Internet Governance Forum
Download
Report
Transcript Internet Governance Forum
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU Global Cybesercurity Agenda and
ITU-T SG17 activities on
Cybersecurity
Paolo Rosa
Head, Workshops and Promotion Division
Telecommunication
Standardization
Bureau
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU Cybersecurity activities
WSIS Action Line C.5
Building Confidence and security in
the use of ICTs
http://www.itu.int/wsis/c5/index.html
ITU Global Cybersecurity Agenda
Framework for international
cooperation in Cybersecurity
ITU Cybersecurity Gateway
Information resource on Cybersecurity
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Strategic direction
Cybersecurity – one of the top priorities of the ITU
WSIS Action Line C5, Building confidence and security in use of
ICTs
A fundamental role of ITU, following the World Summit on the
Information Society (WSIS) and the 2006 ITU Plenipotentiary
Conference is to build confidence and security in the use of ICTs.
At the WSIS, world leaders and governments designated ITU to
facilitate the implementation of WSIS Action Line C5, “Building
confidence and security in the use of ICTs”.
In this capacity, ITU is seeking consensus on a framework for
international cooperation in cybersecurity to reach a common
understanding of cybersecurity threats among countries at all
stages of economic development.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Strategic direction II
Plenipotentiary Resolution 130 (2006), Strengthening
the role of ITU in building confidence and security in
the use of information and communication
technologies – Instructs Director of TSB to intensify
work in study groups, address threats & vulnerabilities,
collaborate, and share information
Plenipotentiary Resolution 149 (2006), Study of
definitions and terminology relating to building
confidence and security in the use of information and
communication technologies - Instructs Council to
study terminology
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Strategic Direction III
WTSA-08 Resolution 50, Cybersecurity – Instructs Director of TSB to
develop a plan to undertake evaluations of ITU-T “existing and evolving
Recommendations, and especially signalling and communications
protocol Recommendations with respect to their robustness of design
and potential for exploitation by malicious parties to interfere
destructively with their deployment”
WTSA-08 Resolution 52, Countering and combating spam – Instructs
relevant study groups “to develop, as a matter of urgency, technical
Recommendations, including required definitions, on countering spam”
WTSA-08 Resolution 58, Encourage the creation of national Computer
Incident Response Teams, particularly for developing countries –
instructs the Director of TSB, in collaboration with the Director of BDT “to
identify best practices to establish CIRTs; to identify where CIRTs are
needed; to collaborate with international experts and bodies to establish
national CIRTs; to provide support, as appropriate, within existing
budgetary resources; to facilitate collaboration between national CIRTs,
such as capacity building and exchange of information, within an
appropriate framework”
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Cybersecurity & Cyberspace
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Draft new ITU-T Rec.X1205
Overview of Cybersecurity
• Cybersecurity: collection of tools, policies, guidelines, risk
management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the
cyberspace against relevant security risks such as
unauthorized access, modification, theft, disruption, or other
threats
• Cyberspace: the cyber environment including software,
connected computing devices, computing users,
applications/services, communications systems, multimedia
communication, and the totality of transmitted and/or stored
information connected directly or indirectly to the Internet. It
includes hosting infrastructures and isolated devices
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Changing nature of cyberspace
Source: Presentation materials at ITU workshop on “Ubiquitous Network Societies”, April 2005.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Threats in cyberspace
Inherited architecture of the Internet was not designed to optimize security
•
•
•
•
•
•
•
•
•
•
•
Constant evolution of the nature of cyberthreats
Low entry barriers and increasing sophistication of cybercrime
Constant evolution in protocols and algorithms
Loopholes in current legal frameworks
Introduction of Next-Generation Networks (NGN)
Convergence among ICT services and networks
Network effects – risks far greater
Possibility of anonymity on the Internet
Absence of appropriate organizational structures
Internationalization requires cross-border cooperation
Vulnerabilities of software applications
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Attackers, hackers and intruders
(generally users cannot be trusted)
• Taxonomy of security threats
– Unauthorized illegal access: insufficient security measures
autent./author/unprotected passwords…
– IP spoofing: assume a trusted host identity, disable host, assume attacker’s
identity, access to IP addresses)
– Network sniffers: read source and destination addressess, passwords,data…
– Denial of Service (DoS): connectivity, network elements or applications
availability
– Bucket brigade attacks: messages interception/modificat.
– Back door traps: placed by system developers / employees /operating
system/created by virus
– Masquerading: accessto the network as false legitimate personnel
– Reply attacks: read authentication information from messages
– Modification of messages without detection
– Insider attacks: legitimate users behave in unauthorized way, needed
perdiodical auditing actions, screening of personnel, hardware and software
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Challenges: Policy
• Lack of relevant cybercrime and anti-spam legislation
– Establish where none
• Base “model law” needed (which is separate ITU initiative)
– Modify existing cybercrime/spam laws where needed to reflect botnetrelated crime
• Capacity building for regulators, police, judiciary
– Training existing officials may be supplemented by co-opting or active
recruitment of technical experts
• Weak international cooperation and outreach
– Participation in local, regional and international initiatives
– Engagement of relevant government, regulators, law enforcement with
peers and other stakeholders around globe
– Targeted outreach to countries and stakeholders known to be particularly
vulnerable to cybercrime
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
The Global Cybersecurity Agenda (GCA)
Launched in May 2007 by the ITU’s Secretary-General,
Dr. Hamadoun Touré on World Telecommunication and
Information Society Day
17 May 2007, International Herald Tribune
9 July 2007
UN Secretary-General
Historic visit to ITU
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Global Cybersecurity Agenda
Framework for International Cooperation in Cybersecurity
• The Global Cybersecurity Agenda (GCA) was created as ITU’s response to its role as sole
Facilitator for WSIS Action Line C5
• GCA is a framework for international multi-stakeholder cooperation in cybersecurity
• GCA brought together a group of world renowned experts in the field of cybersecurity
and formed the High Level Experts Group (HLEG) which developed a global strategic
report available at:
http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html
• GCA is working together with its partners to develop harmonized global strategies
Leveraging expertise for international consensus
On a Global level, from government, international organizations to industry
For a Harmonized approach to build synergies between initiatives
Through Comprehensive strategies on all levels in 5 work areas:
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU’s Global Cybersecurity Agenda
Global Strategic Report
• Legal Measures
• International investigations: depending
on reliable means of cooperation
and effective harmonization
of laws
• Technical and Procedural Measures
• Organizational Structures
• Capacity Building
• International Cooperation
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Current GCA Projects
Curbing Cyberthreats: IMPACT
Partnership with the International Multilateral
Partnership Against Cyber-Threats (IMPACT)
Child Online Protection: COP
The Child Online Protection (COP) initiative in
partnership with organizations from around the world
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU-IMPACT Collaboration
IMPACT is the physical home for the GCA, providing expertise and facilities
for all ITU Member States to address global cyber-threats
Global Response Centre (GRC)
Threat information aggregation and dissemination expert collaboration
Training & Skill Development
Security skills training for Member States
Security Assurance & Research
International benchmarks for Member States Collaborative research on
cyber-threats.
PARTNERS
Centre for Policy and International Co-operation
Advisory services on cybersecurity policy and regulations for Member States
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Child Online Protection (COP)
Internet Governance Forum
Action for Global Cybersecurity
An unique initiative bringing together partners from all
sectors of the international community with the aim of
creating a safe online experience for children everywhere.
Key Objectives
•Identify the main risks and vulnerabilities
to children in cyberspace
•Create awareness of the risks and issues through multiple
channels
•Develop practical tools to help governments, organizations
and educators minimize risk
•Share knowledge and experience while facilitating
international strategic partnerships to define and implement
concrete initiatives
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
The High Level Segment (Council)
• Held on the opening of the ITU council meetings
• Participation of Ministers
• Questions addressed:
– Greatest cyberthreats faced worldwide
– Key elements to formulate national strategies and to
prevent cybercrime
– Role of governments in promoting a cibersecurity culture
– Highest priority activities to address current and emerging
cyberthreats
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU-T SG 17: Security
Responsible for studies relating to security including cybersecurity, countering
spam and identity management. Also responsible for the application of open
system communications including directory and object identifiers, and for
technical languages, the method for their usage and other issues related to
the software aspects of telecommunication systems.
• Study Group 17 is the lead study group in the ITU-T for security –
responsible for:
– Coordination of security work
– Development of core Recommendations
• Most of the other study groups have responsibilities for standardizing
security aspects specific to their technologies, e.g.,
– SG 2 for TMN security
– SG 9 for IPCablecom security
– SG 13 for NGN security
– SG 16 for Multimedia security
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ICT security standards
roadmap
• Part 1 contains information about organizations
working on ICT security standards
• Part 2 is database of existing security standards and
includes ITU-T, ISO/IEC JTC 1,IETF, IEEE, ATIS, ETSI and
OASIS security standards
• Part 3 is a list of standards in development
• Part 4 identifies future needs and proposed new
standards
• Part 5 includes Security Best Practices
http://www.itu.int/ITU-T/studygroups/com17/ict/
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU-T SG 17 structure
Working Party 1: Network and information security
• Q 1 Telecommunications systems security project
• Q 2 Security architecture and framework
• Q 3 Telecommunications information security management
• Q 4 Cybersecurity
• Q 5 Countering spam by technical means
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
21 of 37
ITU-T SG 17 structure (cont.)
Working Party 2: Application security
• Q 6 Security aspects of ubiquitous telecommunication services
• Q 7 Secure application services
• Q 8 Telebiometrics
• Q 9 Service oriented architecture security
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
22 of 37
ITU-T SG 17 structure (cont.)
Working party 3: Identity management and languages
• Q 10 Identity management architecture and mechanisms
• Q 11 Directory services, Directory systems, and public-key/attribute
certificates
• Q 12 Abstract Syntax Notation One (ASN.1), Object Identifiers (OIDs) and
associated registration
• Q 13 Formal languages and telecommunication software
• Q 14 Testing languages, methodologies and framework
• Q 15 Open Systems Interconnection (OSI)
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
23 of 37
Core Security Recommendations
Strong ramp-up on developing core security Recommendations in
SG 17
• 14 approved in 2007
• 27 approved in 2008
• 56 under development for approval this study period
Subjects include:
Architecture and Frameworks Web services Directory
Identity management Risk management Cybersecurity
Incident management Mobile security Countering spam
Security management Secure applications Telebiometrics
Ubiquitous Telecommunication services SOA security
Ramping up on:
Traceback Ubiquitous sensor networks
Collaboration with others on many items
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
24 of 37
Challenges
Addressing security to enhance trust and confidence of users in
networks, applications and services
Balance between centralized and distributed efforts on
developing security standards
Legal and regulatory aspects of cybersecurity, spam,
identity/privacy
Address full cycle – vulnerabilities, threats and risk analysis;
prevention; detection; response and mitigation; forensics;
learning
Uniform language for security terms and definitions
Effective cooperation and collaboration across the many bodies
doing cybersecurity work – within the ITU and with external
organizations
Keeping ICT security database up-to-date
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
25 of 37
SG 17 Security Project 1/3
(Major focus is on coordination and outreach)
Security coordination
ISO/IEC/ITU-T Strategic Advisory Group Security
– Oversees standardization activities in ISO, IEC and ITU-T relevant to security;
provides advice and guidance relative to coordination of security work; and, in
particular, identifies areas where new standardization initiatives may be
warranted.
• Portal established
• Workshops conducted
Global Standards Collaboration
– ITU and participating standards organizations exchange information on the progress
of standards development in the different regions and collaborate in planning
future standards development to gain synergy and to reduce duplication. GSC- 13
resolutions concerning security include:
GSC-13/11 – Cybersecurity
GSC-13/04 – Identity Management
GSC-13/03 – Network aspects of identification systems
GSC-13/25 – Personally Identifiable Information Protection
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
26 of 37
SG 17 Security Project 2/3
(Major focus is on coordination and outreach)
Security coordination (cont.)
Cybersecurity Rapporteur group adopted a focussed action plan
including outreach and collaboration with other organizations
addressing cybersecurity and infrastructure protection.
Basic needs: to identify and effecting lines of communication
among all these organizations.
