificates for code signing of
software
NSA conspiracy theories
Real world issues with PKI
Discussion
Why is Electronic Privacy
Such a Hot Topic Today?
   • Evolution of the Internet,
     commerce, banking, healthcare
   • Dependence on Email
   • Government regulations, SOX,
     HIPAA, GLB, PCI, FERPA
   • Public Image
   • Business warehousing
   • Industrial Espionage
   • The United States government!
The Topic is More Interesting
    When It Affects You!
Intercepting Your Electronic
      Communications
Digital certificates can
         protect your
      sensitive electronic
    information in multiple
             Ways
Encryption, Digital Signing and
         Authentication
Discussion Topic One
• Do you think the threat of Email
  eavesdropping is real?
• What about the government’s argument
  about Email being like a “postcard?”
• Should DOA be allowed to look at
  DWD emails on a public network?
• Are you angry now, or just afraid?
• Who has the responsibility in this
  situation?
What is a Digital Certificate?
Digital Certificate Terminology
            Defined
      Digital Certificate
        Electronic Passport
        Good for authentication
        Good non-repudiation
        Proof of authorship
        Proof of non-altered content
        Encryption!
        Better than username - password
What is in a Certificate?
Public and Private Keys
 The digital certificate has two parts, a
 PUBLIC key and a PRIVATE key
 The Public Key is distributed to
 everyone
 The Private Key is held very closely
 And NEVER shared
 Public Key is used for encryption and
 verification of a digital signature
 Private Key is used for Digital signing and
 decryption
Public Key Cryptography
Getting Someone’s Public Key
      The Public Key must be shared to be
      Useful
      It can be included as part of your
      Email signature
      It can be looked up in an LDAP
      Directory
      Can you think of the advantages and
      disadvantages of each method?
Who Could This Public Key
  Possibly Belong To?
What is PKI?
• PKI is an acronym for Public Key
  Infrastructure
• It is the system which manages and
  controls the lifecycle of digital
  certificates
• The PKI has many features
What Is In a PKI?
 •   Credentialing of individuals
 •   Generating certificates
 •   Distributing certificates
 •   Keeping copies of certificates
 •   Reissuing certificates
 •   Revoking Certificates
Credentialing
• Non technical, but the most
  important part of a PKI!
• A certificate is only as trustworthy as
  the underlying credentialing and
  management system
• Certificate Policies and Certificate
  Practices Statement
Certificate Generation and Storage
      • How do you know who you are
        dealing with in the generation
        process?
      • Where you keep the certificate is
        important
Distributing Certificates
• Can be done
  remotely – benefits
  and drawbacks
• Can be done face
  to face – benefits
  and drawbacks
Keeping Copies – Key Escrow
    • Benefit –
      Available in case
      of emergency
    • Drawback – Can
      be stolen
    • Compromise is
      the best!
    • Use Audit Trails,
      separation of
      duties and good
      accounting
      controls for key
      escrow
Certificate Renewal
• Just like your passport, digital certificates
  expire
• This is for the safety of the organization
  and those who do business with it
• Short lifetime – more assurance of
  validity but a pain to renew
• Long lifetime – less assurance of validity,
  but easier to manage
• Use a Certificate Revocation List if you
  are unsure of certificate validity
Trusted Root Authorities
• A certificate issuer
  recognized by all
  computers around
  the globe
• Root certificates
  are stored in the
  computer’s central
  certificate store
• Requires a
  stringent audit and
  a lot of money!
It Is All About Trust
Using Certificates to Secure Email
      • Best use for certificates, in my
        opinion
      • Digital certificate provides proof that
        the email did indeed come from the
        purported sender
      • Public key enables encryption and
        ensures that the message can only
        be read by the intended recipient
Secure Email is Called
      S/MIME
     • S/MIME = Secure
       Multipurpose Mail
       Extensions
     • S/MIME is the
       industry standard,
       not a point
       solution, unique to
       a specific vendor
Using Certificates For
   Authentication
Digital Certificates
• A digital passport,
  either contained on a
  secure device, or on
  a hard disk
• Secured with a
  password, making
  them truly a dual
  factor solution
• Can be used to
  authenticate
  machines as well as
  humans
Digital Certificate Benefits
   • True Dual Factor Authentication
   • Low variable cost to produce
   • Can contain authorization data as
     well as authentication data
Digital Certificate Drawbacks
   • High fixed cost to build initial
     infrastructure
   • Can be copied and shared if not
     properly stored
   • Expiration
   • Often require access to an interface
     such as a card reader of USB port,
     not always available at kiosks
Digital Signing of Email
 • Proves that the email came from
   you
 • Invalidates plausible denial
 • Proves through a checksum that the
   contents of the email were not
   altered while in transit
 • Provides a mechanism to distribute
   your public key
 • Does NOT prove when you sent the
   email
Using Digital Certificates for Digital
              Signing
Digital Signatures Do Not Prove When
a Message or Document Was Signed
       You need a
       neutral third party
       time stamping
       service, similar to
       how hostages
       often have their
       pictures taken in
       front of a
       newspaper to
       prove they are still
       alive!
Send Me a Signed Email, Please,
    I Need Your Public Key
What Does a Digital Signature Prove?
      Provides proof that the
      email came from the
      purported sender…Is
      this email really from
      Britney Spears?
      Provides proof that the
      contents of the email
      have not been altered
      from the original form
A Digital Signature Can Be Invalid For
            Many Reasons
Why Is The Digital Signature of the
      Sender So Important?
What if This Happens at MATC?

