Page 17 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 17

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               •    Data confidentiality: Protection of data from unauthorised disclosure.

               •    Communication security: Assurance that information only flows between authorized endpoints.
               •    Data integrity: Protection of the correctness and accuracy of data.
               •    Availability: Prevention of denial of authorized access to network elements and data.

               •    Privacy: Protection of data information that might be derived from observing network activity.
               As we consider each of the elements comprising the DFS ecosystem, we will discuss the security challenges
               they face in terms of the security dimensions listed above, as well as distinguishing the security layer at which
               solutions are to be deployed. [ITU-T X.805] defines three layers: an infrastructure security layer, a security
               services layer, and an applications security layer. Protections are additive, with vulnerabilities first addressed
               at the infrastructure security layer, then at the services security layer, and finally, at the applications layer.

               Finally, there are three planes of security defined by [ITU-T X.805] comprising management, control, and end-
               user planes. These address the security needs associated with activities that occur at each of these levels and
               solutions and should ensure that events on one plane are isolated from others. In this report, we will discuss
               security challenges and solutions.


               2.1    Security stakeholders in the DFS ecosystem

               In the DFS environment, security and service integrity needs to be addressed at multiple levels simultaneously,
               an approach that must be applied from design to live operation. Our discussion of the DFS ecosystem is
               concentrated on the security perspective within a wireless communications environment – note that other
               access models are possible within the DFS ecosystem, such as the use of computing devices such as laptops
               or smartphones, communication over Wi-Fi that connect to DFS providers over the Internet, or business
               customers who leverage mobile money services through APIs. The full role of stakeholders is discussed in the
               ITU-T FG-DFS Technical Report, “The Digital Financial Services Ecosystem” [15]. We expand on the role of certain
               stakeholders where necessary to fully describe security requirements; these stakeholders are also informed
               by [ITU-T Y.2741], “Architecture of secure mobile financial transactions in next generation networks” [9].


               Figure 2: Security stakeholders in DFS

























               The stakeholders throughout the ecosystem are comprised of: the end-user making use of a mobile money
               application; the application developer of the mobile money app; the mobile handset manufacturer; the
               mobile carrier, who is responsible for provisioning the SIM card and the infrastructure through which to allow
               transactions to occur; the digital financial services provider, who operates the back-end systems to process the
               financial transactions; and the external service providers who continue the monetization of the transaction
               and finalize the operations.




                                                                                                        3
   12   13   14   15   16   17   18   19   20   21   22