Results 1 to 2 of 2

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Senior Member JohnDoe2's Avatar
    Join Date
    Aug 2008
    Location
    PARADISE (San Diego)
    Posts
    99,040

    National Strategy for Trusted Identities in Cyberspace

    National Strategy for Trusted Identities in Cyberspace

    From Wikipedia, the free encyclopedia


    This article needs more links to other articles to help integrate it into the encyclopedia. Please help improve this article by adding links that are relevant to the context within the existing text. (September 2013)

    The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a US government initiative announced in April 2011 to improve the privacy, security and convenience of sensitive online transactions through collaborative efforts with the private sector, advocacy groups, government agencies, and other organizations.[1]


    The strategy imagined an online environment where individuals and organizations can trust each other because they dentify and authenticate their digital identities and the digital identities of organizations and devices.[2] It was promoted to offer, but not mandate, stronger identification and authentication while protecting privacy by limiting the amount of information that individuals must disclose.[3]

    Contents

    [hide]



    Description[edit]

    The strategy was developed with input from private sector lobbyists, including organizations representing 18 business groups, 70 nonprofit and federal advisory groups, and comments and dialogue from the public.

    The strategy had four guiding principles:[4]


    1. privacy-enhancing and voluntary
    2. secure and resilient
    3. interoperable
    4. cost-effective and easy to use.


    The NSTIC described a vision compared to an ecosystem where individuals, businesses, and other organizations enjoy greater trust and security as they conduct sensitive transactions online. Technologies, policies, and agreed upon standards would securely support transactions ranging from anonymous to fully authenticated and from low to high value in such an imagined world. Implementation included three initiatives:


    • The Identity Ecosystem Steering Group (IDESG), the private sector-led organization developing the Identity Ecosystem Framework;[5]
    • Funding pilot projects that NSTIC said embrace and advance guiding principles;[6] and
    • The Federal Cloud Credential Exchange (FCCX),[7] the U.S. federal government service for government agencies to accept third-party issued credentials approved under the FICAM scheme.


    NSTIC was announced during the Presidency of Barack Obama near the end of his first term on April 15, 2011.[1] A magazine article said individuals might validate their identities securely for sensitive transactions (such as banking or viewing health records) and let them stay anonymous when they are not (such as blogging or surfing the Web).[8]


    In January 2011 the U.S. Department of Commerce had established a National Program Office (NPO), led by the National Institute of Standards and Technology, to help implement NSTIC.[9] To coordinate implementation activities of federal agencies, the NPO works with the White House Cybersecurity Coordinator, originally Howard Schmidt[3] and then after 2012 Michael Daniel.[10]


    Steering Group[edit]


    The NSTIC called a steering group led by the private sector to administer the development and adoption of its framework. This Identity Ecosystem Steering Group (IDESG) held a meeting in Chicago August 15–16, 2012.[11] The meeting brought together 195 members in person and 315 members remotely. Additional plenary meetings were in Phoenix, Arizona,[12] Santa Clara, California[13] and Boston, Massachusetts. Under a grant from 2012 through 2014, Trusted Federal Systems, Inc. was the group’s administrative body.[14]

    Pilots[edit]


    The federal government initiated and supported pilot programs. In 2012, NSTIC awarded $9 million to pilot projects. For example, the American Association of Motor Vehicle Administrators was developing a demonstration of commercial identity provider credentials by the Virginia state government, including securely verifying identities online with the Virginia Department of Motor Vehicles.[15] The Internet2received about $1.8 million for research.[15]

    Federal Cloud Credential Exchange[edit]


    The NSTIC called for U.S. federal government agencies to be early adopters of the Identity Ecosystem envisioned in NSTIC.[16] Agencies struggled to implement it for services they provide internally and externally. Technical, policy and cost barriers made it challenging to accept third-party credential providers accredited by the Federal Identity, Credential, and Access Management (FICAM) initiative.[17]

    In response, the White House created a Federal Cloud Credential Exchange (FCCX) team, co-chaired by NSTIC and the General Services Administration. The team consisted of representatives from agencies whose applications are accessed by a large population of external customers. In November 2012, theUnited States Postal Service was chosen to manage a pilot version of the FCCX. As of July 2013, the USPS Digital Solutions Group was in the process of awarding a contract, after soliciting proposals for the FCCX pilot.


    Criticism[edit]


    The proposal generated criticism since it was released in draft form in June 2010.[3][18] Much centered around privacy implications of the proposal.

    Shortly after the draft's release, the Electronic Privacy Information Center (EPIC), with other consumer-rights and civil liberties organizations, sent the committee a statement in response to the draft NSTIC policy, requesting a clearer and more complete plan to create and safeguard Internet users' rights and privacy.[19] While EPIC head, Marc Rotenberg, called NSTIC "historic," he also cautioned that "...online identity is complex problem and the risk of 'cyber-identity theft' with consolidated identity systems is very real. The US will need to do more to protect online privacy."[20]


    NSTIC addressed some early privacy concerns through its 2013 fair information practice principles document.[21] Subsequent initiatives sought to advance privacy. For example, the American Civil Liberties Union and the Electronic Frontier Foundation were involved in a privacy committee in the IDESG.


    http://en.wikipedia.org/wiki/Nationa..._in_Cyberspace
    NO AMNESTY

    Don't reward the criminal actions of millions of illegal aliens by giving them citizenship.


    Sign in and post comments here.

    Please support our fight against illegal immigration by joining ALIPAC's email alerts here https://eepurl.com/cktGTn

  2. #2
    Senior Member JohnDoe2's Avatar
    Join Date
    Aug 2008
    Location
    PARADISE (San Diego)
    Posts
    99,040
    1. [PDF]National Strategy for Trusted Identities in Cyberspace - The ...

      www.whitehouse.gov/sites/.../NSTICstrategy_041511.pdf‎

      White House

      Apr 15, 2011
      - The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy) charts a course for the public and private sectors to collaborate ...


    2. News for National Strategy for Trusted Identities in ...

      1. Government starts testing online ID program
        RT (blog) ‎- 1 day ago
        The "National Strategy for Trusted Identities in Cyberspace” program has been in development for years, but it's about to finally be rolled-out to ...

      1. Condon to assume exec. director role for trusted identity effort

        FedScoop‎ - 1 day ago


      More news for National Strategy for Trusted Identities in Cyberspace


    3. National Strategy for Trusted Identities in Cyberspace ...

      en.wikipedia.org/.../National_Strategy_for_Trusted_Identities_...‎

      Wikipedia
      The National Strategy for Trusted Identities in Cyberspace(NSTIC) is a US government initiative announced in
      April 2011 to improve the privacy, security and ...Description - ‎Steering Group - ‎Pilots - ‎Federal Cloud Credential Exchange
    4. [PDF]National Strategy for Trusted Identities in Cyberspace Draft

      www.dhs.gov/.../ns_tic.p...‎

      United States Department of Homeland Security

      Jun 25, 2010 - National Strategy for. Trusted Identities in.Cyberspace. Creating Options for Enhanced. Online Security and Privacy. June 25, 2010. Draft ...
    5. National Strategy for Trusted Identities in Cyberspace (NSTIC)

      www.idecosystem.org › About

      National Strategy for Trusted Identities in Cyberspace (NSTIC). You are here. Home ›; About ›; National Strategy for Trusted Identities in Cyberspace (NSTIC).
    6. NSTIC.US

      www.nstic.us/‎

      Jul 30, 2012 - The NSTIC National Program Office (NPO) at NIST made a Discussion Draft of Steering Group By-Laws available shortly before the Internet ...
    7. National Strategy for Trusted Identities in Cyberspace (NSTIC)

      www.smartcardalliance.org/.../publications-smart-card-alliance-endorses-...‎

      National Strategy for Trusted Identities in Cyberspace (NSTIC). The Smart Card Alliance submitted the following comments on the NSTIC Framework at ...
    8. National Strategy for Trusted Identities in Cyberspace (NSTIC)

      epic.org/privacy/nstic.html‎

      Electronic Privacy Information Center


      TheNSTIC proposal is part of a series of initiatives driven by the
      2009 Cyberspace Policy Review. EPIC's comments called for a structure that would "include[e] ...
    9. 2011 Trends: National Strategy for Trusted Identities in ...
      gov20.govfresh.com/2011-trends-national-strategy-for-trusted-i...‎

      by Alexander Howard - in 1,451,197 Google+ circles

      Jan 7, 2011 - The upcoming release of the final version of the White House “National Strategy for Trusted Identities in Cyberspace” highlights three key ...

    10. National Strategy for Trusted Identities in Cyberspace (NSTIC)
      ► 2:01► 2:01
      www.youtube.com/watch?v...‎

      YouTube
      Feb 28, 2011 - Uploaded by National Institute of Standards and Technology
      This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work ...
    NO AMNESTY

    Don't reward the criminal actions of millions of illegal aliens by giving them citizenship.


    Sign in and post comments here.

    Please support our fight against illegal immigration by joining ALIPAC's email alerts here https://eepurl.com/cktGTn

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •