Trust also extends to organisations,
devices, and applications that are
permitted to perform certain functions,
where identity assurance, security and
privacy are paramount. It is also important
with internet of things widgets.
In Estonia, you can get a government-
issued electronic identity (eID) card, in
the form of a National ID/residency card,
digital ID card, or mobile-ID SIM, each of
which have two digital certificates (one
for authentication and another for digital
signature) to access government and
commercial services, and sign documents.
In the UK, you can use some private
companies to go through various
processes to prove your identity and get a
GOV.UK Verify login to a restricted number
of UK government websites. This approach
will naturally limit the use and usefulness
of this identity scheme, which appears to
be little more than a gov.uk login.
A lot of issues stem from the failed
approach to introduce a national ID card
that was citizen-, rather than government-
centric. Without a consistent trust anchor,
and associated liability model, we are
unlikely to get the rich integration available
in other places. Electronic ID needs both
confidence and convenience.
Over the coming year, EU countries
must prepare to meet eIDAS regulation
to support cross-border electronic
identification and trust services. Federation
of eID is the natural way to go and some
countries will be better positioned for it,
INFORMATION SECURITY
and have a competitive advantage over
those still figuring things out.
Identity management as a service for
cloud will need trust frameworks and APIs,
ensuring robust enrolment, and supporting
federated authentication with appropriate
levels of assurance. There will be many
components that have to work end-to-end
and be considered at an early stage in the
design process.
Identity is at the root of who we are as individuals when it comes to
matters of trust, says Gareth Niblett, Chair of the BCS Information
Security Specialist Group.
Information Security Specialist
Group (ISSG):
www.bcs-issg.org.uk
Information Risk Management and
Assurance Specialist Group:
www.bcs.org/groups/irma
BCS Security Community of
Expertise (SCoE):
www.bcs.org/securitycommunity
FURTHER INFORMATION
doi:10.1093/itnow/bwv066©2015TheBritishComputerSocietyImage:Thinkstock
IDENTITY
September 2015 ITNOW 23

More Related Content

PDF
Open Identity Exchange - the Global Growth of Digital Identity
PPT
Mature Digital Trust Infrastructure - Are we there yet?
PDF
Inside Security - Strong Authentication with Smartphones
PDF
Kantara - Digital Identity in 2018
PDF
Building trust attributes in e transactions (final) ver 3.0
PPT
The Hong Kong Public Key Infrastruture 2010
PPT
Re-using existing PKIs for online Identity Management
PDF
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Open Identity Exchange - the Global Growth of Digital Identity
Mature Digital Trust Infrastructure - Are we there yet?
Inside Security - Strong Authentication with Smartphones
Kantara - Digital Identity in 2018
Building trust attributes in e transactions (final) ver 3.0
The Hong Kong Public Key Infrastruture 2010
Re-using existing PKIs for online Identity Management
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...

What's hot (18)

PDF
E-Signature Webcast for Financial Services Legal Counsel (Slides)
PPTX
e-Signatures Summit for Insurance Executives
PDF
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
PDF
Belgian mobile ID presents itsme
PPTX
National identity schemes - digital identity - national ID - eGovernment
PPTX
Presentation on e signature
PPTX
Blockchain
PPTX
Blockchain Development Technology
PPT
E-Signature in Document Management - Megan Smale
PDF
Belgian Mobile ID: taking digital ID to another level
PPTX
ESRA IRS Briefing 20150519
PDF
Identity management in government, mr. iurie turcanu
PDF
Kantara - Consent & Information Sharing WG Update
PPTX
Privacy, Policy, and Encryption
PDF
Case Study: Frontier Communications
PPTX
Iiw east openidentityforopengovfinal
PDF
INTERFACE by apidays_Beyond Consent : It’s Time to Democratize Data Control b...
PDF
Identity in the Internet Age
E-Signature Webcast for Financial Services Legal Counsel (Slides)
e-Signatures Summit for Insurance Executives
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
Belgian mobile ID presents itsme
National identity schemes - digital identity - national ID - eGovernment
Presentation on e signature
Blockchain
Blockchain Development Technology
E-Signature in Document Management - Megan Smale
Belgian Mobile ID: taking digital ID to another level
ESRA IRS Briefing 20150519
Identity management in government, mr. iurie turcanu
Kantara - Consent & Information Sharing WG Update
Privacy, Policy, and Encryption
Case Study: Frontier Communications
Iiw east openidentityforopengovfinal
INTERFACE by apidays_Beyond Consent : It’s Time to Democratize Data Control b...
Identity in the Internet Age
Ad

