You are on page 1of 18

COMESAMeeting/2

ND
ICTSUMMUTONCyberSecurity
25
th
28
th
Nov2013
SafariParkHotel,NAIROBI,KENYA
STUDY:PKIforCIIP
COMESAMemberstatesPreparedness
PKITechnologyidentity,trust
etransaction,datasecurity
MOTSIMABUSIN
WHAT IS PKI?
A 1000 feet view
Public Key Infrastructure (PKI) is a term to describe:
Legal and Technical Framework, made of policies, procedures, standards,
Hardware and software. PKI can be used to Control, Regulate &
Secure information Exchange, and Transactions and to Protect
Critical Informational Infrastructure.
PKI relies on two small elements known as the Public and Private Keys that are
used in conjunction with cryptography software and hardware.
PKI TECHNOLOGY AND
APPLICATIONS
PKIBASICS
DoyouknowAliceandBob?
ALICEANDBOB
AliceandBobcouldbepersons,websites,servers,valvescontrolswitch,pump
pressuregage,oranyothersubject.
TousePKI,BobandAliceeachhasadigitalcertificate[madeofaprivate&Public
Key].
Eachusestheotherspublickeytosendhim/itanencryptedmessage.Anduses
hisprivatekeytosignthemessage.Signatureisahashmadeofthemessage
contentencryptedwiththesendersprivatekey.
Therecipientuseshisprivatekeytodecryptthemessage.Senderspublickeyto
verifythesenderssignatureandintegrityofthemessage.
ENROLLMENT
Howtoobtainadigitalcertificate.
Sameprocess,differentsubjectsandrelyingparties
USE
Wheretousedigitalcertificates?
differentways,differentgoals,sameconcept
POTENTIALUSES
OFPKI COMESA
Internet:identityandTrust
UltimateGoalinImplementinga
PKIProject.
Helporganization'smembersobtaindigitalIDsandbecomepartofa
trustnetwork
Ultimatebusinessandtechnical
goalforanypublicPKIsetupisto
publishitsrootcertificatein
publiclyavailablebrowsers.
Government
PrimaryRoot
CA
GovIntCA1
Ministryof
Finance
GovIntCA11
Taxfiling
GovIntCA12
PensionFunds
GovIntCA2
Ministryof
Interior
GovIntCA21
NationalID
GovIntCA21
Employees
GovIntCA2
ForignAffairs
ModelforGovernmentCAHierarchy
Consideration of the PKI regulations and
instruments developed
Challengescountriesmightwhentryingtopublishtheircertificatesto
thebrowserscertificatestores. $$$$$
COMESAcountriesareencouragedtoshareonepublishedRCA,
otherwisecountriesmightneedtopublishtheirownRCA.
Alternativestopublishingareavailabletodiscussaswell.Howeverit
isachallengewithSSLcertificatesinparticular.
COMESAROOTCACONCEPTUALMODEL
DigitalInvestigationInitiated:
Environmentwherethecrimetookplace.
Istheenvironmentequippedtokeeplogs
andtrackincidents?Howwellequipped?Is
theenvironmentstillvalidtousetocollect
evidence?Isitmonitoredbyapassive
system?PKI?
DigitalCrime
Occurs
Evidencecollection:
1 Whatconstitues an
evidence?
2 Howtopreserveit
Presentevidencetothe
courtoflaw:
Whyshouldcourtaccepts
orrejectsit?
TherightPKIdeploymentshouldhelpgovernmentsfightdigitalcrime
bybeingabletoprovidetheproperevidencethatisacceptableinthe
courtoflaw.
TherightPKIplatformandpartnerselectionenables
governmentsto:
1. Complywithstandards.
2. ProtecttheirinvestmentsinPKI.
3. Scaletheplatformastheirneedsgrow.
4. ConsolidateallidentityprogramstouseasinglePKI
platform.
Cont.TherightPKIplatformandpartnerselection
enablesgovernmentsto:
5. Tapintoabroadecosystemofsupportingtechnology
vendorsandintegrators.
6. SupportnongovernmentorganizationsPKIefforts.
7. MinimizethecostsofPKIdeployment.
Comments,questions?
MotsimAbusin
motsim@pkitech.com
+97455083920

You might also like