National Strategy for Trusted Identities in Cyberspace
“NSTIC could go a long way toward advancing one of the fundamental challenges of the Internet today, which is -- Who do you trust?” said Don Thibeau, chairman of the Open Identity Exchange, an industry group based in San Ramon, California, representing companies that support development of the new framework.
“What is holding back the growth of e-commerce is not technology, it’s policy. This gives us the rules, the policies that we need to really move forward.”
The new system will probably hasten the death of traditional passwords, Clippinger said. Instead, users may rely on devices such as smartcards with embedded chips, tokens that generate random codes or biometric devices.
“Passwords will disappear,” said Clippinger. “They’re buggy whips. The old privacy and security conventions don’t work. You need a new architecture.”
Development of a more advanced security system began in August 2004, when President George W. Bush issued a Homeland Security Presidential Directive that required all federal employees be given smartcards with multiple uses, such as gaining access to buildings, signing on to government websites and insuring that only people with proper clearances would have access to restricted documents. The system was intended to be more secure and more efficient.
The Obama administration advanced the process when it issued its “Cyberspace Policy Review” in 2009. One of the 10 priorities was the security identification system.
Join us on our
Share this page with your friends
on your favorite social network: