regina@cryptoid.com.br

Estamos em novo endereço. Encontre-nos lá!

Faça parte desse projeto você também!

Conteúdo

O objetivo desse Blog é apresentar essa fantástica e importante tecnologia, de forma simples, para que pessoas que não dominam aspectos técnicos também possam acompanhar a evolução da adoção da Certificação Digital e o universo que gira ao seu redor:

Certificado Digital para Assinatura e Sigilo, Certificado de Atributo, Carimbo do Tempo, Documentos Eletrônicos, Processos Eletrônicos, Nota Fical Eletrônica, TV Digital, Smart Card, Token, Assinador de Documento, Gerenciador de Identidades etc..

Este Blog publica matérias e artigos extraídos da mídia que expressam a opinião dos respectivos autores e artigos escritos por mim que expressam, exclusivamente, minha opinião pessoal sem vínculo a nenhuma organização.

Matérias organizadas por data de publicação

Mostrando postagens com marcador (NSTIC). Mostrar todas as postagens
Mostrando postagens com marcador (NSTIC). Mostrar todas as postagens

terça-feira, 6 de setembro de 2011

Autenticação é a palavra-chave


Jeremy Grant

"Estamos tentando nos livrar das senhas. É hora de algo melhor".








A declaração é de Jeremy Grant, conselheiro Executivo Sênior do Escritório Nacional de Programa dos Estados Unidos, da Estratégia Nacional para Identidades Confiáveis no Ciberespaço (NSTIC, na sigla em inglês), um programa da administração Obama para melhorar os métodos utilizados em autenticações online. Para ele, o governo norte-americano pode conduzir a indústria para novas tecnologias em larga escala. Mas, no Brasil, isso é uma iniciativa basicamente privada.

André Carraretto
Afinal, oferecer autenticações fortes para empresas é uma necessidade real no ambiente competitivo no qual o País se encontra em relação ao cenário internacional. Segundo André Carraretto, gerente de Engenharia de Sistemas da Symantec, há um interesse crescente nesses tipos de soluções, ainda mais com as tecnologias de computação na nuvem. "A preocupação das empresas de levar as informações e sistemas para o Cloud é garantir proteção ao acesso às informações", diz.


Faz sentido, já que a tecnologia trata justamente do armazenamento de dados e processos remotamente. Para ter acesso a isso sem a possibilidade de haver interceptações ou falsidade ideológica, um método de autenticação forte é extremamente necessário. Com senha compartilhada dentro de empresas, a chance de se escancarar a vulnerabilidade fica ainda maior. "Você perde a capacidade de fazer o rastreamento. É difícil saber quem daquele grupo está fazendo isso", afirma Carraretto.


Para ingressar com maior força no mercado de autenticação, a Symantec comprou em maio do ano passado por US$ 1,28 bilhão a VeriSign, empresa com atuação em 160 países e mais de 175 milhões de impressões diárias. O negócio incluiu as divisões Secure Sockets Layer, Public Key Infrastructure (PKI), VeriSign Trust Services e o serviço VeriSign Identity Protection (VIP), este último com validação de chave baseado na nuvem.


Sem esse tipo de tecnologia, se o usuário estiver utilizando uma rede pública e a máquina está infectada, o invasor consegue ter acesso às informações. "Se ele estiver utilizando uma solução de autenticação forte, o hacker teria de capturar tudo, inclusive o token, mas não daria tempo de utilizá-lo porque, uma vez usado, ele perde a validade. As informações capturadas são insuficientes para acesso, então há a proteção", diz o executivo.
Mobilidade

Apesar do promissor mercado, a própria empresa de segurança afirma que os ciberataques cresceram 93% por dia no último ano. Nesta corrida, por outro lado, o número de credenciais VIP chegou a 5,5 milhões, sendo 3,5 milhões em plataformas móveis. "Em vez de carregar vários tokens físicos, é possível ter um rodando no celular, já que você está sempre carregando o aparelho", diz Carraretto. O aplicativo, que é gratuito, também pode ser utilizado para autenticação em sites de forma opcional para adicionar uma camada a mais de proteção, como no site de pagamentos virtuais PayPal ou no de leilões e classificados eBay.

