Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Presentasi ftii intlcyberlaw
1. THE ROAD TOWARDS NATIONAL CA
By Sylvia W Sumarlin, Chairlady of FTII
Bali, 16 January 2013
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
2. I T INDUSTRIES ROLE SUPPORTING SAFE CYBER
COMMUNICATION, TRANSACTION AND IDENTITY
Existing Condition
• Each individual, corporation government institution
seek their own security system and method
• Most of them use commercial products from
multinationals security providers.
• Missing national cyber security initiatives is it
needed? Necessary?
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
3. IMPLEMENTING BIOMETRIC SYSTEM in INDONESIA
• Are we ready?
• Pre- requisities Think of how to develop the whole
equipment logistic chain from manufacturing all the way to
equipment usage
• Think of how to provide data storage for any or if any existing
critical national/public or individual’s information
• Preparing the national infrastucture
HIGH DEGREE OF COMPLEXITY
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
4. I.T. INDUSTRY CONTRIBUTIONS
• Road map of Biometrics implementation
• Lead sector LEMSANEG ( Lembaga Sandi Negara)
• Industry’s planning from component preparation,
design architecture/platform, research and
development to conform with national
implementation
• The truth : commercial/business community needs
for security always in demand. Cannot wait for
regulation. 2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
5. SECURITIES INDUSTRY IS RELATED DIRECTLY TO
MANUFACTURING
• Formal logistical support plan
• Provide quality and timely support for the field support
engineers to conduct repair and replacement of Biometric
equipments
• Hardware and Firmware should be reliable. It shoud be
tamper resistant.
SO FAR, WE ONLY TALKED ABOUT MINORITY ISSUE OF
EQUIPMENT MANUFACTURING
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
6. SECURITY and NATIONAL SOVEREIGNTY
• Borderless world in the cyberworld
• According to Mastel ( Infocom Society in Indonesia ), the size
of internet users reached 55.23 million people, the internet
penetration still around 18.5%, 3G and CDMA sim card users
about 200 million
• Demand for electronic transaction is high currently peple
are oblivious forward the cyber crime.
• Who to trust?
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
7. CERTIFICATE OF AUTHORITY
• Foreign which are proven and widely used
• Versus : National CA which are designated for its own citizen
• Benefits Vs Disadvantages? What to do in the absence of
national CA?
Private CA for public interest
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
8. PP 82 / 2012 – PSTE
• “E-public services must have a minimum
qualification to have trusted sertification
based on the I T governance perspective”
• Qualification hardware/firmware, application,
services etc...
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
9. MANUFACTURER, SERVICE PROVIDER and
PUBLIC’s DREAM
• To have a solid and reliable platform
• Co-operation between goverment, services and
manufacturing sectors developing Certificate of Authority
• Each sector is represented by its institution / association
• Local content to enhance security and economic growth
• Joint research and development in providing technology, lab
facilities, etc
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
10. PUTTING TOGETHER A BIG PUZZLE
• Committment
• Dare to conduct public testing
• ....
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
11. CONCLUSION
The need for having a CA in Indonesia is
certainly unavoidable. A strong support from
LEMSANEG to assist the development of CA
together with Local IT expertise will create a
strong platform for a secured electronic
transaction for public and private use.
2013 International Seminar of Cyber Law:
GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION