Do you feel confident when you make a payment with your smartphone? Are you concerned that your digital identity could be stolen and that illegal use could be made in your name? Do you worry about who could access your personal data stored in the Cloud?
Few people are indifferent to these questions, which is why Eurosmart has attempted to give some answers in this digital security reference paper and in three related documents.1
While there is little need to point out the importance of digital information and processes for a modern and innovative Europe, it is critical that our digital society is protected from malicious human activities. We are reminded of this fact every time there is a major data breach, and confidential information like credit card details is exposed by hackers. The digital security industry has developed solutions for identification, authentication, access control and digital signature, used for services like mobile telephony and electronic payments. Smart secure solutions use features such as tamper resistant hardware, secure embedded software, cryptography and security protocols that address challenging concerns such as data confidentiality and integrity, authentication, privacy, non denial of service, non repudiation, digital content protection. But what are the methods and technical skills required to build these solutions? How can we manage the balance between the need for security and its cost in term of performance and resources? Is there a way to guarantee effective security and to rank the level of security of different solutions? This paper tries to answer these questions and explains how solutions based on smart secure devices are essential in achieving very high levels of protection against threats in an unsecure environment.