It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it . ContentsThe article may be deleted if this message remains in place for seven days, i.e., after 11:58, 5 November 2022 (UTC). Find sources: "Public Sector Internal Identity Federation" – news · newspapers · books · scholar · JSTOR |
Public Sector Internal Identity Federation, or PSIIF, is an IT service developed by the British government.
PSIIF is an identity federation service, to allow civil servants and other public-sector actors to authenticate against other public sector IT systems; potentially offering single sign on across multiple departments and agencies, and on the G-cloud. This allows better sharing of information and services. [1]
PSIIF offers several "levels of assurance" of identity:
Level of assurance | Identity verification | Credentials | Accreditation |
---|---|---|---|
0 | None | Not applicable | Not applicable |
1 | BPSS and photographic ID | User ID and password | Self-assessment |
2 | BPSS and photographic ID | User ID and password; additional controls around the client device | Self-assessment |
3 | BPSS and photographic ID | Strong authentication, such as two-factor | Independent accreditation |
4 | National ID scheme | Not appropriate for PSIIF |
Access to systems with higher-impact data would usually require higher levels of assurance. PSIIF is designed to support services handling OFFICIAL information, with business impact levels from IL1 to IL3.
This section is empty. You can help by adding to it. (November 2013) |
E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. E-government offers new opportunities for more direct and convenient citizen access to government and for government provision of services directly to citizens.
Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the material can incur criminal penalties.
Energy conservation is the effort made to reduce the consumption of energy by using less of an energy service. This can be achieved either by using energy more efficiently or by reducing the amount of service used. Energy conservation is a part of the concept of Eco-sufficiency. Energy conservation measures (ECMs) in buildings reduce the need for energy services and can result in increased environmental quality, national security, personal financial security and higher savings. It is at the top of the sustainable energy hierarchy. It also lowers energy costs by preventing future resource depletion.
The Quality Assurance Agency for Higher Education (QAA) is the independent body that checks on standards and quality in UK higher education. It conducts quality assessment reviews, develops reference points and guidance for providers, and conducts or commissions research on relevant issues.
The Liberty Alliance Project was an organization formed in September 2001 to establish standards, guidelines and best practices for identity management in computer systems. It grew to more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments. It released frameworks for federation, identity assurance, an Identity Governance Framework, and Identity Web Services.
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
A credential service provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an authentication system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the US government's eGov and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.
In the 21st century, the Government of Egypt has given greater priority to improving the education system. According to the Human Development Index (HDI), Egypt is ranked 115 in the HDI, and 9 in the lowest 10 HDI countries in the Middle East and Northern Africa, in 2014. With the help of the World Bank and other multilateral organizations Egypt aims to increase access in early childhood to care and education and the inclusion of Information and Communication Technology (ICT) at all levels of education, especially at the tertiary level. The government is responsible for offering free education at all levels. The current overall expenditure on education is about 12.6 percent as of 2007. Investment in education as a percentage of GDP rose to 4.8 in 2005 but then fell to 3.7 in 2007. The Ministry of Education is also tackling a number of issues: trying to move from a highly centralized system to offering more autonomy to individual institutions, thereby increasing accountability.
Critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation.
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset of information security, and as the business outcome of information risk management.
Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.
Internal control, as defined by accounting and auditing, is a process for assuring of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. A broad concept, internal control involves everything that controls risks to an organization.
The University of the Aegean is a public, multi-campus university located in Lesvos, Chios, Samos, Rhodes, Syros and Lemnos, Greece. It was founded on March 20, 1984, by the Presidential Act 83/1984 and its administrative headquarters are located in the town of Mytilene, on the island of Lesvos.
All European countries show eGovernment initiatives, mainly related to the improvement of governance at the national level. Significant eGovernment activities also take place at the European Commission level as well. There is an extensive list of eGovernment Fact Sheets maintained by the European Commission.
Identity assurance in the context of federated identity management is the ability for a party to determine, with some level of certainty, that an electronic credential representing an entity with which it interacts to effect a transaction, can be trusted to actually belong to the entity.
Higher education accreditation is a type of quality assurance process under which services and operations of post-secondary educational institutions or programs are evaluated to determine if applicable standards are met. If standards are met, accredited status is granted by the agency.
The Tertiary Education Quality and Standards Agency (TEQSA) is Australia's independent national quality assurance and regulatory agency for higher education.
The Government Digital Service is a unit of the Government of the United Kingdom's Cabinet Office tasked with transforming the provision of online public services. It was formed in April 2011 to implement the "Digital by Default" strategy proposed by a report produced for the Cabinet Office in 2010 called 'Directgov 2010 and beyond: revolution not evolution'. It is overseen by the Public Expenditure Executive. GDS is primarily based in the Whitechapel Building, London. Its CEO is Tom Read.
The Open Identity Exchange (OIX) is a membership organisation that works to accelerate the adoption of digital identity services based on open standards. It is a non-profit organisation and is technology agnostic. It is collaborative, and works across the private and public sectors.
GOV.UK Verify is an identity assurance system developed by the British Government Digital Service (GDS). The system is intended to provide a single trusted login across all British government digital services, verifying the user’s identity in 15 minutes. It allows users to choose one of several companies to verify their identity to a standard level of assurance before accessing 22 central government online services.