       Could cause harm in
       a critical situation
       Case Scenario
           Multiple hoax emails
           sent with Chancellor’s
           name and email.
           When real crisis
           arrives, people might
           not believe the
           warning.
       It is all about trust!
Digital Signing Summary
• Provides proof of the
  author
• Testifies to message
  integrity
• Valuable for both
  individual or mass
  email
• Supported by
  Wiscmail Web client
  (used by 80% of
  students)
Using Digital Certificates for
        Encryption
What Encryption Does
Encrypting data with a
digital certificate
Secures it end to end.
• While in transit
• Across the network
• While sitting on email
   servers
• While in storage
• On your desktop
   computer
• On your laptop
   computer
• On a server
Encryption Protects the Data At Rest
           and In Transit
      Physical theft from office
      Physical theft from airport
      Virtual theft over the network
Why Encryption is Important
    •   Keeps private information private
    •   HIPAA, FERPA, SOX, GLB compliance
    •   Proprietary research
    •   Human Resource issues
    •   Legal Issues
    •   PR Issues
    •   Industrial Espionage
    •   Over-intrusive Government
    •   You never know who is
        listening and watching!
What does it actually look like in practice?
                -Sending-
What does it actually look like in
practice (unlocking my private key)
             -receiving-
What does it actually look like in practice?
        -receiving- (decrypted)
Digitally signed and verified;
          Encrypted
What does it look like in practice?
   -receiving- (intercepted)
Intercepting the Data in Transit
Digital Certificates For Machines Too
        • SSL – Secure
          Socket Layer
        • Protection of data
          in transit
        • Protection of data
          at rest
        • Where is the
          greater threat?
        • Our certs protect
          both!
Case Study - Why the Registrar’s
Office Chose Digital Certificates
      • Cost
      • Easy Integration
      • Security
      • No individual
        process
        evaluation
      • Leverages a
        central, generic
        resource
      • Ability to inter-
        communicate
Is the NSA Watching?
 • Discussion of NSA_key in Microsoft
   Operating System
 • What about UW-Madison?
SUMMARY
• Authentication
• Digital Signing of Documents
• Encryption

