SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
P a r t n e r s i n B u i l d i n g U A E ' s S e c u r i t y & E c o n o m y
Homeland Security
Exploring the Role of National Identity
Management Infrastructure
Presented by Dr. Ali M. Al-Khouri
In: Homeland Security Summit Middle East
27-28 May 2013 | Abu Dhabi | UAE
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Introduction: Definitions
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Wikipedia Definition
.. refers to the broad national effort by all
levels of government to protect its
territory from hazards, both internal and
external, natural and man-made.
Homeland Security,
URL=http://en.wikipedia.org/wiki/Homeland_Security
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security & Terrorism
Terrorism evokes conjectures of images [violence and destruction]
… associated with the term “Terrorism”..
which can be defined as a primarily a
psychological tool of “strategic leveraging”
and a form of “propaganda by deed,” that
can be utilized by both anti-state partisan
revolutionary groups and state leaderships.
Hall Gardner
Professor of International Politics at
the American University of Paris
“modern day terrorism is conducted
not necessarily by physical gore but
a concerted psychological warfare ..”
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Forms of Terrorism
Classical Definition
1. Anti-state terrorism
disrupt states and undermine governments,
black and gray
market economies.
2. State-sponsored terrorism
disrupt political economies of rival states, attack
leaders and supporters of opposition
movements.
3. Totalitarian terrorism
Fear & control society
4. Street terrorism
kidnapping, drug smuggling, contract killing ..
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Forms of Terrorism
Neo Definition
1. Bio Terrorism [biological and chemical warfare]
2. Cyber Terrorism [loss of billions of dollars]
3. Nuclear Terrorism
4. Eco Terrorism [Ecological destruction]
5. Narco Terrorism [drug abuse]
6. ??
assumed newer
proportions and
has gone
beyond physical
realms into
virtual realms
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Emerging Threats
… each form of
terrorism use Identity
or misuse Identity.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Identity Terrorism
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Identity is required for any transaction
Imposters carry out
illegal transactions
using aliases and
fraudulent identities.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
It takes 130 person-hours to
rebuild a digital identity
after it has been
compromised. . .
Identity Terrorism
Identity in the Digital World
A 2010 report from the U.S.
Department of Justice
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Identity Terrorism
Reported and Published Cases
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Identity Terrorism
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Identity Terrorism
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Modern Identity Management Systems
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Personal Identification
• Identity Protection
• Legal Sanction
Fighting Identity Terrorism
Conventional Identity Documents
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Personal Identification
• Identity Protection
• Legal Sanction
Modern Identity Documents
Fighting Identity Terrorism
Conventional Identity Documents
• Identity Protection
• Fraud Prevention
• Fraud Containment
• Document Protection
• Legal Protection
• Transaction Assurance
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Identity, Document & Transaction Management
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Modern Identity Management Systems
Provide Identity Protection
Digital Identity
Profile
Core Identity
parameters
Multiple
Biometric data
Digital Certificates
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Prevent Identity Abuse
• Digital Notarization of
transactions
• Time-Stamped transactions
Prevent Identity Fraud
• Digital Identity in a Smart
Card
• Identity data signed by the
ID Issue
• Smart Card as a Secure
Document
Prevent Identity Misuse
• Identity verification online,
on demand
• Transaction stakeholders
identified online
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Smart National ID Card
Multiple Security Capabilities
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
ID Enabled e-Transactions
Government, Businesses and Citizens
Modern
Identity
Management
enable remote
transactions
with complete
protection to
the three
dimensions of
Identity
Management.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Protection of Transactions
using ID Credentials for Trust
Improved trust and
ensures
compliance to the
legal systems in
the country.
key to transactional protection
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Digital Signature and Trust
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution
Enabled Trust in Transactions
Digital Signature
as a Service is
embedded in the
UAE ID Program as a
key component that
provides unique
signatures for any
transaction that
needs credential
verification and
transaction
assurance.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Content of Digital Signature
All these
are
verifiable.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
provide Digital
Identity to
individuals in a
Smart Card with
unique
certificates to
every individual.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution
Public Key Infrastructure Technology
Digital Signature
Server components
• User Registration and Life-Cycle Management
• Centralised Policy Management
• Digitally Signed and Time-Stamped Transaction
Management
• Certificate and Card Verification Service
• Transaction Verification Service
• Time Stamping Service
• Audit Logger
• Databases: Identity Repository, Transaction Database,
Audit Trails, ID card Hotlist and CRL Database.Digital Signature
Client
• Active X & Java based Plug-in
• UAE ID Card based Access Control Component
• Digital Signing & Time Stamping Component
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Electronic Document Security
Process
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Robust Identity
Benefit Realisation
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Interoperability and Standardisation
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Interoperability Standardization
different
sides of the
same coin!
enabled by
meaningless
without
Efficient & Effective eGovernment Services
Inter and Intra-Government Interoperability
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital ID Profiles
Enrolment Process
Interoperable Identity
standards
service delivery systems
enable
access
create
provide
enable
standardization
of how Identity is
integrated into
different
applications for
service access and
privilege
management
Government Service Delivery Model
… ability to lay down the standards for interoperability
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
customer experience
standards
establish
(data exchange for
Identity profiles)
data movement across
networks becomes
easier
Federated
Identity
Management
enable
Enhancing Customer Experience
… need for standardisation
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Interoperability of
different devices
Digital
ID
Profiles
Packaging of
Digital ID Profiles
ID Card
integration with
the applications
ID Validation
mechanisms
Multifactor
authentication
Data Exchange
mechanism
Delivery of e-Services
using National ID Card
eGov Transformation
… areas of identity interoperability and standardisation
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
eGov Transformation
… standards that need to be established
Authentication
mechanisms for
determining ID
Data
Exchange
Identity Profile
Integration
Usage of ID in
Service Delivery
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Conclusion
Final Remarks
• Identity Security is no longer isolated from
Homeland Security
• The asymmetric threats related to identity theft
and abuse is now a strategic threat.
• Likely to see new forms of identity theft in the
increasingly digitised world..
• Modern Identity Management provide higher
levels of security and privacy
• Serious and focused international cooperation
and collaboration is fundamental to
comprehend, safeguard critical infrastructure,
cyberspace, and people.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
http://www.emiratesid.gov.ae/ar/media-center/publications.aspx
More Information
Read our recent research publications
www.id.ae
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
….
Thank You
Dr. Ali M. Al-Khouri
Director General
Emirates Identity Authority
United Arab Emirates
ali.alkhouri@emiratesid.ae
www.emiratesid.ae
“I know not with what
weapons World War III
will be fought, but World
War IV will be fought
with sticks and stones.”
Albert Einstein

Contenu connexe

Similaire à Homeland Security

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
Future Agenda
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
Dr Lendy Spires
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
Mohsin Abbas
 

Similaire à Homeland Security (20)

Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Developing Comprehensive National Statistics
Developing Comprehensive National StatisticsDeveloping Comprehensive National Statistics
Developing Comprehensive National Statistics
 
Why Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdfWhy Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdf
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usa
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
EARN DAILY Eldorado Token
 EARN DAILY Eldorado  Token EARN DAILY Eldorado  Token
EARN DAILY Eldorado Token
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapes
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 

Plus de Arab Federation for Digital Economy

المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
Arab Federation for Digital Economy
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
Arab Federation for Digital Economy
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
Arab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
Arab Federation for Digital Economy
 

Plus de Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Homeland Security

  • 1. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved P a r t n e r s i n B u i l d i n g U A E ' s S e c u r i t y & E c o n o m y Homeland Security Exploring the Role of National Identity Management Infrastructure Presented by Dr. Ali M. Al-Khouri In: Homeland Security Summit Middle East 27-28 May 2013 | Abu Dhabi | UAE
  • 2. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda
  • 3. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Introduction: Definitions
  • 4. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security Wikipedia Definition .. refers to the broad national effort by all levels of government to protect its territory from hazards, both internal and external, natural and man-made. Homeland Security, URL=http://en.wikipedia.org/wiki/Homeland_Security
  • 5. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security & Terrorism Terrorism evokes conjectures of images [violence and destruction] … associated with the term “Terrorism”.. which can be defined as a primarily a psychological tool of “strategic leveraging” and a form of “propaganda by deed,” that can be utilized by both anti-state partisan revolutionary groups and state leaderships. Hall Gardner Professor of International Politics at the American University of Paris “modern day terrorism is conducted not necessarily by physical gore but a concerted psychological warfare ..”
  • 6. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security Forms of Terrorism Classical Definition 1. Anti-state terrorism disrupt states and undermine governments, black and gray market economies. 2. State-sponsored terrorism disrupt political economies of rival states, attack leaders and supporters of opposition movements. 3. Totalitarian terrorism Fear & control society 4. Street terrorism kidnapping, drug smuggling, contract killing ..
  • 7. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security Forms of Terrorism Neo Definition 1. Bio Terrorism [biological and chemical warfare] 2. Cyber Terrorism [loss of billions of dollars] 3. Nuclear Terrorism 4. Eco Terrorism [Ecological destruction] 5. Narco Terrorism [drug abuse] 6. ?? assumed newer proportions and has gone beyond physical realms into virtual realms
  • 8. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security Emerging Threats … each form of terrorism use Identity or misuse Identity.
  • 9. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Identity Terrorism
  • 10. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Homeland Security Identity is required for any transaction Imposters carry out illegal transactions using aliases and fraudulent identities.
  • 11. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved It takes 130 person-hours to rebuild a digital identity after it has been compromised. . . Identity Terrorism Identity in the Digital World A 2010 report from the U.S. Department of Justice
  • 12. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Identity Terrorism Reported and Published Cases
  • 13. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Identity Terrorism
  • 14. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Identity Terrorism
  • 15. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Modern Identity Management Systems
  • 16. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Personal Identification • Identity Protection • Legal Sanction Fighting Identity Terrorism Conventional Identity Documents
  • 17. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Personal Identification • Identity Protection • Legal Sanction Modern Identity Documents Fighting Identity Terrorism Conventional Identity Documents • Identity Protection • Fraud Prevention • Fraud Containment • Document Protection • Legal Protection • Transaction Assurance
  • 18. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Fighting Identity Terrorism Identity, Document & Transaction Management
  • 19. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Fighting Identity Terrorism Modern Identity Management Systems Provide Identity Protection Digital Identity Profile Core Identity parameters Multiple Biometric data Digital Certificates
  • 20. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Fighting Identity Terrorism Prevent Identity Abuse • Digital Notarization of transactions • Time-Stamped transactions Prevent Identity Fraud • Digital Identity in a Smart Card • Identity data signed by the ID Issue • Smart Card as a Secure Document Prevent Identity Misuse • Identity verification online, on demand • Transaction stakeholders identified online
  • 21. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Smart National ID Card Multiple Security Capabilities
  • 22. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved ID Enabled e-Transactions Government, Businesses and Citizens Modern Identity Management enable remote transactions with complete protection to the three dimensions of Identity Management.
  • 23. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Protection of Transactions using ID Credentials for Trust Improved trust and ensures compliance to the legal systems in the country. key to transactional protection
  • 24. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Digital Signature and Trust
  • 25. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital Signature Solution Enabled Trust in Transactions Digital Signature as a Service is embedded in the UAE ID Program as a key component that provides unique signatures for any transaction that needs credential verification and transaction assurance.
  • 26. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Content of Digital Signature All these are verifiable.
  • 27. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital Signature Solution: System Architecture provide Digital Identity to individuals in a Smart Card with unique certificates to every individual.
  • 28. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital Signature Solution: System Architecture
  • 29. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital Signature Solution: System Architecture
  • 30. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital Signature Solution Public Key Infrastructure Technology Digital Signature Server components • User Registration and Life-Cycle Management • Centralised Policy Management • Digitally Signed and Time-Stamped Transaction Management • Certificate and Card Verification Service • Transaction Verification Service • Time Stamping Service • Audit Logger • Databases: Identity Repository, Transaction Database, Audit Trails, ID card Hotlist and CRL Database.Digital Signature Client • Active X & Java based Plug-in • UAE ID Card based Access Control Component • Digital Signing & Time Stamping Component
  • 31. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Electronic Document Security Process
  • 32. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Robust Identity Benefit Realisation
  • 33. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Interoperability and Standardisation
  • 34. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Interoperability Standardization different sides of the same coin! enabled by meaningless without Efficient & Effective eGovernment Services Inter and Intra-Government Interoperability
  • 35. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Digital ID Profiles Enrolment Process Interoperable Identity standards service delivery systems enable access create provide enable standardization of how Identity is integrated into different applications for service access and privilege management Government Service Delivery Model … ability to lay down the standards for interoperability
  • 36. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved customer experience standards establish (data exchange for Identity profiles) data movement across networks becomes easier Federated Identity Management enable Enhancing Customer Experience … need for standardisation
  • 37. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Interoperability of different devices Digital ID Profiles Packaging of Digital ID Profiles ID Card integration with the applications ID Validation mechanisms Multifactor authentication Data Exchange mechanism Delivery of e-Services using National ID Card eGov Transformation … areas of identity interoperability and standardisation
  • 38. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved eGov Transformation … standards that need to be established Authentication mechanisms for determining ID Data Exchange Identity Profile Integration Usage of ID in Service Delivery
  • 39. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Introduction: Definitions • Identity Terrorism • Modern Identity Management Systems • Digital Signature and Trust • Interoperability and Standardisation • Concluding Remarks Agenda • Concluding Remarks
  • 40. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Conclusion Final Remarks • Identity Security is no longer isolated from Homeland Security • The asymmetric threats related to identity theft and abuse is now a strategic threat. • Likely to see new forms of identity theft in the increasingly digitised world.. • Modern Identity Management provide higher levels of security and privacy • Serious and focused international cooperation and collaboration is fundamental to comprehend, safeguard critical infrastructure, cyberspace, and people.
  • 41. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved http://www.emiratesid.gov.ae/ar/media-center/publications.aspx More Information Read our recent research publications www.id.ae
  • 42. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved …. Thank You Dr. Ali M. Al-Khouri Director General Emirates Identity Authority United Arab Emirates ali.alkhouri@emiratesid.ae www.emiratesid.ae “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” Albert Einstein