Viewers also liked (18)

PDF
Handout 1: Usability Test Examples
PPTX
Proyecto de Acuerdo para el dia del Motociclista en Bogota
PPS
V8000 wlop
PPT
Conejozor[1]
PPS
Muere lentamente
PDF
BrandonFessler-Recommendation
PPT
Cabeza, Hombro, Rodilla, Pie #2
PPT
La Mujer
PDF
Foro - Expomoto Bogotá 2013
PDF
Calendário ensino infantil creche - 3
DOCX
**N494 Resume Final**
PPS
Veículos Elétricos Multiusos - Via Elétrika
PDF
Cadre Training Course_opt
PPTX
Alvaro ossamonrroy actividad1 2mapac.pdf
DOC
Anexo III Baremo Acceso Destino 04 09
PDF
Conférence Lucanet France
PDF
moodboard Erika Z II
PDF
IDCC 1790 Adhésion volontaire SNDLL avenant 52
Handout 1: Usability Test Examples
Proyecto de Acuerdo para el dia del Motociclista en Bogota
V8000 wlop
Conejozor[1]
Muere lentamente
BrandonFessler-Recommendation
Cabeza, Hombro, Rodilla, Pie #2
La Mujer
Foro - Expomoto Bogotá 2013
Calendário ensino infantil creche - 3
**N494 Resume Final**
Veículos Elétricos Multiusos - Via Elétrika
Cadre Training Course_opt
Alvaro ossamonrroy actividad1 2mapac.pdf
Anexo III Baremo Acceso Destino 04 09
Conférence Lucanet France
moodboard Erika Z II
IDCC 1790 Adhésion volontaire SNDLL avenant 52
Ad

Similar to BCS ITNow 201509 - Identity (20)

DOCX
Why Identity Verification Services Are Crucial for Digital Security in 2024.docx
PDF
Future of digital identity initial perspective - final lr
PDF
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
PDF
A digital society needs a digital id
PPTX
Consumer identity @ Tuesday Update on 1 December 2009
PPTX
5 nov gsma_eema
PDF
The Essence of Online ID Verification for Enhanced User Authentication.pdf
PPTX
eIDAS Reference Guide
PDF
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
PDF
Identity progress-linked-digital-world
PDF
The 10 most trusted authentication solution providers of 2021
PDF
Frequently Asked Questions on eKYC For Remote Platforms.pdf
PDF
Mulin Holstein PKI-strategy
PDF
Future of digital identity Programme summary - 15 dec 2018 lr
PDF
FIDO, Strong Authentication and elD in Germany
PDF
Govt authentication brief ca v
PDF
The Importance of Electronic Identities in the Digital Era
PDF
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
PDF
Australia postdigital id integrationissofamousnow,but how
DOCX
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Why Identity Verification Services Are Crucial for Digital Security in 2024.docx
Future of digital identity initial perspective - final lr
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
A digital society needs a digital id
Consumer identity @ Tuesday Update on 1 December 2009
5 nov gsma_eema
The Essence of Online ID Verification for Enhanced User Authentication.pdf
eIDAS Reference Guide
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Identity progress-linked-digital-world
The 10 most trusted authentication solution providers of 2021
Frequently Asked Questions on eKYC For Remote Platforms.pdf
Mulin Holstein PKI-strategy
Future of digital identity Programme summary - 15 dec 2018 lr
FIDO, Strong Authentication and elD in Germany
Govt authentication brief ca v
The Importance of Electronic Identities in the Digital Era
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
Australia postdigital id integrationissofamousnow,but how
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION

More from Gareth Niblett (16)

PDF
Preventing Predictable Problems (Possibly)
PDF
BCS ITNow 201609 - Defining the Latest Threats
PDF
BCS ITNow 201606 - Insider Threats
PDF
BCS ITNow 201603 - Cyber Response
PDF
BCS ITNow 201303 - Cope, Educate, Secure
PDF
BCS ITNow 201306 - Share Securely
PDF
BCS ITNow 201309 - Holistic Security
PDF
BCS ITNow 201312 - 2014 Threats
PDF
BCS ITNow 201403 - Data Loss Prevention
PDF
BCS ITNow 201406 - The Risk Business
PDF
BCS ITNow 201409 - What's Going On
PDF
BCS ITNow 201412 - Stay Alert
PDF
BCS ITNow 201506 - Silver Bullet
PDF
BCS ITNow 201512 - Cyber Innovation
PDF
Why the Private Sector is Key to Cyber Defence
PDF
RIPA: Perception and Practice
Preventing Predictable Problems (Possibly)
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201606 - Insider Threats
BCS ITNow 201603 - Cyber Response
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201306 - Share Securely
BCS ITNow 201309 - Holistic Security
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201406 - The Risk Business
BCS ITNow 201409 - What's Going On
BCS ITNow 201412 - Stay Alert
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201512 - Cyber Innovation
Why the Private Sector is Key to Cyber Defence
RIPA: Perception and Practice

Recently uploaded (20)

PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPT
12 Things That Make People Trust a Website Instantly
PPTX
Internet Safety for Seniors presentation
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PPTX
Reading as a good Form of Recreation
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PDF
Course Overview and Agenda cloud security
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Alethe Consulting Corporate Profile and Solution Aproach
MY PRESENTATION66666666666666666666.pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
250152213-Excitation-SystemWERRT (1).ppt
Containerization lab dddddddddddddddmanual.pdf
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
12 Things That Make People Trust a Website Instantly
Internet Safety for Seniors presentation
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Reading as a good Form of Recreation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Viva Digitally Software-Defined Wide Area Network.pptx
Course Overview and Agenda cloud security
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf

BCS ITNow 201509 - Identity

  • 1. Trust also extends to organisations, devices, and applications that are permitted to perform certain functions, where identity assurance, security and privacy are paramount. It is also important with internet of things widgets. In Estonia, you can get a government- issued electronic identity (eID) card, in the form of a National ID/residency card, digital ID card, or mobile-ID SIM, each of which have two digital certificates (one for authentication and another for digital signature) to access government and commercial services, and sign documents. In the UK, you can use some private companies to go through various processes to prove your identity and get a GOV.UK Verify login to a restricted number of UK government websites. This approach will naturally limit the use and usefulness of this identity scheme, which appears to be little more than a gov.uk login. A lot of issues stem from the failed approach to introduce a national ID card that was citizen-, rather than government- centric. Without a consistent trust anchor, and associated liability model, we are unlikely to get the rich integration available in other places. Electronic ID needs both confidence and convenience. Over the coming year, EU countries must prepare to meet eIDAS regulation to support cross-border electronic identification and trust services. Federation of eID is the natural way to go and some countries will be better positioned for it, INFORMATION SECURITY and have a competitive advantage over those still figuring things out. Identity management as a service for cloud will need trust frameworks and APIs, ensuring robust enrolment, and supporting federated authentication with appropriate levels of assurance. There will be many components that have to work end-to-end and be considered at an early stage in the design process. Identity is at the root of who we are as individuals when it comes to matters of trust, says Gareth Niblett, Chair of the BCS Information Security Specialist Group. Information Security Specialist Group (ISSG): www.bcs-issg.org.uk Information Risk Management and Assurance Specialist Group: www.bcs.org/groups/irma BCS Security Community of Expertise (SCoE): www.bcs.org/securitycommunity FURTHER INFORMATION doi:10.1093/itnow/bwv066©2015TheBritishComputerSocietyImage:Thinkstock IDENTITY September 2015 ITNOW 23