• Digital certificates can do all of this!
Benefits of Using Digital
          Certificates
Provide global assurance of your identity,
both internally and externally to the
UW-Madison
Provide assurance of message authenticity
and data integrity
Keeps private information private, end to
end, while in transit and storage
You don’t need to have a digital certificate
To verify someone else’s digital signature
Can be used for individual or generic mail
accounts.
Who Uses Digital Certificates
     at UW-Madison?
DoIT
UW Police and Security
Office of the Registrar
Office of Financial Aid
Office of Admissions
Primate Research Lab
Medical School
Bucky Badger, because he’s a team
player and slightly paranoid about his
basketball plays being stolen
Who Uses Digital Certificates
  Besides UW-Madison?
US Department of Defense
US Department of Homeland
Security
All Western European countries
New US Passport
Dartmouth College
University of Texas at Austin
Johnson & Johnson
Raytheon
Others
The Telephone Analogy
When the
telephone was
invented, it was
hard to sell.
It needed to
reach critical
mass and then
everyone wanted
one.
That All Sounds Great in Theory,
    But Do I Really Need It?
    • The world seems
      to get along just
      fine without digital
      certificates…
    • Oh, really?
    • Let’s talk about
      some recent
      stories
We Have Internal Threats Too
     @ UW-Madison!
How Do Users Feel About the
      Technology?
   • Ease of use
   • Challenges
   • Changes in how they do their daily
     work
   • Benefits
   • Drawbacks
It Really Is Up To You!

• Digital certificates / PKI is not hard to
  implement
• It provides end to end security of
  sensitive communications
• It is comprehensive, not a mix of point
  solutions
• You are the leaders of tomorrow, make
  your choices count by pushing for
  secure electronic communications!
How Can I Help You?
ndavis1@wisc.edu
http://www.cio.wisc.edu/security/digitalCert/

Contenu connexe

Tendances

Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 

Tendances (17)

Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Ppt
PptPpt
Ppt
 

Similaire à Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Nicholas Davis
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonNicholas Davis
 
Using digital certificates to secure sensitive communications at uw madison
Using digital certificates to secure sensitive communications at uw madisonUsing digital certificates to secure sensitive communications at uw madison
Using digital certificates to secure sensitive communications at uw madisonNicholas Davis
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Healthcare information security secure sensitive communications within the ...
Healthcare information security   secure sensitive communications within the ...Healthcare information security   secure sensitive communications within the ...
Healthcare information security secure sensitive communications within the ...Nicholas Davis
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...Nicholas Davis
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...Keynectis
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 

Similaire à Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison (20)

Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
 
Cryptography
CryptographyCryptography
Cryptography
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University Wisconsin
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Using digital certificates to secure sensitive communications at uw madison
Using digital certificates to secure sensitive communications at uw madisonUsing digital certificates to secure sensitive communications at uw madison
Using digital certificates to secure sensitive communications at uw madison
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Healthcare information security secure sensitive communications within the ...
Healthcare information security   secure sensitive communications within the ...Healthcare information security   secure sensitive communications within the ...
Healthcare information security secure sensitive communications within the ...
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 

Plus de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Plus de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Dernier

