Security in the use of ICTs APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam Maloor, ITU.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Ashish Narayan, Advisor, ITU Regional Office for Asia and the Pacific
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Overview of Convergence APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam Maloor, ITU.
Protection of Critical National Infrastructure APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam.
WSIS Thematic Meeting Measuring the Information Society Telecommunication Development Bureau International Telecommunication.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
THAILAND COUNTRY REPORT Regional Multi-stakeholder Discussion Forum on Rural ICT Development Bangkok, Thailand, 4 July 2011 Rural ICT Policy Advocacy,
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Lisbon, Portugal 22 April 2009 Alexander Ntoko Head, Corporate Strategy Division International Telecommunication Secretary-General’s Report to WTPF 2009.
EU regulatory framework for electronic communications - Introduction Richard Harris Independent EU telecommunications consultant ICTtrain workshop London.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All The Internet of Things (IoT) aka Machine 2 Machine (M2M) Bilel Jamoussi Chief, Study Groups Department.
ITU.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Swedish Post and Telecom Authority World Conference on International Telecommunications (WCIT-12) Revision of the International Telecommunication Regulations.
 Background  Why the ITRs are important  The need to revise the ITRs  Preparatory process  Some key proposals  Expectations for WCIT-12.
Smart Cloud Strategy in Japan November 2010 Yasu TANIWAKI Division Director, ICT Strategy Division Ministry of Internal Affairs and Communications JAPAN.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
INTERNATIONAL COOPERATION PUBLIC CONSULTATION FIRST OVERVIEW EXPORTIC 27 March 2008 JF SOUPIZET HEAD OF INTERNATIONAL RELATIONS DG INFSO These view are.
11 Cybersecurity & Cybersecurity & Child Online Protection (COP) February 2012 Colombo, Sri Lanka Eun-Ju Kim, Ph.D. Regional Director ITU Regional.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
IMPLEMENTING THE WSIS ACTION PLAN NAIROBI, March 2004 Jose Toscano Director, External Affairs International Telecommunications Satellite Organization.
World summit on the information society World Summit on the Information Society World Summit on the Information Society Overview and Assessment Geneva.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
A National approach to Cyber security/CIIP: Raising awareness.
Internet Governance After the 2012 World Conference on International Telecommunication Regulations.
ASIA-PACIFIC TELECOMMUNITY (APT) “Key Activities and Programs” TCT/TTA Joint Seminar “NGN Broadband Development and Implementation” 29 January 2009 By:
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development SECRET 1 PRESENTATION TO THE PORTFOLIO COMMITTEE ON COMMUNICATIONS:
ITU Carla Licciardello Policy Analyst
Civil Aviation Bureau, MLIT, Japan APEC Aviation Security Sub-group meeting Ministerial Conference on International Transport Security - Outline of Ministerial.
Draft Action Plan for the Implementation of WCIT12 outcomes By Dr. Sherif Guinena Advisor to NTRA Exec. President Coordinator for African Common Proposals.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
The World Summit on the Information Society Eun-Ju Kim, Ph.D. Senior Advisor for Asia and the Pacific International Telecommunication Union The Workshop.
THE FINAL ACTS OF THE ITU PLENIPOTENTIARY CONFERENCE, MARRAKESH, MOROCCO 2002 PRESENTATION TO SELECT COMMITTEE ON LABOUR AND PUBLIC ENTERPRISES.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
International Telecommunication Union COPANT/PASC April ITU and international standards collaboration Gary Fishman Chairman ITU Telecommunication.
23 January 2016 Gustavo C ARUSO Head, Regulatory Activities Section Division of Nuclear Installations Safety Department of Nuclear Safety and Security.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion Mário Rodrigo Canazza Anatel (Brazil)
ITU-T Activities in Bridging The Standardization Gap Vijay Mauree Programme Coordinator, TSB ITU ITU Regional Standardization Forum for Asia-Pacific (Jakarta,
International Telecommunication Union Arab Regional Preparatory Meeting for the World Conference on International Telecommunications (WCIT-12) Cairo, Egypt,
RCC Preparations WCIT-12 Dmitry Cherkesov (Russia) Deputy Head of RCC WP for WCIT-12 Com-ITU Meeting 6 – 8 September 2011 Lisbon, Portugal.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Telecommunications Industry Association (TIA) ADVANCING GLOBAL COMMUNICATIONS.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1 Regional Commonwealth in the field of Communications RCC PREPARATION FOR THE WORLD CONFERENCE ON INTERNATIONAL TELECOMMUNICATIONS
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Inter-American Telecommunication Commission (CITEL)
Cyber Security and Georgia. New Challenges
Regional Commonwealth in the field of Communications
WTSA-12 Resolutions addressing security
Cybersecurity in the ECOWAS region
WTSA-12 Resolutions addressing security
ITU an Overview Combined International SNO and 8th African SNO
The Role of European Standards in Support of the Cybersecurity Act
Survey of ICT Standardization Capability of Developing Countries
De-Briefing Meeting on WCIT-12 Durban, July 8th 2013
Trust and Security Unit
Bilel Jamoussi Chief, Study Groups Dept. TSB/ITU
Promoting Global Cybersecurity
Outline of Presentation
Supported by ITU-BTRC Asia-Pacific Regulators’ Roundtable
Bilel Jamoussi Chief, Study Groups Dept. TSB/ITU
WCIT12 Update Planning & International Relations Department
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Security in the use of ICTs APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam Maloor, ITU

Current Proposals to WCIT regarding the ITRs The 1988 ITR does not contain explicit provisions on security in the use of ICTs – The reference in Article 9 to avoiding technical harm was added in light of the Morris worm, or Internet worm of 2 November Some specific proposals have been submitted to CWG-WCIT that are clearly related to Cybersecurity – Adding new articles on security in the use of ICTs – Amending existing articles (e.g. article 8), in order to include security related elements – Making specific references to countermeasures against spam (in line with WTPF Opinion 6) There is no consensus on the proposals

ITU plays an important role in resolving new and emerging issues (PP-10 Resolution 171) and has developed a number of activities with regard to building confidence and security in the use of ICTs Following the World Summit on the Information Society (WSIS), Heads of States and world leaders entrusted ITU to take the lead in coordinating international efforts as the sole Facilitator of Action Line C5, "Building confidence and security in the use of ICTs". Resolutions from PP, WTSA, WTDC call upon more ITU involvement in building confidence and security in the use of ICTs In the Global Cybersecurity Agenda (GCA), ITU promotes international cooperation aimed at proposing strategies for solutions to enhance confidence and security in the use of ICTs ITU-T Study Group 17 is the Lead Study Group for Telecommunication security, and ITU-T Lead Study Group for Identity management ITU-D Study Group 1 Question 22 on Securing information and communication networks: best practices for developing a culture of cybersecurity ITUs role and mandate

The global cyber threat landscape The definitions International cooperation and agreed international norms and principles International standards The interdependencies Global Challenges

January 2011 Major cyber intrusion in Defense Research and Development in Canada. Finance Department and Treasury board forced to disconnect from the internet March 2011 Hackers penetrate French government computer network South Korea Defense Network penetrated RSA Secure ID compromised Attacks at EUs Commission and External Action Service June 2011 Attacks at Sony. Millions of logins leaked Attacks at NATO internal network Attacks at International Monetary Fund (IMF) Hackers disrupt 51 Malaysian government websites UK Treasury under sustained cyberattack October 2011 Cyber-attacks on UK at disturbing levels Japan under Heavy Cyber Attack November 2011 Hackers destroyed a pump used by a US water utility Duqu computer virus Detected by Iran civil defense organization More than 100 Pakistani Government Sites Under Malware attack Thousands of United Nation (UNDP) logins leaked Cyber attacks hit Fujitsu local government system in Japan Largest DDOS attack hit Chinese company Global Challenges - The global cyber threat landscape

There is not yet a globally accepted definition of security in the use of ICTs IGOs and SDOs have their own definition – ITU-T Recommendation X.1205 Member States might use different definitions – 2009 US National Infrastructure Protection Plan – Dutch national strategy Dictionaries provide other definition – Oxford dictionary Global Challenges - The definitions

Cyberattacks can originate and strike anywhere around the globe. There have been calls for: – norms and principles agreed by the international community for acceptable state behavior in cyberspace – international minimum standard of relevant offences internationally imposed – harmonized legal frameworks, where domestic laws contain provisions on international cooperation Global Challenges - International cooperation and agreed international norms and principles Cyber threats are inherently international in scope and require multi-stakeholder international cooperation

Building Security in the use of ICTs require legal, organizational and technical capabilities Standards can complement the overall efforts, providing interoperability and conformance of security while meeting regulatory constraints of countries and regions The adoption of common technical standards can also help developing countries and bring them up to speed (bridging the standardization gap) Global Challenges - International standards

Telecom Sector and the Internet are considered as interconnected and interdependent systems Infrastructures that have been in isolation so far, are being increasingly supported by telecommunication (e.g. industrial automation networks, intelligent transportation systems (ITS), e-government networks) This paradigm shift of interconnected systems makes ICTs susceptible to cyberattacks of unforeseeable impact Global Challenges - Interdependencies

The security in the use of ICTs have been an increasing international concern over the past 10 years. Countries, regional and international organizations started to elaborate and develop Cybersecurity policies and strategies – National efforts (National strategies and plans – e.g. US, UK, Germany, Estonia, Australia, Malaysia, South Korea and Brazil, among others – India and South Africa also started) – Regional and cross regional efforts (EU initiatives, APEC, ASEAN, CoE, ENISA, FIRST, G8, Meridian, NATO, AOS, OECD) – International efforts (IMPACT, IEEE, IEC, ISO, INTREPOL, UNODC) Overview of the current situation at national, regional, and international level