16
1 Executive Post Graduate Programme in e-Governance (EPGP-EG), 2013-14 Identity Management GROUP # 2 Pravin Kolhe M. Jyothi Rani Sanjay Singh Vivek Srivastava Chandan Kumar Jha Presented by Cyber Security Through Biometrics in e-Gov Projects July-2013, IIM Indore

1 Presented by July-2013, IIM Indore. 2 On Internet, nobody knows who you are… A terrorist… or a student… or a spy…?

Embed Size (px)

Citation preview

Page 1: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

1

Executive Post Graduate Programme in e-Governance (EPGP-EG), 2013-14

Identity Management

GROUP # 2Pravin Kolhe M. Jyothi Rani

Sanjay Singh Vivek SrivastavaChandan Kumar Jha

Presented by

Cyber Security Through Biometrics in e-Gov Projects

July-2013, IIM Indore

Page 2: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

2

On Internet, nobody knows who you are…

A terrorist… or a student… or a spy…?

Page 3: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

3

Compromised Digital Certificate

Denial of Service Data Leakage Malware Hacking

ISSUES IN CYBER SECURITY IN EGOV PROJECTS

Cyber Squatting Phishing Vishing Identity Theft Cyber Terrorism

Page 4: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

4

The majority of cybercrimes are cantered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the

UK Social networks as well as ecommerce/gov sites are major targets 6.9 million bot-infected systems in 2011 14,348 website defacements in 2011 6,850 .in and 4,150 .com domains were defaced during 2011 15,000 sites hacked in 2011 India is the number 1 country in the world for generating spam.

CYBER CRIME IN INDIA

Page 5: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

5

A single identity is associated with each individual and is fixed in time. Individuals are not on a list of known criminals or terrorists. Individuals have not been previously excluded (e.g., are ineligible for services, have been deported, etc.). The claimed identity may be verified (i.e., at a point of service). Cyber Security is about establishing trust in entities accessing your networks and ensuring that they

perform functions consistent with the role you define for them. The fundamental capability necessary for any cyber security solution is Identity Management. Biometrics is a key enabling technology in the fight to strengthen the security of systems against cyber

crime. “Automated measurement of Physiological and/or behavioural characteristics to determine or

authenticate identity” Biometrics provide a clear benefit to counteracting cyber security threats.

HOW BIOMETRICS CAN HELP?

Page 6: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

6

ISO/IEC JTC 1 SC 37 ISO/IEC JTC 1 SC 27

ISO/IEC 24761:2009, Information technology - Security techniques - Authentication context for biometrics (ACBio)

ISO/IEC 19792:2009, Information technology - Security techniques - Security evaluation of biometrics

ISO/IEC 24745 - Information technology - Security techniques - Biometric template protection

ISO/IEC 24760, Information technology - Security techniques - A Framework for Identity Management

ISO TC 68

RECOMMENDED STANDARDS & DESIGN

Page 7: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

Identification Authentication

It determines the identity of the person. It determines whether the person is indeed who he claims to be.

No identity claim Many-to-one mapping. Cost of computation number of record of users.

Identity claim from the userOne-to-one mapping. The cost of computation is independent of the number of records of users.

Captured biometric signatures come from a set of known biometric feature stored in the system.

Captured biometric signatures may be unknown to the system.

IDENTIFICATION VS. AUTHENTICATION

Page 8: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

PHYSIOLOGICAL IDENTIFICATION

Biological/chemical based Finger prints Iris, Retinal scanning Hand shape geometry blood vessel/vein pattern Facial recognition ear image DNA

8

Page 9: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

BEHAVIOURAL IDENTIFICATION

A reflection of an individual’s Psychology Hand written signatures Voice pattern Mouse movement dynamics Gait (way of walking) Keystroke dynamics

9

Page 10: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

10

Eliminate memorization – Users don’t have to memorize features of their voice, face, eyes, or fingerprints

Eliminate misplaced tokens – Users won’t forget to bring fingerprints to work

Can’t be delegated – Users can’t lend fingers or faces to someone else

Often unique – Save money and maintain database integrity by eliminating duplicate enrolments

Liveliness detection & multimodal systems to combat spoofing. Data signing, time stamp and session token mechanisms for minimizing hacking. Coarse scoring, trusted sensors and secured channel for Denial of service.

WHY BIOMETRIC?

Page 11: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

11

Securely manage sensitive biometric data. Ensuring the privacy of users’ personal (e.g. biometric) data. Resisting attacks launched by insiders/outsiders. Providing for non-repudiation of activities. Integrating with 3rd party applications. Scaling enterprise-wide deployments.

AUTHENTICATION FRAMEWORK FOR DATA SECURITY

Page 12: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

12

BUSINESS CASE - ROICOSTS BENEFITS

Setting up global libraries, programming macros, validation checks

Pay one time fees to set up these services

Regulatory Submissions & Reporting

Standardization reduces time and improves quality

Training & Helpdesk Training time reduced,helpdesk cost minimised when all sites adopt same ePRO/EDC technology

Licensing Fees Volume discounts for EDC licensing fees centralized hosting

Resource Utilization Hourly/Daily charges per resource

Page 13: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

13

Expensive Change with Age Privacy Concerns Hygiene perception False Reading & copying Reliability Issues

DISADVANTAGES OF BIOMETRIC

Page 14: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

14

Biometrics offer the ability to both improve security and increase higher degrees of convenience.

Biometrics can supplement existing authentication mechanisms such as tokens and passwords.

ROI on eGov Projects may not show an picture as it is still in its infancy.

CONCLUSION

Page 15: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

15

CONTACT: -

Pravin Kolhe, Executive Engineer

Water Resources Department, Government of Maharashtra

Email:- [email protected]

PPT downloaded from www.pravinkolhe.com

Page 16: 1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

16

THANK YOU…!GROUP # 2, EPGP-EG, IIM INDORE, 2013-14