About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Phreak
Broadcast Technology
Computer Technology
Cryptography
Science & Technology
Space, Astronomy, NASA
Telecommunications
The Internet: Technology of Freedom
Viruses
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

The Green Book

Date:	Mon, 30 Aug 1993 19:44:46 +0059
From:	Roland Hueber <100013.1437@CompuServe.COM>
Subject: Green Book, Draft 3.6
Message-Id: <930830174446_100013.1437_BHB54-1@CompuServe.COM>

Draft 3.6

Green Book on the Security of Information Systems - Draft 3.6

Table of Contents
1.	Preface							 1
2.	Introduction						 3
3.	Scope							 5
4.	General issues						 6
4.1.	Globalisation of the economy and mobility		 6
4.2.	Internal Market ("four freedoms")			 6
4.3.	Human Rights and the protection of communications	 7
4.4.	Social acceptance of identification methods		 8
4.5.	Human Rights and the safety of systems			 9
4.6.	Management of openness and protection			10
4.7.	Common concerns of commercial and national security	11
4.8.	Security and law enforcement on international scale	12
4.9.	Economics of the security of information systems	12
4.10.	Social recognition of information crime			13
4.11.	Safety critical environments				14
4.12.	Embedded systems					15
5.	Demand related issues					16
5.1.	Agreement on security requirements for enterprises	16
5.2.	Agreement on security requirements for individual users	17
5.3.	Security objectives for enterprises			18
5.4.	Sectoral specifics					19
5.5.	Security methodologies					19
5.6.	Security domains					20
5.7.	Data labelling						21
5.8.	Access control and authenticity issues			22
5.8.1.	Access control						22
5.8.2. 	The individual right to signature			23
5.8.3.	Consistency of legal principles				24
5.8.4.	Signature schemes					25
5.8.5.	Key usage						26
5.8.6.	Universal acceptance					27
5.8.7.	Security of electronically stored  information		27
5.9.	Privacy enhancement issues				28
5.9.1.	Perception of requirements for privacy enhancement	28
5.9.2.	The case for the provision of public confidentiality
services						30
5.9.3.	Interworking of autonomous confidentially services	32
5.10.	Motivation to acquire evaluated solutions		32
5.11.	Consistency of procurement practices			33
5.12.	Information Valuation					34
6.	Supply related issues					35
6.1.	Supply related Issues - Trusted Third Parties		35
6.1.1.	Role of Trusted Third Parties				35
6.1.2.	Operating principles of TTP				37
6.1.3.	Accreditation and audit of TTPs				38
6.1.4.	Use of names and certification of credentials		38
6.1.5.	Key management service					40
6.1.6.	Management Services for Names and Credentials		42
6.1.7.	Legal services						43
6.1.8.	Guaranteed date and time stamping			44
6.1.9.	Negotiable document transaction				45
6.2.	Supply related issues - Evaluation of trusted solutions	47
6.2.1.	Perceived Requirements for trusted solutions		47
6.2.2.	International harmonisation and mutual recognition	47
6.2.3.	Vendor declarations					49
6.2.4.	Evaluation of applications				49
6.2.5.	Evaluation of communication services			49
6.2.6.	Trusted network management				51
6.2.7.	Modifications to evaluated products and re-evaluation	52
6.2.8.	Performance reporting for trusted products		53
6.2.9.	Rationalisation of evaluations				53
6.3.	Supply related issues - technological change		55
7.	Liability related issues (Consequences of Security
and Safety Incidents)					57
7.1.	Framework for international law relating to IS		57
7.2.	Legal provisions for liability in global services	57
7.3.	Insurance issues					57
7.4.	Monitoring of compliance				58
7.5.	Metrics for loss assessment				58
8.	Spectrum of Measures					60
8.1.	Common Framework and Consensus				60
8.2.	Awareness, education and training			61
8.3.	Agreements						62
8.4.	Common Practices and Codes of Conduct			63
8.5.	Specifications						65
8.6.	Standards						66
8.7.	Products and Services					67
8.8.	Technology						68
8.9.	Regulation and Legislation				70
8.10.	Accreditation						72
8.10.1.	Accreditation of Services				72
8.10.2.	Accreditation of TTPs					72

Annex: Recalling the Action Lines from the Council mandate	73
Action line I - Development of a strategic framework
for the security of information systems			73
Action line II - Identification of user and service
provider requirements for the security of information	74
Action Line III - Solutions for immediate and interim
needs of users, suppliers and service providers		74
Action line IV - Development of specifications,
standardisation, evaluation and certification in
respect of the security of information systems		75
Action line V - Technological and operational
developments in the security of information systems	76
Action line VI - Provision of security of information
systems							77

Draft 3.6/Version: July 14, 1993

1.	Preface

The Council adopted in May 1992 a Decision in the field of the security
of information systems comprising the development of overall strategies
for the security of information systems (action plan) and setting up a
Senior Officials Group (SOG-IS) to advise the Commission on action to
be undertaken. The action plan having as objective the development of
overall strategies aiming to provide users and producers of
electronically stored, processed or transmitted information with
appropriate protection of information systems against accidental or
deliberate threats.

The scope of the Decision foresees the following lines of action:
I.      Development of a strategic framework  for the security of
information systems
II.     Identification of user and service provider requirements for
the security of information systems
III.    Solutions for immediate and interim needs of users, suppliers
and service providers
IV.     Development of specifications, standardisation, evaluation, and
certification in respect of the security of information systems;
V.      Technological and operational developments in the security of
information systems; and
VI.	Provision of  security of information systems.

The action plan is implemented by the Commission, in close association
with related actions in Member States and in conjunction with related
Community research and development actions.
As a step towards the formulation of the "Action Plan" identified in
the Council Decision and in accordance with the opinion of SOG-IS a
"Green Book on the Security of Information Systems" is being prepared,
which addresses, in accordance with the Annex of the Decision,  an
overall view of the issues involved, and the spectrum of measures that
result from an analysis of the issues.

The present document sets out the background to the development of a
consistent approach to Information Security in Europe taking into
account common interests with other countries.

The intention of the Commission Services in preparing the present
document is to encourage a better understanding with the sector actors
in the Community on Information Security issues and to develop a
consensus on the requirements to be considered.  It therefore does not
necessarily represent the views of the Commission Services, or of the
Senior Officials Group for Information Security, on the subject, but
rather provides a basis for reflection and concertation with sector
actors and Member States.

The "Green Book" represents an intermediate step towards the
formulation of the Action Plan foreseen in the Council Decision. It is
to state the main issues related to the security of information systems
in its context.  A deliberate effort has been made to present the
subject matter in as objective a fashion as possible. By progressively
widening the consultation in the preparation of the document the wish
is, to obtain a representative and balanced view of the issues and the
nature and implications of the options for action one may wish to
consider. In its presentation the document is intentionally avoiding to
voice an opinion on the framework or organisation which might be
adopted to address a given issue or requirement. Such recommendations
are to be included in the Action Plan.

Note on Draft 3
The preparation of the document includes four successive phases
including iterative steps in the preparation of the document:
Phase I: Preparation of an Outline and Collection of material
Phase II: Drafting
Phase III: Informal Consultation
Phase IV: Formal Consultation
In its present form it relates to the result of Phase II of the
preparation of the Green Book.

The present draft document is the result of numerous contributions
received from experts, working in the framework of IBAG, SRI, the
Security Investigations and SOG-IS members (over 60 contributions
received).  To develop the thinking on specific groups of issues, the
Advisory Group reinforced by other experts were consulted and
contributed to the development of the document:

G. Axelsson
F. Iribarne Navarro
F. Piau
C. Blatchford
C. Jansen
E. Pimentel Saraiva
L. Cabirol
M. Jones
R. Pizer
D. Cerny
M. King
K. Presttun
B. Collins
S. Kowalski
M. Purser
M. De Soete
H. Kurth
K. Rihaczek
A. Eriksen
P. Landrock
G. Roelofsen
S. Geyres
O. Leiberich
R. Rueppel
A. Hallan 
R. Moses
G. Ruggiu
G. Hardy
P. MAller
M. Tuset
S. Herda
A. Parondo
P. van Dijken
E. Humphreys
A. Peralta
D. Willis

Their contribution and valuable advise is gratefully acknowledged.

2.	Introduction

Individual, corporate and national wealth is increasingly in the form
of information. The growth and performance of an estimated 2/3 of the
economy relies on manufacturing or services heavily dependent on
information technology, telecommunications and broadcasting, and
therefore depends critically on the accuracy, security and
trustworthiness of information. This is of as great importance and
interest for individuals as for commerce, industry and public
administrations. Correspondingly, the protection of information in all
its aspects, here referred to as Information Security , has become a
central policy issue and a major concern world-wide.

The Council Decision of March 31, 1992 in the field of information
systems recognises this situation and calls for the "development of
strategies to enable the free movement of information within the single
market while ensuring the security of the use of information systems
throughout the Community".

A consistent approach at European level could help to promote the
interoperability of systems, lower existing barriers and avoid the
formation of new ones between the individual Member States and with
other countries Therefore, there is an urgent need to address
requirements and options for action in the field of security of
information systems at national, Community and international level in
close collaboration with sector actors and national governments. Any
action must take into account both national and international
commercial, legal and technical developments.

The key issue is to provide effective and practical security for
information held in an electronic form to the general users, the
business community and administrations without compromising the
interests of the public at large.

Since information security is involved in the protection not just of
property and people, but even of society itself, Member States regard
it as a topic which, like defence, touches on national sovereignty.

Structure of this document

The core of the document is describing issues and requirements for
action. These issues are grouped under the following headings:

General issues. Here some of the basic issues relating to the
security of information systems are described. These place
security into a fast evolving world economy and treats issues
like rights and obligations, human rights, openness and
protection.

Demand related issues. Issues under this section are concerned
with requirements, security objectives, Codes of Practice, and
the needs for digital signature and privacy enhanced
communications.

Supply related issues. The subjects discussed cover possible
answers to the demand for security and include Trusted Third
Parties, evaluation and R&D.

Liability related issues. Under this heading issues relating to
the consequences of security breaches are dealt with. These
include civil law and insurance.

The diagram below depicts this structure.

3.	Scope

4.	General issues

4.1.	Globalisation of the economy and mobility

Issue

The internationalisation, diversification, pluralisation and
popularisation of the use of communications and information systems.

Discussion

The unprecedented increase in mobility and the provision of global
communications has resulted in manufacturing, trade and leisure
activities extending world-wide. Distributed manufacturing, publishing,
and financial operations form the back-bone of the modern economic
system. Travelling and communications for business or pleasure are
common place. This is being supported, and sometimes driven, by a
spectacular development in the field of communications and by the
proliferation of affordable and easy to use information systems. In the
last decade the cost-performance of long-distance transmission has
improved by 5 orders of magnitude. This change is providing the basis
for a rapid diversification of world-wide services customised to
provide access to a full range of information services and utilities
wherever and whenever required. Terrestrial, satellite and mobile
networks provide the physical infrastructure and an unrestrained number
of service applications provide the customised applications.

The nature and scope of provision of Information Security in this new
world of open, multi-service and multi-media communications with a
multitude of alternatives to routing, management and access has
profoundly changed the requirements and options for Information
Security (IS).

Requirements

Revision of the scope and approach to information security to
reflect the new conditions, challenges and requirements brought
about by globalisation

Adaptation of the respective policies and regulations.

4.2.	Internal Market ("four freedoms")

Issue

Alignment of the national conditions relating to Information Security
with the conditions of the Internal Market

Discussion

The Internal Market provides for the "four freedoms " within the
Community, ie free movement of goods, capital, services and people. The
legislation of Member States provides for the internal needs for
Information Security, however the requirements in the case of
trans-European communications remains to be addressed. Inconsistent or
incomplete provisions of information security represents a technical
obstacle to the working of the Internal Market.

Requirements

Verification of the existing provisions with respect to their
conformance to the Internal Market Policy of the EC implying
the removal of existing internal barriers and the avoidance of
the formation of new technical barriers due to divergent
application of IS rules, regulations and legislation

Provision of IS to business and the public of solutions freely
applicable throughout the Community and on a preferential basis
at the international level.

4.3.	Human Rights and the protection of communications

Issue

To reconcile the human right to privacy and the obligations of law
enforcement to protect public order.

Discussion

Privacy and the protection of private information is considered one of
the fundamental human rights of citizens and is protected to varying
degrees in Member States. The European convention on Human Rights
states "Everyone as a right to respect for his private and family life,
his home and his correspondence". Citizens have the legitimate
expectation that this right is respected and that solutions are made
available to him that ensure the safeguard of this right. This applies
to conversation in the home and to a lesser degree when
telecommunications is being used. However, prevailing national
solutions do not, at present, provide for trans-European services and
communications and this lack can be exploited, inter alia, by organised
crime. With the rapid growth and diversification of communication
services the rights and duties of citizens and law enforcement are
being reviewed and redefined, eg FBI supported legislation and the
proposal of the government to provide US business and citizens with
cryptographic devices including explicit provision for intercept by law
enforcement agencies.

In this context, it should also be noted that the Maastricht treaty
establishes a citizenship of the Union, and that every person holding
the nationality of a Member State shall be a citizen of the Union.

As the safety and security of the citizen provided by the process of
law and order is also related to human rights, reconciling these
objectives represents a delicate political issue.

The diagram below gives an overview of international, Community and
national responsibilities for different application categories.

Requirements

Definition of a common approach defining rights,
responsibilities and duties of citizens and business on the one
hand, and that of the authorities on the other hand.

4.4.	Social acceptance of identification methods

Issue

To reconcile the human right to privacy and protection and the use of
identification methods to control human access to systems, buildings,
offices and other physical environments.

Discussion

The use of biometric methods is becoming more technically feasible and
cost-effective as an identification technique for access control. Such
methods rely on a system of machine recognition of a set of personal
characteristics to verify the identity of an authorised user in order
to allow access to some physical environment. Such personal
characteristics include hand-written signatures, fingerprints, voice
prints, machine phrenology, lip prints, response of the skeleton to a
physical stimulus, hand geometry and retinal patterns.

Many other different personal characteristics and recognition
techniques are being investigated by researchers. Some of these effect
the human right for privacy more than others and some are socially
unacceptable.

As an example, the retinal blood-vessel pattern of a human eye (retinal
vasculature) is highly characteristic of the individual. A typical
system might work as follows. The individual is required to look into
an optical device and through a process of optical adjustment fixate on
a crosswire whereby the recognition machine will locate the fovea of
the individual, and scanning with a low intensity infra-red beam detect
the nodes and branches of the retinal pattern falling within the
scanned area. The measured pattern is compared with the stored pattern
of the individual and access is granted or denied depending on the
result of the comparison. This method of machine recognition may or may
not be considered sociably acceptable on the grounds of hygiene, due to
the type of information being stored about the individual (a record of
which may be built up which may reveal other information relating to a
persons health condition) or the general problem of protection of
medically relevant information.

There are systems under trial for the recognition of human profiles eg
the human face. Again these systems may not in general be socially
acceptable and the issue of privacy and human rights may come into
play.

Progress in bio-technology raises new questions as to the definition of
privacy and as to the rights of the individual over information
relating to his person and the assurances required for its use.
Information relating to genetic defects are of obvious sensitivity and
implies corresponding measures for protection. Work may need to be
undertaken to set out a clear definition between things that are
biometric and things that are medical.  At the present time there is
low confidence by the general public in the honesty of commerce or
government in the field of bio-technology.

Requirements

Clarification of the ownership and privacy issues surrounding
biometric data

Development of an agreed classification of biometric data and
conditions requiring secure handling of such data

Development of a common approach defining the rights of and
responsibilities of citizens, business users, corporations and
administrations using biometric techniques.

4.5.	Human Rights and the safety of systems

Issue

To reconcile the human right to an expectation of the supply of goods
and services that are not life threatening with the vendors commercial
needs to supply goods and services that exploit information systems in
safety critical functions.

Discussion

Security critical systems differ from security critical ones in that if
they fail death or serious injury to people may result. The law treats
the liability of suppliers in this situation differently from that
where information is lost or property damaged. Suppliers are held
strictly liable. Codes of practice for the development of safety
critical systems exist in order to reduce the chance of failure and
design techniques are invoked to analyse all possible hazards.
Nevertheless risks remain.

At a community level, harmonisation of such codes of practice and
design techniques would enable citizens to have greater expectations of
their own safety in any member nation, and it would reduce the costs of
development of codes of practice and design techniques in each nation.
Furthermore, pan-community procurement would be facilitated, as would
the development of safety critical systems by community wide
consortia.

Requirements

Review of current design practices and codes of conduct with
the aim of generating a community wide standard for such
processes

Study the legal environment within which vendors and users of
safety critical systems work, with the objective of harmonising
that environment.

4.6.	Management of openness and protection

Issue

Openness and protection are partially contradictory user requirements,
which need to be reconciled depending on the specific circumstances.
The user must be able to define the security controls based on need,
consistent with national, international and regulatory constraints.
These controls need to managed in a way that provides protection in an
open environment.

Discussion

In considering management, one must introduce the concept of a user of
an Information System, and the role that they perform in using that
system.  At any time the user of an Information System will be
performing a role, which could be one of: system owner, administrator,
auditor, investigator, data provider, reviewer/collator. It is quite
possible for the requirements of these roles to be logical in conflict
with each other. Openness of access may be in conflict with protection
from general availability. There may also be national, international or
regulatory constraints which impose role requirements beyond those
needed to satisfy the operational use of the Information System.  An
Open environment must be provided with controls that are capable of
providing protection without technical limitations.

A single, isolated computer may be effectively protected, as far as
confidentiality is concerned, against threats from outside by physical
separation and human administration. This does not apply in the context
of telematics. Telecommunications and telematics applications are
increasingly being designed for maximum openness and inter-operability
since the utility of ITT&B-based services and applications depends
largely on the possibility of users world-wide being able to freely
inter-operate over communication links. Major international efforts are
underway to establish standards permitting this, in particular through
OSI (Open System Interconnection), (ODP) Open Distributed Processing
and ONP (Open Network Provision).

The acceptance and use of telematics services depends on meeting the
justifiable interests of all parties: in particular to be able to chose
trade-offs between "openness" and "protection".

In recognition of this, increasing attention is being given to the
provision of Information Security Services and Techniques.

The comparison with the way this dilemma is traditionally addressed
leads to some observations which most likely will also apply when
information is handled electronically. These include, for example

The User/Originator requires the freedom to decide over the
degree of openness/protection depending on his appreciation of
the requirement or the applicable rules of conduct for the
given activity.

Profiles exist setting out the needs of both openness and
protection that need to be supported.  A single level profile
will not support the requirements of all the users involved,
and there may need to be mechanisms which allow for negotiation
between profiles to determine temporarily agreed common
profiles.

