Safety and Security Standards

 

 

Expert Assent

 

 

The extract of the current press release by Mark Zuckerberg gives us right, the internet safety and security is the future challenge. It concerns everybody and at any time. It is a matter of your privacy regardless of if you´re a private or business user.

 

“…The internet is our shared space. It helps us connect. It spreads opportunity. It enables us to learn. It gives us a voice. It makes us stronger and safer together.

To keep the internet strong, we need to keep it secure. That's why at Facebook we spend a lot of our energy making our services and the whole internet safer and more secure. We encrypt communications, we use secure protocols for traffic, we encourage people to use multiple factors for authentication and we go out of our way to help fix issues we find in other people's services.

The internet works because most people and companies do the same. We work together to create this secure environment and make our shared space even better for the world…”

(Mark Zuckerberg, Founder and CEO at Facebook, March 2014)

  

 

 

General Standards

 

 

We highlight just the following significant:

 

-  Security Standards

-  Payment Standards and

-  Identity Standards

 

Some are only recommendations and some are commitments – even by law.

 

 

 

 

 

 

There are a number of points that need to be taken into consideration when you want to create a high quality system for Certification to Standards relating to technical data processing and Transmission. We would like to emphasize the following standards:.  

 

The aim of all these standards is the Information Security Management System. This includes Penetration Tests, Security Audits and Risk Management in order to achieve no data manipulations. For a secured Standard you must be sure that the system and processing is safe.

 

-  American TCSEC

-  European ITSEC

-  International ISO / IEC 2700 ...

 

In the Payment Management we are talking about initiation, authorization and realization of a transaction. In the Identity Management the key point is, to develop an “Identity Lawyer”. The aim is to find the maximum of assurance about the identity of online communication partner without having to transmit an unnecessary amount of personal data at the same time.

 

PCI Mobile Payment Accaptance

-  PCI DSS Compliance Payment Card Industry / Data Security Standard

-  3 D Security

 

In the Identity Management the key point is, to develop an “Identity Lawyer”. The aim is to find the maximum of assurance about the identity of online communication partner without having to transmit an unnecessary amount of personal data at the same time.

-  Federated Identity Management

-  Identity Management for mobile & fixed Internet (3G American)

-  Identity Standard W3C

 

 

 

Attacks

 

 

If you consider how many data - worth of being secured - is send every day through the web – it´s incredible.

In 2013 there were about 5.2 billion registered attacks – even more if you reflect on the NSA - within a year that is to say over 14  million each day. Every fourth attack took place in the US.  The virus programs are permanently up-dated and the game of cat-and-mouse starts again. People are worried and built up fear while using the internet in particular when it involves sensitive data. And it doesn´t make any difference which device they use, e.g. a computer, a tablet or a smart phone. The possibility to become a victim of the cyber-crime by using a computer is much lower, because people usually use firewalls and anti-virus software. But the cyber-attacks are still and in future too often to successful.

It should be mentioned in passing by, those payment card issuers, merchants and acquiring banks lost   $ 11.27   billion in  2012 coming up from about $ 3.0B 10 years ago - according to the Nilson Report (issued August 2013). This loss corresponds roughly to 0.5% of all transaction amounts and the result is a very great loss to the economy.

 

 

Encryption

 

 

So there is a big need for a more intelligent and secure data processing.

Just to have a standard data encryption can´t be the future way, even it is high intelligent. “Attackers are doing 2 to the power of 80  bit ops / year. Human race with the total computer power have at least  2 to the power of 128  bit ops / year. The NSA with the new data center in Utah is able to  2 to the power of 87 bit ops / year. And the cryptanalytic has had only a small effect on key size and CPU time for 2 to the power of 128 “.

(Sept. 2012 by Daniel J. Bernstein)

 

 

 

 

 

 

 

 

Measures

 

 

Web Agent One responds to the growing importance and necessary of the world’s highest standard of security. We create many measures, many more than mentioned, but they will keep our trade secret, as you´ll understand.  

  • -  User access control
  • -  Device and IP access control
  • -  Special Web Agent One encryption data base
  • -  Incomplete encryption data base on device
  • -  Receiving virtual key
  • -  Second special data translation
  • -  Changing order of data and sending
  • -  Special data compression
  • -  VPN Tunnel with additional encryption
  • -  Restrictive configuration and timestamp
  • -  All encryptions are dynamic and changed
  • -  Short limited data time of valid
  • -  and much else measures

  

For all action points they need to be taken for a high quality standard - Web Agent One puts the level of security much higher. We create further steps in the processing and an intelligent and more detailed protocol with added safety loops to become a high-end security (that are not mentioned in the measures points). Our Network´s design for this special System is unmatched. The technology offers a large number of opportunities to use and right here we can only suggest how intelligent it is. 

The standard of security is absolutely new and higher than every other in the world - we know nothing comparable to it. It is worthy of being the one and only standard for transferring all sensitive data via the Personal Computer, Smartphone and other devices through the web. We paid great attention on the one hand to meet the customers favor and on the other hand everything a hacker would do to be successful. These are the ingredients of a successful product that has gained the customers trust.

The technological pioneer has protected his innovations with patents that maintain the standards of security.

 

 

 

 

 

 

 

 


Email