Skip to:Content
|
Bottom
Cover image for PKI security solutions for the enterprise :  solving HIPAA, e-paper act, and other compliance issues
Title:
PKI security solutions for the enterprise : solving HIPAA, e-paper act, and other compliance issues
Personal Author:
Publication Information:
Indianapolis, Ind. : Wiley Publishing, 2003
ISBN:
9780471315292

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010059074 QA76.9.A25 R34 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Outlines cost-effective, bottom-line solutions that show how companies can protect transactions over the Internet using PKI First book to explain how PKI (Public Key Infrastructure) is used by companies to comply with the HIPAA (Health Insurance Portability and Accountability Act) rules mandated by the U.S. Department of Labor, Health, and Human Services Illustrates how to use PKI for important business solutions with the help of detailed case studies in health care, financial, government, and consumer industries


Author Notes

KAPIL RAINA is a security professional who advises on marketing strategies for technology-related products and services. With many years of technical and business experience in the computer security field, Raina has held key positions at leading companies such as VeriSign and consulted to international companies such as British Telecom. Raina is a prolific author and speaker making contributions on topics such as mCommerce Security and Biometrics. He holds the CISSP security certification from ISC2, an internationally recognized organization for security professionals.


Table of Contents

Acknowledgmentsp. xv
Introductionp. xvii
Part 1 Trust Basics: Ins and Outs of PKIp. 1
Chapter 1 What Is Trust?p. 3
Trust in the Digital Worldp. 3
Defining Trustp. 4
Implementing Trustp. 5
Trust Policiesp. 6
Privacyp. 6
Proper Use of Informationp. 6
Recourse in the Event of Breach of Trustp. 7
Continuity of Trustp. 8
User Consentp. 8
Trust Infrastructurep. 8
Physical Layerp. 9
System Layerp. 10
Application Layerp. 11
Trust Affiliationsp. 12
Legal Issues with Trust in the Electronic Worldp. 14
Binding Trust with the Lawp. 14
P3Pp. 15
Digital Trust Solutionsp. 16
Summary: The Need for Solutionsp. 17
Chapter 2 Complexities of PKIp. 19
PKI: A Basis for Digital Trustp. 19
Why Is PKI So Complicated?p. 20
Security Issuesp. 21
Privacyp. 22
Authenticationp. 23
Integrityp. 24
Authorizationp. 25
Nonrepudiationp. 26
Applications of PKIp. 27
XKMSp. 29
PKI Functionsp. 29
Certificate Authorityp. 30
Cross-Certificationp. 32
Registration Authorityp. 33
End-entityp. 35
Types of Certificatesp. 35
Implementation Issuesp. 37
Setupp. 37
Back-end Setupp. 38
User Setup and Registrationp. 38
Certificate Policy and Certificate Practice Statement (CPS)p. 39
Administrationp. 39
Renewalp. 40
Searchp. 40
Exception Handlingp. 41
Revocationp. 41
Escrowp. 42
Audiencep. 43
Time Allotted for Rolloutp. 43
Expertise Availablep. 44
Funds Availablep. 44
Integration Issuesp. 44
Integration with Applicationsp. 45
Integration with Tthird-Party Datap. 45
Integration with Stronger Authentication Optionsp. 46
Integration with Legacy Systemsp. 46
Integration with Single Interfacep. 47
Costp. 47
Summary: Best Practices to Reduce Complexityp. 49
Chapter 3 Best Practices of PKIp. 51
Insource versus Outsource Factorsp. 51
Public and Private Hierarchiesp. 52
Control and Flexibilityp. 54
Cost and Deployment Timep. 54
Vendor and Technology Selectionp. 55
Determining the Selection Criteriap. 55
Financial Strengthp. 56
Scalabilityp. 56
Securityp. 57
Operationsp. 57
Supportp. 58
Consulting Strengthp. 59
Vendor Vetting: How to Ask the Right Questionsp. 60
Executive Summaryp. 60
Introductionp. 60
Scope of the Projectp. 61
Project Organization and Managementp. 62
Security Architecturep. 62
Security Policyp. 62
Standards and Security Design Guidelinesp. 63
Operational Guidelinesp. 64
Auditp. 64
Security Awareness and Trainingp. 65
Consultant Profilesp. 65
Project Referencesp. 66
Designp. 66
Elements of a PKI Infrastructurep. 66
CA Hardware and Software Architecturep. 66
User Setup/Registration Definitionsp. 67
Legal Policy Developmentp. 67
RA Agreementp. 69
RA-End-Entity Agreementp. 69
Subscriber-End-Entity Agreementp. 69
Best Practices for PKI Selectionp. 70
Personnelp. 70
Secure Infrastructurep. 70
Legal Aspectsp. 71
Deployment Time Framep. 71
Costsp. 72
Implementationp. 72
Project Managementp. 73
Resources Neededp. 73
Timelinesp. 74
Summary: Choosing the Right Partnerp. 80
Chapter 4 Selling PKIp. 81
ROI on PKI, ASAPp. 81
Reactive versus Proactive Selling Modelsp. 82
Success Criteriap. 83
Implementation ROIp. 84
Creating ROI Modelsp. 85
Cost Savings per Transactionp. 86
Reduced Processing Time per Transactionp. 88
New Servicesp. 90
Reduced Exposure Modelp. 92
Regulation Compliance Modelp. 93
Nonfinancial Benefitsp. 94
FUDp. 94
Industry Peer Comparisonp. 94
Vulnerability Assessmentp. 95
Internal Surveysp. 96
Conveniencep. 97
Case Study: Anatomy of a PKI Salep. 98
The Prospectp. 98
The Pitchp. 98
The Closingp. 98
The Paymentp. 98
The Deliveryp. 99
Summary: It's All about the ROIp. 99
Part 2 Solutions for Trustp. 101
Chapter 5 Healthcare Solutionsp. 103
HIPAAp. 103
PKI as a Solution to HIPAAp. 109
Biometrics and HIPAAp. 111
Biometrics Overviewp. 111
Hospitals, Doctors, and Managed Carep. 116
Unique Security Requirementsp. 116
Doctors' Requirementsp. 116
Hospital Characteristicsp. 118
Managed Carep. 118
Cost and Other Factorsp. 119
Who Pays?p. 120
Summary: The Healthcare Prognosisp. 123
Chapter 6 Financial Solutionsp. 125
Financial Sectorp. 125
Consumerp. 125
Commercialp. 126
Legal Driversp. 127
The Gramm-Leach-Bliley Actp. 127
Privacyp. 128
Securityp. 129
Assessment of Riskp. 130
Control of Riskp. 130
Supervision of Service Provider Arrangementsp. 131
Revisions of Guidelinesp. 131
Reporting to the Boardp. 131
Secure Wireless Communications under GLBAp. 132
Fair Credit Reporting Actp. 132
Electronic Fund Transferp. 133
OnLine Mortgage and Loan Applicationsp. 134
Identrusp. 138
What Is Identrus?p. 138
Need for Identrusp. 138
Architecturep. 139
Applicationsp. 142
Future of Identrusp. 142
Identrus Alternativesp. 142
Global Trust Authorityp. 143
ABAecomp. 144
EMV Solutionsp. 144
EU Directivesp. 146
Directive 1999/93/ECp. 147
Directive 2000/31/ECp. 148
Safe Harbor Agreementp. 148
What Do All These Standards Mean for Me?p. 150
Summary: Money Talksp. 151
Chapter 7 Government Solutionsp. 153
Types of Government Solutionsp. 153
National Identity Projectsp. 154
Technology Challengesp. 155
The Trust Factorp. 156
Citizen Identification Devicep. 157
Terminal Readersp. 158
Government Regulationsp. 158
E-government projectsp. 158
U.S. Government Initiativesp. 159
Common Access Cardp. 160
ACESp. 163
Legal Driversp. 166
Paperwork Reduction Act (E-Paper Act)p. 166
Privacy Actp. 166
Federal Agency Protection of Privacy Actp. 167
Government Paperwork Elimination Actp. 167
Electronic Signatures in Global and National Commerce (E-Sign) Actp. 169
