SlideShare una empresa de Scribd logo
1 de 11
THE ROAD TOWARDS NATIONAL CA



By Sylvia W Sumarlin, Chairlady of FTII
Bali, 16 January 2013
                                         2013 International Seminar of Cyber Law:
                         GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
I T INDUSTRIES ROLE SUPPORTING SAFE CYBER
  COMMUNICATION, TRANSACTION AND IDENTITY
Existing Condition
• Each individual, corporation government institution
  seek their own security system and method
• Most of them use commercial products from
  multinationals security providers.
• Missing national cyber security initiatives  is it
  needed? Necessary?
                                        2013 International Seminar of Cyber Law:
                        GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
IMPLEMENTING BIOMETRIC SYSTEM in INDONESIA
• Are we ready?
• Pre- requisities  Think of how to develop the whole
  equipment logistic chain from manufacturing all the way to
  equipment usage
• Think of how to provide data storage for any or if any existing
  critical national/public or individual’s information
• Preparing the national infrastucture


HIGH DEGREE OF COMPLEXITY
                                             2013 International Seminar of Cyber Law:
                             GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
I.T. INDUSTRY CONTRIBUTIONS
• Road map of Biometrics implementation
• Lead sector  LEMSANEG ( Lembaga Sandi Negara)
• Industry’s planning from component preparation,
  design architecture/platform, research and
  development to conform with national
  implementation
• The truth : commercial/business community needs
  for security always in demand. Cannot wait for
  regulation.                       2013 International Seminar of Cyber Law:
                                  GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
SECURITIES INDUSTRY IS RELATED DIRECTLY TO
MANUFACTURING
• Formal logistical support plan
• Provide quality and timely support for the field support
  engineers to conduct repair and replacement of Biometric
  equipments
• Hardware and Firmware should be reliable. It shoud be
  tamper resistant.
SO FAR, WE ONLY TALKED ABOUT MINORITY ISSUE OF
EQUIPMENT MANUFACTURING
                              2013 International Seminar of Cyber Law:
                       GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
SECURITY and NATIONAL SOVEREIGNTY

• Borderless world in the cyberworld
• According to Mastel ( Infocom Society in Indonesia ), the size
  of internet users reached 55.23 million people, the internet
  penetration still around 18.5%, 3G and CDMA sim card users
  about 200 million
• Demand for electronic transaction is high  currently peple
  are oblivious forward the cyber crime.
• Who to trust?
                                   2013 International Seminar of Cyber Law:
                            GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
CERTIFICATE OF AUTHORITY

• Foreign which are proven and widely used
• Versus : National CA which are designated for its own citizen
• Benefits Vs Disadvantages? What to do in the absence of
  national CA?
  Private CA for public interest




                                   2013 International Seminar of Cyber Law:
                            GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
PP 82 / 2012 – PSTE

• “E-public services must have a minimum
  qualification to have trusted sertification
  based on the I T governance perspective”
• Qualification hardware/firmware, application,
  services etc...

                             2013 International Seminar of Cyber Law:
                      GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
MANUFACTURER, SERVICE PROVIDER and
 PUBLIC’s DREAM
• To have a solid and reliable platform
• Co-operation between goverment, services and
  manufacturing sectors developing Certificate of Authority
• Each sector is represented by its institution / association
• Local content to enhance security and economic growth
• Joint research and development in providing technology, lab
  facilities, etc

                                  2013 International Seminar of Cyber Law:
                           GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
PUTTING TOGETHER A BIG PUZZLE

• Committment
• Dare to conduct public testing
• ....



