112 research outputs found

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizensโ€™ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the projectโ€™s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizensโ€™ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the projectโ€™s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Strong Electronic Identification: Survey & Scenario Planning

    Get PDF
    The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others. This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet. This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet. The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis. As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future. To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future

    Strong Electronic Identification: Survey & Scenario Planning

    Get PDF
    The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others. This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet. This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet. The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis. As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future. To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future

    Digital Identity Scheme

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. Junki Kim.๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ๋Š” ๋””์ง€ํ„ธ ์„œ๋น„์Šค์™€์˜ ์ƒํ˜ธ์ž‘์šฉ์—์„œ ๊ฐœ์ธ์„ ๊ณ ์œ ํ•˜๊ฒŒ ์ฐจ๋ณ„ํ™”ํ•˜๋Š” ์†์„ฑ์„ ์˜๋ฏธํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ๋ผ์ดํ”„์‚ฌ์ดํด์„ ๊ด€๋ฆฌํ•˜๋Š” ์ •์ฑ…, ๊ธฐ์ˆ , ์กฐ์ง ๋ฐ ํ”„๋กœ์„ธ์Šค์˜ ์ž˜ ์„ค๊ณ„๋œ ์ง‘ํ•ฉ์ฒด์ด๋‹ค. ์ด๋Š” ๋””์ง€ํ„ธ ๋ณ€ํ™˜์˜ ํ•„์ˆ˜ ์š”์†Œ์ด๋ฉฐ ๋””์ง€ํ„ธ ์‹ ๋ขฐ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ํ•ต์‹ฌ ์š”์†Œ์ด๋‹ค. ๊ทธ๋Ÿฐ ๋งฅ๋ฝ์—์„œ, ์ด ๋…ผ๋ฌธ์€ ๊ตญ๊ฐ€ ์ฐจ์›์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ๋ฐ ์žˆ์–ด ์–ด๋ ค์›€์„ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•œ๋‹ค. ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ์•ˆ์ „์„ฑ, ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋””์ง€ํ„ธ ID์˜ ์ด์ ์€ ๊ณต๊ณต ๋ฐ ๋ฏผ๊ฐ„ ๋ถ€๋ฌธ, ์•„์นด๋ฐ๋ฏธ ๋ฐ ๊ตญ์ œ ์กฐ์ง์— ์˜ํ•ด ๋„๋ฆฌ ์ธ์‹๋˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋”๋ถˆ์–ด COVID-19์˜ ์„ธ๊ณ„์ ์ธ ํ™•์‚ฐ์œผ๋กœ ์ธํ•ด ์‚ฌํšŒ์  ๊ฑฐ๋ฆฌ๋‘๊ธฐ ์กฐ์น˜์™€ ๋น„๋Œ€๋ฉด ๊ฑฐ๋ž˜๊ฐ€ ์ฆ๊ฐ€ํ•˜๋ฉด์„œ, ์šฐ๋ฆฌ๋Š” ์ •๋ถ€์™€ ๊ธฐ์—…์— ์˜ํ•ด ๊ฐœ๋ฐœ๋˜๋Š” ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๋ฐœ์ „ํ•˜๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ๋Œ€ํ•œ๋ฏผ๊ตญ(์ดํ•˜ ํ•œ๊ตญ)๊ณผ ํŽ˜๋ฃจ์™€ ๊ฐ™์€ ๋‚˜๋ผ๋“ค์€ ํ•ธ๋“œํฐ, ์ธ๊ณต์ง€๋Šฅ, ๋น…๋ฐ์ดํ„ฐ, ์ƒํ˜ธ์šด์šฉ์„ฑ, ๋ฐ์ดํ„ฐ์„ผํ„ฐ์™€ ๊ฐ™์€ ๋ถ€์ƒํ•œ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์‹๋ณ„ ๋ฐ ์ธ์ฆ ํ”„๋กœ์„ธ์Šค์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๊ธฐ ์œ„ํ•ด ์„œ๋กœ ๋‹ค๋ฅธ ์ข…๋ฅ˜์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ์™€ ํ”Œ๋žซํผ์„ ๊ฐœ๋ฐœ, ์‹œํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์— ๋”ฐ๋ผ ํ˜„์žฌ๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ์ „์ž์ •๋ถ€ ๊ณต์‹ํฌํ„ธ๋กœ, ๋””์ง€ํ„ธ์›ํŒจ์Šค(Digital ONEPASS)๋ฅผ ๋””์ง€ํ„ธ์ธ์ฆํ”Œ๋žซํผ์œผ๋กœ ๊ตฌํ˜„ํ•ด ์‹œ๋ฏผ ๋น„๋Œ€๋ฉด ์ธ์ฆ์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ฃผ๋ฏผ๋“ฑ๋ก์ œ๋„(RRS)๋„ ํ•œ๊ตญ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ํ•ต์‹ฌ์š”์†Œ๋กœ ์ž๋ฆฌ๋งค๊น€ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋น„์Šทํ•˜๊ฒŒ ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๊ธฐ์กด์˜ ์ „์ž์ •๋ถ€ ์ ‘๊ทผ ๋ฐฉ์‹์ด ๋””์ง€ํ„ธ ์ •๋ถ€๋ผ๋Š” ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„์œผ๋กœ ๋ณ€๋ชจํ•˜์˜€๋‹ค๋Š” ๊ฒƒ๊ณผ, ๋””์ง€ํ„ธ ๊ธฐ์ˆ ์€ ๋” ์ด์ƒ ๊ธฐ์ˆ ์  ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ ์ •์น˜, ๋ฒ•๋ฅ , ํ˜‘๋ ฅ์  ๋ฌธ์ œ๋ผ๋Š” ์ดํ•ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ 2018๋…„ ๋””์ง€ํ„ธ ์ •๋ถ€๊ฐ€ ์ œ์ •๋˜์—ˆ๋‹ค. ๋””์ง€ํ„ธ ์ •์ฒด์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๋‘ ๊ฐœ์˜ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ์ด ์‹œํ–‰๋˜๊ณ  ์žˆ๋Š”๋ฐ, ํ•˜๋‚˜๋Š” ์‹œ๋ฏผ ์ง€ํ–ฅ์˜ ๋‹จ์ผ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ(GOB.PE)์ด๋ฉฐ, ๋‹ค๋ฅธ ํ•˜๋‚˜๋Š” ๋””์ง€ํ„ธ ์‹ ์› ํ™•์ธ ๋ฐ ์ธ์ฆ์„ ์œ„ํ•œ ๊ตญ๊ฐ€ ํ”Œ๋žซํผ(ID)์ด๋‹ค. ๋‘ ํ”Œ๋žซํผ์€ ์ •๋ถ€์— ์˜ํ•ด ์œ ์ง€๋˜๊ณ  ๊ฐœ๋ฐœ๋œ๋‹ค. ์ด์ฒ˜๋Ÿผ ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ์ •์ฑ… ์‚ฌ์ด์— ์œ ์‚ฌ์ ์ด ์žˆ์ง€๋งŒ ๊ฒฐ๊ณผ๋Š” ๋‹ค๋ฅด๋‹ค. ์ „์ž์ •๋ถ€๊ฐœ๋ฐœ์ง€์ˆ˜(EDGI)์—์„œ ํ•œ๊ตญ์€ ์„ธ๊ณ„ 2์œ„, ํŽ˜๋ฃจ๋Š” 71์œ„, ํ•œ๊ตญ์€ ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๊ตฌํ˜„๋˜์–ด ์žˆ๊ณ , ์ •๋ถ€24๋Š” ๋‹ค์–‘ํ•œ ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ONE PASS, KAKAO, ์‚ผ์„ฑ PASS ๋“ฑ ์‹œ๋ฏผ์„ ์œ„ํ•œ ๊ฐ„ํŽธํ•˜๊ณ  ํŽธ๋ฆฌํ•œ ์ธ์ฆ ๋ฐฉ๋ฒ•์ด ์‚ฌ์šฉ๋œ๋‹ค. ๋˜ํ•œ 2021๋…„๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ํ†ตํ•ด ์˜จ๋ผ์ธ์œผ๋กœ ์ ‘์ˆ˜๋œ ์ฒญ์›์€ 13202๋งŒ 5035๊ฑด์— ๋‹ฌํ•˜๋ฉฐ, ์ฆ๋ช…์„œ์™€ ๋ฌธ์„œ๋Š” ์‹œ๋ฏผ์ด ์ง์ ‘ ํ”„๋ฆฐํ„ฐ๋ฅผ ํ†ตํ•ด ์ถœ๋ ฅํ–ˆ๋‹ค. ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์ •๋ถ€๋ฒ•์ด ๊ทœ์ œํ•˜๋Š” ๊ณต๊ณต๋ถ€๋ฌธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ •๋ถ€๊ฐ€ ๊ธฐ๋ณธ์ ์œผ๋กœ ์ฃผ๋„ํ•˜๋Š” ์ง„ํ–‰ํ˜• ํ”„๋กœ์„ธ์Šค๋‹ค. ๋”ฐ๋ผ์„œ, ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์ด ๊ฐœ์ธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ์˜ ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ๋ณด์•ˆ์„ฑ ๋ฐ ์‚ฌ์šฉ์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์–ด๋–ค ์„ฑ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ๋Š”์ง€ ์ค‘์ ์ ์œผ๋กœ ์‚ดํŽด๋ณด๋ ค๊ณ  ํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ์œ ์—”๊ณผ ๊ฒฝ์ œํ˜‘๋ ฅ๊ฐœ๋ฐœ๊ธฐ๊ตฌ(OECD)๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์ ์šฉํ•œ ๋น„๊ต ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ํ™œ์šฉํ•ด ์œ ์‚ฌ์ ๊ณผ ์ฐจ์ด์ ์„ ๊ทœ๋ช…ํ•  ์˜ˆ์ •์ด๋‹ค. ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋น„๊ต ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ์‹œ์˜์ ์ ˆํ•˜๋‹ค. ์™œ๋ƒํ•˜๋ฉด ํŽ˜๋ฃจ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ๋ชจ๋ฒ” ์‚ฌ๋ก€์™€ ์ข‹์€ ๊ตํ›ˆ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๊ณ  ๋” ๋‚˜์€ ์ •์ฑ…๊ณผ ๊ฒฐ์ •์„ ์„ค๊ณ„ํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ICT ์ „๋ฌธ๊ฐ€์™€ ์˜จ๋ผ์ธ ์ธํ„ฐ๋ทฐ๋ฅผ ํ†ตํ•ด ์–‘๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„์— ๋Œ€ํ•œ ์‹ฌ์ธต์ ์ธ ์ดํ•ด๋ฅผ ์ฐฝ์ถœํ•˜๋Š” ์ •์„ฑ์  ์—ฐ๊ตฌ ๋ฐฉ๋ฒ•์„ ํ™œ์šฉํ•˜์˜€๋‹ค. ์ด 10๋ช…์˜ ์ „๋ฌธ๊ฐ€๋ฅผ ์ธํ„ฐ๋ทฐํ–ˆ๋Š”๋ฐ, ์ „๋ฌธ๊ฐ€์™€์˜ ์ธํ„ฐ๋ทฐ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ง„ํ™”์— ๋Œ€ํ•œ ๊ฐœ์š”๋ฅผ ์ œ๊ณตํ•˜๊ณ  ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„ ๊ตฌํ˜„ ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๊ณผ์ œ๋ฅผ ์‹๋ณ„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋””์ง€ํ„ธ ๊ณต๊ณต ์„œ๋น„์Šค์˜ ๊ฐœ๋ฐœ ๋ฐ ์ œ๊ณต์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•œ ๊ฐ•๋ ฅํ•˜๊ณ  ์ง€์†์ ์ธ ๋””์ง€ํ„ธ ๋ฆฌ๋”์‹ญ, ์‹œ์˜์ ์ ˆํ•œ ๋ฒ•์  ํ”„๋ ˆ์ž„์›Œํฌ, ํ˜„๋Œ€ ICT ๊ธฐ์ˆ ์ด๋ผ๋Š” ์„ธ ๊ฐ€์ง€ ์š”์†Œ์—์„œ ํฐ ์ฐจ์ด๊ฐ€ ๋‚˜ํƒ€๋‚ฌ์Œ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋Š” ๋˜ํ•œ ํŽ˜๋ฃจ์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ƒํƒœ๊ณ„๋ฅผ ์กฐ์„ฑํ•˜๊ธฐ ์œ„ํ•œ ๋ชฉ์ ์œผ๋กœ ์ œ๋„์  ์ •๋น„๋ฅผ ํ•˜๊ณ , ๊ทœ์ œ๋ฅผ ๊ฐœ์„ ํ•˜๋ฉฐ, ์˜ˆ์‚ฐ์„ ์ตœ์ ํ™”ํ•œ๋‹ค๋ฉด ํฐ ์„ฑ๊ณผ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ์ฃผ์š” ํ‚ค์›Œ๋“œ: ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ, ๋””์ง€ํ„ธ ์ •๋ถ€, ๋””์ง€ํ„ธ ๋ณ€ํ™˜, ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žตDigital identity is the collection of attributes that uniquely differentiates a person in his interaction with digital services. The literature and previous research suggest that it is an essential component to the digital transformation and a vital element for strengthening the digital trust. Currently, due to worldwide spread of COVID-19, which has accelerated the digital transition in the public and private sector, the non-face-to-face transactions have been increased, coupled with cybercrimes such as identity theft, private data leakage, fraud, among other cybercrimes. In this sense, governments should become aware of the importance of digital identity management, because it is increasingly embedded in everything we do in our digital and offline life (WEF, Identity in the Digital World a new chapter in the social contract, 2018, p. 9). To deal with those issues and leverage all the potential of digital identity at national level, many countries implement a Digital Identity Scheme, which is a well-designed and articulated collection of policies, business rules, technologies, organizations, and processes in charge of governing the digital identity lifecycle to promote a digital society. Hence, countries such as The Republic of Korea (hereinafter, Korea) and The Republic of Peru (hereinafter, Peru) have been developed and implemented different kind of policies, legal instruments, initiatives, and digital technologies to enhance accessibility, efficiency and security of the identification and authentication process, for instance, Korea has issued the Electronic Government Law and implemented cross-platforms such as Government24 (์ •๋ถ€24) as official electronic government portal, Digital ONEPASS (๋””์ง€ํ„ธ์›ํŒจ์Šค) as a digital authentication platform to enable a convenient no-face-to-face authentication of the citizens, Resident Registration System (RRS), as a fundamental national information system which manages and stores relevant personal information of Koreans, and Sharing Information System (ํ–‰์ •์ •๋ณด๊ณต๋™์ด์šฉ์‹œ์Šคํ…œ), as a interoperability platform to exchange information with governmental agencies. Moreover, Korea has a PKI Scheme which is divided into a National Public Key Infrastructure (NPKI), and a Government Public Key Infrastructure (GPKI). All these regulations, technologies and platforms are vital elements of the Korean Digital Identity Scheme. In the case of Peru, based on Law Nยฐ 26497 enacted in 1995, the government has been managing and maintaining the National Identification Registry of Peruvian. Moreover, since issuance of Digital Government Law in 2018, Peru has been implemented different kind of cross-platforms such as the Single Digital Platform for Citizen Orientation (GOB.PE), to offer one point of contact between government and citizens, National Interoperability Platform, to promote information exchange among public entities, the National Digital Government Platform, to provide cloud services to the public entities, and National Platform for Identification and Authentication of Digital Identity (ID.GOB.PE), to verify a persons identity. Although there are similarities, the outcomes are different, in the Electronic Government Development Index 2022, Korea is ranked 3rd in the world, while Peru is ranked 59th, from another side, in terms of digital identity, Korea has a digital identity ecosystem operating, for instance Government24 accepts several authentication methods which are easily and conveniently for the citizens such as ONEPASS, KAKAO, Samsung PASS, among others (MOIS, Status of Government 24, 2022). To 2021, almost 132,025,035 petitions were filed online through Government24 (MOIS, Status of Government 24, 2022). In the case of Peru, the digital identity scheme is an ongoing project, which is leading basically by the government, based on the Digital Government Law and its enforcement decree. In that vein, this research aims at understanding the components for governing and managing a Digital Identity Scheme in Korea and Peru and identifying the gap between them. Therefore, in this study we are going to focus on how the Digital Identity Scheme of Korea is performing to strengthen accuracy, inclusiveness, security, and usability of digital identity of persons. We are going to establish the similarities and differences by using a comparison framework which is an adaptation of the frameworks used by the United Nations (UN), International Telecommunication Union (UIT) and Organization for Economic Cooperation and Development (OECD). Additionally, in this moment, undertaking a comparison study between Korea and Peru is a relevant work, because Peru is implementing transversal digital government platforms based on the Digital Government Law, and based on that we are dealing with cybercrimes and digital threats, that is why we can learn of the best practices and good lessons of the Digital Identity Scheme in Korea and design better policies and decisions for Peruvian implementation. This research was carried out by using a qualitative research method which involved online interviews with ICT specialists from Korea and Peru to generate an in-depth understanding of the digital identity scheme of both countries. A total of ten specialists were interviewed. Interviews provide an overview of the digital identity evolution in Korea and allow me to identify challenges and policy recommendations in the implementation process of Digital Identity Scheme in Peru. Based on the results the big differences are integrated in three factors: strong and continuous digital leadership, timely legal framework, and modern ICT technology to support development and public services rendering. However, the results also suggest that it is possible to get big achievements on the Digital Identity Scheme in Peru, making institutional arrangements, enhancing digital regulation and optimizing the budget with the purpose to create a sustainable digital identity ecosystem.ABSTRACT 5 LIST OF ABBREVIATIONS 9 LIST OF TABLES 9 CHAPTER 1: INTRODUCTION 12 1.1 STUDY BACKGROUND 12 1.2 BACKGROUND OF THE COUNTRIES 20 1.3 THEORETICAL BACKGROUND 27 1.4 PURPOSE OF THE RESEARCH 39 CHAPTER 2. KEY CONCEPTS AND FRAMEWORK 43 CHAPTER 3: LITERATURE REVIEW 77 CHAPTER 4: DIGITAL IDENTITY IN KOREA AND PERU 86 4.1 LEGAL FRAMEWORK 86 4.2 TECHNOLOGY 100 4.3 GOVERNANCE AND LEADERSHIP 116 4.4 BUDGET 120 4.5 MARKET 122 4.6 FINDINGS 122 CHAPTER 5: CONCLUSIONS 132 5.1 SUMMARY OF THE THESIS 132 5.2 POLICY COMPARISON 143 5.3 POLICY RECOMMENDATIONS 145 5.4 LIMITATIONS OF THE RESEARCH 150 REFERENCES 152 APPENDICES 158 APPENDIX 1. QUESTIONNAIRE 158 APPENDIX 2. MATRIZ OF COMPARISON 167์„

    Data Protection and Cybersecurity Certification Activities and Schemes in the Energy Sector

    Get PDF
    Cybersecurity concerns have been at the forefront of regulatory reform in the European Union (EU) recently. One of the outcomes of these reforms is the introduction of certification schemes for information and communication technology (ICT) products, services and processes, as well as for data processing operations concerning personal data. These schemes aim to provide an avenue for consumers to assess the compliance posture of organisations concerning the privacy and security of ICT products, services and processes. They also present manufacturers, providers and data controllers with the opportunity to demonstrate compliance with regulatory requirements through a verifiable third-party assessment. As these certification schemes are being developed, various sectors, including the electrical power and energy sector, will need to access the impact on their operations and plan towards successful implementation. Relying on a doctrinal method, this paper identifies relevant EU legal instruments on data protection and cybersecurity certification and their interpretation in order to examine their potential impact when applying certification schemes within the Electrical Power and Energy System (EPES) domain. The result suggests that the EPES domain employs different technologies and services from diverse areas, which can result in the application of several certification schemes within its environment, including horizontal, technological and sector-specific schemes. This has the potential for creating a complex constellation of implementation models and would require careful design to avoid proliferation and disincentivising of stakeholders. ยฉ 2022 by the authors. Licensee MDPI, Basel, Switzerland

    Automating interpretations of trustworthiness

    Get PDF

    The Once-Only Principle

    Get PDF
    This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view
    • โ€ฆ
    corecore