Top Malware Source Countries RankCategory 1Business / Financial 2Computers & Technology 3Pornography/Sexually Explicit 4Search Engines and Portals 5Health & Medicine 6Education 7Shopping 8Personal Sites 9Real Estate 10Travel Top Malware Hosting Website Categories Source: Symantec, Kaspersky, McAfee, Sophos Global Statistics – Malware attacks 2008-2009 Reported Malware Incidents 2008-2009 Top Attack Sectors Malware: Hostile, intrusive, or annoying software or program code designed to infiltrate a computer system (virus/worms/Trojans/rootkit/backdoors/spyware). Botnets: Software agents/bots that run autonomously and automatically under a common command-and-control structure and perform malicious activities. Phishing: Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. Spamming: Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately in the form of e-mail, instant messaging etc. SQL injection: Code injection technique that exploits vulnerability in the database of an application resulting in unexpected execution of code.
Building a Global Culture of Cybersecurity The World Summit on the Information Society (WSIS 2003) recognized the real and significant threat posed by inadequate confidence and security in the use of ICTs and the proliferation of cybercrime At WSIS in 2005, ITU was entrusted by leaders of the global community to be the Facilitator and Moderator of Build confidence and security in the use of ICTs. As a result, the Global Cybersecurity Agenda (GCA) was launched, as a framework for international cooperation on cybersecurity UN General Assembly has outlined elements for creating a global culture of cybersecurity through several resolutions, including: Resolution 64/L.8 (2009)Creation of a Global Culture of Cybersecurity (Second Committee) Resolution 64/L.39 (2009) Developments in the field of information and telecommunications in the context of international security (First Committee)
Global Cybersecurity Agenda A 5-part platform 2. Legal measures 1. Technical & procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation
ITU Cybersecurity Resources package : Toolkit for Cybercrime legislation; Understanding Cybercrime: A Guide for Developing Countries; National Cybersecurity/Critical Information Infrastructure Protection Self-Assessment Tool; Botnet Mitigation Toolkit; Study on Financial Aspects of Network Security: Malware and Spam; Toolkit for Promoting a Culture of Cybersecurity; Child Online Protection (COP) Initiative; International Multilateral Partnership Against Cyber Threats (IMPACT).
Creating Confidence in Cyberspace Global problem which cannot be solved by any single entity (country or organization); The Information Society was built by Member States, Private Sector, Civil Society and the Media – the issue of cybersecurity must therefore be dealt with by all stakeholders ; UN agencies need to work together to ensure that WSIS goals are met and that UN is able to Deliver as One on cybersecurity; Chief Executive Board is engaged.
Recognizing the need for public trust & network security in building… an equitable, inclusive information society.