Federal Bridge Certification Authorityp. 170
Meaning of Assurancep. 171
International Effortsp. 173
Australiap. 173
United Kingdomp. 175
Indiap. 176
Summary: Citizen Certificatep. 178
Chapter 8 Communications Solutionsp. 179
Secure Messagingp. 179
Methods of Secure Communicationsp. 180
Encryption Point-to Pointp. 180
Encryption with Insecure Pickupp. 182
Encryption with Secure Pickupp. 183
Instant Messagingp. 184
Peer to Peerp. 185
Guaranteed Deliveryp. 186
Secure Drop-off and Pickup Modelp. 187
Private Internet Networkp. 187
Content Managementp. 188
Policy Methodsp. 189
Secured Deliveryp. 191
Encapsulationp. 191
Secure Spacep. 192
Time Stampingp. 192
SSL: The Old Standbyp. 194
Challenges with SSLp. 194
Deployment Strategiesp. 196
Dedicated SSLp. 196
Shared SSLp. 197
Server Appliance Modelp. 197
Alternative Approach: OpenSSLp. 198
Code Signingp. 198
Summary: Speaking Digitallyp. 200
Chapter 9 Other Solutionsp. 201
Virtual Private Networksp. 201
What Is a VPN?p. 201
Why Do We Need Them?p. 202
Pros of VPNsp. 203
Cons of VPNsp. 203
How Do They Work?p. 203
Internet Key Exchangep. 205
Alternatives to IPSec VPNs?p. 207
Smart Cardsp. 209
Novell Architecturep. 210
Token FOBp. 211
Kerberosp. 212
Took Kitsp. 214
Microsoftp. 214
Xetexp. 214
Broadbandp. 214
DOCSISp. 216
PacketCablep. 220
CableHomep. 221
OpenCablep. 222
Euro-DOCSISp. 223
PKI on a Chipp. 224
Integrated Security Chipp. 224
User Verification Managerp. 224
PKI Standards Supportp. 225
Administrator Utilityp. 225
File and Folder Protectionp. 225
(VPN) Authenticationp. 226
Intel's Solutionp. 226
Other Applicationsp. 227
X-Bulkp. 227
Printersp. 228
Summary: PKI Is Far and Widep. 229
Part 3 Trust Solutions Guidep. 231
Chapter 10 Overview of Trust Solutionsp. 233
Consultant's Cornerp. 233
Challengesp. 234
It's the Law!p. 234
Staying Currentp. 235
Guide to Commercial Solutions by Categoryp. 235
VPN Solutionsp. 235
Checkpointp. 237
Nokiap. 237
Netscreenp. 237
SonicWallp. 237
Biometric Solutionsp. 238
Device Vendorsp. 238
Middleware Vendorsp. 239
Form-Signing Solutionsp. 239
Stand-Alone Form Signingp. 240
Hybridp. 241
Core Technologyp. 242
Secure Messagingp. 243
Solutions with End-User Clientsp. 244
Solutions without End-User Clientsp. 244
Miscellaneous Solutionsp. 245
Secure Wireless Solutionsp. 246
Certicomp. 247
Openwavep. 247
Diversinetp. 247
Single Sign-On Solutionsp. 247
Integrated Solutionsp. 249
Hybrid Solutionsp. 250
Content Management Solutionsp. 251
Probixp. 252
Alchemediap. 252
Web Serversp. 253
Software Web Serversp. 254
Hardware (Appliance) Web Serversp. 255
Smart Cardsp. 256
Gemplusp. 257
Schlumbergerp. 257
Data Storage Protectionp. 257
Brocadep. 257
Veritasp. 258
Web Portalsp. 259
Plumtreep. 259
Hummingbirdp. 259
B2Bp. 259
Cyclone Commercep. 260
webMethodsp. 260
SETp. 260
IBMp. 260
VeriFonep. 261
Summary: The Answer Is ... Solutions!p. 261
Chapter 11 The Future of PKIp. 263
The Future of Mobile Security in PKIp. 264
Mobile VPNsp. 265
Lessening the Painp. 266
Trends in Integrationp. 266
Solution Buildingp. 267
Consolidation of the Security Marketp. 267
Survey of the Security Marketp. 268
Encryptionp. 268
Authenticationp. 269
Authorizationp. 271
Administrationp. 271
Firewalls and VPNsp. 272
Operational Integrityp. 273
Only the Strong Will Survivep. 274
One-Stop Shoppingp. 274
PKI Is Only Part of the Solutionp. 276
Need for Good Security Policiesp. 277
Strong Audit Capabilityp. 278
Good Physical Securityp. 278
Summary: The Growth of PKIp. 279
Appendixp. 281
Indexp. 289
Go to:Top of Page