1 / 31

Network of Hemispheric Legal Cooperation in the Area of Family and Child Law

Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Introduction to the Secure Component. November 10, 2010 Washington, D.C. Agenda. Secure Component tool Contacts and Messaging Workspaces Hypothetical Case. What is Groupware?.

anika
Télécharger la présentation

Network of Hemispheric Legal Cooperation in the Area of Family and Child Law

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Introduction to the Secure Component November 10, 2010Washington, D.C.

  2. Agenda • Secure Component tool • Contacts and Messaging • Workspaces • Hypothetical Case

  3. What is Groupware? Communication(Instant Messaging) Common Goals and Objectives Information Sharing (Workspaces) Coordination Groupware

  4. Secure Groupware Security(Encryption) Communication(Instant Messaging) Common Goals and Objectives Information (Workspaces) Coordination Groupware

  5. E-mail vs. Secure Groupware E-mail • Message is not encrypted • Message can be intercepted • Message can be altered • Message is not confidential Internet • Attached documents are not encrypted • Both message and attachments can be intercepted • Both message and attachments can be altered • Both message and attachments are not confidential

  6. E-mail vs. Secure Groupware Message remains encrypted when stored in the hard drive and while in transit Internet • Message is encrypted all the time • Message can not be deciphered • Message can not be altered • If user is behind a off-line, OAS servers are used • Authenticity, Integrity and Availability

  7. Initial Considerations • Facilitate communications among points of contact on Mutual Legal Assistance. • Confidentiality of the information: • No central database • No OAS Member State has control over the application • SG/OAS has no access to the information shared by the participants • Decision in 2003: • Groove Networks

  8. Evolution of the Plataform • 2003 – Implementation of Groove Networks • 2005 – Microsoft acquires Groove Networks • 2007 – Microsoft integrates Groove to Office 2007 • 2010 – Microsoft SharePoint Workspace 2010 • Integration with content management platform

  9. Evolution of the Plataform • 2007- OAS/Microsoft agreement • 2007 version available in: • English • Spanish • French • Portuguese • Technology upgrade:

  10. Technology Upgrade • New platform only works in 64-bit platforms 32 • Migration to new 64-bit servers required MIGRATED • Upgrade Windows 2000 to Windows 2003 64-bit UPGRADED The SG/OAS has upgraded the current platform to its latest version

  11. Technology Upgrade ManagementServer Relay Server Groove 3.1 Windows 2000 32-bit Windows 2000 32-bit Relay Servers ManagementServer OfficeGroove 2007 Storage AreaNetwork Windows 2003 64-bit Windows 2003 64-bit Windows 2003 64-bit

  12. Components of Groove within the OAS Infrastructure Public and Private components Microsoft OfficeGroove 2007 Groove Users

  13. Security • Authenticity, Integrity and availability of the information contained in the local hard drive and while in transit • Authenticity: information is only available to the intended recipient • Integrity: information is never altered or modified • Availability: information is always available and ready to be used when desired • Use of Certificate Authority (CA) and Public Key Infrastructure (PKI) • High encryption standards used

  14. Secure Communications System • Definition: • It is a software that allows groups of geographically separated individuals to work together securely over public networks such as the Internet. Security is always enabled and it is not optional.

  15. Secure Communications System Features • Efficient use of the Network – Bandwidth optimization • Synchronization – can be used off-line • Security is always enabled • Data encryption – local and while in transit • Compatibility with MS Office applications • User awareness • Alerts • Users decide who they share information with • Easy to use

  16. Launchbar • Contacts panel • Workspaces • Common tasks

  17. Status Indicators • Active • Online • Online – No Activity • Offline • New Content

  18. Alerts • Notifications of status change, content updates and user presence • Contacts • Workspaces • Content

  19. Contacts Panel • The contact panel shows the list of every participant added. This panel is different from the contact panel that appears in the Workspaces • Options in the contacts panel: • Adding contacts using the Search functionality • Deleting contacts • Show contacts status

  20. Messaging • Messages can be sent to an individual or a group • Messages can contain text, pictures, documents or audio • Messages are sent immediately if the receiver is online. If the receiver is offline, the message is held until he/she reconnects • Large files should be shared creating a Workspace • Message History

  21. Message History • The message history maintains a list of sent and received messages

  22. Workspace Definition • A workspace is a place for information sharing among individuals with common goals and objectives

  23. Workspace Definition • The information within a Workspace is highly dynamic • The information is synchronized instantaneously with the online members of the Workspace • Any change in the Workspace is synchronized with offline users as soon as they reconnect • Only Workspace members can access the information shared in that Workspace

  24. Workspace Elements Files panel Workspace members Chat for EVERY memberof the Workspace Common tasks Folders panel Message history

  25. Workspace Contacts • Allows to choose who to share the information with • Allows sending messages to Workspace members • Allows to Chat with EVERY member of the Workspace • Allows sharing Word documents, presentations, pictures or any other file type

  26. Features in a Workspace • User Roles • Manager – changes roles and rights • Participant – adds documents and invites contacts • Guest – read only • Folder permissions configuration

  27. Questions?

  28. Hypothetical Case

  29. Network of Hemispheric Legal Cooperation in the Area of Family and Child Law Introduction to the Secure Component November 10, 2010Washington, D.C.

  30. Encryption Algorithms Feature Algorithm RSA 2048-bits Identity MARC4 192-bits Messages MARC4 256-bits Workspaces ESIGN 1536-bits Hard Disc AES 192-bits Management Server AES 256-bits Relay Server ElGamal 1536-bits

  31. On-line Course “E-Learning” platform MS Office Groove 2007 Available in English and Spanish

More Related