APCAUCE Meeting Overview of ITU Development Sector Activities New Delhi, India

advertisement
APCAUCE Meeting
Overview of ITU Development
Sector Activities
New Delhi, India
2 September 2007
Robert Shaw
Head, ICT Applications and Cybersecurity Division
ITU Telecommunication Development Sector
International
Telecommunication
Union
Setting the Context
 In the 21st century, growing dependency on





information and communications systems
(ICTs) that span the globe;
Rapid growth on ICTs and dependencies led to shift
in perception of cybersecurity threats in mid-1990s;
Growing linkage of cybersecurity and critical
information infrastructure protection (CIIP);
Number of countries began assessment of threats,
vulnerabilities and explored mechanisms to redress them;
With national consideration, began move to international
political agenda;
At the World Summit on the Information Society (WSIS),
consensus that “Building confidence and security in the use of
ICTs” was key issue for building Global Information Society
August 2007
2
Examples of International
Cooperation Agenda







Council of Europe Convention on Cybercrime
(1997-2001)
UN Resolutions 57/239 (2002) and 58/199
(2004): Creation of a global culture of
cybersecurity and the protection of critical
information infrastructure;
WSIS Phase I (2003) and Phase II (2005):
Building confidence and security in the use of ICTs;
WSIS Thematic Meeting on Countering Spam (2004);
ITU World Telecommunication Standardization Assembly
Resolutions (2004): Cybersecurity and Spam;
WSIS Thematic Meeting on Cybersecurity (2005);
ITU World Telecommunication Development Conference 2006:
 Programme 3 Activities;
 Question 22/1: Securing information and communication networks: Best
practices for developing a culture of cybersecurity.

ITU Resolution 130 update: Strengthening the role of ITU in building
confidence and security in the use of information and communication
technologies (Antalya, 2006);
August 2007
3
Many Relevant Actors in International
Cybersecurity/CIIP Ecosystem
ITU Cybersecurity Work Programme
to Assist Developing Countries
 Most countries have not
formulated or implemented a
national strategy for
cybersecurity and Critical
Information Infrastructure
Protection (CIIP)
 ITU Work Programme scopes a
set of proposed high level
assistance activities
 Contains set of detailed
initiatives planned in the 20072009 period by the ITU
Development Sector’s ICT
Applications and Cybersecurity
Division
www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-cybersecurity-work-programme-developing-countries.pdf
August 2007
5
ITU-D Cybersecurity Work Programme to Assist
Developing Countries: High Level Elements




Assistance related to
Establishment of National
Strategies/Capabilities for
Cybersecurity and Critical
Information Infrastructure
Protection (CIIP)
Assistance related to
Establishment of appropriate
Cybercrime Legislation and
Enforcement Mechanisms
Assistance related to
Establishment of Watch,
Warning and Incident Response
(WWIR) Capabilities
Assistance related to
Countering Spam and Related
Threats
August 2007



Assistance in Bridging the
Security-Related
Standardization Gap between
Developing and Developed
Countries
Establishment of an ITU
Cybersecurity/CIIP Directory,
Contact Database and Who’s
Who Publication
Assistance in Information
Sharing through Enhancing the
ITU Cybersecurity Gateway
 www.itu.int/cybersecurity

Outreach and Promotion of
Related Activities
6
Examples of Specific Initiatives
 Identification of Best




Practices in the
Establishment of National
Frameworks for
Cybersecurity and CIIP
National Cybersecurity/CIIP
Readiness Self-Assessment
Toolkit
Botnet Migitation Toolkit
Cybersecurity Guideline
Publications for Developing
Countries
International Survey of
National Cybersecurity/
CERT Capabilities
August 2007
 Toolkit for Model Cybercrime
Legislation for Developing
Countries
 2007-2008 Regional Workshops
on Frameworks for
Cybersecurity and Critical
Information Infrastructure
Protection






Hanoi, Vietnam
Buenois Aires, Argentina
Praia, Cape Verde
Thailand
Egypt or Tunisia
Caribbean
 Toolkit for Promoting a Culture
of Cybersecurity
7
Examples of Specific Initiatives
 Translation of MAAWG Best
 ITU-D Question 22/1: Securing
 Activities to support
StopSpamAlliance
 Contact Database Support?
 Calls for Member States and
Sector Members to create a
report on best practices in the
field of cybersecurity;
 Question has a four-year study
cycle
Practices Document
 Study on the Economics of
Spam
 Translation of CERT.BR
cartoons to educate users
 Spam Initiatives Survey
 Open Forum at Internet
Governance Meeting in Rio
de Janeiro (November
2007)
August 2007
information and communication
networks: Best practices for
developing a culture of
cybersecurity
 17 September: all day
workshop at ITU with tutorial
on elements of cybersecurity
best practices
 U.S. and EU speakers;
 Open to all participants.
8
More information
www.itu.int/itu-d/cyb/
www.itu.int/itu-d/cyb/cybersecurity/
August 2007
9
International
Telecommunication
Union
Building the Information Society
August 2007
10
Download