É preciso, no entanto, deixar claro que existe uma diferença entre a versão móvel e a física do mecanismo. “O token no celular não deixa de ser um software. Neste caso, mesmo que utilizemos as melhores técnicas de anticlonagem e ofuscation das sementes, na comparação a um token hardware, o software acaba sendo, de alguma forma, menos seguro. O token hardware está completamente isolado do mundo, numa caixinha inviolável e sem nenhum tipo de comunicação", esclarece o gerente de Engenharia de Sistemas da Symantec.

Isso não impede que 65% dos usuários de tokens tenham migrado para o celular, segundo informações da empresa. "Qualquer solução de proteção (autenticação) considera a balança Segurança X Comodidade. E o mesmo acontece na comparação Token X Celular”, diz. Ou seja, o risco existe, mas não deve ser levado ao nível de paranoia. “O mais importante é estar com uma autenticação forte. E tem questões de segurança do próprio celular que podem ajudar”, ameniza, citando exemplos de aplicativos de proteção em caso de extravio. “A tendência é de haver cada vez mais necessidade de autenticação”.


Fonte: Risk REPORT

sexta-feira, 6 de maio de 2011

USA lança estratégia para proteger os consumidores on-line


The White House
Office of the Press Secretary

 

 

  

Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace


WASHINGTON, DC – Today, the Obama Administration released the National Strategy for Trusted Identities in Cyberspace (NSTIC), which seeks to better protect consumers from fraud and identity theft, enhance individuals’ privacy, and foster economic growth by enabling industry both to move more services online and to create innovative new services.  The NSTIC aims to make online transactions more trustworthy, thereby giving businesses and consumers more confidence in conducting business online.

“The Internet has transformed how we communicate and do business, opening up markets, and connecting our society as never before.  But it has also led to new challenges, like online fraud and identity theft, that harm consumers and cost billions of dollars each year,” said President Obama.  “By making online transactions more trustworthy and better protecting privacy, we will prevent costly crime, we will give businesses and consumers new confidence, and we will foster growth and untold innovation.  That’s why this initiative is so important for our economy.”

“We must do more to help consumers protect themselves, and we must make it more convenient than remembering dozens of passwords,” said Commerce Secretary Gary Locke, speaking at the U.S. Chamber of Commerce.  “Working together, innovators, industry, consumer advocates, and the government can develop standards so that the marketplace can provide more secure online credentials, while protecting privacy, for consumers who want them.”

The goal of NSTIC is to create an “Identity Ecosystem” in which there will be interoperable, secure, and reliable credentials available to consumers who want them.  Consumers who want to participate will be able to obtain a single credential--such as a unique piece of software on a smart phone, a smart card, or a token that generates a one-time digital password.  Instead of having to remember dozens of passwords, the consumer can use their single credential to log into any website, with more security than passwords alone provide.  Since consumers will be able to choose among a diverse market of different providers of credentials, there will be no single, centralized database of information.  Consumers can use their credential to prove their identity when they're carrying out sensitive transactions, like banking, and can stay anonymous when they are not.

Once the Identity Ecosystem is developed, a small business, for example, would be able to avoid the cost of building its own login system and could more easily take its business online.  Consumers would be able to connect with the new business with a credential they already have, thereby avoiding the hassle of creating another username and password while also being more secure.  The small business can take advantage of this interoperability to focus on its product or service instead of on managing users’ accounts.  The small business has also expanded its ability to reach new customers across the nation and around the world.

Separately, there are many services for which consumers must go to a physical store--or sign a sheet of paper and fax it to a business.  In the Identity Ecosystem, consumers would have the option of proving their identity online, which would enable industry and government to both move brick-and-mortar services to the online world and to create innovative new services.