Infrastructure, services, applications and organisation have to
be adapted to provide the openness/protection.

To the role holders, both the visibility of and the
transparency of the degree of openness/protection is crucial.

Accountability for the application of appropriate levels of
openness/protection require objective records, which are
themselves protected.

The management of the openness and the protection of
Information Systems requires the definition of security
domains.  These correspond to the security policies which are
in force for the Information Systems in use, as modified by the
constraints of the role holders.  It should be remembered that
computers which are not directly under human supervision may
form part of the security domains involved.

Requirements

Development of a generic framework for the management of open and
protected communications in a user/business oriented environment:

1.	Reinforcement of the options to define security domains 
Terminal users, servers and other computer based resources link
into business processes to provide information domains which
require corresponding security domains.  Such facilities must
not only promote the correct degree of openness , but must also
provide filters against unauthorised access. This needs to be
possible not only at one site eg on LAN-Based applications, but
also via MANs and other communication-links. The definition and
management of such security domains needs to be possible either
from within the user group or provided by a trusted third
party. Virtual Private Networks have some of the features, but
these would also need to be available in the context of public
network based applications.

2.	User Interface for the management of openness/protection

The normal usage requires the ability to communicate either
with specific correspondents, a select group, an open group or
indiscriminately. The choice being determined by the nature of
the information, its function and the applicable rules. The
user-interface needs to cater for this as well as the
underlying services and applications.

3.      Objective records and procedures for the accounting of
open/protected transactions

Processes must be available that provide non-refutable evidence
of the origin of, and delivery of, information to all involved
partners.

4.7.	Common concerns of commercial and national security

Issue

Information Security is a common concern of business, administrations,
citizens, law enforcement and defence.

Discussion

Though not to the same degree, commercial and personal information
security shares many aspects with the defence and other classified
governmental affairs. This provides an opportunity for commercial and
personal applications to build on experience and expertise from the
defence and classified government area.

The reverse is also true. As commercial security advances and becomes
available at a large scale, governments and defence organisations are
well advised to take into account this body of experience. In addition
governments themselves are, of course, in the need of adequate
protection of their non-classified information and will wish to make
use of public services of this kind.

Requirements

Concerted effort to address the common requirements of
business, citizens and authorities to adequately protect
commercial and personal information and its communication

definition of common rules and procedures distinguishing the
handling of classified and commercial and personal
information.

4.8.	Security and law enforcement on international scale

Issue

Crime is exploiting weak information security to further its ends.
Strong information privacy may also be used to escape investigation by
law enforcement.

Discussion

Crime, and here organised crime and terrorism in particular, are
relying on weak information security to prepare and execute their
operations. As quite powerful means for information security have been
published and are freely available, their increased use in protecting
such operations is a growing problem. Public authorities have in the
past used legal and regulatory powers to restrict the use and
dissemination of related technologies. With the growing availability of
computing power and open networks, this approach is getting less
effective, as organised crime, contrary to the legitimate user, is not
concerned with the use of products that are not authorised. The overall
result is that business is seriously constrained in meeting its
security requirements, particularly in international communications and
in its relations with other organisations. If business requires the
legal and regulatory powers to relinquish total control over these
security related technologies, business has a "duty of care" to manage
and control their use for their commercial and business purposes,
including the policing and auditing of management environments.

Requirements

An effective, internationally agreed, economic, ethical and
usable solution to meet business, administration and personal
needs including mechanisms for authorised interception and
reporting of incidents and crimes adjusted to the conditions of
the Internal Market, and to include the necessary equipment and
software, but also an infrastructure of Trusted Third Parties.
This will discourage "home-made" or other solutions.

4.9.	Economics of the security of information systems

Issue

The use of information security impacts on costs, performance and
availability.

Discussion

The cost of security is an integral part of cost of ownership of an
information system, ie namely that without security the users system is
at risk. The cost of protection against breaches of security needs to
be commensurate with the costs (both direct and indirect) that may be
incurred from a breach in security. A security breach may have short
term (and perhaps, localised) implications such as loss of sales and
revenue or fraud or theft. It may also have longer term (and wider)
impacts on business communities through loss of confidence and
consequential loss of business.

The costs of detection, resistance and recovery can be both tangible
and high, and although there are techniques available to quantify risks
there are no generally applicable methods for estimating the potential
costs arising for example from denial of service or loss of integrity.
The provision of security measures may also make it harder to use and
may constrain overall performance. However, where the security risk is
high enough to cause an unacceptable level of compromise, leading to
considerable commercial and financial loss, then security measures must
be given high priority commensurate with the nature and value of the
business in question.

If IS is to expensive, clumsy, not effective in the context of actual
usage or not available in time its use is avoided and high risks are
taken until something drastic happens. The issue for IS is therefore,
not only to be effective but also to address other requirements which
impact the acceptability and application of IS.

In particular, countermeasures may have to be put in place that meet
specific regulatory or legislative requirements, with associated
mandatory assurance needs.

To a business, securing information can be thought of as being like an
insurance policy - the cost of protection must be balanced against the
likely consequences of the perceived threat occurring. This cost is
made up of a number of elements, including:

the life-cycle costs of implementing the countermeasures in
relation to likely and worst case

impact on business performance

liability of management for incidents and relationship with
customer confidence.

Requirements

Development of an approach to a "cost of Security" model for a
business and the private user. This includes, among other
potential costs, the cost of installation, operation,
maintenance, up-grade and insurance premiums as well as direct
financial losses due to breaches of security.

Definition of IS as business and marketing factor.

Codes of practice and other recognised regulatory norms need to
be developed which identify to a level acceptable to both
insurers, regulators and the commercial courts specific duties
and responsibilities of the parties to the use of Information
Systems and their security requirements.

4.10.	Social recognition of information crime

Issues

Negligence, ignorance and recklessness are the some of the causes of
many security events and create the opportunity for information
crimes.

Discussion

IS-incidents, like failures to observe safety rules, can in many
instances be attributed to a lack of motivation. This is compounded by
the fact that the loss of immaterial goods, for example information, is
not considered as serious as the loss of material goods. This is due in
part to the fact that electronically stored information can be
reproduced at close to zero costs without the loss of the original.
Stealing information is therefore often considered as a gain for the
thief without a loss to the owner. It is perceived by many to be a game
rather than a real problem because people are unable to relate the
electronic world to the real one. This has the double effect of
enciting negligence by the owner of the information and little concern
for the illegal acquisition of information. Because of the widely
practised back-up of information resources, this applies even to the
intentional or accidental destruction of information.

There is much work in establishing and reinforcing "ethical principles"
as applied to specific actions of information ownership, creation,
dissemination, etc. These need to be related to sector actors, their
control perspective and the assets over which they exercise either
explicit or implicit authority. This needs to be related to codes of
practice and conduct, legislation and regulation to establish the
extent to which protection is dependent upon a formal or informal
control environment or can rely on the enhancement of ethical and
professional standards. At the moment there are no effective
professional standards in IT, anyone can do IT by buying a PC and
taking a bulletin board subscription.  Changes to traditional
programming techniques have made it possible for non-IT professionals
to deliver programming and systems analysis methods.  In many SMEs such
work would often be done by non-IT professionals.]

Two examples of computer crime illustrate the diversity of situations
which may arise:

Example 1
In a German company (belonging to the "Association for Security") a
programmer - unsatisfied with his salary - caused damage by a specific
computer-programme. This program modified the data of a data bank by
randomly controlled accesses. The programme was intricately hidden
among other programme-parts. Within two years the data-bank became more
and more defective and damaged. The costs of damages and of
reconstructing the data bank were about 500 000 ECU.

Example 2
In an office of the German Government a huge computer-system,
comprising various storage means and terminals was installed. Suddenly
the computer-execution-times and the response times became much longer
than expected. After a difficult investigations it turned out, that a
programmer, who had founded together with his wife a shop for sending
out photo-equipment, has done his complete accounting, mailing, etc.
for his shop on the computer in a hidden area. He had camouflaged or
suppressed the protocolling of this programme. He caused damage of
about 100 000 ECU.

Requirements

Development into basic education of the Information Security
requirements and concepts needed to operate safely in the
Information Age

Clarification of "Info-Ethics" for the professional and
individual user in its relationship to Information Security

Clarification of responsibilities of the sector actors in
general and in their relations within each other, with
particular reference to open and distributed applications.

4.11.	Safety critical environments

Issue

Protection of information in safety critical environments.

Discussion

Safety is defined in terms of hazards and risk. A hazard is a set of
conditions (a state) that can lead to an accident, given certain
environmental conditions. The analysis of the safety environment
involves identifying the hazards within a safety critical environment
and then either verifying that hazardous states cannot be reached or
that the risk is acceptable. Risk is defined as a function of the
probability of a hazard occurring, the probability that the hazard will
lead to an accident, and the worst potential loss associated with such
an accident. You can diminish risk by reducing any or all of these
factors, and there are environmental-safety techniques that focus on
each.

There is an increase in the use of information systems within various
areas of application which are considered as part of a safety critical
environment. For example in the area of healthcare (eg medical
databases), air traffic control, transportation of hazardous and
dangerous goods, industrial processes etc. The increased reliance on
electronic information in these various areas of application
specifically related to the control and management of safety, has
resulted in an increased need for the protection of the information
system supplying such information. Therefore the protection of
information systems used in safety critical environments is factor to
be addressed when considering hazards and associated risks in such
environments.

Consideration needs to be given to the common requirement of security
and safety, common methods for analysing the threats, vulnerabilities
and hazards, and the role of security evaluation for safety-critical
systems.

Requirements

Development of a common approach to the handling of security
and safety critical requirements

Development of a common methodology for threat, vulnerability
and hazard analysis for the protection of information systems
used in safety-critical environments

Generation of common methodology for the design, development
and procurement of safety critical systems, covering project
management, development environment, auditing of process,
configuration management and change control

Development of a common approach to security evaluation of
information systems in safety-critical environments.

4.12.	Embedded systems

Issue:

Increasing use of computers and information processing is occurring in
a manner that incorporates information/computers into other products to
make those products more usable, flexible, etc. These embedded systems
depend upon the accuracy of the programs they contain and the
information inputs/outputs to preserve the usefulness of the products
in which they are placed. Failure of the processor or corruption of the
programs or information contained may cause failure or destruction of
the device or hazard to the user.

Discussion:

Embedded systems are already being used in automobiles for controlling
ignition and carburetor systems or braking systems, in television sets
and VCRs, in microwave ovens, and so on. As embedded systems
proliferate they create potentials for physical hazard to users beyond
simple loss of the functionality of the devices in which they are
embedded. The potential will also exist that such embedded systems
could constitute a hazard to the well-being of bystanders or property.
For example, one scenario of embedded systems would have them in
household appliances and include the capability to communicate
potential failure information to maintenance providers. The potential
exists that such a device could fail in a mode that would put household
or service providers' telephone systems at risk.

To some extent, liability laws will cover product failures which create
damage to users. However, there may need to be some added means of
ensuring the reliability of embedded systems and the integrity of the
systems as they leave the factory. These means may include:

Requirements

Development of methods of testing that enable standards of
reliability to be ensured, including tests to destruction where
appropriate

Development of an approach for the certification of samples

Definition of requirements for fail-safe system architectures
and implementations

Definition of anti-tampering and protection specifications and
standards.

5.	Demand related issues

5.1.	Agreement on security requirements for enterprises

Issue

Identification of real world security requirements and objectives for
business and administration.

Discussion

The protection of information systems must be all embracing.
Consideration must be given to requirements from the view point of the
enterprise, taking into account corporate and organisation plans, goals
and strategies of the business or administration. Requirements at this
level can be then translated into "Security Objectives" - why the
security functionality is required as it applies to the operation of
the business or administration environment.

These security objectives need then to be supported by a definition of
the security functionality and related services required necessary to
support the user/business.

The security model has not included legal, accounting or regulatory
requirements which may be imposed upon enterprises rather than forming
any integral part of the Enterprise requirements.

Given the complexity and diversity of user/enterprise requirements for
such protection it is necessary to classify the requirements in some
structured way consistent with real world business and operational
environments.

The protection of information systems needs to consider the enterprise
requirements of the "business". These requirements not only include
functionality that is "owned" by the enterprise but must include
inter-enterprise requirements as well. It must consider the
functionality and assurance of IT building blocks, end user
applications, integration enablers (such as electronic mail), operating
systems, communication services and protocols, and basic hardware and
software platforms.

The balance of functionality (what it does) and assurance (how well it
does it), both generic and application specific, will determine the
extent to which electronic information systems are accepted as an
integral part of both the public and corporate IT infrastructure to
underpin business actions.

The prime requirement for any secure system must be a set of
architectural principles that can be effectively translated into an
overall design framework. Secure systems must be created at different
"grades of assurance" from a set of policies, standards and
procedures.

Specific security requirements relating to open systems will come from
a threat assessment and risk analysis which will form part of the
overall system security policy process.

The cost of security is an integral part of the cost of ownership of an
IT system ie namely that without security the users system is at risk.
The cost of protection against breaches of security needs to be
commensurate with the costs (both direct and indirect) that may be
incurred from a breach in security. A security breach may have short
term (and perhaps, localised) implications such as loss of sales and
revenue or fraud. It may also have longer term (and wider) impacts on
business communities through loss of confidence and consequential loss
of business.

The costs of detection, resistance and recovery can be both tangible
and high, and although there are techniques available to quantify risks
there are no generally applicable methods for estimating the potential
costs arising for example from denial of service or loss of integrity.
The provision of security measures may also make it harder to use and
may constrain overall performance. However, where the security risk is
high enough to cause an unacceptable level of compromise, leading to
considerable commercial and financial loss, then security measures must
be given high priority commensurate with the nature and value of the
business in question. Sectoral requirements vary widely, as do
requirements by size of enterprise within a sector.  Sectoral
requirements may be varied by regulation, bilateral international
agreements, general trading agreements or conventions.

Increased demand for Electronic trading from all kinds of businesses,
both public and private sector, will place requirements for security on
the communal service infrastructure that provides the capability for
such business activities. The regulatory and legal environment within
which such service organisations work will become a factor for economic
growth in the community, and security of service provision an element
of such services.

Requirements

Development of a taxonomy and directory of user requirements
and security objectives derived from real world business
applications.

5.2.	Agreement on security requirements for individual users

Issue

Identification of security requirements and objectives for individual
users.

Discussion

The individual user, in their role as a private citizen or as a member
of a liberal profession (eg a lawyer or medical doctor), has a natural
interest, and sometimes a legal requirement, to protect some of their
information. Unlike in the case of the enterprise, the individual user
will not normally go through a systematic process of establishing
goals, definition of security objectives, etc, unless they are subject
to professional standards of conduct.

The individual normally has at his disposal a PC (or small network of
PCs) and some communication links, eg telephone, fax, e-mail. Physical
security is likely to be weak.

Most liberal profession work under some codes of practice or conduct.
These codes are of a general nature and do not normally specify
particular security arrangements.

The common and specific requirements of individual users, with regard
to the protection of their computer installation (physical and
electronic), the protection of their data (against accidental and
deliberate loss) and the protection of their communications (eg signed
communications, privacy enhanced communications) must be established.

Requirements

Development of user profiles identifying standard types of
users together with typical requirements.

5.3.	Security objectives for enterprises

Issue

Definition of Security Objectives for enterprises.

Discussion

Security objectives are related to confidentiality, integrity,
availability, legality and auditability. Controls are related to
segregation of duties and methods for obtaining independent audit of
the achieved results of an Information System.  Controls may also
relate to the reasonableness or plausibility of information or an
activity.

A security objective is a description of what security the enterprise
is trying to achieve eg why this security control/function is wanted.
It is a mission statement of the user/enterprise which describes why an
aspect of security is needed. It is a user/business target or purpose
to which security is being addressed. For example, consider the subject
of data integrity and the objective "Prevent unauthorised modification
to data". The security objective has the objective "Appropriate
mechanisms should exist to preserve the integrity of data". For example
this may be related to data held on a medical database, on a company
financial database, in airline reservation system or a geography
information system.

Security objectives are thus concerned with the preservation of
information with regard to its utility, availability, authenticity,
integrity and confidentiality within the enterprise and between
enterprises or concerned with some user environment. These are
dependent upon more detailed definitions of business control being
made. The structure and organisation of the specialist accounting
functions in a business are examples of business controls.

The organisation of security within enterprises in terms of business
control structures or in the case of some user environment (eg legal,
accounting, audit etc) and functions (eg IT, human resources,
insurance) needs to be integrated with a set of security policies,
standards (both public and in-house), and made compliant with laws and
regulations (eg computer crime manual), guidelines and codes of
practice etc.

The process of producing a security policy requires the use of a set of
security methodologies, tools and evaluation criteria. For example risk
analysis methods, baseline controls, and evaluation criteria (eg ITSEC,
Federal Criteria etc.).

Security objectives thus encompasses a set of objectives (and possibly
sub-objectives) and a set of related issues that reflect specific
points of concern, problems, questions relative to business
requirements, controls and applications.

The diagram below shows the relationship between Security objectives,
Security organisation, and Security methodologies. Laws apply to the
user environment directly.  Their presence generates some of the
security objectives.  Standards may be both mandatory and
discretionary, and may incorporate methodologies.  The final box covers
security methods and techniques.

5.4.	Sectoral specifics

Issue

Beyond the normal requirements common to different business sectors and
user environments there may also be additional requirements and
priorities specific to the operational nature and commercial mission of
a particular business. These specific requirements can be normally
expressed in terms of codes of practice and baseline controls.

Discussion

Legal and regulatory provisions can be supported by Codes of Practice
to achieve due care and diligence. There are those of general
application and those that are industry specific. A general Code of
Practice may achieved by  the establishment of a security management
handbook, maybe based upon the approach taken for achieving a Quality
code of practice (ISO9000). The application of IS is a prerequisite for
the successful conduct of business for particular sectors, especially
when these sectors a highly interactive. The most prominent among them
are:
Finance
Trade
Medical
Telecommunications
Administrations.

Requirements

Development of a set of codes of practice and baseline controls
addressing specific business sector requirements.

5.5.	Security methodologies 
Issue

Selection of security requirements analysis methodologies (eg risk
analysis methods, codes of practice etc.) and related safety hazard
analysis methods relevant and applicable to the user/enterprise
business policies and controls.