Address the needs of countries with lack in resources and part of
the global network cybersecurity and vulnerability mosaic.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
27 of 37
SG 17 Security Project 4/4
Security Compendium
– Includes catalogs of approved security-related
Recommendations and security definitions
extracted from approved Recommendations
Security Standards Roadmap
– Includes searchable database of approved ICT
security standards from ITU-T and others (e.g.,
ISO/IEC, IETF, ETSI, IEEE, ATIS)
ITU-T Security Manual
– Assisted in its development
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Security standardization strategy
1. Assure the continued relevance of security standards by keeping
them current with rapidly-developing
telecommunications
technologies and operators’ trends.
(in e-commerce, e-payments, e-banking, telemedicine, fraud-monitoring, fraudmanagement, fraud identification, digital identity infrastructure creation, billing systems,
IPTV, Video-on-demand, grid network computing, ubiquitous networks, etc.).
2. Give attention to the issue of trust between network providers and
communication infrastructure vendors, in particular, in terms of
communication hardware and software security.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
29 of 37
Identity Management Overall objectives
1. a security enabler by providing trust in the identity of both
parties to an e-transaction
1. a very important capability for significantly improving security
and trust
3. provides Network Operators an opportunity to increase
revenues by offering advanced identity-based services
4. ITU-T’s IdM work on global trust and interoperability of
diverse IdM capabilities in telecommunications focused on
leveraging and bridging existing solution
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
30 of 37
Recommendations in progress
First IdM Recommendations for ITU-T SG 17:
• X.1250, Capabilities for global identity management trust and
interoperability
• X.1251, A framework for user control of digital identity
And one Supplement approved:
• Supplement to X.1250-series, Overview of IdM in the context of
cybersecurity
Many additional IdM Recommendations are under development
(specially IdM terms and definitions)
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
31 of 37
Survey of developing countries ICT security needs
• Questionnaire initiated May 2008
• Key Results
– The overall level of concern about cyber security is
high
– There is a high level of interest in the possibility of
obtaining advice and/or assistance on ICT security
from the ITU
– The ITU needs to do better in promoting its ICT
security products
• Details of analysis at:
http://www.itu.int/dms_pub/itu-t/oth/0A/0D/T0A0D0000180001PDFE.pdf
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Challenges
Addressing security to enhance trust and confidence of users
in networks, applications and services
With global cyberspace, what are the security priorities for the ITU with its
government / private sector partnership?
Balance between centralized and distributed efforts on developing security
standards
Legal and regulatory aspects of cybersecurity, spam, identity/privacy
Address full cycle – vulnerabilities, threats and risk analysis; prevention;
detection; response and mitigation; forensics; learning
Uniform definitions of cybersecurity terms and definitions
Effective cooperation and collaboration across the many bodies doing
cybersecurity work – within the ITU and with external organizations
Keeping ICT security database up-to-date
There is no “silver bullet” for cybersecurity
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Some useful web resources
• ITU Global Cybersecurity Agenda (GCA)
http://www.itu.int/osg/csd/cybersecurity/gca/
• ITU-T Home page http://www.itu.int/ITU-T/
• Study Group 17 http://www.itu.int/ITU-T/studygroups/com17/index.asp
e-mail: [email protected]
• LSG on Security http://www.itu.int/ITU-T/studygroups/com17/tel-security.html
• Security Roadmap http://www.itu.int/ITU-T/studygroups/com17/ict/index.html
• Security Manual http://www.itu.int/publ/T-HDB-SEC.03-2006/en
• Cybersecurity Portal http://www.itu.int/cybersecurity/
• Cybersecurity Gateway http://www.itu.int/cybersecurity/gateway/index.html
• ITU-T Recommendations http://www.itu.int/ITU-T/publications/recs.html
• ITU-T Lighthouse http://www.itu.int/ITU-T/lighthouse/index.phtml
• ITU-T Workshops http://www.itu.int/ITU-T/worksem/index.html
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Thank you!
Paolo Rosa
[email protected]
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
35 of 37
ADDITIONAL SLIDES
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU GCA main goals
Elaboration of strategies to:
– develop a model cybercrime legislation globally applicable, interoperable
with existing national / regional legislative measures
– create national and regional organizational structures and policies on
cybercrime
– establish globally accepted minimum security criteria and accreditation
schemes for software applications and systems
– create a global framework for watch, warning and incident response to
ensure cross-border coordination of initiatives
– create and endorse a generic and universal digital identity system and the
necessary organizational structures to ensure the recognition of digital
credentials for individuals across geographical boundaries
– develop a global strategy to facilitate human and institutional capacitybuilding to enhance knowledge and know-how across sectors and in all the
above-mentioned areas
– advice on potential framework for a global multi-stakeholder strategy for
international cooperation, dialogue and coordination in all the abovementioned areas.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
Initiatives
ITU’s Global Cybersecurity Agenda housed in new centre in
Malaysia
The International Multilateral Partnership Against Cyber
Threats (IMPACT) headquarters in Cyberjaya (Kuala Lumpur) to
focus on strengthening network security 20 March 2009
ITU’s Telecommunication Development Bureau (BDT) will
facilitate the deployment of IMPACT services, such as the
Global Response Centre, which aims at providing state-of-theart cybersecurity capabilities for ITU Member States to
strengthen network security worldwide.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
ITU-T SG 17 structure
Recommendations under development in WP1
Guidelines on security of the individual information service for operators
Architecture of external interrelations for a telecommunication network security
system Information security governance framework Information security
management framework for telecommunications Requirement of security
information sharing framework Abnormal traffic detection and control guideline
for telecommunication network Frameworks for botnet detection and response
Digital evidence exchange file format Guideline on preventing malicious code
spreading in a data communication network
Mechanism and procedure for distributing policies for network security
Framework for countering cyber attacks in SIP-based services
Traceback use cases and capabilities Framework for countering IP multimedia
spam Functions and interfaces for countering email spam sent by botnet
Technical means for countering spam Interactive countering spam gateway system
Technical means for countering VoIP spam
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
39 of 37
ITU-T SG 17 structure
Recommendations under development in WP2
Functional requirements and mechanisms for secure transcodable
scheme of IPTV Key management framework for secure IPTV
services Algorithm selection scheme for SCP descrambling SCP
interoperability scheme Security requirement and framework for
multicast communication Security aspects of mobile multi-homed
communications Security framework for ubiquitous sensor network
USN middleware security guidelines Secure routing mechanisms
for wireless sensor network SAML 2.0 XACML 2.0 Security
requirements and mechanisms of peer-to-peer-based
telecommunication network Management framework for one time
password based authentication service Security framework for
enhanced web based telecommunication services Telebiometrics
issues
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
40 of 37
ITU-T SG 17 structure
Recommendations under development in WP3
Baseline capabilities for enhanced global identity management trust and
interoperability A framework for user control of digital identity
Entity authentication assurance Extended validation certificate
Common identity data model Framework architecture for interoperable
identity management systems IdM terms and definitions Security
guidelines for identity management systems Criteria for assessing the
level of protection for personally identifiable information in identity
management Guideline on protection for personally identifiable
information in RFID applications Object identifier resolution system
UML profile for ASN.1 Information technology reference model issues:
SDL issues Message sequence chart (MSC) issues User requirements
notation (URN) issues Testing and test control notation issues
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
41 of 37
Business use of telecommunications/ICT top security standards
The report will consist of summary sheets for analysed top security standards
Status and summary of standards Who does the standard affect? Business benefits
Technologies involved Technical implications
ITU-T SG 17 seeks comment on the work activity from the ITU-D and other standards
development organizations. Specifically, your views on the following would be
appreciated:
Do you agree that this work activity would be useful to organizations and/or DC/CETs
planning to deploy telecommunications/ICT security systems?
Does your organization have existing information that may be related to this work
activity or that may be used to progress this work?
Does your organization have contact with DC/CETs that may further elaborate on their
needs and detail the information they may find most useful to capture in the activity
output?
Does your organization have any suggestions to provide additional detail regarding the
proposed summary sheet elements or criteria to select standards?
Would your organization be willing to assist the ITU-T SG 17 in progressing this work?
ITU-T SG 17 welcomes your consideration and your response on this matter.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
42 of 37
The High Level Segment: HLEG
• Held on the opening of the ITU council meetings
• Participation of Ministers
• Questions addressed:
– Greatest cyberthreats faced worldwide
– Key elements to formulate national strategies and to
prevent cybercrime
– Role of governments in promoting a cibersecurity culture
– Highest priority activities to address current and emerging
cyberthreats
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity II
Managing cyberthreats through harmonized policies and
organizational structures
Objective: to examine how cyberthreats can be detected and managed
effectively through harmonized policies and improved organization
structures.
The absence of effective institutions to deal with cyber-attacks is a
major issue. Some countries have established specific agencies with
watch, warning and incident response capabilities. Other countries
prefer to promote capacity to deal with cyber-incidents within existing
law enforcement agencies. What lessons can be learned from the
experience of different countries? And how can cooperation and the
flow of information between national institutions be improved?
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
High-Level Segment (HLS) of Council 2008
Geneva, 12-13 November 2008
– Designed to provide Ministers and Councillors with
an opportunity to exchange views on issues of
strategic importance to the Union and on emerging
trends in the sector. This year, speakers offered
their perspectives on Climate Change and
Cybersecurity.
– Inaugurated by two Heads of State, H.E. Mr Paul
Kagame, President of Rwanda, and H.E. Mr Blaise
Compaoré, President of Burkina Faso, as well as by
United Nations Secretary-General Mr Ban Ki-moon
via video message.
– Attended by some 400 participants, 21 Ministers,
Ambassadors and heads of regulatory
organizations and UN agencies.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity 1/2
Managing cyberthreats through harmonized policies and
organizational structures
Objective: to examine how cyberthreats can be detected
and managed effectively through harmonized policies and
improved organization structures.
Addressing the technical and legal challenges related to
the borderless nature of cybercrime
Objective: to consider how the technical and legal
challenges associated with cybercrime can best be
addressed.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity 2/2
Be Safe Online: A Call to Action
Objective: What can be done and what should be done to
protect our most valuable resource : our children?
ITU Global Cybersecurity Agenda: Towards an
International Roadmap for Cybersecurity
Objective: How the framework and expert proposals
developed within the GCA can help countries promote
cybersecurity.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity III
Addressing the technical and legal challenges related to the
borderless nature of cybercrime
Objective: to consider how the technical and legal challenges
associated with cybercrime can best be addressed.
Threats to cybersecurity are global in nature. Cybercriminals can strike
at will, exploiting technical vulnerabilities and legal loopholes through
cross-border operations that show no respect for geographical
boundaries or jurisdictional borders. This makes it difficult for any
single national or regional legal framework to address cyberthreats
effectively. What are the major challenges countries face in fighting
cybercrime? How can countries deal with these challenges?
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity IV
Be Safe Online: A Call to Action
Objective: What can be done and what should be done to protect our
most valuable resource – our children?
The most vulnerable Internet users online are children. In
industrialized countries, as many as 60% of children and teenagers use
online chatrooms regularly, and evidence suggests that as many of
three-quarters of these may be willing to share personal information in
exchange for online goods and services. In some countries, as many as
one in five children may be targeted by a predator or paedophile each
year. These trends are increasingly true in many emerging and
developing countries as well.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009
HLS 2008 Sessions on Cybersecurity V
ITU Global Cybersecurity Agenda: Towards an International
Roadmap for Cybersecurity
Objective: How the framework and expert proposals developed within
the GCA can help countries promote cybersecurity.
There are many valuable national and regional initiatives underway to
promote cybersecurity. However, the growing global cyberthreats need
a global basis on which they can be addressed. On 17 May 2007, the
ITU Secretary-General Dr. Hamadoun Touré launched the Global
Cybersecurity Agenda (GCA) as a framework for international
cooperation to promote cybersecurity and enhance confidence and
security in the information society. The GCA seeks to encourage
collaboration amongst all relevant partners in building confidence and
security in the use of ICTs.
Forum on Next Generation Network Standardization
Colombo, Sri Lanka, 7-10 April 2009