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

  • 1. PKI & Personal Digital Certificates, The Key to Securing Sensitive Electronic Communications MATC April 22, 2010 Nicholas Davis
  • 2. Overview Why is electronic privacy such a hot topic these days? Watch video What is a digital certificate? What is PKI? Why are these technologies important? Trusted Root Authorities Using digital certificates for email encryption Key Escrow, the double edged sword Integrating digital certificates into email for security New uses for digital certificates How is PKI related to SSL? Using certificates for code signing of software NSA conspiracy theories Real world issues with PKI Discussion
  • 3. Why is Electronic Privacy Such a Hot Topic Today? • Evolution of the Internet, commerce, banking, healthcare • Dependence on Email • Government regulations, SOX, HIPAA, GLB, PCI, FERPA • Public Image • Business warehousing • Industrial Espionage • The United States government!
  • 4. The Topic is More Interesting When It Affects You!
  • 6. Digital certificates can protect your sensitive electronic information in multiple Ways Encryption, Digital Signing and Authentication
  • 7. Discussion Topic One • Do you think the threat of Email eavesdropping is real? • What about the government’s argument about Email being like a “postcard?” • Should DOA be allowed to look at DWD emails on a public network? • Are you angry now, or just afraid? • Who has the responsibility in this situation?
  • 8. What is a Digital Certificate?
  • 9. Digital Certificate Terminology Defined Digital Certificate Electronic Passport Good for authentication Good non-repudiation Proof of authorship Proof of non-altered content Encryption! Better than username - password
  • 10. What is in a Certificate?
  • 11. Public and Private Keys The digital certificate has two parts, a PUBLIC key and a PRIVATE key The Public Key is distributed to everyone The Private Key is held very closely And NEVER shared Public Key is used for encryption and verification of a digital signature Private Key is used for Digital signing and decryption
  • 13. Getting Someone’s Public Key The Public Key must be shared to be Useful It can be included as part of your Email signature It can be looked up in an LDAP Directory Can you think of the advantages and disadvantages of each method?
  • 14. Who Could This Public Key Possibly Belong To?
  • 15. What is PKI? • PKI is an acronym for Public Key Infrastructure • It is the system which manages and controls the lifecycle of digital certificates • The PKI has many features
  • 16. What Is In a PKI? • Credentialing of individuals • Generating certificates • Distributing certificates • Keeping copies of certificates • Reissuing certificates • Revoking Certificates
  • 17. Credentialing • Non technical, but the most important part of a PKI! • A certificate is only as trustworthy as the underlying credentialing and management system • Certificate Policies and Certificate Practices Statement
  • 18. Certificate Generation and Storage • How do you know who you are dealing with in the generation process? • Where you keep the certificate is important
  • 19. Distributing Certificates • Can be done remotely – benefits and drawbacks • Can be done face to face – benefits and drawbacks
  • 20. Keeping Copies – Key Escrow • Benefit – Available in case of emergency • Drawback – Can be stolen • Compromise is the best! • Use Audit Trails, separation of duties and good accounting controls for key escrow
  • 21. Certificate Renewal • Just like your passport, digital certificates expire • This is for the safety of the organization and those who do business with it • Short lifetime – more assurance of validity but a pain to renew • Long lifetime – less assurance of validity, but easier to manage • Use a Certificate Revocation List if you are unsure of certificate validity
  • 22. Trusted Root Authorities • A certificate issuer recognized by all computers around the globe • Root certificates are stored in the computer’s central certificate store • Requires a stringent audit and a lot of money!
  • 23. It Is All About Trust
  • 24. Using Certificates to Secure Email • Best use for certificates, in my opinion • Digital certificate provides proof that the email did indeed come from the purported sender • Public key enables encryption and ensures that the message can only be read by the intended recipient
  • 25. Secure Email is Called S/MIME • S/MIME = Secure Multipurpose Mail Extensions • S/MIME is the industry standard, not a point solution, unique to a specific vendor
  • 26. Using Certificates For Authentication
  • 27. Digital Certificates • A digital passport, either contained on a secure device, or on a hard disk • Secured with a password, making them truly a dual factor solution • Can be used to authenticate machines as well as humans
  • 28. Digital Certificate Benefits • True Dual Factor Authentication • Low variable cost to produce • Can contain authorization data as well as authentication data
  • 29. Digital Certificate Drawbacks • High fixed cost to build initial infrastructure • Can be copied and shared if not properly stored • Expiration • Often require access to an interface such as a card reader of USB port, not always available at kiosks