Discussion

Any security policy formulation must derive its requirements statement
from an assessment of the potential threats against the business and
the supporting service infrastructure of the IT and telecommunication
processes. This will allow an eventual implementation with clearly
understood trade-offs, administrative and technical measures against
human malefactors, and a balance between security cost and level of
operational fitness; these are components of a Risk Management
strategy. The risk management strategy on a European level should be
based on a rigorous and consistent approach to the analysis of the
threats to and vulnerabilities of the system and its components, and
where appropriate safety hazards. This approach should be based as far
as possible on existing, and, possibly, standardised, risk/hazard
analysis modelling techniques and products. The issues include:

adequacy of present risk assessment techniques

awareness about current trends, and modelling

awareness of the responsible security officers about security 

security breach incidents

safety hazards as they impact on or are related to the security
of a system and vice versa.

Requirements

Development of evaluation criteria and guidelines applicable to
the selection of security requirements analysis methodologies
(eg risk analysis and management methods, products etc)

Harmonisation and standardisation of a European and
international approach

Integration of security and safety methodologies where
appropriate to provide a coherent framework for the analysis of
assured systems.

5.6.	Security domains

Issue

Openness and protection.

Discussion

In practice, the level of IS is dynamically adapted to a given
situation. This leads to the concept of Dynamic IS Management and the
need to be able to define domains, in which IS is applied
homogeneously.

Security Domain Concept

Domains are user groupings sharing some of their functions and support.
For some activities they operate as virtually closed user groups, but
have the possibility to interwork with other domains as long as certain
minimum requirements ensure no loss of trust or a transparent
downgrading.

The notion of a security domain is therefore important for two reasons.
Namely,
It can be used to describe how security is managed and administered, and
It can be used as a building block in modelling security
relevant activities that involve elements under distinct
security authorities.

Examples of domain activities are:

accesses to elements (eg a database for network management)
a communications link
operations relating to a specific management function
non-repudiation operations involving a notary.

Security Policy

The organisation of security within enterprises in terms of business
control structures or in the case of some user environment (eg legal,
accounting, audit etc) and functions (eg IT, human resources,
insurance) needs to be supported by a set of security policies,
standards (both public and in-house), laws and regulations (eg computer
crime manual), guidelines and codes of practice etc.

The security policy defines what is meant by security within the
domain, the rules by which security may be obtained to the satisfaction
of the security authority, and the activities to which it applies. The
security policy may also define which rules apply in relations with
other security domains in general, and in relations with particular
other security domains.

Requirements

The management of inter-domain openness and protection may be different
depending on similarities in purpose, and agreements will be needed to
achieve appropriate levels of assurance. Mechanisms by which TTPs
achieve efficient, coherent management of policies, procedures and
controls between domains need development:

generation of guidelines for domain creation, management and
control

development of a common framework for domain interworking

agreement on management, TTPs, accreditation, auditing and
relations with law enforcement agencies.

5.7.	Information labelling

Issue

Transfer of information between domains requires agreement on the
syntax and semantics of information labels, and of the procedures and
mechanisms for handling labelled information.

Discussion

The information label is a short hand way of expressing the protective
measures that should be applied to the labelled information.

Information labelling is an essential part of ensuring that information
objects receive the appropriate level of security protection both
within and between security domains.

Trust between organisations depends on the assurance that information
will be handled in a way consistent with its security requirement in
terms of confidentiality, integrity, availability and non-repudiation.

The need for comprehensive labels has become acute because of the
increasing degree to which organisations interoperate electronically.
This has led to increased reliance on technical measures to achieve
adequate security. It is quite feasible for trusted systems to switch
on or off technical measures automatically providing that the label
adequately expresses the security requirement associated with a piece
of information. Labels could then be used to make decisions on
information routing, transmission enveloping, requirements for
confirmation and so on.

Organisations have to agree on the range of options that do meet any
particular security requirement. Part of the solution to the handling
of labelled information lies in the development of Codes of Practice
specifying procedures and mechanisms. There is also a need for
accreditation and audit of communicating partners. The introduction of
independent third parties avoids the pairwise interactions that would
otherwise be necessary to establish trust.

Requirements

Code of Practice for information labelling.

5.8.	Access control and authenticity issues

5.8.1.	Access control

Issue

Access control procedures to many systems are not standardised or well
managed.

Discussion

Computer systems and services impose control procedures on persons (or
other systems) attempting to access them directly or over local or
wide-area networks. These access control procedures apply to
"connections"; that is, they determine whether or not a connection,
association or session is allowed to be established. These control
procedures have been often primitive and relatively insecure, as the
occurrence of "hacking" demonstrates. For example, the only protection
afforded may be by a password, transmitted over the network "in clear"
so that any wiretapper with physical or electro-magnetic access can
read it.

The requirement for secure access control is not confined to access to
host computers by persons at terminals. Reciprocal (mutual) access
control is often needed between two (or sometimes more) systems. Access
control can apply across general telecommunication networks,
determining (for example) who may call whom by telephone; or who may
receive which programme on a cable TV network. In addition to applying
to end-to-end (trans-network) communications, access control also
applies to users and (even more importantly) operators accessing the
network and to access by human users to terminal devices.

Although the importance of access control is widely recognised, the
practical application of security techniques to solving the problem is
more limited. This is for a variety of reasons including technical
complexity, lack of agreed standards, lack of user acceptability and
lack of supporting infrastructure (such as TTPs).

Secure access control relies on a mixture of:

identification mechanisms (authentic naming) identifying the
remote person or system

authorisation mechanisms, determining the authority of the
remote person or system to carry out different types of actions

random (unpredictable) components, affording protection against
the re-use of once-valid access control messages under invalid
circumstances (replay)

cryptographic techniques to protect the above from
modification, copying, etc.

Without some analysis of access control scenarios, followed by some
outline standardisation work, users and systems are going to find
themselves having to implement and use (depending on their current
application) a range of incompatible techniques, which in turn rely on
only partially interoperable infrastructures (such as naming and
identification authorities, certification authorities, key management
systems, directory services, etc.).

Requirements

There is a need for widely accepted solutions to the most common access
control scenarios. There is a need to:

identify and group access control scenarios, to determine
levels of commonality

identify techniques, products, specifications and standards
addressing access control, and associate them with the
identified scenarios

identify parameters common to most or all of the above
techniques, products, specifications and standards and
investigate the feasibility of establishing common formats for
them

identify the key features for coherence in the supporting
infrastructure

define a limited number of basic access control mechanisms for
pilot implementation.

5.8.2. 	The individual right to signature 

Issue

Individuals have the right to sign any information.

Discussion

Like with hand-written signatures, anybody is entitled to use a digital
signature. Therefore, the distribution of keys for the purpose of
signature must be non-discriminatory and non-restrictive. Separate from
the signature is the question of authority, ie if a certain person is
entitled to sign a certain element of information, document or
transaction.

Signature verification is therefore a two step process: formal
verification of the signature and verification of the authority of the
sender. This process is depicted below.

It is assumed in this simple model, that the sender adds his
certificate (name plus his public key) to the signed document. The
formal verification then establishes that a person with a certain name
has correctly applied his signature and that the document has not been
modified in transfer. Verification of authority checks that the name
has the legal authority to sign a particular document.

Note that as a consequence, the authority given to a person should not
be included in the attributes of the certificate, otherwise any change
in authority would invalidate the certificate.

The situation maybe further complicated by the fact that several
signatures maybe required for certain documents, eg husband and wife
plus notary, two company directors.

Requirements

Clarification of the right to signature and the attached authority.

5.8.3.	Consistency of legal principles

Issue

The legal functions have to be clearly identified for the authority of
digital signatures, before a code-of-practice can be developed and
introduced.

Discussion

In legal practice security and functional requirements for hand-written
signatures differ widely. In some cases a hand-written signature is
only to indicate that the signer has concluded his train of thought or
his expression of will; under the given circumstances its authenticity
may be obvious and need not be provable. In other cases, for evidence,
the signature must be provably authentic. In yet other cases
authenticity requirements may demand attestation or even ask for more
than one person's signature or for public notification.

The spectrum of legal requirements can be matched by the spectrum of
technical realisations which may differ with respect to security
provisions just as widely as legal requirements. Yet the signing
process must be transparent to the signer. For this reason it must
follow standardised rules; specific man-machine interfaces must be
familiar to the signer; i.e. they must follow a standardised layout
principle.

For ease of transition (in judicial thinking) from hand-written to
digital signatures traditional functional requirements for hand-written
signatures should be met by the technical implementation of digital
signatures as closely as possible.

A particular problem is the validity period of a digital signature. One
must distinguish the validity period of the signature itself and the
validity period of the authorisation.

The validity period of the digital signature itself may have to be
limited for technical reasons. These reasons include:

1.      Insufficient key length. One may discover that some years from
now, new progress in mathematics and technology makes it plausible that
keys of the originally chosen limited length can be broken. (For
instance, several European banks have introduced remote banking with
RSA keys of length 512 bits. One cannot guarantee that this will be
safe in 10 years, or even less, from now.)

2.      Poor key generation. One cannot be sure that programs at the
desired quality level will be used by all key management centres. Hence
users of those key management centres may find that their keys are
breakable, and they have to cancel their certificates.

3.      Weak protection of workstation. The secret key of a user may be
compromised accidentally or through negligence. It may also be possible
to tap the password of a user through a Trojan horse on his PC and
subsequently get access to the secret key. (Fraudulent users may even
claim this happened, and give away their key on purpose, in order to
dispute that a certain signature did originate from them.)

Taking the necessary precautions, and taking a differentiated approach
to the validity period of signatures, then most digital signatures
would fall inside the scope of applicability of hand written signatures

The authority attached to a signature normally changes much faster. The
authority given to a person should therefore not be included in the
attributes of the certificate, otherwise any change in authority would
invalidate the certificate.

However, in all the work that has been carried out so far, there is no
solution offered to the following problem: If messages have been signed
with a key and needs to be kept for a number of years, and that key is
denounced by the user as being compromised, how can the value of the
already calculated signature be left intact? One possibility might be
to use a TTP for time stamping, but further study into this problem
seems in place. An example may illustrate this point.

If a user A signs a message in 1993, which has legal consequences to
user B until 2003, and A then cancels his certificate in year 1995,
claiming that his key has been compromised, he will probably claim that
the signed document from 1993 was falsified in 1995 by B, who could
have bought a copy of A's secret key. However, if B upon receipt in
1993 had gone to a TTP and had the signature of A time stamped and
signed by the TTP, or even registered, he can prove that A in fact did
produce the said signature back in 1993.

For some sectors and/or applications the granularity of the time
stamping will be critical. It is conceivable that trusted time down to
one second accuracy will be needed.

Requirements

The legal functions of signatures need to be agreed
EC-wide/internationally. Once this is achieved, it is possible
to determine to what extent a code-of- practice will suffice.
One issue to be addressed is the intended use of the digital
signature, and the legal responsibility and liability of the
signing entity with regard to the signed information.

Clarification of the conditions of acceptance of the authority
of an digital signature, eg for legally binding purposes, ie as
substitute for hand-written original signatures.

Recommendation for the implementation for a public digital
signature scheme for use by business, administrations and the
general public.

Legislative rules and, where appropriate, liabilities, for
keys, certificates and TTPs need to be developed to cover
revocation of any or all the entities involved in the "chain of
proof" needed in the signature technique.

5.8.4.	Signature schemes 

Issue

Introduction of an international digital signature and identification
schemes.

Discussion

Open communication requires standardised publicly available algorithms.
It is possible, however, to develop a scheme for digital signatures, to
get laws, regulations or directives in place, to develop supporting
profile standards and to develop fully implementable models for TTPs,
without specifying in detail the underlying algorithms.

The characteristics required of a digital signature mechanism include
that it

is practically unbreakable

has a sufficiently large key space, performance (time and space
requirements for signing and verification), reasonable size of
key, etc.

includes key generation.

In order to allow for world-wide, unrestricted use of a digital
signature scheme, the mechanism should not be usable for the
concealment of message content.

The minimum requirement should include

an estimate of error probability if probabilistic methods are used

an estimate of probability of occurrence of weak keys (perhaps
completely improbable)

a guarantee of sufficiently high degree of uniform
distribution.

In so-called identification schemes (for access control), which do
require public key techniques rather than conventional schemes,
practical zero-knowledge protocols must be developed and standardised
that fit a corresponding digital signature standard.

Requirements

Development of specifications and standards along the lines
described above

Development of specifications and standards for application
oriented integration

Development of a general application programming interface
(API) for integration of security services which could be
easily integrated into most application (This could as well
include codes which explain the intention of the applied
signature.)

Development of transaction-oriented multiple signature schemes

Solution to the specification, standardisation and licensing
problem of cryptographic algorithms.

5.8.5.	Key usage

Issue

Digital signatures imply the specification of a full set of procedures
dealing with the three phases of key management - user enrolment, key
and certification distribution, and operational maintenance
(revocation, blacklist, destruction), which must be agreed and
accepted.

Discussion

In order to apply security to any message or process, four logical
layers are relevant:

1.	Legal intentions and implications

2.      The definition and identification of the relevant security
service to be applied.

3.	The underlying mechanisms.

4.	The algorithm and protocols.

Without standardising or agreeing on the 4th layer, it will not be
possible to communicate.

In order to adopt electronic versions of negotiable and
quasi-negotiable documents, such as bills of lading, new security
services have been identified to meet business requirements, in
particular claim of ownership for exchange of values. This needs to go
through a standardisation process.

But also for more " classical" services, the current standards do not
reflect the granularity of eg non-repudiation needed by business
requirements. ISO 7489-2 only addresses non-repudiation of origin and
delivery (sometimes called receipt). However, one needs at least
origin, submission, delivery and receipt, where submission and delivery
would correspond to the services required when a registered letter is
mailed.

For hand-written signatures , a person typically knows what he is
signing, which is important for legal implications. This is not so easy
to achieve with electronic data. In particular it must be clarified to
what extent the system must indicate to the user what he is actually
signing.

Requirements

Develop standards and profiles as described above, especially
the development of profile - or functional - standards to
support CCITT X.509.

5.8.6.	Universal acceptance

Issue

For digital signatures to become a full alternative to hand-written
signature universal acceptance is required.

Discussion

All functions of the hand-written signature should also apply to
digital signatures.

Where legal functions are carried out by digital signature, consensus
with the legal profession is essential.

Requirements

Development, together with the legal profession, of
recommendations for the practical use of digital signatures as
a full equivalent to hand-written signatures in legal
transactions

Demonstration, through pilot projects, that digital signatures
can be used as equivalent to hand-written signatures

Inclusion in the curriculum of relevant educational institutes
(eg engineering, law and business schools) the use of digital
signature.

5.8.7.	Security of electronically stored  information

Issue

As legally and commercially significant information is transferred and
stored electronically, the implications of this on long-term (10's of
years) secure storage and retrieval must be properly understood.

Discussion

Industry is moving increasingly towards electronic trading in all its
aspects. Governments are encouraging the use of electronic
communication of commercially and legally significant information. As a
result, there is a need both to establish irrefutably the origin of,
and the delivery of, such information and, particularly, that the
information has been signed and stored in an unforgeable way. This
unforgeable electronic signature must be trusted for at least 10's of
years for some information, and the associated information must be
retained in a secure manner that is capable of human interpretation at
any time during that period. Any system proposed for electronic
signature storage must be as secure and robust as that currently used
for hand-written signatures.

Any such system must allow for not just technical evolution, but also
social change and other factors (e.g. the continued existence of
trusted public key directory centres, or the way businesses merge,
change or collapse).It is not currently clear that the way this can be
achieved is yet accepted legally, or the full implications are even
properly understood.

Requirements

Build on the digital signature experience to consider the
long-term implications of the unforgeable secure storage and
retrieval of legally and commercially significant information,
with access by any authorised person or organisation
internationally.

5.9.	Privacy enhancement issues

5.9.1.	Perception of requirements for privacy enhancement

Issue

Confidentiality is, at times, essential for the good functioning of
administrations, business and human relations.

Discussion

Business user of telecommunications and information systems cannot
obtain full business benefit without confidentiality services being
available. There is a clear need for confidentiality services in the
exchange of information in the business as well as in the private use.
Today the exchange of sensitive information requiring confidentiality
is often done in non-electronic form because for electronic
transmission "confidentiality" is either not available or its use not
permitted. With the increasing demand for fast exchange of all kind of
data, demand for "confidentiality" will become pressing.

Most business and private users of communication systems are aware of
the conflict between their confidentiality requirements and national
security issues which require the possibility to intercept the
communication in a way regulated by national laws. They accept the
national authorities ability for this interception provided there are
adequate safeguards to prevent unauthorised interception even by
government employees.

Expectations of confidentiality of electronic message services can
currently not be met in the absence of international standards or
internationally accepted methods. Uptake of these services by
commercial users to support business processes will therefore have a
natural limit, ie to those messages that someone usually writes on a
postcard. Examples of commercially sensitive information includes
pricing and bidding strategies, mergers and take-overs, or from a
privacy point of view (transmission of personnel and medical data).

User needs for confidentiality

In analogy with confidentiality offered by existing physical mail and
archiving services, ie envelopes, registration, courier services, etc.,
there is a need for confidentiality in the situation of electronic
interchange and storage of data. Even more so because electronic data
can much more easily be copied or disclosed in its usual form, eg only
channel coding and formatting as the "envelope", than its physical
counterpart.

At present certain unclassified but sensitive information on physical
media such as paper, microfilm, or photograph, of business enterprises
or medical centres are protected against unauthorised disclosure by
physical and procedural methods.

Today the trend is towards more electronic communication and storage of
data and hence there is a need for appropriate confidentiality services
in an agreed or standardised form to be readily available for all users
of electronic information systems.

Service provision

The extent to which confidentiality services are provided for a
specific business or citizen could depend on a system of licenses or
certificates.

A particular business might qualify for a confidentiality license
depending on its internal procedures and activities. A general
(minimum) level of confidentiality could be provided to all users.

It should be possible for certain user groups or businesses to use
other confidential services (egproprietary) than the standard ones
provided.

There are strong indications of emerging "bottom up" solutions for
these needs (eg the Pretty Good Privacy offering on Internet, beginning
1993).

Other initiatives (eg the announcement of the "Clipper Chip", 16April
1993) illustrate the growing awareness of governments of the needs of
their citizens for confidentiality services.

Awareness 

In general users of electronic data processing systems are not aware of
the threats involved in using those systems. Only after they have
noticed (the consequences of) an unwanted or unauthorised disclosure of
their information will they start to think of the inherent
vulnerability of the system they are using. In view of this one should
try to create more security awareness. Users, service providers,
operators and authorities should achieve a certain minimum level of
awareness of the issues involved in using confidentiality services
before embarking on their use.

Granularity (meeting differentiated needs)

Confidentiality services at different granularity and for different
types of telecommunication services are needed. Based on his risk
analysis the user can then decide which level of confidentiality he
needs and then use the services which provides this required level.

Some users may want a range of services of different assurance levels
(analogy of courier services, registered mail, ordinary mail). Some
users may want visibility of assurances to different extents.

