BUILDING THE INFORMATION SOCIETY 14 May 2007 1 ITU-T activities on security (focus on ITU-T ITU-T activities on security (focus on ITU-T Study Group 17)

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

World Class Standards Recommended Improvements to The ETSI Standards Engineering Process Hans van der Veer Chair OCG-IOP & Steve Randall STF308 OCG#32,
Telecommunication Security
GSC: Standardization Advancing Global Communications Home Networking in ITU-T An overview of the Home Networking studies in ITU-T and of the Joint Co-ordination.
GSC: Standardization Advancing Global Communications ITU-T Status Report on standardization of Networked RFID P.A. Probst/Chairman of ITU-T SG16 SOURCE:ITU-T.
GSC: Standardization Advancing Global Communications 1 ITU-T Status Report on Disaster Relief and Early warning SOURCE:ITU-T TITLE:ITU-T Status Report.
GSC: Standardization Advancing Global Communications Update on ITU-T NGN activities since GSC10 Brian Moore Lucent Technologies Chairman of ITU-T Study.
GSC: Standardization Advancing Global Communications NGN-GSI TSR (Technical and Strategic Review) Chae Sub Lee, Dick Knight NGN-GSI TSR Coordinators SOURCE:ITU-T.
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
INTERNATIONAL TELECOMMUNICATION UNION Document 27 – E TELECOMMUNICATION STANDARDIZATION SECTOR TSB Directors Consultation Meeting on IPTV standardization.
ATU-ITU|TATU-ITU|T Preparing for WTSA Issues on SG Structure Gary Fishman ITU-T TSAG Chairman Preparatory Meeting for Africa for WTSA-04 Victoria Falls,
Geneva, 15 May 2009 Status of NGN architecture related studies in ITU-T SG13 Olivier Le Grand WP 3/13 chairman France Telecom JOINT ITU-T SG13 - IEEE NGSON.
Contact: African Region Involvement in ITU-T Activities and Africa’s Participation in WTSA 12 Raynold C. Mfungahema Contact:
GSC Global Standards Collaboration GSC#10 28 August – 2 September 2005 Sophia Antipolis, France ITU-T Security Standardization Herb Bertine Chairman ITU-T.
Telecommunication Security
ITU-T Network Security Initiatives
International Telecommunication Union ICT Security Standards Roadmap: an Update Mike Harrop Rapporteur ITU-T, Study Group 17 Q4 3 rd ETSI Security Workshop.
International Telecommunication Union Informal Forum Summit San Francisco, July 2003 PROGRESS REPORT ON ACTION ITEMS SINCE THE 2001 IFS Greg Jones.
Committed to connecting the world Major issues related to working methods of ITU-T WTSA-12 Regional Preparatory Meeting Tashkent, Uzbekistan 3 April 2012.
ITU-T SG5 activities on EMF
ITU-T activity in ICT security
International Telecommunication Union ITU-T Seminar – Lisbon, 25 June 2002 ITU-T Activities Greg Jones ITU Telecommunication Standardization Sector (ITU-T)
Arkadiy Kremer Chairman ITU-T Study Group 17 Session 5: SDOs security standardization, implementation and evaluation strategy ITU-T Workshop on "New challenges.
International Telecommunication Union ITU-T Seminar – Lisbon, 25 June 2002 ITU-T Activities on Security Greg Jones ITU Telecommunication Standardization.
ITU-D STUDY GROUPS A unique and neutral worldwide Forum where developed and developing countries meet to study through Questions matters of priority to.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Working methods of ITU-T Georges Sebek Counselor, SG 17 ITU.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Committed to connecting the world Overview of ITU-T Study Group 5 “Environment and Climate Change” Ahmed ZEDDAM France Telecom Orange Chairman, ITU-T Study.
Maputo, Mozambique, April 2014 Standardization activities on optical access transport systems in ITU-T SG15 Hiroshi OTA Study Group Engineer, ITU/TSB.
Maputo, Mozambique, April 2014 ITU Activities on Bridging the Standardization Gap (BSG) Hiroshi OTA Study Group Engineer, ITU/TSB
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GTSC-9 Summary Glenn Parsons, GTSC-9 Chair, ISACC Document No: GSC16-CL-04 Source: GTSC-9 Contact:
All-IP Transition Initiatives June 17, ATIS Board of Directors’ Meeting October 20, 2011 NANC Meeting June 17, 2014 IP Transition Work within.
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus) Abbie Barbir, Ph.D. ITU-T Q6/17 Cybersecurity.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Wayne Zeuch, ATIS ATIS Cybersecurity Standards Document No: GSC16-GTSC9-10 Source: ATIS Contact:
Cloud computing security related works in ITU-T SG17
Security Standardization in ITU-T
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
ITU-T Study Group 5 Activities on Smart Sustainable Cities Dr Ahmed Zeddam, Chairman, ITU-T Study Group 5 Orange, France.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Arkadiy Kremer Chairman ITU-T Study Group 17 Session 2: Role of Standardization in Cybersecurity.
International Telecommunication Union eInfrastructures Open Workshop (Internet & Grids), 15 April 2004) What ITU-T can do for GRIDs – or ITU-T in an 8-minute.
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
1 International Telecommunication Union ITU CHALLENGES AND RESPONSES (Fabio Bigi – TSB Deputy Director) (
International Telecommunication Union ITU Seminar on the Standardization and ICT development for the Information Society Uzbekistan, 6-8 October 2003 Network.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Security of Cyber-Physical Systems and Cross-SDO Collaboration 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
International Telecommunication Union Accra, Ghana, June 2009 AN AFRICAN VIEW ON THE OUTCOMES OF WTSA-08 Joshua Peprah Director, Regulatory Administration,
ITU Workshop on “Voice and Video over LTE” Geneva, Switzerland, 1 December 2015 ACTIVITIES OF THE ITU-T SG11 TOWARDS IMS AND VoLTE/ViLTE INTEROPERABILITY.
International Telecommunication Union Accra, Ghana, June 2009 Telecommunication Security Standardization in ITU-T SG 17 Georges Sebek, ITU/TSB ITU.
IRG-AVA REPORT The Role of Information and Communication Technologies in the Development of Inclusive Society Belgrade, 8 October 2015 Pilar Orero IRG-AVA.
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
ITU - Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-PLEN-44 FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
International Telecommunication Union 5th Annual Meeting for Telecom Development Beirut, May 2003 ITU-T standardization directions Greg Jones ITU.
ITU-T SG17 Q.2 Security Architecture and Framework An overview for newcomers Patrick Mwesigwa Q.2/17 Rapporteur 15 March 2016.
Inter-American Telecommunication Commission
Inter-American Telecommunication Commission
Global Standards Collaboration (GSC) 14
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
HIS Smart Grid – Summary (1)
ITU-T Products & Services
ITU Overview Empowering global ICT development Malcolm Johnson
ITU-T SG17 Q.3 Telecommunication information security management
ITU-T Study Group 17 Security
Martin Euchner, Advisor, ITU-T Study Group 17
The ITU-T and the Action Line C2 - WSIS
ITU-T activity in ICT security
COMMITTEE 4 ITU-T Structure: Points of agreement and
Presentation transcript:

BUILDING THE INFORMATION SOCIETY 14 May ITU-T activities on security (focus on ITU-T ITU-T activities on security (focus on ITU-T Study Group 17) 2 nd WSIS Action Line C5 Facilitation Meeting: Building Confidence and Security in the use of ICTs May 2007 Georges Sebek International Telecommunication Union (ITU)

BUILDING THE INFORMATION SOCIETY 14 May Cooperation Awareness Standards

BUILDING THE INFORMATION SOCIETY 14 May ITU-T Study Groups SG 2 Operational aspects of service provision, networks and performance SG 3 Tariff and accounting principles including related telecommunications economic and policy issues SG 4 Telecommunication management SG 5 Protection against electromagnetic environment effects SG 6 Outside plant and related indoor installations SG 9 Integrated broadband cable networks and television and sound transmission SG 11 Signalling requirements and protocols SG 12 Performance and quality of service SG 13 Next generation networks SG 15 Optical and other transport network infrastructures SG 16 Multimedia terminals, systems and applications SG 17 Security, languages and telecommunication software SG 19 Mobile telecommunication networks

BUILDING THE INFORMATION SOCIETY 14 May ITU-T Security Building Blocks

BUILDING THE INFORMATION SOCIETY 14 May Study Group 17: Security, languages and telecommunication software SG 17 is the Lead Study Group on telecommunication security - It is responsible for coordination of security across all study groups. Subdivided into three Working Parties (WPs) WP1 - Open systems technologies; WP2 - Telecommunications security; and WP3 - Languages and telecommunications software Most (but not all) security Questions are in WP2 Summaries of all draft Recommendations under development in SG 17 are available on the SG 17 web page at

BUILDING THE INFORMATION SOCIETY 14 May Cyber Security * Vulnerability Information Sharing… * Incident Handling Operations Secure Communication Services * Secure Mobile Communications * Home Network Security * Web Services Security Q.6/1 7 Q.9/1 7 Q.7/1 7 Q.5/1 7 Communications System Security Project *Vision, Project Roadmap, … Q.4/1 7 Telebiometrics *Multimodal Model Framework *System Mechanism *Protection Procedure Q.8/17 Security Architecture and Framework * Architecture, Model, Concepts, Frameworks Security Management * ISMS-T * Incident Management * Risk Assessment Methodology Telecom Systems Telecom Systems Users Countering spam by technical means * Technical anti-spam measures Q.17/1 7

BUILDING THE INFORMATION SOCIETY 14 May Examples of recently approved security Recommendations (revision to well established standards, frameworks, technology or applications-related,…) M , 1, 2, 3, 4 Security for the management plane: Overview, Security requirements, Security services, Security mechanism, Profile proforma X.509Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks X.805Security Architecture for Systems Providing End-to-End Communications X.893Information technology – Generic applications of ASN.1: Fast infoset security X.1035Password-authenticated key exchange (PAK) protocol X.1051Information security management system - Requirements for telecommunications (ISMS-T) X.1081The telebiometric multimodal model - A framework for the specification of security and safety aspects of telebiometrics X.1111Framework for security technologies for home network X.1121Framework of security technologies for mobile end-to-end communications X.1122Guideline for implementing secure mobile systems based on PKI X.1141Security Assertion Markup Language (SAML 2.0) X.1142eXtensible Access Control Markup Language (XACML 2.0) Y.2701Security requirements for NGN release 1

BUILDING THE INFORMATION SOCIETY 14 May Extract from the current SG 17 security work Q.AcronymTitle or Subject 5X.akmFramework for EAP-based authentication and key management 6X.1205Overview of cybersecurity 6X.idmfIdentity management framework 6X.gopwGuideline on preventing worm spreading in a data communication network 7X.1051 (Revised)Information security management guidelines for telecommunications based on ISO/IEC X.rmgRisk management guidelines for telecommunications 8X.bipBioAPI interworking protocol 8X.taiTelebiometrics authentication infrastructure 9X.homesec-2, 3, 4Certificate profile for the device in the home network, User authentication mechanisms for home network service, Authorization framework for home network 9X.msec-3General security value added service (policy) for mobile data communication 9X.p2p-1Requirements of security for peer-to-peer and peer-to-multi peer communications 9X.websec-3Security architecture for message security in mobile web services 17X.csreqRequirement on countering spam 17X.fcsipFramework of countering IP multimedia spam Many more in SG 17 work plan … 49 x items

BUILDING THE INFORMATION SOCIETY 14 May Question 15/13, NGN Security: work in progress Y.IdMsecNGN identity management security Y.NGN AAAAAA application for implementation of network and service security requirements over NGN Y.NGN AuthenticationNGN Authentication Y.NGN Certificate Management NGN certificate management Y.SecMechanismsNGN Security mechanisms and procedures Y.SecReqR2Security requirements for NGN release 2

BUILDING THE INFORMATION SOCIETY 14 May Specific Systems, Services, Applications Security in ITU-T are developed by SG 2, 3, 4, 5, 6, 9, 11, 13, 15, 16, 19 Core Technology and Common Security Techniques in ITU-T are developed by SG 17 Security standardization Collaboration is key factor 1/3 ISO/IEC SC 27, 37IETFANSI, ETSI, OASIS, etc.

BUILDING THE INFORMATION SOCIETY 14 May Security standardization Collaboration is key factor 2/3 World Standards Cooperation (WSC)ISO, IEC, ITU Global Standards Collaboration (GSC) Regional, National SDOs and ITU-T, ITU-R exchange information between participating standards organizations to facilitate collaboration and to support the ITU as the preeminent global telecommunication and radiocommunication standards development organization ISO IEC ITU-T Strategic Advisory Group on Security (SAG-S) To oversee standardization activities in ISO, IEC and ITU-T relevant to the field of security To provide advice and guidance to the ISO Technical Management Board, the IEC Standardization Management Board and the ITU-T Telecommunication Standardization Advisory Group (TSAG) relative to the coordination of work relevant to security, and in particular to identify areas where new standardization initiatives may be warranted To monitor implementation of the SAG-S Recommendations

BUILDING THE INFORMATION SOCIETY 14 May Security standardization Collaboration is key factor 3/3 Security Standardization Exchange Network (SSEN) an informal association of individual security practitioners with direct experience of, or strong interest in, security standardization facilitate the informal exchange of information on security-standards- related matters to increase overall awareness of issues of common interest with the intention of helping to advance the development of needed standards and minimizing overlap and duplication of effort in security standards development SG 17 Security Standardization, Implementation and Evaluation Strategy Initiative Why, What, How … to provide a security infrastructure Strategy includes necessary collaboration within SG 17, ITU-T SGs, ITU, the telecom industry and SDOs.

BUILDING THE INFORMATION SOCIETY 14 May Focus Group: Security Baseline for Network Operators (FG SBNO) Established October 2005 by SG 17 Objectives: Define a security baseline against which network operators can assess their network and information security posture in terms of what security standards are available, which of these standards should be used to meet particular requirements, when they should be used, and how they should be applied Describe a network operators readiness and ability to collaborate with other entities (operators, users and law enforcement authorities) to counteract information security threats Provide meaningful criteria that can be used by network operators against which other network operators can be assessed, if required. Achieved Survey network operators by means of a questionnaire Next step: Develop text to be proposed to SG 17 for progressing as an ITU-T publication

BUILDING THE INFORMATION SOCIETY 14 May Established December 2006 by SG 17 The objectives of the FG IdM areFG IdM 1) to perform requirements analysis based on uses case scenarios, in order 2) to identify generic IdM framework components, so that 3) a standards gap analysis can be completed, in order 4) to identify new standards work and the ITU and other SDOs that should perform the work The first two meetings of the FG IdM took place in February and April 2007 Focus Group structure Ecosystem and Lexicon Working Group Use Cases Working Group Requirements Working Group Framework Working Group Focus Group: Identity Management (FG IdM)

BUILDING THE INFORMATION SOCIETY 14 May ITU-T SG 13 Q.15 Rec. Y.IdMsec ITU-T SG 17 Q.6 Rec. X.Idmf ITU-T Focus Group Identity Management Established Geneva Feb Geneva Apr Mountain View May Tokyo Jul Geneva Sept ISO/IEC JTC 1/SC27 Focus Group IdM: Timing

BUILDING THE INFORMATION SOCIETY 14 May ICT security standards roadmap Part 1 contains information about organizations working on ICT security standards Part 2 is database of existing security standards Part 3 will be a list of standards in development Part 4 will identify future needs and proposed new standards Part 5 is now being built and includes Security Best Practices ENISA and Network and Information Security Steering Group (NISSG) are now collaborating with ITU-T in the development of the Roadmap

BUILDING THE INFORMATION SOCIETY 14 May Roadmap access Part 2 currently includes ITU-T, ISO/IEC JTC 1, IETF, IEEE, ATIS, ETSI and OASIS security standards By the end of May 2007, the data will be available in a database format to allow searching by organization and topic and to allow organizations to manage their own data Publicly available under Special Projects and Issues at: We invite you to use the Roadmap, provide feedback and help us develop it to meet your needs

BUILDING THE INFORMATION SOCIETY 14 May Other projects Security in Telecommunications and Information Technology – an overview of existing ITU-T Recommendations for secure telecommunications. Security compendium: catalogue of approved ITU-T Recommendations related to telecommunication security extract of ITU-T approved security definitions listing of ITU-T security related Questions

BUILDING THE INFORMATION SOCIETY 14 May Observations Security is everybody's business Collaboration with other SDOs is necessary Security needs to be designed in upfront Security must be an ongoing effort Systematically addressing vulnerabilities (intrinsic properties of networks/systems) is key so that protection can be provided independent of what the threats (which are constantly changing and may be unknown) may be

BUILDING THE INFORMATION SOCIETY 14 May Some useful web resources ITU-T Home page Study Group Recommendations ITU-T Lighthouse ITU-T Workshops Security Roadmap