  • 30. Digital Signing of Email • Proves that the email came from you • Invalidates plausible denial • Proves through a checksum that the contents of the email were not altered while in transit • Provides a mechanism to distribute your public key • Does NOT prove when you sent the email
  • 31. Using Digital Certificates for Digital Signing
  • 32. Digital Signatures Do Not Prove When a Message or Document Was Signed You need a neutral third party time stamping service, similar to how hostages often have their pictures taken in front of a newspaper to prove they are still alive!
  • 33. Send Me a Signed Email, Please, I Need Your Public Key
  • 34. What Does a Digital Signature Prove? Provides proof that the email came from the purported sender…Is this email really from Britney Spears? Provides proof that the contents of the email have not been altered from the original form
  • 35. A Digital Signature Can Be Invalid For Many Reasons
  • 36. Why Is The Digital Signature of the Sender So Important?
  • 37. What if This Happens at MATC? Could cause harm in a critical situation Case Scenario Multiple hoax emails sent with Chancellor’s name and email. When real crisis arrives, people might not believe the warning. It is all about trust!
  • 38. Digital Signing Summary • Provides proof of the author • Testifies to message integrity • Valuable for both individual or mass email • Supported by Wiscmail Web client (used by 80% of students)
  • 39. Using Digital Certificates for Encryption
  • 40. What Encryption Does Encrypting data with a digital certificate Secures it end to end. • While in transit • Across the network • While sitting on email servers • While in storage • On your desktop computer • On your laptop computer • On a server
  • 41. Encryption Protects the Data At Rest and In Transit Physical theft from office Physical theft from airport Virtual theft over the network
  • 42. Why Encryption is Important • Keeps private information private • HIPAA, FERPA, SOX, GLB compliance • Proprietary research • Human Resource issues • Legal Issues • PR Issues • Industrial Espionage • Over-intrusive Government • You never know who is listening and watching!
  • 43. What does it actually look like in practice? -Sending-
  • 44. What does it actually look like in practice (unlocking my private key) -receiving-
  • 45. What does it actually look like in practice? -receiving- (decrypted)
  • 46. Digitally signed and verified; Encrypted
  • 47. What does it look like in practice? -receiving- (intercepted)
  • 48. Intercepting the Data in Transit
  • 49. Digital Certificates For Machines Too • SSL – Secure Socket Layer • Protection of data in transit • Protection of data at rest • Where is the greater threat? • Our certs protect both!
  • 50. Case Study - Why the Registrar’s Office Chose Digital Certificates • Cost • Easy Integration • Security • No individual process evaluation • Leverages a central, generic resource • Ability to inter- communicate
  • 51. Is the NSA Watching? • Discussion of NSA_key in Microsoft Operating System • What about UW-Madison?
  • 52. SUMMARY • Authentication • Digital Signing of Documents • Encryption • Digital certificates can do all of this!
  • 53. Benefits of Using Digital Certificates Provide global assurance of your identity, both internally and externally to the UW-Madison Provide assurance of message authenticity and data integrity Keeps private information private, end to end, while in transit and storage You don’t need to have a digital certificate To verify someone else’s digital signature Can be used for individual or generic mail accounts.
  • 54. Who Uses Digital Certificates at UW-Madison? DoIT UW Police and Security Office of the Registrar Office of Financial Aid Office of Admissions Primate Research Lab Medical School Bucky Badger, because he’s a team player and slightly paranoid about his basketball plays being stolen
  • 55. Who Uses Digital Certificates Besides UW-Madison? US Department of Defense US Department of Homeland Security All Western European countries New US Passport Dartmouth College University of Texas at Austin Johnson & Johnson Raytheon Others
  • 56. The Telephone Analogy When the telephone was invented, it was hard to sell. It needed to reach critical mass and then everyone wanted one.
  • 57. That All Sounds Great in Theory, But Do I Really Need It? • The world seems to get along just fine without digital certificates… • Oh, really? • Let’s talk about some recent stories
  • 58. We Have Internal Threats Too @ UW-Madison!
  • 59. How Do Users Feel About the Technology? • Ease of use • Challenges • Changes in how they do their daily work • Benefits • Drawbacks
  • 60. It Really Is Up To You! • Digital certificates / PKI is not hard to implement • It provides end to end security of sensitive communications • It is comprehensive, not a mix of point solutions • You are the leaders of tomorrow, make your choices count by pushing for secure electronic communications!
  • 61. How Can I Help You? ndavis1@wisc.edu http://www.cio.wisc.edu/security/digitalCert/