More secure credentials will also help consumers and businesses better protect themselves from identity theft and online fraud, which annually cost our economy billions of dollars and impose a significant cost in time and money to those who fall victim.  In the worst cases, it can take a consumer over 130 hours to recover from having their identity stolen.  According to industry surveys, a consumer will also suffer an average out-of-pocket cost of $631 when their identity is stolen--and millions of consumers suffer this experience each year.

The Identity Ecosystem will provide more security for consumers; it will also provide better privacy protections.  Today, a vast amount of information about consumers is collected as they surf the Internet and conduct transactions.  How organizations handle that information can vary greatly, and more often than not, it is difficult for consumers to understand how their privacy will (or will not) be protected.  T

he NSTIC seeks to drive the development of privacy-enhancing policies as well as innovative privacy-enhancing technologies to ensure that the ecosystem provides strong privacy protections for consumers.

The NSTIC outlines a private-sector led effort, facilitated by government, to develop the technologies, standards and policies necessary to create the Identity Ecosystem and to enable a self-sustaining market of many different credential providers.  The Identity Ecosystem will be built to provide more security and privacy to consumers, while also spurring economic growth by helping businesses move more services online.

For more details on the National Strategy for Trusted Identities in Cyberspace (NSTIC), click here, or read the full Strategy here.

Fact Sheet: National Strategy for Trusted Identities in Cyberspace

“The internet has transformed how we do business, opening up markets and connecting our economy as never before.  It has revolutionized the ways in which we communicate with one another, whether with a friend down the street or a colleague across the globe.  And as we have seen in recent weeks, it has empowered people all over the world with tools to share information and speak their minds.  In short, the growth of the internet has been one of the greatest forces for innovation and progress in history.”
—President Barack Obama

A PLATFORM FOR SECURITY, PRIVACY AND INNOVATION

The NSTIC’s vision statement is: “Individuals and organizations utilize secure, efficient, easy-to-use and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.”

For our nation to continue to drive economic growth over the Internet, we must provide individuals and organizations the ability and the option to more securely identify each other.  When individuals and organizations have greater trust in online identities, they can offer and use online services for more sophisticated and sensitive transactions than have been available to date. They will also be better protected against online fraud and identity theft.

The Strategy emphasizes choice for individuals, who can:
  • Choose whether or not to participate at all: participation is optional.
  • Choose one or more different identity providers: the Strategy envisions a vibrant marketplace that provides individuals with choices among multiple identity providers—both private and public.
  • Choose between different types of credentials: individuals will be able to choose credentials that meet their needs, including smart cards, cell phones, keychain “fobs,” one-time password generators, and, undoubtedly, secure solutions that have yet to be invented.
  • Choose when to use a credential: if people want to use cyberspace without a credential in ways that don’t require authentication, like browsing or blogging anonymously, they can do so at any time.
  • Choice drives competition and innovation —and will result in a thriving market of diverse solutions to fit different individuals’ needs.
EXAMPLES

Faster Online Errands—Mary is tired of memorizing dozens of password and username combinations to conduct her personal online errands.  She opts instead to get a smart card from her Internet service provider. She inserts the card into her computer and in a matter of seconds, with just clicks of her mouse, she is able to securely move between her online account with her bank, her mortgage company, and her doctor; next she sends an authenticated email to her friend and remotely checks her office calendar on her employer’s intranet.

Age Appropriate Access—Antonio, age 13, visits online chat rooms to talk to other students his age.  His parents give him permission to get an identity credential, stored on a keychain fob, from his school.  The credential verifies his age so that he can visit chat rooms for adolescents, but it does not reveal his birth date, name, or other information.  Nor does it inform the school about his online activities.  Antonio can speak anonymously but with confidence that the other participants are his age.

Smart Phone Transactions—Parvati does most of her online transactions using her smart phone.  She downloads a "digital certificate" from an ID provider that resides as an application on her phone.  Used in conjunction with a single, short PIN or password, the phone's application is used to prove her identity.  She can do all her sensitive transactions, even pay her taxes, through her smart phone whenever and wherever it is convenient for her – and without remembering complex passwords.

Efficient and Secure Business Operations—Juan owns a small business and is setting up a new online storefront.  Without making large investments in information technology, he wants customers to know that his small firm can provide the same safety and privacy for their transactions as sites for larger companies.  He installs standard software and agrees to follow the Identity Ecosystem privacy and security requirements, earning a "trustmark" logo for his Web site.  To reduce his risk of fraud, he needs to know that his customers' credit cards or other payment mechanisms are valid and where to ship his merchandise.

There are a number of different ID providers that can issue credentials that validate this information.  Millions of individuals can now use his Web site without having to share extra personal information or even set up accounts with Juan's company.  This saves his customers time, increases their privacy and confidence, and saves Juan money.

Enhanced Public Safety—Joel is a doctor.  A devastating hurricane occurs close to his home.  Using his interoperable credential located on a USB thumb drive and issued by his employer, he logs in to a Web portal maintained by a federal agency.  The site tells him that his medical specialty is urgently needed at a triage center nearby.

PRINCIPLES

PRIVACY ENHANCING AND VOLUNTARY
  • Participation in the Identity Ecosystem will be voluntary: there is no requirement that any individual obtain a credential.
  • The envisioned Identity Ecosystem will be grounded in the implementation of the full set of the Fair Information Practice Principles (FIPPs) in order to provide multi-faceted privacy protections.  The privacy rules must address not only the circumstances under which participants in the Identity Ecosystem may share information but also the kinds of information that they may collect and how that information is managed and used.
  • Although individuals will retain the right to exchange their personal information in return for services they value, these protections will provide a default level of privacy and will enable individuals to form consistent expectations about the treatment of their information within the ecosystem.
  • A FIPPs-based approach will also promote the adoption of privacy-enhancing technical standards. As envisioned by NSTIC, such standards will minimize the ability to link credential use among service providers, thereby preventing them from developing a complete picture of an individual’s activities online.
SECURE AND RESILIENT
  • Identity solutions will provide secure and reliable methods of electronic authentication.  Authentication credentials are secure when they are issued based on sound criteria for verifying the identity of individuals and devices; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements.
  • Credentials are resilient when they can recover from loss, compromise, theft—and can be effectively revoked or suspended in instances of misuse.  Another contributor to resilience is the existence of a diverse environment of providers and methods of authentication.
INTEROPERABLE
  • Interoperability encourages service providers to accept a variety of credentials and identity media, similar to the way ATMs accept credit and debit cards from different banks.
  • Interoperability also supports identity portability: it enables individuals to use a variety of credentials in asserting their digital identities to service providers.  Finally, the interoperability of identity solutions envisioned in the Strategy will enable individuals to easily switch providers, thus aligning market incentives to meet individuals’ expectations.
COST-EFFECTIVE AND EASY TO USE
  • Individuals, businesses, organizations, and all levels of government will benefit from the reduced cost of online transactions: fewer redundant account procedures, a reduction in fraud, decreased help-desk costs, and a transition away from expensive paper-based processes.
BENEFITS
INDIVIDUALS
  • Convenience. Individuals will be able to conduct their personal business online with less time and effort.
  • Privacy. Individuals’ privacy will be enhanced.
  • Security. Individuals can work and play online with fewer concerns about identity theft.
PRIVATE SECTOR
  • Innovation. The Identity Ecosystem will provide a platform on which new and more efficient business models will be developed—just as the Internet itself has been a platform for innovation.  It will also enable organizations to put new services online, especially for sectors such as healthcare and banking. 
  • Efficiency. Online transactions will be practical in more situations.  The private sector will have lower barriers to customer enrollment, increased productivity, and decreased costs.  Cross-organizational trust will provide businesses with exposure to a large population of potential customers they might not otherwise reach.  Not only is there potential access to new customers, the traditional barriers associated with customer enrollment can be eliminated, reducing a friction that prevents potential customers from using a service.
  • Trust. Trusted digital identities will allow organizations to better display and protect their brands online.  Participants in the Identity Ecosystem will also be more trusted, because they will have agreed to the Identity Ecosystem’s minimum standards for privacy and security.
GOVERNMENT
  • Constituent Satisfaction. The Identity Ecosystem will enable government to expand its online services in order to serve its constituents more efficiently and transparently.
  • Economic Growth. Government support of the Identity Ecosystem will generate innovation in the marketplace that will create new business opportunities.
  • Public Safety. Increasing online security will reduce cyber crime, improve the integrity of networks and systems, and raise overall consumer safety levels.  Enhanced online trust will also provide a platform to support more effective and adaptable response to national emergencies.

President Obama’s New Role: Identity Protector in Chief

With $10 trillion of U.S. commerce conducted online every year, basic username and password “security” is just not strong enough – not strong enough to protect the amount of information people volunteer or are  required to give to complete an ecommerce transaction.

While this is not a new revelation and none of you have suddenly been awakened to this reality, recent moves by the Obama administration to push stronger online identity protection helps bring to light a real human concern and we hope starts a process resulting in better identity protection for all internet users.

Last week in Washington D.C. , top officials from the Commerce Dept., Department of Homeland Security (DHS) and others launched the National Strategy for Trusted Identities in Cyberspace (NSTIC), which President Obama has now signed.


“The Internet has transformed how we communicate and do business, opening up markets, and connecting our society as never before. But it has also led to new challenges, like online fraud and identity theft, that harm consumers and cost billions of dollars each year,” said President Obama. “By making online transactions more trustworthy and better protecting privacy, we will prevent costly crime, we will give businesses and consumers new confidence, and we will foster growth and untold innovation. That’s why this initiative is so important for our economy.”


“We must do more to help consumers protect themselves, and we must make it more convenient than remembering dozens of passwords,” said Commerce Secretary Gary Locke, speaking at the U.S. Chamber of Commerce. “Working together, innovators, industry, consumer advocates, and the government can develop standards so that the marketplace can provide more secure online credentials, while protecting privacy, for consumers who want them.”
It’s about time we got serious about this topic and with this statement the Obama administration has elevated protecting online digital identities to a national priority.

Is this just political positioning?  Far from it.

Identity is the very essence of who we are.

Yet ID theft has been the #1 consumer complaint to the Federal Trade Commission for the last ten years.  During that time the threat landscape has evolved from a labor intensive paper chase to super automated botnets and a global network of computers pushing out phishing, keyboard loggers and other attacks by the millions.

The threat is so pervasive that the Anti-Phishing Working Group (APWG) states that 25 percent of all PCs are infected with banking Trojans or downloaders aimed at stealing account credentials or hijacking online banking sessions.  Cyber criminals are particularly focused on businesses, municipalities and high net worth individuals where they can get a much bigger payout.

While NSTIC recognizes there is a place for anonymity and many low level password-protected personas online, there is a clear message that high value transactions, especially e-commerce and banking, need to move to a higher level of identity protection based on a smart card or secure USB token.

Speaking at the launch event, U.S. Commerce Secretary Gary Locke said, “We must do more to help consumers protect themselves, and we must make it more convenient than remembering dozens of passwords.  Working together, innovators, industry, consumer advocates, and the government can develop standards so that the marketplace can provide more secure online credentials, while protecting privacy, for consumers who want them.”

Protecting online identity is not a luxury – it is a mandate. As more of our world becomes connected, protecting online identity needs to be a top priority. As more people use (and in some ways implicitly trust) the internet for e-commerce, personal finance and social interaction, the amount of personal information placed online warrants a real identity protection solution. The NSTIC call for a strong identity credential is a great foundation to protect the individual identity with standardized industry proven technology. While it will take some time to see the true impact of NSTIC, it is certainly a move in the right direction.

Posted on 26th Apr 2011 by Ray Wizbowski