Impact of loss of information and Impact of theft of information

By its nature, actual risks and impacts of disclosure are hard to
quantify. But the absence of a baseline of protection of
confidentiality will undoubtedly have a negative impact on commercial
(and other) usage of international electronic communications in a wide
range of business processes.

Actors and roles

Individuals may have a number of roles in more than one organisation -
these need defining or clarifying. Their "role" as a private citizen is
an important case. The organisations that act as custodians of roles
need to be classified also. These are essential ingredients for domain
management.

Mutual confidence and TTPs

Users and mechanisms to ensure that they get assurance of compliance to
agreed "rules of procedure" from their trading partners, or other
private citizens, with whom they are interacting using confidentiality
services. TTPs are one mechanism for achieving this, but other lower
assurance, lower cost solutions may also need to be considered.

Requirements

Proposal for a frameworks and architectures which are accepted
as well by the business users as by the national security
agencies and the service providers

Standards for services and service provision. Ensure that the
confidentiality services are compatible with existing
communication standards and practices where possible

Verification of practicability of proposed solutions through
suitable pilot projects

Model contracts for confidentiality services

Awareness of sector actors of the potential losses due to the
absence of confidentiality services.

5.9.2.	The case for the provision of public confidentiality services

Issue

The provision of public confidentiality services have to reconcile the
needs of the business sector and general public with the obligation of
public authorities to provide adequate protection while at the same
time maintaining its capability to fight organised crime, maintain
public order and national security.

A well developed public confidentiality service would provide for the
obligations in a transparent manner.

Discussion

Business operates increasingly in an international and open
environment. The communications take place via private and public
networks. Modern network management techniques use alternative routing
depending on traffic conditions. This implies that the physical
communication is under the control of a variety of intermediaries
working under different regulatory and legal conditions for data
protection and privacy, and therefore one must consider the network as
inherently risky. This means that end-to-end protection is required.
This applies also to the general public using international public
telephone networks.

It is a fact that business and the general public have been addressing
their needs with public domain solutions (published algorithms and
freely available software). However, the approach is awkward and its
utility therefore limited, since, for example, there is no public
directory and he has to manage the keys himself. A public solutions
open to all users requiring electronic signature and confidentiality
would remove the need for the use of ad hoc solutions. It would also
provide for a transparent solution to the need for legally authorised
intercepts.

If a public confidentiality scheme is offered, organised crime could
also subscribe to such a scheme, but as it would include provisions for
legal intercept, it would hardly be attractive. One would expect that
such users would continue to find their own solutions as will the
classified domain.

An open and public service offering a credible level of confidentiality
would therefore provide for the honest user, while not worsening the
situation with respect to public order or national security.

The combination of international communication and national security
regulations require a common framework for confidentiality services,
which on the one hand interoperate within all Community Member States
as well as with countries outside the Community which themselves may
establish their confidentiality services. This requires either an
overlay approach or gateways which link the different national or
regional services. These gateways are only required where multinational
agreements for co-operation on national security concerns is not yet
established. In this case these gateways may provide at least an
interim solution.

In order to fulfil its function and eliminate the need for "home-made"
solutions, the public confidentiality service must be open to
world-wide use and provide its service in a non-discriminatory way.

Confidentiality services should ensure that

Users are protected and obtain assurance against non authorised
interception and disclosure.

The confidentiality service is of high (technical, procedural)
quality and evaluated as such by all Member States.

Authorised disclosure of the protected user information (undo
the confidentiality service) is under certain well-defined
circumstances possible, eg by secret-sharing.

With this approach, confidentiality mechanisms details (description) do
not need to be published or disclosed to the public in general.

While the use must be largely unrestricted, the systems and sub-systems
or equipment for the independent implementation of aforementioned
confidentiality services can be made subject of export controls, eg
export is possible if:

The users comply with the rules of the exporting nation
(end-user declaration) with respect to the disclosure
mechanism.

Multinational business users form EC countries with "central"
organisations.

Other countries on a bilateral agreement liaise with EC if they
comply with the rules.

Export restrictions are, inter alia, based on the concern that
cryptography may be used by hostile governments or other organisations
for the concealment of subversive information. The same concern does
not apply to the use of cryptography for integrity and authenticity
enhancing service.

There are technical solutions to provide only integrity, integrity plus
signature, and integrity, signature and confidentiality.
Confidentiality enhancement is de facto only meaningful in
communications with also the two other functions being provided.

The problem remains that organised crime and hostile governments are
not restrained from adopting public domain solutions or from developing
"home-made" mechanisms. Furthermore they are able to exploit legitimate
users of systems and solutions to their own ends by use of
"traditional" criminal mechanisms of bribery, blackmail or threats to
personal safety. Legislation could discourage non-authorised use, but
cannot be expected to prevent it, particularly in the case of organised
crime. Restrictive legislation impacts the "law-abiding user" much
stronger than others.

Choice versus interoperability

The users and service providers may feel the need to choose solutions
to achieve the assurance levels they require. But interoperability will
dictate a limited set of possible choices being available, and costs of
service provision will also focus debate onto efficient solutions.

Advice and instruction / prohibition

This may vary from country to country, however certain minimum-rules
will need to be adhered to between parties offering interworking public
schemes which includes beyond simply usage also systems and sub-systems
or equipment for the independent implementation of such confidentiality
services

Requirements

Choice of architecture that minimises service vulnerability
(The confidentiality that users enjoy will depend upon the
robustness of the service that is offered. This in turn will
depend upon the robustness of the architectures available to
perceived threats: key theft, masquerade, deliberate denial of
service, inadequate disaster recovery are examples of threats
the vulnerability to which may be different for alternate
architectures.)

framework for the provision of trans-domain confidentiality
services (Mechanisms are needed that provide for a defined way
to pass from one domain to another. This will require
collective or multilateral agreements for interoperation.)

Guidelines for pan-European confidentiality service providers

Model contract for relationship between service providers
across national boundaries

Assurance criteria for service providers and operators

Accreditation process for mutual recognition.

5.9.3.	Interworking of autonomous confidentially services 

Issue

Till such time that a universal service is being offered, interworking
between autonomous confidentiality services is likely to be the normal
situation because of the differentiated requirements. This implies the
need for generally accepted rules for the relationship between these
services.

Discussion

For quite a time the conflict between national security issues and the
business need for international communications has blocked significant
progress in the area of confidentiality services in telecommunications.
With the recent US initiatives, pressure from European companies will
grow to have access to equivalent services. But within Europe we have
the situation that neither the legal situation in the different EC
countries nor their national security policies are harmonised enough to
have a single confidentiality service scheme with a single algorithm
established within the foreseeable future. Therefore it is necessary to
have a framework, which enables user-transparent interoperability
between different national or regional schemes and which do not block
the way for a single scheme which may be established in the far future.
Interoperability is also required with non-European schemes like the
US. scheme. To provide this interoperability the way information is
passed from one national security domain to another has to be specified
and the national schemes have to be compatible with this specified way.
The establishment of such a framework for interoperability is therefore
a subject which needs international harmonisation. Aspects related to
this are requirements for the cryptographic algorithms and for key
management issues.

Requirements

Definition of minimum requirements to ensure interoperability,
including standards, specifications, rules of procedure and
operating practices

Demonstration of trans-European confidentiality services using
a suitable application , eg the realisation of administrative
telematics applications.

5.10.	Motivation to acquire evaluated solutions

Issue

The advantage of the use of evaluated/certified solutions is not
generally accepted for commercial applications.

Discussion

Formal security evaluations have been carried out at a national level
by a comprehensive, costly and time consuming process. The investment
in the evaluation process by the vendor has resulted in higher prices
for the resulting secure IT product. The duration of the evaluation
process, has resulted in many secure products falling behind the
technical state of the art.

Up to now, this has detracted from their broader relevance in the
commercial market. Users have often preferred lower cost, more
functionality rich products unless forced to purchase evaluated and
certified products through some public procurement policy.

Vendors, historically, had products evaluated separately by each
national market and their supporting criteria. The resulting limited
revenue opportunity did not justify the high cost of getting products
evaluated.

It is necessary to change this view by convincing users of the
advantages of purchasing evaluated/certified solutions. Rapid adoption
of Common evaluation and certification criteria is essential to reduce
cost and speed-up mutual recognition of the resulting certificates.

Requirements

Rapid adoption of common criteria

Rapid agreement on common evaluation method

Portability of test results and mutual recognition

Work sharing between vendors, test centres and users to speed
up the evaluation process

Establishment of the "value-added" for the use by
administrations and business, eg in terms of liability
protection

Consistent use in public procurement.

5.11.	Consistency of procurement practices

Issue

National procurement guidelines for the purchase of
evaluated/non-evaluated products are not consistent throughout the EC,
nor is there a general agreement on when there is an obligation to use
evaluated products, and when it is recommended but discretional.

Discussion

Some security evaluated IT and communications products are purchased as
a result of a risk analysis where it is determined that the evaluated
communications product better suits the organisation's security needs
than a non-evaluated product.

However, a survey conducted of over 200 organisations indicated that,
to a large extent, evaluated products are purchased today by
organisations in the EC because of the expectation they will be
required by law to use certified products. This type of legislated
market is occurring especially in those Member States that were
involved in the development of ITSEC.

Unless common procurement policies are established in the EC, the IT
market will become a patchwork of evaluated and unevaluated products.
This may create new barriers to the efficient flow of information.

Requirements

Identification of categories of application for evaluated
solutions

Alignment of national procurement policies concerning evaluated
products

Investigation of to assist those member states not involved in
the early stages of ITSEC to develop and test procurement
policies that are based on evaluated communications products.

5.12.	Information Valuation

Issue:

For insurance purposes and for tort law cases a common means of
valuation of information and information processing resources is
needed.

Discussion:

In the case of information processing resources, the valuation may be
as straightforward as estimating the replacement value of computers or
the value of computer time in the case of denial of service (eg:
through virus attacks or other penetration). However, in the case of
destruction or theft of information, the problem is less
straightforward.

Obviously, it is not possible to set a standard for the value of
information, so what appears to be a potential solution is to establish
standards for valuation.

Requirements

Definition of the classes of information used and the types of
damage that could be caused to the information owners

Definition of the rights and duties of information ownership

Development of guidance for owners of information as to the
actions that they would have been expected to take to protect
their assets and avoid negligence charges

Development of the methods and procedures that should be used
to establish information value.

6.	Supply related issues

6.1.	Supply related Issues - Trusted Third Parties

6.1.1.	Role of Trusted Third Parties

Issue

The public and generalised use of digital signature and of
confidentiality services and the conformance with the needs of law
enforcement implies the availability of Trusted Third Party (TTP)
services to provide essential functions.

Discussion

TTPs will have to inter-communicate internationally and thus form a
network of Trusted Third Parties , based on an international framework
for their operation.

Trusted Third Party services can be considered as value-added
communication services available to users wishing to enhance the trust
of the services he uses. Therefore TTPs have to be able to offer value
added with regard to availability, integrity, confidentiality and
assurance. Although TTPs may be set up on a national basis within
national law, they must be trusted internationally.

There are different types of functions which may all or in part be
fulfilled by TTPs. The exact nature and extend to which these functions
are provided by TTPs will be dictated by practical considerations and
may vary considerably.

In general the TTPs operate on the basis of information provided by the
user. Certification of information is carried out on the basis of
evidence of correctness provided by the user or generated by the TTP
itself, eg the keys.

The major services a TTP may offer include some or all of the following:

Name assignment, ie the function of assigning individuals' and
enterprises' unique names and addresses. Individuals may
possess several different distinguished names, according to
their role, eg as private citizen and as employee of a
corporation.

Certification, ie the function to validate that a name and
address has certain credentials, eg a public key for
signature.

Key Management for signature, ie the generation, distribution,
establishment, and administration of public and private keys.

Key Management for confidentiality, ie the function to
generate, distribute and administer keys used for confidential
communications.

Management Services for Names and Credentials, ie the function
to establish, administer and make available registers with the
names of individuals and their certified credentials.

Legal services, ie functions usually performed by the legal
profession, mostly concerned with non-repudiation.

Guaranteed Date and Time Stamping, ie the function to provide
exact date and time on request, to support non-repudiation.

Management of Negotiable Document Transactions, ie unforgeable
non-personalised tokens (eg electronic Bills of Lading,
electronic shares).

Storage of Electronic Information for clients with appropriate
guarantees of confidentiality and integrity.

Common to Trusted Third Party service providers is that they have to be
accredited and audited, and that they have to operate under the law of
the country using common guidelines. The figure below provides an
analysis of the different functions involved in the establishment and
operation of TTPs.

The diagram identifies four functions in this process. The functions are:

the provision of the required good practices, rules and
regulations for the accreditation and operation of TTPs

the accreditation, re-accreditation and audit of TTPs

the TTP functions themselves

the use of communications and of the TTP.

This diagram does not imply any particular allocation of responsibility
for the functions indicated.

The information flow contains the following major elements:

National Laws. The operation of TTPs will take place within the
laws of the country in which they are located. It is
conceivable that some legislation has to be updated to allow
TTPs to operate in an international environment.

Good practices, rules and regulations for the accreditation,
operation and audit of TTPs.

Standards for communications.

Good practices, regulations and laws for the use of
communication services.

6.1.2.	Operating principles of TTP

Issue

The need for common operating principles for TTPs.

Discussion

To be effective, TTPs must:

operate securely

operate within a consistent legal framework across the Community

offer a range of services, with a defined minimum

conform to European or international standards, where available

follow accepted good practice

allow for independent arbitration, without compromising security

be monitored by a supervisory board

be independent in its operation within accreditation rules

have a public policy on service refusals, if applicable

assume responsibility of liability within defined limits for
availability and quality of service.

The key questions include:

Has the TTP a contractual obligation of results in terms of
availability, integrity and confidentiality?

How and by whom are the loss and penalty determined in cases of
fraud, negligence or failure of the TTP?

What assurance to the final user is offered by the
accreditation of the TTP?

Requirements

Harmonised legislation to provide an appropriate framework for
arbitration, supervision and litigation

Model for TTPs meeting the requirements of users and
authorities.

Baseline for accepted good practice including a study of the
level of availability, privacy and security required for the
TTP by the final users and how much they are ready to pay for
it

Definition of quality of service, including availability,
confidentiality, response-time, rules of disclosure to law
enforcement agencies

Operational guidelines, including descriptions of minimum set
of services and standards to conform to

Standard clauses for the contract between the TTP and the user,
concerning the liability of the TTP.

6.1.3.	Accreditation and audit of TTPs

Issue

The need for harmonised procedures for the accreditation and audit of
TTPs.

Discussion

Although the accreditation and audit of TTPs may be a local or national
responsibility, the procedures to be followed must be harmonised and
have a common basis in order to ensure mutual trust.

It is assumed that national governments will be responsible for
approving accrediting bodies. This may require to create new national
laws or to adapt existing laws.

From the TTP point of view, timely and fair responses to requests for
accreditation will be important.

From the user point of view, the agreed terms of the accreditation need
to be properly documented and inspectable.

To maintain public trust in TTPs, an audit process must be put in place.

Other issues are related to the

requests for accreditation from service providers in other EC
and non-EC countries

certification of certificates

authority and accreditor signatures.

Existing Community rules for accreditation (eg of test centers) should
be used as a basis for this work.

Requirements

Development of international guidelines for the accreditation
and audit of TTPs

Adaptation of applicable legislation or regulations to provide
an appropriate legal framework for use throughout the Community
and in the relations with third countries.

6.1.4.	Use of names and certification of credentials

Issue

Use of names and of credentials (eg the public key) in international
communications.

Discussion

Name Assignment and Certifications Authorities are Trusted Third
Parties. They have been defined and, to some degree, specified by CCITT
X.509 "Directory - Authentication Framework". Their purpose is to allow
for individual and authentic addressing of communication system users
by means of their authenticated Distinguished Names. A user may ask a
Naming Assignment Authority for a Distinguished Name. The Naming
Authority will give him a Relative Distinguished Name and supplement it
by its own Distinguished Name to the user's Distinguished Name. Thus,
although a person may ask several Naming Authorities for the same
Relative Distinguished Name, each of his Distinguished Names will be
unique, because the Distinguished Names of the Naming Authorities, by
definition, will be unique. The concept of an agent that handles the
interfaces between the end-user and the naming authorities is important
in providing a user friendly interface to this process.

The two functions of name assignment (or identification) and
certification are "binding" operations. Name assignment binds a
particular name to an entity (a person or device), and certification
binds certain credentials to a name. The diagram below shows the double
binding process.

A Distinguished Name and a unique cryptographic Public Key are made
part of the user's Credentials. The Public Key can be used to verify a
(ciphertext) signature which has been effected by the user's
complementary Secret Key (not contained in the Credentials).
Credentials are signed/certified by the Certification Authority. Thus
the user's Certificate consists of the Credentials, their signature by
the Certification Authority and, if necessary, the Certification
Authority's own Certificate. The user is given his certificate,
preferably in a tamper resistant chipcard.

After signing a message with his Secret Key the user concatenates his
Certificate to the message and its signature. The receiver of the
signed message can use the Certification Authority's widely available
Public Key to verify the signer's Certificate and Public Key. With the
latter the authenticity and integrity of the message can be verified.

The security services related to name assignment and certification need
further standardisation as well as legal recognition, both preferably
on an international level.

The United States have already begun to apply relevant US national
standards. Therefore, corresponding standardisation action should be
started on a European level. Its results should be made the basis for a
European contribution to international standardisation. At the same
time an interface toward a legal usage of naming and certification
services should be defined to ease the adaptation to and to provide for
the compatibility of the various EC legal systems.

Other related issues are pseudonyms and anonymity, for which a business
requirement has been identified. Different degrees of anonymity should
be provided for according to the specific needs in digital cash,
tele-shopping, registration in data bases for statistical purpose etc.

As described above, the ability to sign a piece of data is to be
distinguished from the authority an entity possesses.  This
relationship is depicted below:

Requirements
Development of guidelines covering the use of names, by specifying:

o naming principles (hierarchy of naming authorities)
o format of Distinguished Name/Relative Distinguished Name
o requirements to meet by naming authorities
o requirements to meet by the user
o requirements for the protection of the name against changes
o handling protocol between naming authorities, user and
certification authority
o change of names
o recording of information pertinent to de-referencing of names
(by the Directory).

Development of guidelines covering the  use of certificates, by
specifying:
o certificate semantics and format
o certificate handling (production, issuance)
o signature and its certification (method, process)
o authentication of certificate owner (method, process)
o expiry dates
o renewal of certificates (periodical)
o renewal of TTP public key (periodical)
o handling compromises of secret information (secret keys, PIN etc.)
o revocation of certificates and notification
o black listing and execution of certificates
o security requirements to meet by certification authorities.

6.1.5.	Key management service

Issue

Key management services for signed and privacy enhanced communications
between organisations and individuals.

Discussion

General

Definition of responsibilities and obligations for services
that provide trust in the integrity of communications and those
that provide confidentiality.

Development of codes of practice for the generation,
distribution and storage and destruction of keys for both
purposes (integrity and confidentiality) in environments that
have varying levels of assurance.

Definition of escrow services. Some of the secrets may be of
paramount importance and may have to be distributed among
trusted parties (distributed-secret-escrow agents) so that none
of the parties know the complete secret and not less than a
defined minimum of those trusted parties must contribute their
part of the secret in order to produce the complete secret.

Mechanisms and criteria for assessing applicants suitability
for the use of TTP services. Not all potential users of TTPs
may have the necessary attributes (eglegal status, financial
viability, etc.). This essentially applies to TTP services for
closed user groups.

Integrity and digital signatures

Relationship between the key management functions, directory
management and certification needs to be clarified.

Timeliness of issuing signatures when an application is made -
verification of "signature worthiness" of applicant - periodic
review of "worthiness" of existing constituency of signature
holders.

Removal of signatures from "active list" and initiation of
"attempted illegal use" audit. This is a "certificate
management" - "key management" interface management issue.

Privacy Enhancement

Management of the domain within which the confidentiality keys
are valid. The identity of authorised subjects within the
domain: Key distribution to those authorised subjects (people
and automated processes.).

Should the TTP define the domain as well as manage it: if not
should another TTP hold the definition (ietable of authorised
subjects).

Assessment of the assurance level of the domain within which
the confidentiality keys are to be used, ranging from vetted,
cleared people with physical and logical access controls to
un-cleared people in open environments.

Domains are an important concept in confidentiality provision. The
following questions require an answer:

1.      What is the scope of validity of a domain for certification and
the scope of validity for a confidentiality mechanism? Who manages the
domains? Who manages inter-domain issues? Does each domain need a
different TTP?

2.      Who determines the scope of a domain? Who is authorised to
change it? (for both certification and confidentiality.) Is a domain a
"contract", and under which circumstances?

3.      What are the assurance criteria for domain management? Who
audits a domain manager? Who maintains the principles of domain
management as technology changes?

4.      Should domains for certification and confidentiality be
different in view of the fact that a confidentiality domain will be
transitory and that therefore key management principles are different?

5. When should the use of escrow services be mandated to ensure domain
integrity.

Requirements

Single digital signature mechanism and specifications
preferably consistent with other leading countries

Adoption of a confidentiality algorithm standard and
specification, and a key distribution mechanism based on an
asymmetric public key algorithm

Establishment of "domain assurance" levels and criteria for
TTPs to use for confidentiality key management purposes

Codes of practice for TTPs engaged in key management
activities, and the provision of escrow services and the
methods by which those codes of practice would be audited

Set of criteria for mutual recognition between TTPs acting on
behalf of organisations who wish to communicate securely.
Merging of signature directories and secure inter-domain
communications are fundamental issues.

6.1.6.	Management Services for Names and Credentials

Issues

Whenever parties engage in bi- or multi-lateral electronic
transactions, they need beforehand some non-transient information on
their partners (such as identity, legal representatives or any other
kind of credentials eg public keys). This does not imply permanent
recording of such information.

Discussion

Management Services for Names and Credentials are established to
facilitate access to this type of information, whereby service
subscribers are provided with up-to-date data pertaining to the parties
listed in there. Because partners may conclude the transactions on the
basis of the information (at the minimum, the authenticated identity of
their partners) they are provided with, and because some of the
information stored by such a service may be protected by privacy
legislation, the service itself must be trustworthy and the data it
provides correct.

Management Services for Names and Credentials keep objects which are
referred to by "Distinguished Names". A Distinguished Name is unique to
a communication subject. A subject may have a number of (unique in the
above sense) "Alias Names". It is required that the service can
reference Alias Names to their subject's natural names. An Alias Name
may be a pseudonym. Whether or not the service is allowed to reference
a pseudonym and let inquirer know the result will depend on the
subject's data privacy rights.

If, as is likely going to be the case, there is more than one provider
and certifier of information, the Management Services for Names and
Credentials must be part of a network of information suppliers. Network
can be organised according to either geographical distribution or
business sector or information taxonomy or all three of them. Users may
have to subscribe to more than one such service or service type (eg
"Public Key directory for the banking sector"). Users may have a number
of different roles in an enterprise, each of which needs access to a
set of different services. In the case of a multiple service and
network of providers, one can speak of a system of Management Services
for Names and Credentials.

Because of the damages that could be caused by the distribution of
false information, the Management Services for Names and Credentials
must apply due care in its operations. In the case of proven negligence
the service could be held liable if inaccurate information were
provided. The creation, update and destruction (eg in the case of
certificate revocation) of information is either mandatory or
forbidden. In critical cases (eg; certificate revocation), the update
may have to be notified to subscribers without request.

The management of the Management Services for Names and Credentials
must thus be accountable. There must be legislation, rules and
regulations governing it.

Obviously, the service must cover and be available on an international
level.

Obviously there is the issue of standardisation of the service at the
user end (external interface) and between service providers (internal
interface).

Since international Management Services for Names and Credentials are
akin to internationally distributed data bases, they face the same
legal questions: who is legally responsible for the information
(between the creator, the storer, the distributor)?

Market pressures are bound to promote the advent of sectorial
Management Services for Names and Credentials, and possibly their
subsequent interconnection or integration into larger network. In order
to avoid fragmentation among proprietary services, there may be a need
to lay down base rules for naming, binding, certificates and the
associated IPR rules.

Requirements

The basic issue is the provision of efficient Management Services for
Names and Credentials, supplying various types of information is a
requirement that needs rapid and efficient satisfaction.

Provision of Management Services for Names and Credentials, to
include:

o Identity (cf. issues on name authentication and referencing
of Alias Names)
o Name information (to enable the correct forwarding of
messages (eg static digital network or GSM communications)
o Credentials such as public keys or any signature-verification
data.

Interoperability specifications and standards.

Harmonisation of legislation , rules and regulations concerning
Management Services for Names and Credentials, intra-Community
and extra-Community.

6.1.7.	Legal services

Issues

Legal TTP services are offered essentially to prevent disputes, or
resolve them in a structured, efficient, accepted by all parties
involved and non-controversial way.

Discussion

Prevention of disputes arises essentially from the very ability of
legal services to assign responsibility and fault, should one occur.

Thus, legal services must essentially be able to verify the
application or non-application of rules and the evidence
pertaining to them.

Legal services may or may not generate the evidence itself. In
other words the question is whether a third party offering a
trusted service also arbitrates litigations pertaining to its
principal service. For example, does a signature generation
service also provides signature-verification services?

Two issues arise in this topic:

What is the legal status of evidence generated by TTPs ? Does
it imply liability? What is the legal status of decisions made
par legal services when they are not judicial but private(and
corollary, what are the rules of appeal)?

If evidence is not generated by the arbiter, how is the
evidence acquired and authenticated and how is responsibility
assigned? One is faced with the general problems of TTPs :
operating rules and legislation, standardisation,
inter-operability and accreditation.

Requirements

In addition to the ones concerning operation legislation,
standardisation, inter-operability and accreditation, Community actions
specifically aimed at legal TTP services could focus on

the harmonisation of legislation on the legal status of
evidence generated by any TTPs and especially on the intra- and
extra- community recognition thereof. This probably implies the
settlement of the accreditation question

the promotion of community-level information technology
litigation services modelled after existing international
bodies such as the International Chamber of Commerce

Essentially focus on - and restrict actions to the problems
created by the fastest-growing services based on Public Key
cryptography, eg verification of signatures, certificates,
etc.

6.1.8.	Guaranteed date and time stamping

Issue

Guarantee of unambiguous date and time of submission and receipt.

Discussion

In electronic communications, a digital equivalent is required for the
date and time stamp in the paper world. Such a time stamp must be
issued by an organisation that is trusted. If time stamps are simply
attached internally by the sender or receiver of a message, then, in
case of litigation, it will be difficult to establish if these were
erroneous or have been forged.

In direct communications, both parties may agree on a mutual time
reference, but in store-and-forward type communications time stamping
by a third party is particularly important.

Depending on sectoral differences, different granularities of time
stamps may be needed. Some sectors may be content with the date, some
with the nearest second.

The third party must be trusted by both parties, or at least the
dispute resolution mechanism, for the correctness of the date and time
supplied, but also for the confidentiality with which they handle the
contents of the correspondence.

The time stamping schemes proposed so far are impractical, because they
require the recording of the time stamp and the document (or at least
its digest).

Requirements

Development of an approach to date and time stamping for
time-critical transactions and applications, including a range
of granularities of timing.

International harmonisation of rules and services for time
stamping, with the objective of achieving general recognition
and acceptance of time stamps and their provision by suitably
accredited service providers.

International harmonisation of rules and services for time
stamping, with the objective to achieve general recognition and
acceptance of time stamps issued from different service
providers.

6.1.9.	Negotiable document transaction

Issue

Some conventional physical documents, such as eg the bill of lading and
the bill of exchange, must be negotiable. The possession of the
document must allow to give title to anybody who can present it. The
electronic equivalent is also needed.

Discussion

Negotiable documents entail that their physical uniqueness must be
protected against duplication; it must be easy to distinguish a copy
from its original. This is the case with hand signed paper documents;
the hand-written signature cannot be copied such that the copy could
not be distinguished from the original. True, a digital signature does
protect the integrity of the signed electronic document; however, it
can be easily copied so that the physical original cannot be discerned
from its copies.

This impedes the usage of electronic communication eg in maritime
trade. The sender of a cargo produces a unique document, the bill of
lading, hands a copy to the shipper and sends the protected original to
the receiver. The receiver may trade the original and its title or keep
it. Whoever presents the original to the shipper will be handed over
the cargo.

The shortcoming of the paper bill of lading is the fact that it takes
time to transport it, particularly as it is a piece of value and must
be well protected. Therefore, an electronic substitute should be found
that protects its originality and can be transacted in
telecommunication systems.

The Document originality can be provided by the use of chipcards. A
chipcard can store a secret and protect it. The secret is essential to
authenticate the signature of the document. As the chipcard cannot be
explored, the secret cannot be transacted into another chipcard. Thus
it is practically impossible to duplicate the original chipcard. Such a
chipcard can be made a substitute of the negotiable paper document.

In order to produce and to transact chipcard documents via
telecommunication trusted equipment is needed. It Should be operated by
trusted third parties, eg by public notaries. They may be bestowed with
the responsibility to produce chipcard documents and to transact and
receive them by means of their trusted equipment. Transaction may be
performed by depleting the original chipcard at the sending end,
securely transmitting its information and feeding it into another
chipcard at the receiving end. This process must be protected for its
integrity and confidentiality. Not even the "public notary" must be in
a position to alter the information.

Beside issuing negotiable documents there are other ways of securing
correct title to property. Instead of a person proving his claim by the
presence of a token, the claim may be addressed to a distinct person
who then is expected to prove his identity.

This - continuing with the above example - is the case with the freight
bill, which is another way to deliver a cargo to the authentic
receiver. However, the freight bill cannot be traded as effectively as
the bill of lading, although, by omission of additional chipcards and
other trusted equipment, it makes it easier to design the electronic
substitute process.

One should expect that, unless proper electronic documents will be
available, the use of paper for negotiable documents will be continued
at the expense of effectivity and more paper.

Requirements

Development of techniques for the establishment, handling and
recording of Electronic Negotiable Documents.

6.2.	Supply related issues - Evaluation of trusted solutions

6.2.1.	Perceived Requirements for trusted solutions

Issue

Need of users for trusted components, products, systems, services and
applications

Discussion

The trustworthiness of a given information system and its use imply an
evaluation process. Depending on the needs of the customer, either
vendor declarations or formal certification procedures may be needed.
The choice of either of these mechanisms will depend, inter alia, on
costs and delays involved in formal certification processes. A major
factor is also the recognition of certificates in other markets and
their utility, eg in protecting the user or vendor against liability
claims, where it is possible to do so. In the safety related area, the
trustworthiness of the development process and its execution are also
critical factors and need not only evaluation but also auditing. The
qualifications and experience of project managers and safety auditors
are also factors which affect the resultant level of trust in the
system.

Requirements

International agreement on criteria and evaluation methods, and
mutual recognition of test results

Clarification of the commercial value of "certified products",
eg in terms of liability limitation

Clarification of the status and implied liability of vendor
declarations

Development of principles for liability definitions for
multi-level, distributed services

International agreement on the methods for evaluating safety
critical system development processes, and the qualifications
and experience needed for individuals to become managers and
auditors of such activities.

6.2.2.	International harmonisation and mutual recognition

Issue

At the moment different evaluation criteria and evaluation schemes are
in use. These are especially the US, TCSEC, the European ITSEC and the
Canadian CTCPEC. Other countries like Japan have first drafts of
criteria. This situation is not acceptable to international
manufacturers who would have to perform different evaluations against
different criteria and schemes for a single product. This will
unnecessarily increase the cost of the product without enhancing the
security features.

Discussion

Different activities have already been taken or are currently on the
way to harmonise evaluation criteria and evaluation schemes. The ITSEC
and ITSEM are a result of such a harmonisation process within Europe,
and the United Kingdom, France, Germany and the Netherlands are
discussing the mutual recognition of each other's certificates based on
ITSEC and ITSEM, with the intention of achieving agreement in 1994.

In North America, the US and Canada co-operated in the production of
the first draft of the Federal Criteria. Following publication of the
Federal Criteria in early 1993, it has been decided to make all effort
to align the ITSEC and the Federal Criteria to produce a joint
European/North American set of Criteria compatible with existing
practices in both North America and Europe in 1994. This is the first
step towards international harmonisation between the two groups.

Based on these activities, ISO/IEC JTC1/SC27, Working Group 3 is
working on an ISO standard for evaluation criteria.

But harmonisation of the criteria is only the first step to reach
mutual recognition of evaluation results. It will need to be
accompanied by agreement on methodology, schemes and certification
bodies. Only then will mutual recognition between North America and
Europe be possible.

Even within the European Community mutual recognition has turned out to
be an arduous task and mutual recognition of certificates is not yet
achieved, mainly for legal reasons. This indicates that world-wide
mutual recognition of certificates requires many, yet unknown, problems
to be solved.

Some activities for international harmonisation of evaluation criteria
and evaluation processes are currently in progress but only one result
of such a process which seems to be stable and widely accepted has
until now been achieved. This is the ITSEC. But even in Europe the
subject of harmonising the evaluation process turns out to take much
more time than the harmonisation of the criteria. The reason for this
is that the ITSEC could be adopted by different countries quite easily
without significant changes to their existing evaluation processes (and
almost no changes to the certification schemes). The real changes to
the established practices come up when you try to harmonise these two
topics, since this results in significant changes to evaluation and
certification practices and may even have legal consequences.

Looking into the international arena, the only evaluation process and
certification scheme in the area of communications-security which is in
place for a significant time is (beside the European one) the US TCSEC
evaluation scheme. But the focus of this scheme is mainly to evaluate
and certify commercial operating system products suitable for
government applications. Currently the US are trying to widen this
scope with the Federal Criteria and the accompanying trust technology
programme of NIST whose main goal is to establish a more commercially
oriented evaluation and certification scheme with industrial evaluation
facilities like the ITSEF's in Europe. Both the Federal Criteria as
well as the trust technology program look like a much better basis for
international harmonisation but nevertheless a considerable amount of
work is necessary to achieve this goal. But since both the new criteria
as well as the commercial evaluation process are not yet established in
the US there is an opportunity to influence this process. The fact that
the US sponsors two parallel ITSEC evaluation of their TMach operating
system show clearly that the US side watches the European activities in
this area very carefully and tries to get as much information as
possible (both positive and negative!) about the European evaluation
process.

Even for the old TCSEC evaluation scheme the US showed great interest
in comparing this scheme with the European ones. Joint tasks between
the CEC and the US side represented by NIST and NSA material about the
various evaluation processes was presented. This shows a will for
co-operation which is clearly based on the fact that US manufacturers
sell more communications-products in Europe than vice versa. Other
countries like Sweden, Australia and Japan watch this process very
carefully.

Requirements

Establishment of conditions and procedures for mutual
recognition of evaluations

Establishment of conditions and procedures for
EC-wide/international evaluations

International and EC standardisation of evaluation criteria and
methods.

6.2.3.	Vendor declarations

Issue

For applications that need security, but not the kind requiring formal
evaluations, vendor declarations are used. These are, however, at
present not defined in terms of what they cover and what assurance they
offer compared to formal evaluation.

Discussion

Between the requirements of governments for formally evaluated
solutions and no evaluation at all, there is a large part of
applications used by business and the general public. Vendors do
address security and provide some level of assurance, but its
significance, particularly in an open environment is not obvious.

Requirements

Development of an agreed definition of scope and liabilities of
vendor declarations for secure solutions.

6.2.4.	Evaluation of applications

Issue

The user interest is finally with the security of his application. The
use of secure products and services is a necessary but not a sufficient
condition to meet the user requirements for the protection of the
application.

Discussion

At present, evaluations and certification schemes address primarily
products and systems. Communication services are only partially
addressed and applications running on the products and via networks (in
particular public networks) are left to the user to address. However
with the restrictive handling of confidentiality mechanisms and
opposition against end-to-end encryption, the user is left exposed.

Requirements

Extension of ITSEC criteria and methods to cover services and
applications.

6.2.5.	Evaluation of communication services 

Issue

With the ITSEC and ITSEM Europe has already a scheme for the
independent security evaluation of IT-products and (to some extent)
IT-systems. At the moment this scheme does not fully cover the aspect
of the evaluation of telecommunication services, but extensions to this
scheme seem possible which are able to address the items not yet
covered by the current ITSEC/ITSEM scheme.

Discussion

The main item where communications security is considered in the public
is in the area of telecommunication services. Especially when people
send sensitive information to others using telecommunication services
they are interested that this information

gets to the intended recipient(s) in time

is not altered by the service

it not received by anyone else than to the intended recipient(s).

Not all these aspects are of the same importance for each kind of
communication. The level of importance is highly dependent on the kind
of information one wants to transfer.

The use of telecommunication services grows rapidly as more powerful
equipment and services become available. A lot of companies and
especially administrations have policies which forbid the use of
specific telecommunication services for highly sensitive information
since they do not trust the communication services providers that some
of the above mentioned security issues are enforced adequately. They
use conventional techniques for the exchange of sensitive information
with conventional security measures (eg sending sealed letters by
registered mail or by courier).

In a time where industrial success depends on the fast exchange of all
types of information these conventional techniques become more and more
unacceptable. So the service providers will incorporate security
provisions within their services. But nevertheless a lot of companies
(and the national governments) will continue to use the conventional
techniques since they do not trust those security services unless they
are under their own control or being verified by independent experts.

Providing a security service as part of a telecommunication service
will normally result in all entities involved in the provision of the
telecommunication service being involved in providing the security
service. Additional entities may even be necessary (like eg a trusted
third party for key management issues or authentication services).
These entities use systems and products to provide their part of
telecommunication (and security) service. The total service is
therefore provided by an interaction of all the entities.

The current ITSEC/ITSEM scheme is aimed at the technical evaluation of
security measures within products and systems. It does not cover
organisational, personnel, administrative or non-IT related physical
security measures. Still many security services for telecommunication
will heavily rely not only on IT-security measures but also on the
above mentioned other security controls. For example a trusted third
party will surely need extensive organisational, personnel and non-IT
physical control. So it is clear that an extension to the ITSEC/ITSEM
evaluation scheme is necessary to cover these aspects. The following
section tries to identify how this can be done and which areas are not
yet covered.

Looking at communication services one can easily identify several
different types of communications-products and systems which have to
co-operate to provide the service. This includes for example

the end user equipment (telephone, modem or even his computer)

digital dialling switches

data concentrators

conventional computer systems with databases for eg user
profiles, directory information

conventional computer systems providing mailbox services

the communication media

gateways etc.

For a specific telecommunication service one can identify the task each
of these products or systems has to fulfil to provide this service. The
same is true for security services. Each component involved contributes
for one aspect of the security objectives or functions. These will then
differ significantly in the functionality as well as in the assurance
level required. Various topics regarding this may lead to problems, for
instance:. assumptions on the security provisions to be taken in the
environment of the product or system. Some of the security measures
will heavily depend on hardware features. Evaluation of non-IT security
features, like effectiveness of personnel and administrative security
measures has to be established. The integration of all security
measures has to be checked for consistency, completeness and
effectiveness. For the evaluation of a communication service,
therefore, different evaluations of systems involved in providing the
service are necessary before the whole service can be evaluated.

Requirements

Extension of ITSEC to cover more explicitly evaluation of
hardware security features

Establishment of a formal accreditation scheme for secure
communication services

Development of accreditation guidelines for the
telecommunication sector

Trial service evaluations for existing telecommunication
services

Articulation of the requirements of service evaluation.

6.2.6.	Trusted network management

Issue

Trusted Network Management systems need to maintain a given assurance
level while optimising the use of communication assets to achieve good
economics and quality of service.

Discussion

There is a growing dependence in the security of network management
systems for managing and controlling the provision of
telecommunications. This is due to an increased reliance on distributed
systems, the provision of new value added services and operations, and
on the increased sophistication and richness of network and service
functionality. Such dependency is placing greater demands on
performance and quality of service. Tomorrow's electronic highways
should be managed networks that should ideally interoperate in a
seamless way to ensure efficient "self-healing" network operations and
flexible creation and provision of a broad range of services, including
those supplied by third party suppliers. The management of
telecommunications systems security is thus growing in complexity
commensurate with the growth in communications systems and the
associated services and business use.

The major network management issues involve the protection of
electronic information in storage, in transmission and being processed.
Information used and applied to the controlling and maintenance of
networks and services. Information that is used as input to the process
of decision making and operational support, and which is also used as
input to the emerging new wave of intelligent systems and
communications. The provision of appropriate and effective network
management solutions is fundamental to the success of the future
telecommunications infrastructure for Europe.

Given the complex telecommunication systems that are evolving, the
interrelationships that are needed for multi-domain working, grade of
service requirements against a future European framework for
legislation and regulation needed to maintain multi-domain working, the
provision and maintenance of network management security the question
of security evaluation is a key issue. What is the alternative if
evaluation of network management security is not carried out ?

There are a number of constraints imposed by end users, service
providers and network operators on the provision of security for
network management eg concerning the employment of intelligence in
networks and the idea of securing shared resources, dealing with
different threat analysis and the responsibility for service
liability.

Requirements

Methods for network management evaluation

Extension of ITSEC to cover the evaluation of network
management systems

Definition of Functionality Classes (or Protection Profiles)
suitable for systems, products and services used in network
management systems

Accreditation guidelines for the trusted network management

Trial evaluations for existing network management systems.

6.2.7.	Modifications to evaluated products and re-evaluation

Issue

The shortening life cycle of products and the rapid evolution of
services and applications due to competitive pressures implies the need
for frequent adaptations and therefore re-evaluation.

Discussion

The impact of Open System, with its emphasis on portability and
interoperablity, has resulted in many new products being incremental
releases of existing products, for new operational platforms,
applications, etc.  There may be multiple releases or versions of a
hardware or software solution in a short period of time. The
maintenance issues of many similar and homogeneous configurations
making up a product line is being understood.

The evaluation and certification of the product may take longer than
the period between releases or updates to the solution. A certificate
currently applies to a specific release or version. Changes may
invalidate the certificate.

There is a need to devise a method to cope with these product or system
changes so that the certified status of a product may be maintained.

Particular concerns include:

Scope of the evaluation - Is an evaluation necessary for every
single platform-dependent configuration of a product already
certified?

Assurance - Is it necessary to have an entire new release
evaluated again in which only a small modification occurred (eg
a spelling mistake in the user interface)?

Re-use of previous evaluation work and results - Must the
evaluation of sensitive and relevant but unmodified components
of a product be repeated?

ITSEC and ITSEM have created a good basis on which to identify the key
issues of re-evaluation and subsequent re-certification.

Practical experience of re-evaluation is limited but the problem may be
mitigated by identifying key requirements. One approach is to
categorise code in the security Target of Evaluation (ITSEC-TOE). This
"Traffic Light" approach includes:

a)      GREEN code that has no bearing on the security functionality of
the product or system and that may be modified in future releases
without impact on the security of the product or system.

b)      YELLOW code that might impact the security of the product or
system and that must be inspected by an independent party (such as an
INSEF) before re-certification can be considered.

c)      RED code that is critical to the security functionality of the
product or system for which may modifications may require re-evaluation
of the whole product or system.

This structure will assist developers, evaluators and certifiers in
containing the level of necessary re-evaluation commitment following
any modifications.

Experience is available on the parallel field of quality evaluation of
software products. A framework for re-evaluation is outlined in ISO9126
and associated processes. It is likely that the impact of software
quality on "operational" correctness of security products will force
alignment of the various processes.

Requirements

Effective feedback from existing Community schemes, both
national and ITSEC related, on the problem of re-evaluation

Product-line structuring, understanding the current strategic
development of IT products and how this is likely to change
product cycles

Closer harmonisation of the evaluation process of all system
and product "qualities" (performance, reliability, security)
and how these may re-enforce each other in any re-evaluation
actions

Development of criteria for re-evaluation decisions

Development of "critical event" approach to re-evaluation

development of self-diagnostic techniques and procedures for IS
maintenance.

6.2.8.	Performance reporting for trusted products

Issue

Obligation to take corrective action in the case of faults found in
evaluated products.

Discussion

Despite the successful evaluation and certification of a product or
system, there is a small chance, smaller with the higher assurance
levels, that a security related fault will be detected. The Developer
is likely to have this fault reported to him and ought to take steps to
correct this fault as quickly as possible and issue a new release of
the software or hardware. The Certification Body needs to be informed
of the fault and the steps the Developer intends to take to correct the
fault. The Certification Body and the Developer need to discuss the
need for any re-evaluation work and agree a timescale for this. Where a
Developer is unwilling to correct the fault, the Certification Body
needs to decide whether to withdraw the certified status and publish
the fact that a fault exists, although not necessarily the details of
the fault.

Requirements

Incident reporting system for Certification Bodies

Definition of user and supplier obligations to report incidents.

6.2.9.	Rationalisation of evaluations 

Issue

Speeding up and lowering cost of evaluation and thereby improve
attractiveness of security evaluations.

Discussion

Two key factors to the success of a security market enhancement are
that evaluations are approachable and that the products or systems are
developed in a way that is meant to meet the ITSEC requirements
beforehand. It must also be understood that in many industrial cases,
security, while indeed an important feature of a product or service, is
only one aspect of an even larger target which is product quality or
the quality of service.

Considerable work has been carried on in the broad field of software
quality and its engineering which might be valuable to the security
community.

Three standards address quality through an evaluation and certification
approach, namely ISO 9000, SEI CMM and ISO 9126, at the organisation
level, at the process level and at the product level, respectively.
Those standards are well established and the demand for certificates
based on them is growing rapidly.

There is an urgent need to consider the harmonisation of the ITSEC and
ITSEM contents, to take into account to a much larger and clearer
extent the benefits brought by those standards to security and to help
reduce costs and needs of several, disconnected or even conflicting
evaluations and certificates. The ITSEC approach seem to be
sufficiently well accepted today to consider its integration into a
broader context.

A closer technical look at quality standards and ITSEC/ITSEM taken
together shows that, although they are all basically based on the same
fundamental ideas and principles, there are residual conflicts when
evaluations are to be carried out, either due to different requirements
or to different evaluation approaches.

There are many ways in which the ITSEC could be turned more compatible
with the quality certification domain. The following steps seem
relevant:

While preserving the current technical principles and
requirements, a better distinction between specifically
security related requirements and more quality related should
be made so that it becomes clearer, if not explicit, what the
various other evaluation systems and associated requirements
can cover or contribute to.

As all standards evolve, the ITSEC and ITSEM will have to be
updated, at the level of the actual required deliverables for
instance, to be directly compatible with what the other domains
require, while still keeping its specificity.

As the certification bodies of the quality fields become
Trusted Third Parties for the ITSEC community, parts of the
current ITSEC requirements might eventually be replaced by
requirements for relevant quality certificates, and hopefully
vice versa.

This plan suggests that the first step is one to consider directly today.

Few people involved today in security and its evaluation have a
software quality background, which has impeded until now the
harmonisation of the ITSEC with the other standards. Awareness raising
actions on this topic should be considered with a fairly high priority
level.

Requirements

Alignment of security evaluation criteria and methods with
those for quality and safety

Establishment of portability of results between quality of
service, safety and security evaluations.

6.3.	Supply related issues - technological change

Issue

Changes in the way in which technology is used throughout society will
result in demands for new  technological approaches to information
security.

Discussion

Over the next decades it is to be expected that the macro economic
climate will change dramatically.  This is mainly driven by the shift
in geographic location of the generation of the worlds GDP from North
America  and Europe to a more even spread, with the Pacific rim
countries producing a larger share. The health and nutrition problems
that will face the developing world will become more acute as a greater
fraction of their population enters adulthood.

Information underpins these processes in a number of ways. The
financial aspects of global businesses will become vital to their
survival and the timely, accurate and where appropriate private
communication of  financial information on a global and adaptable scale
will be critical. Health care information will need to be routinely
available as health carers deal with the health problems of an
increasing number of mobile people. Transportation of food to areas in
need will require logistic information to be available in remote and
underdeveloped parts of the world quickly and accurately.

The developed world will make increasing use of their less structured
employment patterns to earn money in a variety of ways and in
performing a range of tasks, less and less to do with manufacturing.
Success will only be possible by the exploitation of mobility and wide
bandwidth telecommunications services. It has the potential to provide
quality of life together with high productivity. The effectiveness of
this approach, in providing a method of revenue generation, will
depend, inter alia, upon the performance, reliability and security of
the information and transportation infrastructures.

Driving technologies within this scenario are:

Wide bandwidth telecommunications, including
o Multi media applications and communications
o Global teleconferencing

Mobile services for all applications

Gigabyte storage in portable systems

Robotically controlled transportation mechanisms.

It will be essential for a range of security and safety features to be
embedded as a matter of design in all infrastructures, services and
applications for them to deliver the benefits that are expected by
their users.

Requirements

Wide bandwidth telecommunications.

Bandwidth will become a commodity on telecommunication systems.
The added value in using it comes from the quality of service
provided. One aspect of such quality is that of security. To
provide security on wide band  public switched networks,
investment is needed that is  focused on those aspects of
security that are required by a) the telecoms service provider
for his own purposes and b) the end user to support his
application. Community wide and international specifications on
security in ATM, SDH and associated signalling structures will
be necessary.

Multi media applications and communications

Multi media applications will integrate all known
representations of information into files, documents, messages
and displays. Representations such as voice, audio, still
image, text, video and graphics will become interchangeably
available from a range of equipments that users interact with,
including mobile telephones, personal computers, television
sets and personal communicators. All aspects of security must
be incorporated for potential implementation an all of these
systems in order that a user may implement a level of security
service appropriate to the application and the environment.

A key issue is to maintain the "veracity" of the information
transmitted. Veracity is the feature of a piece of information
(eg a video sequence) to be true.  Veracity is a wider concept
than integrity which is only concerned with the protection of
information during transmission and storage.

Another issue is concerned with the protection of information
through copyright.  Without suitable technical means to
safeguard the interests of the information owner, the evolution
towards the information society will be seriously hampered.

Global teleconferencing

Teleconferencing is becoming the substitute for travel. In
order to make it really cost effective all the above
applications, multimedia, mobility, access to mass data and if
necessary access to  one or more parties who are travelling in
private vehicles need to be incorporated within the
teleconferencing application. True geographic independence will
come only if such an application works on a global scale and
provides all the security services that are needed by the
community of users. Such an application will demand the
integration of the security services provided for each of the
sub-applications alone. Specifications to allow such
integration should be defined and the technology to provide the
security functionality developed.

Mobile services for applications.

Mobility provides the end user with geographic independence.
The price paid for this independence is infrastrucural
information and process that allows his demands on the
infrastrucural services to be met wherever he is. Such
information and process has to, by design, have security
features incorporated. At the community level extensions of the
GSM concepts to allow all applications to function securely in
the way telephony does on GSM will require significant
technological investment.

Mass data storage and communications in portable systems.

Access to huge amounts of data from a mobile terminal will be
essential. Such data needs to be communicated  securely,
whether it be held in volatile memory, in the form of
mechanically read ROM or transmitted over a network.
Specifications for securing such data need to be developed as
do the necessary bulk encryption services for huge data volumes
. The technology components of such services will be a major
challenge and need to be defined now.

Robotically controlled transportation mechanisms.

Human involvement in controlling mass transportation mechanisms
is already decreasing as technology becomes more reliable. If
human involvement  for individual transportation is to shrink
in the same way then mass production of cost effective safety
assured technologies will be essential. Collision avoidance ,
guidance and navigation systems will be essential parts of
every domestic vehicle and the requirements for the information
safety and security critical elements of such systems need to
be defined, standardised and developed .

7.	Liability related issues (Consequences of Security and Safety Incidents)

7.1.	Framework for international law relating to IS

[tba]

7.2.	Legal provisions for liability in global services

Issue

Liability is a difficult issue under the best of conditions, but in the
context of global telematics services it remains a matter of great
concern but so far few advances have been accomplished.

Discussion

Liability is dealt with normally by a mixture of laws, regulations,
conventions and counselling reinforced by risk sharing arrangements, in
particular insurances. Legislation has so far evolved slowly and is
still far from the point where it can deal effectively with the issues
on a national level. When it comes to deal with liability under
international law things become even more difficult. The same applies
to regulations. It is only the insurance industry which has started to
cover some of the risks. With the rapid increase in the use of
telematics clearly there is a need to come to a better understanding of
liability in the context of world-wide networking of services.

Requirements

Development of international framework for private law, especially liability

Application of "Verursacherprinzip"

Under this kind of liability the source of the information has the
responsibility to assure the proper use, its accuracy and the
compliance with the law and regulations. In the case of intermediaries
adding value the principle would be carried forward since the quality
of the information may have been significantly changed.

Application of "User Principle"

In this case the user is made liable for the what is done with the
information and its consequences. He has to take all necessary steps to
ensure that the information is correct and applicable to its use.

7.3.	Insurance issues

Issue

[tba]

Discussion

For the public safety risks are addressed by the Insurance Industry
with the premiums calculated on the basis of the assessment of risks
reflecting past experience. For the risk associated with information
systems there are only the beginning of an extension to cover this kind
of risks. As the taking out of insurance policies is a natural, or
partial alternative to IS measures, an improved methodology for the
assessment of risks is important in adopting the most economic and
practicable solution. Of course, there are some application areas where
this approach is not or only partially acceptable.

Requirements

[tba]

7.4.	Monitoring of compliance

[tba]

Development of framework for the monitoring of compliance to
regulations, recommendations and good practices

7.5.	Metrics for loss assessment

Issues

There is a fundamental need for guidance of any kind on how to access
the loss and damages an organisation might face and how much of this
might be addressed by evaluation and certification. Such metrics would
increase the perception of the value of a formal evaluation scheme.

Discussion

Action is necessary to ensure the effective international exploitation
of the security product evaluation and certification scheme. There must
be a competitive business advantage of developing, implementing and
using certified security products, and there must be a well understood
correlation between a certified security product and the problems that
it can solve.

Progress is hindered by lack of independent measures of the business
relevance of the certified product.

Measures can be obtained by:

vendor/user studies (from actual risk assessment)

product comparisons (using loss reduction models)

insurance contracts (both direct and consequential damage
assessment)

vendor cost/benefit profiles (market penetration, Software
engineering costs, etc.).

Such studies would prove invaluable to the SMEs who cannot justify
extensive Security controls yet are probably the most vulnerable to the
consequences of information abuse.

The ITSEC actions should reflect a balance between the product based
concepts of security objectives (codes of good practice) and
quantitative risk/loss assessment.

This should result in measured, affordable controls as a prerequisite
to developing a European and international security market.

Requirements.

Such a quantitative approach must address:

mapping, certified product features to specific security incidents

common, product independent risk analysis processes

insurance processes recognising the advantages of certified products

security incidents are the recognition by the legal, regulating
and financial community.

A short term approach would be to raise awareness of the security
exposures of using poorly complying (non-assurance, non-certified)
products.

8.	Spectrum of Measures

8.1.	Common Framework and Consensus

Objective

To provide a minimum framework for trusted information and
communications services on an international scale and to establish a
multi actor consensus on essential requirements and options for the
provision of information security and related issues.

Background

Information and its exchange via global networks is inextricably
associated with all public and private activities involving the
citizen, service providers, operators, vendors, administrations and
authorities in numerous ways for all kind of purposes. With the
increasing globalisation of the economies an agreed framework for the
protection of information either associated with intellectual property,
privacy, internal security and other legitimate reasons is needed.
While there are several conventions and recommendations, the rapid
evolution of technology and services implies the need to reflect on a
common framework which could assist countries and regions to maintain
interworking and avoid technical barriers to trade and communications
without compromising their priorities in the protection of information
assets.

