2 ITU-T activity in ICT security Dr. Jianyong Chen(Vice-Chairman, ITU-T SG17)
3 ITU-T activity and collaboration in ICT security ITU-T SG17 Security----leading study group on securityWP1 Network and information securityQ. 1 Telecommunications systems security projectQ. 2 Security architecture and frameworkQ. 3 Telecommunications information security managementQ. 4 CybersecurityQ. 5 Countering spam by technical meansWP2 Application securityQ.6 Security aspects of ubiquitous telecommunication servicesQ. 7 Secure application servicesQ. 8 service oriented architecture securityQ. 9 TelebiometricsWP3 Identity managementQ.10 Identity management architecture and mechanismQ. 11 Directory services, directory system, and public-key/attribute certificatesQ. 12 Abstract syntax notation one (ASN.1), objective identifiers (OIDs) and associated registrationOther SGsSG13 Future network---Q.16 Security and identity management for NGNSG 16---multimedia security
4 Major accomplishment Security Infrastructure Public key infrastructure (PKI)X.500 series (X. 509 etc.)TelebiometricsX (framework, interworking protocol, biometric authentication protocol, biometric digital key and biometric data security, etc.)Identity managementX Baseline capabilities for enhanced global identity management trust and interoperabilityX A framework for user control of digital identity X Baseline identity management terms and definitions Y NGN identity management framework Y NGN identity management requirements and use cases
5 Major accomplishment Cybersecurity Countering spam X.1205Overview of cybersecurity X.1206A vendor-neutral framework for automatic notification of security related information and dissemination of updates X.1207Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted softwareCountering spamX.1231Technical strategies on countering spam X.1240Technologies involved in countering spam X.1241Technical framework for countering spam X.1242Short message service (SMS) spam filtering system based on user-specified rules X.1244Overall aspects of countering spam in IP-based multimedia applications
6 Major accomplishment Security framework Security management X.805Security architecture for systems providing end-to-end communicationsSecurity managementX.1051Information technology - Security techniques - Information security management guidelines for telecommunications organizations based on ISO/IEC X.1055Risk management and risk profile guidelines for telecommunication organizations X.1056Security incident management guidelines for telecommunications organizations
7 Major accomplishment IPTV security Mobile security X.1191Functional requirements and architecture for IPTV security aspects Mobile securityX.1121 Framework of security technologies for mobile end-to-end data communications X Guideline for implementing secure mobile systems based on PKI X.1123 Differentiated security service for secure mobile end-to-end data communication X.1124 Authentication architecture for mobile end-to-end data communication X.1125 Correlative reacting system in mobile data communicationSecure application securityX.1143 Security architecture for message security in mobile web servicesX.1151 Guideline on secure password-based authentication protocol with key exchange X.1152 Secure end-to-end data communication techniques using trusted third party services Peer-to-peer securityX Framework for secure peer-to-peer communications X.1162 Security architecture and operations for peer-to-peer networksRFID/PII securityX.1171 Threats and requirements for protection of personally identifiable information in applications using tag-based identification
8 Future direction-Identity management Interoperability of identity managementX.giim, Generic IdM interoperability mechanismsX.idm-ifa, Framework architecture for interoperable identity management systemsX.1250, Baseline capabilities for enhanced global identity management trust and interoperabilityTrust of identity managementX.authi, Authentication integration in IDMX.EVcert, Extended validation certificateX.eaa, Information technology – Security techniques – Entity authentication assuranceX. OITF, Open identity trust frameworkDiscovery of of identity management informationX.discovery, Discovery of identity management informationprotection of personally identifiable informationX.1275, Guidelines on protection of personally identifiable information in the application of RFID technologyX.priva, Criteria for assessing the level of protection for personally identifiable information in identity management
9 Future direction--Cybersecurity Cybersecurity Information Exchange (CYBEX)Facilitate standardized global exchange of vulnerability and incident informationmaking security measurableX.sisfreqCapabilities and their context scenarios for cybersecurity information sharing and exchangeX.cybexCybersecurity information exchange frameworkX.cveCommon Vulnerabilities and ExposuresX.cvssCommon vulnerability scoring systemX.gopwGuideline on preventing malicious code spreading in a data communication networkX.alertingProcedures for the registration of arcs under the Alerting object identifier arcX.1205Supplement 8Draft Supplement to X.series Recommendation - ITU-T X.1205 – Supplement on best practices against botnet threats
10 Future direction-- Cloud computing security Recommendations in developingX.srfctse, Security requirement and framework of cloud based telecommunication service environmentX.ccsec, Security guideline for cloud computing in telecommunication areaPKI and identity management in cloud computingITU-T Focus Group on Cloud Computing (FG-Cloud)
11 Future direction-- Ubiquitous network and service security Recommendations in developingX.usnsec-1, Security framework for ubiquitous sensor networkX.usnsec-2, Ubiquitous sensor network (USN) middleware security guidelinesX.usnsec-3, Secure routing mechanisms for wireless sensor networkM2M communication, Internet of things, etc.
12 Future direction– IPTV Recommendations in developingX.iptvsec-2, Functional requirements and mechanisms for secure transcodable scheme of IPTVX.iptvsec-3, Key management framework for secure IPTV servicesX.iptvsec-4, Algorithm selection scheme for service and content protection (SCP) descramblingX.iptvsec-5, Service and content protection (SCP) interoperability schemeX.iptvsec-6, Framework for the downloadable service and content protection (SCP) system in mobile IPTV environmentX.iptvsec-7 , Guidelines on criteria for selecting cyptographic algorthms for the IPTV service and content protection (SCP)
13 Future direction – Secure application security Recommendations in developingX.websec-4, Security framework for enhanced web based telecommunication servicesX.sap-3, Management framework for one time password based authentication serviceX.sap-4 , The general framework of combined authentication on multiple identity service provider environmentX.sap-5, A guideline on anonymous authentication for e-commerce serviceX.p2p-3, Security requirements and mechanisms of peer-to-peer-based telecommunication network
14 Collaboration Webpage on ICT security standard roadmap Webpage on ICT cybersecurity organizationsJoint coordination activity on various areas (e.g. JCA-IdM)
Your consent to our cookies if you continue to use this website.