                            2013 International Seminar of Cyber Law:
                     GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
CONCLUSION

 The need for having a CA in Indonesia is
 certainly unavoidable. A strong support from
 LEMSANEG to assist the development of CA
 together with Local IT expertise will create a
 strong platform for a secured electronic
 transaction for public and private use.
                           2013 International Seminar of Cyber Law:
                    GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION

Más contenido relacionado

La actualidad más candente

IoT - the internet evolution
IoT - the internet evolutionIoT - the internet evolution
IoT - the internet evolutionPrateek T.C
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyBettShow
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAmmar
 
OTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitOTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitSigit Puspito Wigati Jarot
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsQian JIN
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 

La actualidad más candente (18)

Internet Of EveryThing
Internet Of EveryThingInternet Of EveryThing
Internet Of EveryThing
 
IoT - the internet evolution
IoT - the internet evolutionIoT - the internet evolution
IoT - the internet evolution
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
OTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigitOTT regulator's perspective - APECTEL-wG 51 - sigit
OTT regulator's perspective - APECTEL-wG 51 - sigit
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 

Destacado

Technology Transfer from Patent Document
Technology Transfer from Patent DocumentTechnology Transfer from Patent Document
Technology Transfer from Patent DocumentKaruna Chinthanom
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Психосоматика: как понять, о чем говорит симптом?
Психосоматика: как понять, о чем говорит симптом?Психосоматика: как понять, о чем говорит симптом?
Психосоматика: как понять, о чем говорит симптом?Mary KoySin
 
3 3 2_kodi_familjes_1942_1
3 3 2_kodi_familjes_1942_13 3 2_kodi_familjes_1942_1
3 3 2_kodi_familjes_1942_1ela budini
 
παρουσίαση ιωάννα βάσιλα
παρουσίαση  ιωάννα βάσιλαπαρουσίαση  ιωάννα βάσιλα
παρουσίαση ιωάννα βάσιλα11dimpeir
 
εργασιες σμυρνη 2014
εργασιες σμυρνη 2014εργασιες σμυρνη 2014
εργασιες σμυρνη 201411dimpeir
 
εργασία για τα επτάνησα2
εργασία για τα επτάνησα2εργασία για τα επτάνησα2
εργασία για τα επτάνησα211dimpeir
 
εικαστικες παρεμβασεις 2014
εικαστικες παρεμβασεις 2014εικαστικες παρεμβασεις 2014
εικαστικες παρεμβασεις 201411dimpeir
 
δωδεκανησα ροδος-πατμος
δωδεκανησα ροδος-πατμοςδωδεκανησα ροδος-πατμος
δωδεκανησα ροδος-πατμος11dimpeir
 
μανα, η σμυρνη καιγεται
μανα, η σμυρνη καιγεταιμανα, η σμυρνη καιγεται
μανα, η σμυρνη καιγεται11dimpeir
 

Destacado (13)

Technology Transfer from Patent Document
Technology Transfer from Patent DocumentTechnology Transfer from Patent Document
Technology Transfer from Patent Document
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Психосоматика: как понять, о чем говорит симптом?
Психосоматика: как понять, о чем говорит симптом?Психосоматика: как понять, о чем говорит симптом?
Психосоматика: как понять, о чем говорит симптом?
 
3 3 2_kodi_familjes_1942_1
3 3 2_kodi_familjes_1942_13 3 2_kodi_familjes_1942_1
3 3 2_kodi_familjes_1942_1
 
Optical computing
Optical computingOptical computing
Optical computing
 
Cap13 al
Cap13 alCap13 al
Cap13 al
 
Faust
FaustFaust
Faust
 
παρουσίαση ιωάννα βάσιλα
παρουσίαση  ιωάννα βάσιλαπαρουσίαση  ιωάννα βάσιλα
παρουσίαση ιωάννα βάσιλα
 
εργασιες σμυρνη 2014
εργασιες σμυρνη 2014εργασιες σμυρνη 2014
εργασιες σμυρνη 2014
 
εργασία για τα επτάνησα2
εργασία για τα επτάνησα2εργασία για τα επτάνησα2
εργασία για τα επτάνησα2
 
εικαστικες παρεμβασεις 2014
εικαστικες παρεμβασεις 2014εικαστικες παρεμβασεις 2014
εικαστικες παρεμβασεις 2014
 
δωδεκανησα ροδος-πατμος
δωδεκανησα ροδος-πατμοςδωδεκανησα ροδος-πατμος
δωδεκανησα ροδος-πατμος
 
μανα, η σμυρνη καιγεται
μανα, η σμυρνη καιγεταιμανα, η σμυρνη καιγεται
μανα, η σμυρνη καιγεται
 

Similar a Presentasi ftii intlcyberlaw

Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesSaeed Al Dhaheri
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2Jorge Rivero Sanchez
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 

Similar a Presentasi ftii intlcyberlaw (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 

Presentasi ftii intlcyberlaw

  • 1. THE ROAD TOWARDS NATIONAL CA By Sylvia W Sumarlin, Chairlady of FTII Bali, 16 January 2013 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 2. I T INDUSTRIES ROLE SUPPORTING SAFE CYBER COMMUNICATION, TRANSACTION AND IDENTITY Existing Condition • Each individual, corporation government institution seek their own security system and method • Most of them use commercial products from multinationals security providers. • Missing national cyber security initiatives  is it needed? Necessary? 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 3. IMPLEMENTING BIOMETRIC SYSTEM in INDONESIA • Are we ready? • Pre- requisities  Think of how to develop the whole equipment logistic chain from manufacturing all the way to equipment usage • Think of how to provide data storage for any or if any existing critical national/public or individual’s information • Preparing the national infrastucture HIGH DEGREE OF COMPLEXITY 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 4. I.T. INDUSTRY CONTRIBUTIONS • Road map of Biometrics implementation • Lead sector  LEMSANEG ( Lembaga Sandi Negara) • Industry’s planning from component preparation, design architecture/platform, research and development to conform with national implementation • The truth : commercial/business community needs for security always in demand. Cannot wait for regulation. 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 5. SECURITIES INDUSTRY IS RELATED DIRECTLY TO MANUFACTURING • Formal logistical support plan • Provide quality and timely support for the field support engineers to conduct repair and replacement of Biometric equipments • Hardware and Firmware should be reliable. It shoud be tamper resistant. SO FAR, WE ONLY TALKED ABOUT MINORITY ISSUE OF EQUIPMENT MANUFACTURING 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 6. SECURITY and NATIONAL SOVEREIGNTY • Borderless world in the cyberworld • According to Mastel ( Infocom Society in Indonesia ), the size of internet users reached 55.23 million people, the internet penetration still around 18.5%, 3G and CDMA sim card users about 200 million • Demand for electronic transaction is high  currently peple are oblivious forward the cyber crime. • Who to trust? 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 7. CERTIFICATE OF AUTHORITY • Foreign which are proven and widely used • Versus : National CA which are designated for its own citizen • Benefits Vs Disadvantages? What to do in the absence of national CA? Private CA for public interest 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 8. PP 82 / 2012 – PSTE • “E-public services must have a minimum qualification to have trusted sertification based on the I T governance perspective” • Qualification hardware/firmware, application, services etc... 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 9. MANUFACTURER, SERVICE PROVIDER and PUBLIC’s DREAM • To have a solid and reliable platform • Co-operation between goverment, services and manufacturing sectors developing Certificate of Authority • Each sector is represented by its institution / association • Local content to enhance security and economic growth • Joint research and development in providing technology, lab facilities, etc 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 10. PUTTING TOGETHER A BIG PUZZLE • Committment • Dare to conduct public testing • .... 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION
  • 11. CONCLUSION The need for having a CA in Indonesia is certainly unavoidable. A strong support from LEMSANEG to assist the development of CA together with Local IT expertise will create a strong platform for a secured electronic transaction for public and private use. 2013 International Seminar of Cyber Law: GLOBAL CHALLENGES TO NATIONAL E-AUTHENTIFICATION