Solutions for open communications between a variety of parties on a
global scale do exist. They differ in detail and convenience in usage.
However, the ability to use them depends critically on a broad
consensus on the use of one or the other option. Nationally constrained
solutions, such as DES, RSA in the USA are of little utility if they
can not be used by US business in the pursuit of their global business
interests and vice versa if others can not make use of these techniques
for their communications with US partners.

To achieve agreement and reasonably general acceptance by the users
concerned is as important as the technical performance of the solution
in question.

Tasks 

Development of a Common Framework to address the following issues:

Revision of scope and approach to information security to
reflect the new conditions, challenges and requirements brought
about by globalisation (4.1.)

Verification of the existing provisions with respect to their
conformance to the Internal Market Policy of the EC implying
the removal of existing internal barriers and the avoidance of
the formation of new technical barriers due to divergent
application of IS rules, regulations and legislation (4.2.)

Definition of a common approach defining rights,
responsibilities and duties of citizens and business on the one
hand, and that of the authorities on the other hand (4.3.)

Development of a common approach defining the rights of
citizens and business users on the one hand and that of
corporations, organisations and authorities using biometric
techniques (4.4.)

Development of a generic framework for the management of open
and protected communications in a user/business oriented
environment (4.5.)

Concerted effort to address the common requirements of
business, citizens and authorities to adequately protect
non-classified information and its communication (4.6.)

Common approach to the assignment of responsibility and
liability (4.9.)

Clarification of "Info-Ethics" for the professional and
individual user in its relationship to Information Security

Clarification of responsibilities of the sector actors in
general and in their relations within each other, with
particular reference to open and distributed applications
(4.10.)

Concerted effort to address a common approach to the handling
of security and safety critical requirements (4.10.)

Development of a common approach to security evaluation of
information systems in safety-critical environments (4.11.)

Common framework for domain interworking (5.6.)

Clarification of the right to signature and the attached
authority (5.8.2.)

Common approach to the security of electronically stored
information (5.8.7.)

Proposal for a frameworks and architectures which are accepted
as well by the business users as by the national security
agencies and the service providers (5.9.1.)

Framework for the provision of trans-domain confidentiality
services . Mechanisms are needed that provide for a defined way
to pass from one domain to another. This will require
collective or multilateral agreements for interoperation
(5.9.2.)

Adoption of a confidentiality algorithm standard and
specification, and a key distribution mechanism based on an
asymmetric public key algorithm (6.1.5.)

Develop an approach to date and time stamping for time-critical
transactions and applications (6.1.8.)

Establish conditions and procedures for mutual recognition of
evaluations (6.2.2.)

Development of an agreed definition of scope and liabilities of
vendor declarations for secure solutions (6.2.3.)

8.2.	Awareness, education and training

Objective

Improved awareness of the issues of information security by specific
actions and a greater emphasis in the education and training of related
professions.

Background

In the end it is the human factor which decides the level of
information security, irrespective of the technical and operational
measures one may wish to deploy. In this sense awareness and the
teaching of appropriate skills in the context of the information
professions, is an important measure to be considered. This may entail
the creation of special training schemes and curricula, but most of all
the appropriate inclusion of information security related issues in the
teaching of information professions in general. This is in many cased
essential, since information security is very closely related to the
way information is used in a given context, ie often it has to be
embedded in the application and management procedure and can not be
added on as an external procedure.

Tasks

Inclusion in the curriculum of relevant educational institutes
(eg engineering, law and business schools) the use of digital
signature (5.8.6.)

Awareness of sector actors of the potential losses due to the
absence of confidentiality services (5.9.1.)

Initiate investigation to assist those member states not
involved in the early stages of ITSEC to develop and test
procurement policies that are based on evaluated communications
products (5.11.)

8.3.	Agreements

Objective

International agreements on a minimum set of features and operational
concepts as required for trusted and open service provision.

Background

While a common framework and general consensus may go a long way, there
is the need to get formal agreement on certain aspects. These may, for
example, relate to issues surrounding liability, accreditation and
certification and the fighting of organised crime..

Tasks

Development of a Common Framework to address the following issues:

4.4.	Human Rights and biometrics

4.6.	Management of Openness and Protection

4.7.	Common concerns of commercial and national security

4.8.	Security and Law enforcement on international scale

5.6.	Security domains

5.8.	Signature issues

5.8.2. 	The individual right to signature

5.8.3.	Consistency of legal principles

5.10.	Motivation to acquire evaluated products

5.11.	Consistency of procurement practices

6.1.4.	Use of names and certification of credentials

6.1.5.	Key management service

6.1.6.	Directory services

6.1.7.	Legal services

6.1.8.	Guaranteed date and time stamping

6.1.9.	Negotiable document transaction

6.2.1.	Perceived Requirements for trusted solutions

6.2.2.	International harmonisation and mutual recognition

6.2.3.	Vendor Declarations

6.2.4.	Evaluation of applications

8.4.	Common Practices and Codes of Conduct

Objectives

Development of Codes of Practice to

support the development and harmonisation of sectorial practices

support the development of a standardised approach to the
development of baseline controls

support the development and harmonisation of baseline controls.

Background

Codes of practice are found in many industries and disciplines. They
encapsulate the collective wisdom and experience of the practitioners
of a trade or profession or of an industry. For example codes of
practice for the building trade. To the practitioners of a trade or
profession, the need for codes of practice is self evident.

Codes of practice are not always obvious because they are often given
other names. In some situations they may be called standards manuals in
others requirements specifications. The property that sets them apart
and makes them recognisable as codes of practice is the encapsulation
of collective wisdom. The collective wisdom represents the means by
which all parties to a transaction are protected from harm. In legal or
business management terms this may be called a "standard of due care."

Any professional discipline needs to have a vehicle to encapsulate the
collective wisdom of its practitioners. They help to ensure consistency
across the wide spectrum of practitioners. That has to be true of
something as important as information processing.

We have mentioned elsewhere the move towards empowerment and
distributed systems. Empowerment means that the person responsible for
an operating unit of an enterprise is free to obtain its services and
resources anywhere. Where once information processing was done
in-house, it is now just as likely to be out-sourced.

When information was once processed centrally the computer centre was
well protected, both physically and logically. Indeed the protection of
computer centres was the trigger for the development of corporate
information security programmes. With information processing spread
throughout the enterprise, the need for a central site vanishes. With
it goes the ease of justifying the costs of high levels of security.

These two factors taken together mean that responsibility for
information security is fragmented and put in the hands of people who
have other responsibilities. Their mind set does not contain the same
awareness of the need for security. Neither do they understand the
interdependence of security and control measures.

The growth of legal, regulatory and contractual requirements for
security create the need for a generally accepted set of controls and
security measures. Words like due diligence and compliance with best
practice can be satisfied by compliance with codes of practice. They
provide the baseline needed for any comparison of actual with best
practice.

Looking to the future we can see that information processing will
become a basic skill for any skilled worker or manager. Where
industries have their own codes of practice governing the way they
operate, information security should become a sub-set.

Codes of practice must be formulated in such a way that audits can be
performed to establish compliance.

Tasks
Development of:

Review of current design practices and codes of conduct with
the aim of generating a community wide standard for the safety
of systems (4.5.)

Codes of practice for the handling of non-classified
information, as opposed to classified information.  This should
include rules for labelling of information. (4.7.)

Guidelines to establish "cost of security" (4.9.)

Assignment of responsibility and liability in global services (4.9.)

Sector-specific codes of practice and base line controls, eg for:
o finance
o insurance
o trade
o medical
o telecommunications
o electronic service providers (including rules for
inter-operation)
o administrations

(5.4.)

Guidelines for the selection of security methodologies (5.5.)

Code of Practice for data labelling (5.7.)

Model contract clauses for contracts between service providers,
TTPs and users, especially confidentiality service providers
and services operating across national boundaries (5.9.1.,
5.9.2., 5.9.3)

Good practices for the operation of TTPs, specifically
regarding availability, confidentiality, response times, rules
of disclosure (6.1.2.)

International guidelines for the accreditation and audit of
TTPs (6.1.3.)

International guidelines for
o naming and certification
o key management
o directory services
o legal services
o time stamping
o negotiable document transactions
(6.1.4., to 6.1.9.)

Rules for vendor declarations, as to the security of their
products (6.2.3.)

User and supplier obligations to report incidents (6.2.8.)

Guidelines for the monitoring of compliance to codes of
practice (7.4.)

Rules for loss assessment (7.5.)

8.5.	Specifications

Objectives

To develop specifications for the application of security, in order to
ensure interworking, interoperation and mutual recognition.

Background

Functional specifications for products or services are documents that
are to be used as parts of purchase specifications. They specify the
functions of a solution and the required performance characteristics.
Implementation aspects are only dealt with if they are particularly
important for the fulfilment of a specific function. Specifications
call up standards and profiles, as far as available.  Options in the
standards are resolved in specifications.

Common specifications for methodologies, eg evaluation, serve as a
basis for mutual recognition.

Tasks

Development of:

Specifications for solutions to confidentiality and integrity
services (4.8.)

Methodologies for the assessment of threats, vulnerabilities,
and hazards for safety critical systems (4.11.)

Development of methods of testing that enable standards of
reliability to be ensured, including tests to destruction where
appropriate (4.12.)

Definition of requirements for fail-safe system architectures
and implementations (4.12.)

Specifications of security evaluations for safety critical
environments

Taxonomy of user requirements for enterprises, individuals and
citizens (5.1., 5.2.)

Identify and group access control scenarios, to determine
levels of commonality (5.8.1.)

Identify techniques, products, specifications and standards
addressing access control, and associate them with the
identified scenarios (5.8.1.)

Identify parameters common to most or all of the above
techniques, products, specifications and standards and
investigate the feasibility of establishing common formats for
them (5.8.1.)

Identify the key features for coherence in the supporting
infrastructure (5.8.1.)

Define a limited number of basic access control mechanisms for
pilot implementation (5.8.1.)

Specification of a signature scheme (5.8.4.)

Specification of application oriented integration of the
signature scheme (5.8.4.)

Specification of an Application Program Interface (API) for the
signature scheme (5.8.4.)

Specification of the use of multiple signatures (5.8.4.)

Specification of key usage for integrity and confidentiality
(5.8.5.)

Specification for the practical use of digital signatures as a
full equivalent to manual signatures (5.8.6.)

Specification for the handling of electronically stored
information (5.8.7.)

Specification of an approach to confidentiality (5.9.1.)

Assurance criteria for confidentiality service providers and
operators (5.9.2.)

Specification for the inter-operability of confidentiality
services (5.9.3.)

Specification for date and time stamping (6.1.8.)

8.6.	Standards

Objective

Development of standards for IS.

Background

European security standards developed over the next decade will have a
decisive influence on the technological structure of the entire
European market and will change the conditions of trade in export
markets and national markets.

The standards making infrastructure for the development of IT and
telecommunication standards has become increasingly complex. The number
of groups, the range of work items and the  overall process at
different levels of international, regional and national
standardisation is a complex maze. Security standardisation is no
exception to this situation. In general there is a reoccurring problem
which is that of coordination between groups developing standards
similar in nature and scope. Such coordination is necessary to avoid
duplication of work and the unnecessary waste of resource, and to
ensure that the standards that are developed are consistent and  they
form a coherent set.

At the European level the establishment of the Advisory Expert Group
ITAEGV has provided an ideal mechanism for the coordination of security
standards work within Europe. In addition, ITAEGV is in the process of
developing a European Memorandum, M-IT-06, which is a Taxonomy and
Directory of European Standardisation Requirements for Information
Systems Security based on market driven requirements. This memorandum
also contains a future work programme for security standardisation.

Hence Europe is now demonstrating through this action a clearly defined
strategic stance on security standardisation. One that is demonstrating
effective coordination, leadership and a market driven focused approach
to standardisation.

Traditionally the principal contributors to standards making have been
suppliers, designers and professionals. The end user of products and
services has only been peripherally interested or involved. The end
user has been concerned that standards have been used in relation to
the products he buys but not greatly interested in what they are.

There is a need for a more effective mechanism and framework through
which user interest is able to collectively express their requirements
and priorities so that they can contribute to the standardisation
process in a way which will balance the very strong interest of the
supply industry.

This mechanism should be used to provide greater user input into the
development of the European Memorandum, M-IT-06 (The Taxonomy and
Directory of European Standardisation Requirements for Information
Systems Security). This memorandum also contains a future work
programme for security standardisation.

The long-term benefits of security standardisation requires investment
by companies and users and as such they must be prepared to organise
themselves more effectively to participate in the standards making
process.

Tasks

Define a solution to the specification, standardisation and
licensing problem of cryptographic algorithms(5.8.4.).

Develop standards for:

identify and group access control scenarios, to determine
levels of commonality (5.8.1.)

identify techniques, products, specifications and standards
addressing access control, and associate them with the
identified scenarios (5.8.1.)

identify parameters common to most or all of the above
techniques, products, specifications and standards and
investigate the feasibility of establishing common formats for
them (5.8.1.)

identify the key features for coherence in the supporting
infrastructure (5.8.1.)

define a limited number of basic access control mechanisms for
pilot implementation (5.8.1.)

Digital signatures, including for application oriented
integration and a general application programming interface
(API) for integration of security services which could be
easily integrated into any (almost) application (5.8.4.)

Profile - or functional - standards to support CCITT X.509 (5.8.5.)

Services and service provision. Ensure that the confidentiality
services are compatible with existing communication standards
and practices where possible (5.9.1.)

Minimum requirements to ensure interoperability of procedure
and operating practices for confidentiality services (5.9.3.)

Evaluation criteria and methods (6.2.2.).

8.7.	Products and Services

Objective

In order to facilitate a harmonious development of the provision of
security of information systems in the Community for the protection of
the public and of business interests, it will be necessary to develop a
consistent approach as to its provision of security. Where independent
organisations will have to be mandated, their functions and conditions
will need to be defined and agreed and, where required, embedded into
the regulatory framework. The objective would be to come to a clearly
defined and agreed sharing of responsibilities between the different
actors on a Community level as a prerequisite for mutual recognition.

Background

At present, the provision of security of information systems is well
organised only for specific areas and limited to addressing their
specific needs. The organisation on a European level is mostly
informal, and mutual recognition of verification and certification is
not yet established outside closed groups. With the growing importance
of the security of information systems, the need for defining a
consistent approach to the provision of security for information
systems in Europe and internationally is becoming urgent. The most
urgent needs identified relate to digital signatures and
confidentiality services.

Tasks

Verification of the existing provisions with respect to their
conformance to the Internal Market Policy of the EC implying
the removal of existing internal barriers and the avoidance of
the formation of new technical barriers due to divergent
application of IS rules, regulations and legislation (4.2.)

Provision of IS to business and the public of solutions freely
applicable throughout the Community and on a preferential basis
at the international level (4.2.)

An effective, internationally agreed, economic, ethical and
usable solution to meet business, administration and personal
needs including mechanisms for authorised interception and
reporting of incidents and crimes adjusted to the conditions of
the Internal Market, and to include the necessary equipment and
software, but also an infrastructure of Trusted Third Parties.
This will discourage "home-made" or other solutions (4.8.)

Recommendation for the implementation for a public digital
signature scheme for use by business, administrations and the
general public (5.8.3.)

Development of a general application programming interface
(API) for integration of security services which could be
easily integrated into most application (This could as well
include codes which explain the intention of the applied
signature.) (5.8.4.)

Development of transaction-oriented multiple signature schemes
(5.8.4.)

Framework for the provision of trans-domain confidentiality
services (Mechanisms are needed that provide for a defined way
to pass from one domain to another. This will require
collective or multilateral agreements for interoperation.)
(5.9.2.)

Demonstration of trans-European confidentiality services using
a suitable application , eg the realisation of administrative
telematics applications (5.9.3.)

Trial service evaluations for existing telecommunication
services (6.2.5.)

Incident reporting system for Certification Bodies (6.2.8.)

8.8.    Technology

Objective

Systematic investigation and development of the technology to permit
economically viable and operationally satisfactory solutions to a range
of present and future requirements for the security of information
systems.

Background

Work on security of information systems would need to address
development and implementation strategies, technologies, and
integration and verification.

The strategic R&D work would have to cover conceptual models for secure
systems (secure against compromise, unauthorised modifications and
denial of service), functional requirements models, risk models and
architectures for security.

Verification and validation of the security of the technical system and
its applicability would be investigated through integration and
verification projects.

In addition to the consolidation and development of security
technology, a number of accompanying measures are required concerned
with the creation, maintenance and consistent application of standards,
and the validation and certification of IT and telecommunication
products with respect to their security properties, including
validation and certification of methods to design and implement
systems.

The fourth RD&T Community Framework Programme might be one of the tools
to foster co-operative projects at precompetitive and prenormative
levels.

Tasks

Demonstration, through pilot projects, that digital signatures
can be used as equivalent to hand-written signatures (5.8.6.)

Development of techniques for the establishment, handling and
recording of Electronic Negotiable Documents (6.1.9.)

Adapt to technological change:

Wide bandwidth telecommunications.

Bandwidth will become a commodity on telecommunication systems.
The added value in using it comes from the quality of service
provided. One aspect of such quality is that of security. To
provide security on wide band  public switched networks,
investment is needed that is  focused on those aspects of
security that are required by a) the telecoms service provider
for his own purposes and b) the end user to support his
application. Community wide and international specifications on
security in ATM, SDH and associated signalling structures will
be necessary.

Multi media  applications and communications

Multi media applications will integrate all known
representations of information into files, documents, messages
and displays. Representations such as voice, audio, still
image, text, video and graphics will become interchangeably
available from a range of equipments that users interact with,
including mobile telephones, personal computers, television
sets and personal communicators. All aspects of security must
be incorporated for potential implementation an all of these
systems in order that a user may implement a level of security
service appropriate to the application and the environment.

A key issue is to maintain the "veracity" of the information
transmitted. Veracity is the feature of a piece of information
(eg a video sequence) to be true.  Veracity is a wider concept
than integrity which is only concerned with the protection of
information during transmission and storage.

Another issue is concerned with the protection of information
through copyright.  Without suitable technical means to
safeguard the interests of the information owner, the evolution
towards the information society will be seriously hampered.

Global teleconferencing

Teleconferencing is becoming the substitute for travel. In
order to make it really cost effective all the above
applications, multimedia, mobility, access to mass data and if
necessary access to  one or more parties who are travelling in
private vehicles need to be incorporated within the
teleconferencing application. True geographic independence will
come only if such an application works on a global scale and
provides all the security services that are needed by the
community of users. Such an application will demand the
integration of the security services provided for each of the
sub-applications alone. Specifications to allow such
integration should be defined and the technology to provide the
security functionality developed.

Mobile services for applications.

Mobility provides the end user with geographic independence.
The price paid for this independence is infrastrucural
information and process that allows his demands on the
infrastrucural services to be met wherever he is. Such
information and process has to, by design, have security
features incorporated. At the community level extensions of the
GSM concepts to allow all applications to function securely in
the way telephony does on GSM will require significant
technological investment.

Mass data storage and communications in portable systems.

Access to huge amounts of data from a mobile terminal will be
essential. Such data needs to be communicated  securely,
whether it be held in volatile memory, in the form of
mechanically read ROM or transmitted over a network.
Specifications for securing such data need to be developed as
do the necessary bulk encryption services for huge data volumes.
The technology components of such services will be a major
challenge and need to be defined now.

Robotically controlled transportation mechanisms.

Human involvement in controlling mass transportation mechanisms
is already decreasing as technology becomes more reliable. If
human involvement  for individual transportation is to shrink
in the same way then mass production of cost effective safety
assured technologies will be essential. Collision avoidance,
guidance and navigation systems will be essential parts of
every domestic vehicle and the requirements for the information
safety and security critical elements of such systems need to
be defined, standardised and developed .

8.9.    Regulation and Legislation

Objective

Adjustment of national regulations and legislation to permit seamless
interworking of trusted services.

Background

The provision of information security is seen to related in some areas
closely to public order and defence issues. The related national
regulations and legislations vary considerably. In order to avoid the
creation of technical barriers to trade and communications outside the
domains of internal order and national security, adjustments of
legislation and regulations may be required in some countries.

Tasks

Development of a legal framework to address the following issues:

Verification of the existing provisions with respect to their
conformance to the Internal Market Policy of the EC implying
the removal of existing internal barriers and the avoidance of
the formation of new technical barriers due to divergent
application of IS rules, regulations and legislation (4.2.)

Clarification of the ownership and privacy issues surrounding
biometric data (4.4.)

Study the legal environment within which vendors and users of
safety critical systems work, with the objective of harmonising
that environment (4.5.)

Need to provide business and the general public with an
effective, economic and usable security solution to meet their
needs including a mechanism for authorised interception (4.8.)

Establishment of a network of Trusted Third Parties to provide
user support and manage directories (4.8.)

Clarification of responsibilities of the sector actors in
general and in their relations within each other, with
particular reference to open and distributed applications
(4.10.)

Agreement on management, TTPs, accreditation, auditing and
relations with law enforcement agencies (5.6.)

Clarification of the right to signature and the attached
authority (5.8.3.)

The legal functions of signatures need to be agreed
EC-wide/internationally. Once this is achieved, it is possible
to determine to what extent a code-of- practice will suffice.
One issue to be addressed is the intended use of the digital
signature, and the legal responsibility and liability of the
signing entity with regard to the signed information (5.8.3.)

Clarification of the conditions of acceptance of the authority
of an electronic signature, eg for legally binding purposes, ie
as substitute for hand-written original signatures (5.8.3.)

Solution to the licensing problem of cryptographic algorithms
(5.8.4.)

Definition of minimum requirements to ensure interoperability,
including standards, specifications, rules of procedure and
operating practices for autonomous confidentiality services
(5.9.3.)

Alignment of national procurement policies concerning evaluated
products (5.11.)

Definition of the classes of information used and the types of
damage that could be caused to the information owners (5.12.)

Definition of the rights and duties of information ownership
(5.12.)

Development of guidance for owners of information as to the
actions that they would have been expected to take to protect
their assets and avoid negligence charges (5.12.)

Development of the methods and procedures that should be used
to establish information value (5.12.)

Introduce or harmonise legislation to provide an appropriate
framework for arbitration, supervision and litigation (6.1.2.)

Adapt applicable legislation or regulations to provide an
appropriate legal framework for use throughout the Community
and in the relations with third countries (6.1.3.)

Harmonisation of legislation on the legal status of evidence
generated by any TTPs and especially on the intra- and extra-
community recognition thereof. This probably implies the
settlement of the accreditation question.

Promotion of community-level information technology litigation
services modelled after existing international bodies such as
the International Chamber of Commerce (6.1.7.)

Framework for international law relating to IS (7.1.)

Development of international framework for private law,
especially liability (7.2.)

8.10.   Accreditation

8.10.1. Accreditation of Services

Objective

Evaluation of communication services.

Background

Common criteria for security evaluation are mainly focused on IT
products and IT systems.  However, there is a perceived need for
criteria to support the evaluation of communication services.  This
later criteria may be considered as an extension to the current
criteria or there may be a need to develop separate criteria.

The evaluation of a service and its subsequent accreditation will be a
critical requirement in many user applications, in particular those
that need to use trans-European communication services. The
consistency, completeness and effectiveness of the security
enhancements of communication services needs to be checked for an
overall fitness for purpose. Hence there is a need for a framework for
accreditation of communications services.

Tasks

Establishment of a formal accreditation scheme for secure
communication services (6.2.5.)

Development of accreditation guidelines for the
telecommunication sector (6.2.5.)

Accreditation guidelines for the trusted network management
(6.2.6.)

8.10.2. Accreditation of TTPs

Objective

Procedures for the accreditation and audit of TTPs.

Background

TTPs will need to interwork and communicate internationally to provide
a service infrastructure to support a range of security services such
as digital signature and confidentiality.  TTPs will thus need to
process, store and distribute a range of security-related information
for the use and management of such services. This implies the need for
a set of harmonised procedures for the accreditation and audit of TTPs
in order to ensure mutual trust by the public in TTPs and the services
they provide.

Tasks

Development of international guidelines for the accreditation
and audit of TTPs (6.1.3.)

Adaptation of applicable legislation or regulations to provide
an appropriate legal framework for use throughout the Community
and in the relations with third countries (6.1.3.)

Annex: Recalling the Action Lines from the Council mandate

Action line I - Development of a strategic framework for the security
of information systems

Issue

Security of information systems is recognized as a pervasive quality
necessary in modern society. Electronic information services need a
secure telecommunications infrastructure, secure hard- and software as
well as secure usage and management. An overall strategy, considering
all aspects of security of information systems, needs to be
established, avoiding a fragmented approach. Any strategy for the
security of information processed in an electronic form must reflect
the wish of any society to operate effectively yet protect itself in a
rapidly changing world.

Objective

A strategically oriented framework has to be established to reconcile
social, economic and political objectives with technical, operational
and legislative options for the Community in an international context.
The sensitive balance between different concerns, objectives and
constraints are to be found by sector actors working together in the
development of a common perception and agreed strategy framework. These
are the are the prerequisites for reconciling interests and needs both
in policy-making and in industrial developments.

Status and trends

The situation is characterized by growing awareness of the need to act.
However, in the absence of an initiative to coordinate efforts, it
seems very likely that dispersed efforts various sectors will create a
situation which will de facto be contradictory, creating progressively
more serious legal, social and economic problems.

Requirements, options and priorities

Such a shared framework would need to address and situate risk analysis
and risk management concerning the vulnerability of information and
related services, the alignment of laws and regulations associated with
computer/telecommunications abuse and misuse, administrative
infrastructures including security policies, and how these may be
effectively implemented by various industries/disciplines, and social
and privacy concerns (e.g. the application of identification,
authentication, non-repudiation and possibly authorization schemes in a
democratic environment ).

Clear guidance is to be provided for the development of physical and
logical architectures for secure distributed information services,
standards, guidelines and definitions for assured security products and
services, pilots and prototypes to establish the viability of various
administrative structures, architectures and standards related to the
needs of specific sectors.

Security awareness must be created in order to influence the attitude
of the users towards an increased concern about security in information
technology (IT).

Action line II - Identification of user and service provider
requirements for the security of information systems

Issues

Security of information systems is the inherent prerequisite for the
integrity and trustworthiness of business applications, intellectual
property and confidentiality. This leads inevitably to a difficult
balance and sometimes choices, between a commitment to free trade and a
commitment to securing privacy and intellectual property. These choices
and compromises need to be based on a full appreciation of requirements
and the impact of possible options for the security of information
systems to respond to them.

User requirements imply the security functionalities of information
systems interdependent with technological, operational and regulatory
aspects. Therefore, a systematic investigation of security requirements
for information systems forms an essential part of the development of
appropriate and effective measures.

Objective

Establishing the nature and characteristics of requirements of users
and service providers and their relation to security measures of
information systems.

Status and trends

Hitherto, no concerted effort has been undertaken to identify the
rapidly evolving and changing requirements of the major actors for the
security of information systems. Member States of the Community have
identified the requirements for harmonization of national activities
(especially of the "IT security evaluation criteria"). Uniform
evaluation criteria and rules for mutual recognition of evaluation
certification are of major importance.

Requirements, options and priorities

As a basis for a consistent and transparent treatment of the justified
needs of the sector actors, it is considered necessary to develop an
agreed classification of user requirements and its relation to the
provision of security in information systems.

It is also considered important to identify requirements for
legislation, regulations and codes of practice in the light of an
assessment of trends in service characteristics and technology, to
identify alternative strategies for meeting the objectives by
administrative, service, operational and technical provisions, and to
assess the effectiveness, user friendliness and costs of alternative
security options and strategies for information systems for users,
service providers and operators.

Action Line III - Solutions for immediate and interim needs of users,
suppliers and service providers

Issues

At present it is possible to protect adequately computers from
unauthorized access from the outside world by "isolation", i.e. by
supplying conventional organizational and physical measures. This
applies also to electronic communications within closed user group
operating on a dedicated network. The situation is very different if
the information is shared between user groups or exchanged via a
public, or generally accessible, network. Neither the technology,
terminals and services nor the related standards and procedures are
generally available to provide comparable security for information
systems in these cases.

Objectives

The objective has to be to provide, at short notice, solutions which
can respond to the most urgent needs of users, service providers and
manufacturers. This includes the use of common IT-security evaluation
criteria. These should be conceived as open towards future requirements
and solutions.

Status and trends

Some user groups have developed techniques and procedures for their
specific use responding, in particular, to the need for authentication,
integrity and non-repudiation. In general, magnetic cards or smart
cards are being used. Some are using more or less sophisticated
cryptographic techniques. Often this implied the definition of
user-group specific "authorities". However, it is difficult to
generalise these techniques and methods to meet the needs of an open
environment.

ISO is working on OSI Information System Security (ISO DIS 7498-2) and
CCITT in the context of X400. It is also possible to insert security
segments into the messages. Authentication, integrity and
non-repudiation are being addressed as part of the messages (EDIFACT)
as well as part of the X400 MHS.

At present, the Electronic Data Interchange (EDI) legal framework is
still at the stage of conception. The International Chamber of Commerce
has published uniform rules of conduct for the exchange of commercial
data via telecommunications networks.

Several countries (e.g. Germany, France, the United Kingdom and the
United States) have developed, or are developing, criteria to evaluate
the trustworthiness of IT and telecommunication products and systems
and the corresponding procedures for conducting evaluations. These
criteria have been coordinated with the national manufacturers and will
lead to an increasing number of reliable products and systems starting
with simple products. The establishment of national organizations which
will conduct evaluations and offer certificates will support this
trend.

Confidentiality provision is considered by most users as less
immediately important. In the future, however, this situation is likely
to change as advanced communication services and, in particular, mobile
services will have become all-pervasive.

Requirements, options and priorities

It is essential to develop as soon as possible the procedures,
standards, products and tools suited to assure security both in
information systems as such (computers, peripherals) and in public
communications networks. A high priority should be given to
authentication, integrity and non-repudiation. Pilot projects should be
carried out to establish the validity of the proposed solutions.
Solutions to priority needs on EDI are looked at in the TEDIS programme
within the more general content of this action plan.

Action line IV - Development of specifications, standardization,
evaluation and certification in respect of the security of information
systems

Issues

Requirements for the security of information systems are pervasive and
as such common specifications and standards are crucial. The absence of
agreed standards and specifications for IT security may present a major
barrier to the advance of information-based processes and services
throughout the economy and society. Actions are also required to
accelerate the development and use of technology and standards in
several related communication and computer network areas that are of
critical importance to users, industry and administrations.

Objective

Efforts are required to provide a means of supporting and performing
specific security functions in the general areas of OSI, ONP, ISDN/IBC
and network management. Inherently related to standardization and
specification are the techniques and approaches required for
verification, including certification leading to mutual recognition.
Where possible, internationally agreed solutions are to be supported.
The development and use of computer systems with security functions
should also be encouraged.

Status and trends

The United States, in particular, has taken major initiatives to
address the security of information systems. In Europe the subject is
treated in the context of IT and telecommunications standardization in
the context of ETSI and CEN/CENELEC in preparation of CCITT and ISO
work in the field.

In view of growing concern, the work in the United States is rapidly
intensifying and both vendors and service providers are increasing
their efforts in this area In Europe, France, Germany and the United
Kingdom have independently started similar activities, but a common
effort corresponding to the United States is evolving only slowly.

Requirements, options and priorities

In the security of information systems there is inherently a very close
relationship between regulatory, operational, administrative and
technical aspects. Regulations need to be reflected in standards, and
provisions for the security of information systems need to comply in a
verifiable manner to the standards and regulations. In several aspects,
regulations require specifications which go beyond the conventional
scope of standardization, i.e. include codes of practice. Requirements
for standards and codes of practice are present in all areas of
security of information systems, and a distinction has to be made
between the protection requirements which correspond to the security
objectives and some of the technical requirements which can be
entrusted to the competent European standards bodies (CEN/CENELEC/
ETSI).

Specifications and standards must cover the subjects of security
services of information systems (personal and enterprise
authentication, non-repudiation protocols, legally acceptable
electronic proof, authorisation control), their communication services
(image communication privacy, mobile communications voice and data
privacy, data and image data-base protection, integrated services
security), their communication and security management (public/private
key system for open network operation, network management protection,
service provider protection) and their certification (assurance
criteria and levels, security assurance procedures for secure
information systems).

Action line V - Technological and operational developments in the
security of information systems

Issues

Systematic investigation and development of the technology to permit
economically viable and operationally satisfactory solutions to a range
of present and future requirements for the security of information
systems is a prerequisite for the development of the services market
and the competitiveness of the European economy as a whole.

Any technological developments in the security of information systems
will have to include both the aspects of computer security and security
of communications as most present-day systems are distributed systems,
and access to such systems is through communications services.

Objective

Systematic investigation and development of the technology to permit
economically viable and operationally satisfactory solutions to a range
of present and future requirements for the security of information
systems.

Requirements, options and priorities

Work on security of information systems would need to address
development and implementation strategies, technologies, and
integration and verification.

The strategic R&D work would have to cover conceptual models for secure
systems (secure against compromise, unauthorized modifications and
denial of service), functional requirements models, risk models and
architectures for security.

The technology-oriented R&D work would have to include user and message
authentication (e.g. through voice-analysis and electronic signatures),
technical interfaces and protocols for encryption, access control
mechanisms and implementation methods for provable secure systems.

Verification and validation of the security of the technical system and
its applicability would be investigated through integration and
verification projects.

In addition to the consolidation and development of security
technology, a number of accompanying measures are required concerned
with the creation, maintenance and consistent application of standards,
and the validation and certification of IT and telecommunication
products with respect to their security properties, including
validation and certification of methods to design and implement
systems.

The third RD&T Community Framework Programme might be used to foster
cooperative projects at precompetitive and prenormative levels.

Action line VI - Provision of security of information systems

Issues

Depending on the exact nature of the security features of information
systems, the required functions will need to be incorporated at
different parts of the information system including
terminals/computers, services, network management to cryptographic
devices, smart cards, public and private keys, etc. Some of these can
be expected to be embedded in the hardware or software provided by
vendors, while others may be part of distributed systems (e.g. network
management), in the possession of the individual user (e.g. smart
cards) or provided from a specialised organization (e. g.
public/private keys).

Most of the security products and services can be expected to be
provided by vendors, service providers or operators. For specific
functions, e.g. the provision of public/private keys, auditing
authorization, there may be the need to identify and mandate
appropriate organizations.

The same applies for certification, evaluation and verification of
quality of service which are functions which need to be addressed by
organizations independent of the interests of vendors, service
providers or operators. These organizations could be private,
governmental or licensed by government to perform delegated functions.

Objective

In order to facilitate a harmonious development of the provision of
security of information systems in the Community for the protection of
the public and of business interests, it will be necessary to develop a
consistent approach as to its provision of security. Where independent
organizations will have to be mandated, their functions and conditions
will need to be defined and agreed and, where required, embedded into
the regulatory framework. The objective would be to come to a clearly
defined and agreed sharing of responsibilities between the different
actors on a Community level as a prerequisite for mutual recognition.

Status and trends

At present, the provision of security of information systems is well
organized only for specific areas and limited to addressing their
specific needs. The organization on a European level is mostly
informal, and mutual recognition of verification and certification is
not yet established outside closed groups. With the growing importance
of the security of information systems, the need for defining a
consistent approach to the provision of security for information
systems in Europe and internationally is becoming urgent.

Requirements, options and priorities

Because of the number of different actors concerned and the close
relations to regulatory and legislative questions, it is particularly
important to pre-agree on the principles which should govern the
provision of the security of information systems.

In developing a consistent approach to this question, one will need to
address the aspects of identification and specification of functions
requiring, by their very nature, the availability of some independent
organizations (or interworking organizations). This could include
functions such as the administration of a public/private key system.

In addition, it is required to identify and specify, at an early stage,
the functions which in the public interest need to be entrusted to
independent organizations (or interworking organizations). This could,
for example, include auditing, quality assurance, verification,
certification and similar functions.


OJ No L 123, 8.5.1992, p.19

SOG-IS Opinion of 17.11.92 on objectives, scope and approach

Information Security is concerned with the protection of
information stored, processed or transmitted in electronic
form, against deliberate or accidental threats.

Information is acquired, communicated, processed and stored by
Information Services.  Electronic Information services need a
secure telecommunication infrastructure, secure terminals
(including processors and data bases) as well as secure usage.
The management of the service provision itself must also and
foremost be secure.  Therefore the approach to information
security starts form an analysis of the needs of an individual
or organisation for Information Services.  92/242/EEC

This danger has already been identified and OECD Member
Countries have, in the context of Protection of Privacy and
Transborder Data Flow of Personal Data, recognised the risk of
new technical barriers forming.  They have therefore agreed to
endeavour to remove and to avoid to create in the name of
privacy protection, unjustified obstacles to transborder flows
of personal data, co-operate in the implementation of the
Guidelines and agree as soon as possible on specific procedures
of consultation and co-operation for the application of these
Guidelines.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
What do you call the main box of the computer?
Comp keeps freezing after bootup :(
Essential Programs Thread
Your tech related job
32-bit OS on 64-bit computer
Split Hard Drive???
computer crashed
Intel's Q6600
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS