 :22/1  

advertisement
22/1 

(2010-2006)1
:22/1




2010

(ITU-D)
! "#$% &' (2006 ) 2 (WTDC-06) 34 " ,
56 78 ! 9: (2006 ) 1 1 2 - .
*+ ,- * " ,./ !
BC D ,./+ E/ ! 2010-2006 @'% A$4 8 1 = >6 ? .*2; 3#$ <$2
D ,./+ G2 ! *6 ? 18 2 = +? . % $ F / #
. +$ H 1;I JH;K B +L @!6 BC
: Mr Souheil MARINE/Ms Christine SUND
Telecommunication Development Bureau (BDT)
ITU
Place des Nations
CH-1211 GENEVA 20
Switzerland
Telephone:
+41 22 730 5323/ 5203
Fax:
+41 22 730 5484
E-mail:
souheil.marine@itu.int
christine.sund@itu.int
: !" #$
. !" #$ %& ' ()* + ,-./0 12
ITU
Sales Service
Place des Nations
CH-1211 GENEVA 20
Switzerland
Fax:
+41 22 730 5194
E-mail: sales@itu.int
http://www.itu.int/publications
: %)*'+ %&'(
© ITU 2010
R !S T+ A;/+ IL UFV% 6 WX- $ 9Y% @G :Z T+ 5[ 9? \/ ]^ .N'O P1Q EM
._
22/1
(2010-2006)
1
:22/1 : !"#$ % &'(
%& '( ) *+ ,* ( - '/0* 1 . !" # $
.12&1 3 41 567 8/& (
iii
22/1
%9
1
......................................................................................................................... 6
........................................ &'#$ %
"#$ !
I ............................................................ 0+ -&/ , *
+ )&$ ($
A.I
.............................................................*
+:
90+ 78 456
1
23
B.I
7
7
10
11
11
14
14
14
20
20
20
........................................................ B&3
A&2
@!
>? <&=
&;/ II .............................................................. 0+ -&/ , *'# )&$ ($
A.II
............................................................... *C
0+ 78 456
1
23
B.II
................................................................................. E
D
A5- III .............................................................. 0+ -&/ , *'# )&$ ($
A.III
............................................................... *C
0+ 78 456
1
23
B.III
................................ O&=EN
?&N
-
0EI
L;
M
:J5
!
4-
5I GH &FE/ IV ............................................................ 0+ -&/ , *
+ )&$ ($
A.IV
.............................................................*
+:
90+ 78 456
1
23
B.IV
23
.................................................................... %&R PQ
V .............................................................. 0+ -&/ , *'# )&$ ($
A.V
.............................................................*
+:
90+ 78 456
1
23
B.V
26
................................................................................... 1
UM&? GT&; 1 SQ0
28
.......................................... &=V
X?
:
&W , <&=
0V 2 SQ0
31
.............................................................. (Spam) &8;
ST&- :1&
-
YZ 78#M
47
......................................................................................... QC
4-
5/ &? 78#M
57
...................................................................................... ^
_?
- ]^ 78#M
23
23
1
22/1
22/1 '( )* +, -.$ / #$ %& ! " ; & <& 7= > '? ) /34 @1 9 .1( -.$ / 01 234 5 67 894
23N4 /MO PK PQR I3 'ST ' /M .-.$ 0GH I# JK H L) A BCD 'EF&
/ 8\ +, .-.$ / #$U V4 W ? 7N X X$Y I$Z J +, [),$&
PG^ d`K .b / ) cHK +, ^ M`4 & M3` a B^ _TK KCD '-.$ / +, ] B^
e& B, / & 0J f g +, '>7T d3 T *h & LMT a ij 2K^ @1
2
.kJ B,1 l3 B$K m?
:n] e o $p t-.$ /s Q4 rF
•
t,* p M? I ( S$& +, B4 u1
•
tK.$ O% E
•
tP v? f 8Mg 1 [) v)g
•
.-.$ /s Dw "7
•
@1 7= i44 d` A .-.$ / 01 ! Q7 / P0J M` B^ x / *, M ey3
. |9 i$T Sz^ , } BM4 )u .z{ *, +, *, GH4
$ ,>‚ 2K# ITU-T X.1205 f ) g +, ' |~ ' "\
B>G 3 >& GD^ i) 0J <& [1 67K 7J l3& K>G 8H&
I>$& ƒ^ >9& >`4 .I>$& ƒ^ >9& K.$ „3 a f 7)< /MO W JM
> M *? '
A*4A >9K^ '
)h '
3N 'g 3 'IH=& '& i? 7…
>9> ‡h +, ˆH? ‰Z H] -.$ / )z B#! / .K.$ „3 f K<& ^/ &
:e ‹ /s |) k#4 .K.$ „3 f * Š <& 01 I>$& ƒ^
D
•
* L), >`4 )u W '$
•
uŒ&
•
? g 3 a '
> ? g 3 '? g 3 '-.$ / I u 87H4 87& /
.u x 1 M` * .? d\ g 3 '
>
kp= )h >9K 3, P>, 71 9 (CI) BCD '
H f kH /34 } B] /„
/ ,>‚ 5^ +, ^ e / ^ [Q ^ $ g* +, Œ{ @1 d)4 ^ 7N4 5Y W $p
>9K w) 'FD , (-3& ‰D& w) , / ? g 3 k#4 .)T B{ f x
& JM4 , >`4 [, 7M 'z ) / "?" 3N /34 )u .(1 M` 9K) (
K3
'g3 T& 'p>M & 'x& '\ ', ' g* ' 'D*& ƒ>, 'uN '
A*4A
.27003 27001 !" # .42 () *$
% &+ ,-/0 1 23 0 :(WSIS) $
% &' % 1
2
22/1
2
2K^ 4 >? rF ‘N’ @1 JT f > T r“ f B)3 . M? )h ,Nu
)u dD (FDA & >? ”Š f U '? g 3 a 'Sz^ [3 5^) ? g 3 7) M`
.5*uA A L7& 8,) / K& B>F / ƒ
'
N 'uN N• '|*& -3 w '2 h & 2^ 2 *uA ,N x / ENu ]
JM4 +, >,A ] )>4 ) *u f ? ,N x /M .M? i4M& '
H`$&
xo 2 mŒ& 0 +, L )>4 & o^ ,N x BCD '! – +, .
A*4A &
? g 3 f d3] N, 5^ v)T BCD '2, .o>,^ BY! k*4 X)z —) )3 [)u f ŒY '
A*4A & JM4 ENu x) Q P PŒ^ H +, v)˜ B^ 2K#! / >
>? D B^ 6K B#! / .[) ,Nu f 27 0^ +,
.
> ? g 3 eFDA BM>
> ? g 3 / ,D ,>‚ (CIIP) > ? g 3 a .4 '1 M` f 21 ` >]
g 3 4 ƒz / K.$ v? ƒM!^ r“ / >? -.$ / D .0$ +, -.$ /
.I>$> JTA D4 W )h M3` I#4 '$? ,N 7, )>4 W > ?
N`K ƒM!^ / [dw] PAM!^ z#4 U '? d\ ? > g 3 +, ŒY4 B^ K.$ vg /MO
[G ‚. guA p `K )h šD & >Qo f (botnets) ™ 4 L)< w '[G
v? >`4 )u '”Š @1 DF .> +, M3` [)u f ŒY4 W (3< L ‚ dH w)
+, [, '(pharming) *<` & u$ g (phishing) nTA )* w ,` d\ N`K^ K.$
N4 mNK E$4 r 'r mNK +, D4 Q7& )4 r A f z{ -.$ Nh .o u
.K.$ <& xo 7>4 T k› +, B)3 ™F4 )u .IK.$ IQ> )
'-.$ / #$ %& ] 0`K1 '? K.$ <& e, [ -.$ / ‰g ( 6R 5^ >`
'Œ kH< d)4 H4 'Nh 84 PG^ M` .vT / r & 5)* f 7 [HA /MO W ‘ u1
a +, ),$ B^ -.$ /s )J ( 6K rF B#! / .-.$ /s ( 6K 5^ / P0J 6p [1
ˆH? '
& >9K^ f K<& & a '
,N ., ‘N< > f b$& ‰ /, m> / )3 *u
.87 œ g B>F 'e / K '7>% Œ +,
3
22/1
! "# $%& :1 *
! "#$% &
.'( )+ ,- ./0
(CIIP)
! "
# $%&
*( )
*( )
!" #$%& '( )* +,$ -. //0 1
2 3 -4 3DE B
0
( 2005-2003 A B
C A (WSIS) 90: ;
< :0 2 1 = >?
8 @*6 5 (6( 78
>?
NO( P9 * > - 39 7( K6 LI 3M*8 - 36( 35 J7 )* ?2 5I 0 FG HI8
: ( 6Q R
* S 1 = "6:( HIT( "2 U' -* 90: ;
< :0 2
(
`
O 6QM ^a" (2006 ^ A ;I:) JZ9O: J(R: [\: 71 "2 A 6"9 4 XRY
b"2011-2008
Rd
A -.( 2e H fg A 6Q "(6 //0" (2006 ^ A ;I:) JZ9O: J(R: [\: 130 "2
(c
b"1( 90: I99
(h
3DE 3 >, j= A i (WTDC-06) 1 :0 [\ C(R * ^G - 0: H/I.
$ 9( k"
* +,$ -. 6Rl mN 1( 90: I99 2^( (
T 3(0
//0
r" 390 (2006 C(R) 45 "2 6
* pG( `6Rq ^ED n9%1 1 o^2
22/1
%&'( )*+ ,'+ - #/ 45 !#$ ." 0#01 %:;+ <=> ?8$ 9@2 !7 ,8 9 0#01+ -2 3'4 )5,6
A($/'4 BC DE )5,6 F>: GH 5 I#+ J/# K2$ 9,L4 MN5 $/ A( $
2006 J1 A8@;4 A($/'4 BC DE J/4 )*+ ,'+ - #+ O!5 PQR S$ .2006 J1 A8@;4
3
.http://www.itu.int/md/S06-PP-C-0024-en :T ?@4 O!5
!, \3H$ K]3( )*+ ^+ P\ 17 )/ 'X Y62 Z ;[4 ,5
a13 )/ 'X _ ` Z
2 M3HE ?g3+" K@'1( (2008 9fH:@6) )*+ ^ 41 1,X IbC c+/,5 d> 58 _ `1!\8 Z ,5( m5 d> "' K/!l! kb 9(CIRT) +@!14 iV@j )h 'R$ (g
a)*+ ,'+ P\ 22.1 ]4
J1 A c!R2 d> (GCA) p q41 GH( r14 s@4 ? Mt u# ^ #+ no!#
O!5 0= ? 9<Vl4 F>: </g4 1l g+ m/: K]3( Mt )h 2007 @# 17
: ^,t ,1 ) !* ) )k@
H@H v(/ •
6w$ ' v(/ •
q,&' x •
)/ M'( •
T$/ K$1 •
6w \3H :v[+ Z H@H )#/ $'+ ;= O!5 F>: ,1 ) ,8 "H@H v(/" 0=+$
O!5 "6w$ ' v(/" 0=+$ .I$V @ #\( )*+$ )@!14 6@@'+ )ly O!5 l+4
)\\| 9v MN; Ro4 <VE$ A <z01 G{ V,5 0#01 v(/
x (g$ L'5 3$ H ),gx #@ O!5 "q,&' x" 0=#$ .V,5 v#1$ @=@+$($
)g+ ?8$ O!5 ")/ M'(" 0=#$ .)@!1,! #@j 'l ,&H2 #} 9)z <VE$
0=# 9Ivb2$ .'R@ GH( #@+$ 9m14 H$ 9q5@ <[ )/ M'( )~
5 4
. #N $'+ T$/ u'$ @j$ K$1 O!5 "T$/ K$1"
$ [ M'l H$1+ )g+" K]3( )*+ ) q41 s/'4 F/,5 d> vb 4 d P$3
.MN5 $/ @5/#$ )*+Q T$/ V @5/# € kb 96")*+$ )@!14 6@@'+ ,1 $/ DE <yl4 </54 ‚/+ u#R 5 )*+ ,'+ - (H$w )l\) 3 GH \3H2
/1* O!5 p €> %/)/ M'( )$V2$ ?#3 Qb 9' K/!l MN5
VQ <N +@($ ) „… ;† )$V2 5@,$ (CITP) )@!1,! 6j 'l #}/rR@
.(CIRT) ‡@j 2 iV@j 'R@ (g )/ M'( )$V2 5@,$ )*+Q T$/
45+ 6 ! "# $% &'( ) *#+ ,- ./ & 0123
.&A;B %/ &( *789 :; <$ <2+ &19 <=> &1:?
.D+( :) 5E F: G=) H I J) *3 K & 6 5- %
:( L; D+( :) 5E F: G=) H <3 L; M,N9 6?O
.http://www.itu.int/osg/csd/cybersecurity/gca/docs/Report_of_the_Chairman_of_HLEG_to_ITU_SG_03_sept_08.pdf
:( L; *9T9 *>+ U( D#A; 4 Q% MR( <? S# L; M,N9 6?O
.http://www.itu.int/osg/csd/wtpf/wtpf2009/documents/opinion4.pdf
4
(V
(:
($
(z
(
3
4
5
6
5
22/1
#,‹ Œ@L' O!5 ,1! $V H$1+ l3= 2008 ,@H (COP) ‰t O!5 ;R #} <Vl `!RŠ2
? y( ‰t O!5 ~ @! K]3( )L6@+ ‚/+ Qb Ž1 M2 ?7 ‰t O!5 ‡l3$ ;R
R@$ Ro4 /#/ (1 : <Vl4 F>x m/: [,+$ .
#b~ M=3$ </4 % )=$
(3 a<V/1 )@' Qb #N$ Ro4( 5@ (2 a MN; ‡l3$ ;R( ‰ Z 1N
E L+ ? )t$ m14 Vl+ (4 aRo4 H/+ O!5 A,!14$ ),&'4$ )@j </54 )$V2 ?8$
.@,! )Vl >;'+$ ?8@ $/ g+ )=3
(IMPACT) H )/#/L L6@4 mR <V/1 $/ =3$ )*+Q T$/ V A( K$1 :
!*4 ‡k2 ?7 DE m/Y Z$ 9 )*+Q T$/ VQ q41 ,1 GH( RE %:V@$ %L$ %Yb v@ SV= )x$ ‘t P\ )=y$ )@j M=3$ A
(1 :q: H$1 x F>x m/:$ .1;( H )/#/L L6@ 62 V( MN5 $/!
,!w$ $/ ) ?8$$ =x M3HE (2 aiV@j )h (g$ >Hw$ l,! q45 RE ?8$
C4$ #3l )/ M'( L+ (3 a(CIRT) (@j iV@! (gQ 'R@ [ 9+,&'4$
.Ž1 M2 ?7 #V/14 !*4 ‡k2 A( T$/ K$1 L+ (4 a)5\ ?7
(ˆ
(d
22/1
I
6
! !
" # $% &'( )* +, - . /01
.! D-E 7 (B ;?
@ A
+1 ;<9 =>) 2!3 4
25 .6 $ 7 8 9
9#@j Y@!14 'l #} !,5 </54 DE )@j ’ 9dV* F$ q@ ( u!1+ ‡l$
z$g+ {2 ,= /!( d2 5'* )5\ ?7 ,3+ Tj H*5 )@!1,! 'l .{,8$ #,j F>: 0#01+$
#0$ Ik “L# K2 K = <V@6@ L!1” d> )@!1,! #@j 'l! 3 ?(\ K]y $ .K/!l V$/h
.!: #V*
,'+ - •#@;( )6 V `*–o$ .;!4 Ro4$ Vl4 V,5 )h v[( IN#2 K+ #04 F>: K2 O!5
:7T @' O!5 F>: V( )*+
) q1( [ )@!14 )/t , ly = A1N !*4 ‡k2 ?7 )V#E$ + KE
F>: ,3+$ . $ [lt )( „]+ A!,14$ (ISPs) `HHw )/b dV@$ )l3 q!—3$
)0Lg$ ˜\' Œ1 <yl4 $ ’Q1 +$ @ v(/ + 9*j [4 l O!5 9„~
</#/6 )/+ /@+ $ [lt ) K2 h >: /1+ /#0# ™$ .JhVz ‘ +$
)g'4 [) #g ,5p ’› O!5 53 q;N+ {E œh .q5y vš b~ •1l$ q5y LN1( 9b/!
6E ’› J2  ž;+ {2 ,= (˜\' Œ5$ 'l$ ! <VN4 !+$ )$v;! <VN4
-5Q ‰\b$ 5 </@4 )1l4 O!5 )@,5 q8+$ +@($ )l3 v6]+) #g ,5p
/1+ O!5 ,1+ !*4 ‡k2 s/ 81 IHh2$ \!| 0@h DE @1 F>: dVC+ T($ .(4 ˜$(
.!34 F>x @!h DE k@
'( {2 O!5 (PSTN) !#/l @,1 'R@ +x ly 1+ 9)@' </1 9K/!l %&1 'R@ ) `!Ÿ /$
F>x 'l <vl= M062 #g )=3 !B 9K/!l v[= $ . >: O!5 L#} D@+$ 92 
)*+$ )@!14 )6@@'+ ?# ?@ K2 vš ./LX >: IN1( LN1( ?$ )@j ? `H$1+$ )l3
2 )l!\$ ?(R d>6 v—+ i/hE DE sV2 rl *+ ) !Q$ ! *+ )ly ,
= vš #/! !#/l @,1 'R@ +x )ly O!5 /,14 )M6E$ ) c1 `lk2 $ )l3
.
>: u </#/X )l!\4 l!
#g ,5$ )@j -H6 K$1 O!5 0= I/#0 )*+$ )@!14 )6@@'+ L„/h2 Z )v— qN+$
$ .)@!14 )ly$ ,&H2 K@/o#$ 9/t K$#/#$ K$V@#$ K@!S$ K@1N# #> A!,14 sV$ ),&'4 ¡vš$
‡k2 ’VE K,8 £j c¡2 c ™ K¢ 9)l3 2 dV $/( PQ\8 Kh v[= )@j k@+ Ah
9I1 ,1 Qb $ .J5 c6@( %$ ‰\o !,5 9:$V¤@$ 'l @!—3 %L 9A'14 #b~ !*4
>: K]y $ .)@!1,! #@j 'l( !*4 Ro4 <VE $ ,Yb z01# K2 ‘t P\$ @j S
9T$/ /1* O!5$ .1 [=$ %Q4 3( )6@@'$ ) ul\+$ #@\+ ;# K2$ [ 5N# K2 ’Vw
.$/ h O!5 M=3$ $/ A( u'$ K$1 0#01+$ )@!1,! #@j 'l #} qN+
.(2008 6) ITU-D 1/144 \"&19 <=> &$2E *[5 :*?2R 6 &( YWZ" &>) MR VW
7
7
22/1
A.I
9)@!1,! #@j =x$ #} #N( 'R@ ) s@ O!5 q5@ <[ 1.A.I
.T$/ K$1$ rR@ M6w DE 6j($
.#V4$ H ),gx MN;$ )@!1,! #@j =x #,j 'R$ g+ ?8$
2.A.I
9x d/*$ V/1$ iV@j #@( !* ) 'R@ \3H u'+ DE $/ V@LX =34 3.A.I
.L' 1$
!"# $%&'
B.I
Z m$&$ )6h -‹ #l+ :>;' >o+ Z <V/¥ )@\t K2 /( aK/!l ?7 A( =3 ( m/:
.)@\t F>_ PQ\8 9K/!l v[= 9'R@ )@j D@+ m@$ ./!( = _ V;'#
'l 1N R@$ \bp d/*! rR$ M6E DE 6j( )@j A A$C4 P'E
1.B.I
.) s@ O!5 )3'4 Qb 'R@ H
¦+ D$ <@\t [,+ 9#@j Y@!14 'l A]+$ 0#01+ DE O1+ $V d l'(
.1
¡]( m1# (1) p 'R$ K( d2 K¢ 9J@,1 c6$ O!5$ .'R$ Fl5( (3) 9(8Ro4 ?7 I<V5 $'# G{ ) cL6@+ Z Ro4 V/§ (2) 9/!l DE l'( )@!1,! #@j 'l
? K$1 u#R 5 9 F>: >;'+ ;= J5 c6@( V/§ (4) 9 m/: V/§
.A'14 !*4 ‡k2
'R$ g+ u#R 5 L ?@ S F>: K¢ 9 p 8$ 5 /#/ %# K2 $
K¢ 9 DE 8w($ .>;'( !14 )$ '0 R +$ 9)#@$ ?N+$ 9)$C4$ $V V/
_ ?!\N4 sb $/ \3H ˜ 'R@ V@LX IN#2 K1N# / g+$ L!5 d@\'# Z 4( q5@ <V#z d$N K@# / 9 p 5 ?8$ 62 $ .
L!5 u;4 m/: f@!( K2 @=/# K2 A$C4 MC: O!5 A1#$ .) † 5 A$C4 l= A( , .!#@R < ˜—# / p
Ob@# K2 q—l'# 9 /($ .:v—+ S ) ]# K2 p rR$ RE d q—l'# .2
m/:2 V/§ K2 R¨ q—l'#$ .'#/ Ro4 l (g O!5 </$ H$4( q! )$ Rw ?8$
,1+ K2 @j vš )H$ @j )=@! S 91 m/:2 /#/ Qb $ .1 .1$ <M;= [= @' O!5 <4 m/: f@!( 62 I1
9A'14 A=34 ) q![™ ? $3+ !,5 Qb H$1+ <@*( 'R@ F>: ?8$ q—l'#
.3
s@4 O!5 F>: 3H q—l'#$ .'14 )\($ SV= ˆ$$ ‘t P\$ 9@j )=@
.@j ^ Qb K@# K2 N;#$ 9rR@
`&;Aa &7#? &2b Nc( K I V# <AR Nc( )Jd I 2 Q % F;( _.#
.(&A % &') +WB #3 6 e &2b f)? *98 gh <AR
8
22/1
8
d> q@j K4 /#/$ arR@ s@4 O!5 3 /LX( PQ\8 T@ </ C$ q noy /#/
2.B.I
10
9
</ )C4 /#/$ a  >: 'R@ $C4 cE =@+ 9 ‡@j 2 iV@j (g u# FRE ]3'# K2 q—l'#
.'R@ g+ -H@6 -H6 >_ u!14 rR@ /LX <V 9$ !h4 9D@# noy /#/ ( u!1+ <Vl P$3 -!\#
(1
!14 4( VE O!5$ 9) s@ O!5 @j( A!1 noy @:$ 9rR@ s@4 O!5 q—l'#$ .‘t P\ ? 5;# K2$ 9@j )C4 V@L6 u'#$ c6@# K2 ?\#$ 9 (
\! F>:$ .@j ^ DE ;' H¢( K@&§ ™$ @ H no3 >x K@# K2 [4 h'
@# m@$ .•1l LN1( A( 5; DE ’ Z )H A( , u' K,N #$8 s@4 1
./!l p ' ),&'4$ <V c!5 0+# K2 S IC I2 -'4 `@ $2 no3 $/ >_ ?!\N# K2 DE , 6j &+ / 9 ( u!1+ <Vl /!l P3# K2 Vg
(2
./LX >: 5y #>! C4
.
p 'R@ g+ ;!| M062 >;'+$ ?8$ 5 $C4 sb )C4 /#/ A1#
(3
.%:$V2$ ‘t P\$ @j )\!$ 9@j )z@ bV A,Q4 ) q18$$ Mt /#/
)C4$ V ?7 O!5$ .A=34 ?7 A( " „" ’VE 1; 'R@ )M6w -!\+
LH*( K@@#$ {$#/#$ {$V©ª@#$ {@!S$ )@!14 )ly$ ,&H2 K@1N# #> 9L6b$ @j bV
) q1Hk l= O!5 -”$ .:† q—l'# Z )M6w$ c( @1!\N# K2 A1# d> $/ %L;+ 9{@!,1#$
ˆ@\t v@+ A'; Mt l= O!5 A1#$ .%YC bV )#@$$ m/: /#/ ‘t P\ <V$
.(@!\4 )M6w † zQ R$ L6@
.%L'( ,$ A=34 ?,X H$1 )l+ /#/
*+ ?g3+$ ž+ Z £ vš$ £ H$1 )l+ 9M@ O!5 9z01+ K2 'R@ )@! q—l'#
q!—3 $2 r s@4 O!5 >;'# m@$ .@j$ ‘t P\ A( , )@!14 Vl+$
% … ’VE$ V@LX F>: u'+ IN#2 q—l'#$ .@j vš$ @j )C4 N#5 ;R \@(
.)@!14
.rR@ s@4 O!5 ‘t P\ )H=$ )@j A( , K$1! )… E
M… V@LX F>: q5+ K2 q—l'#$ .;y$ h@; !,5 Qb 'R@ ‰\t >;'+$ <@!($ ) ?8$ q—l'#
.A=34 ?7 «*$
3.B.I
(1
4.B.I
(1
5.B.I
(1
9 #N X14 $/ V@LX 0#01+$ 9A!¥ A=3,! q!¥ s@4 O!5 A$/ M&' /#/
6.B.I
q41 BC4 5 V* 45 >;'( u!14 P$34 GH l5 >bC+ K2 O!5 9</54 V@L6$ )@!14 %+ .(WTDC-06) 2006 J1 )*+ ,'
,!w )#/'4 =34 Qb </54 O!5 rR@ A DE q /LX *
(1
)#/'4 F>: J@+$ .Kh -!š2 ,5 ¬$$ )BC y 9-#/$ %!1 @+ K2 S Z $/ $2
S ,= .Y@&'$ Yb$ :2 % K/!l! k; h+E$ 9Mt Œ$5 v@+$ 9#N( q5@ <[(
.i>j 6% fJj &k>9 I U+= l;A <$A \*;( 6% 5- 6 m! F: "i>j 6% fJj &k>9 F:"
A Step-by-Step Approach on ) *9,- Q% 6 I L; n o!( 3# + fJj p &Z( &q, *E F :
*9j &k>9 &:% > "% &: p L; F;b .http://www.enisa.europa.eu/act/cert How to Set Up a CSIRT
I "i>j" u;bT .t.( GW &: 6 # , QJs \(CERTs) &>j r)b *9j Y! &:% % &>j r)b
\*c( \*vw+( .7% \$( <2> L; \Ubx yz H I &;{ )T <A+ i>j 6% fJj &k> F: )2
.n &;T( *H2b \0WWB 5 <A e &;H#( .7
."N-CSIRT" Tc( \")T- \i>j 6% fJj &k>, &#N &: |d )R> \H }~
9
10
9
22/1
@: >:$ .!„™ m/:2 u @ !1 $/$ ,!w ),&'4 #@N1 $2/$ =34 /LX >: /5+ K2
.45 >;'( u!14 P$34 m/:2 /h2
q41 0#01+ $2 A DE O1+ Z mR <V/14 ),&',! h4 \3H$ G =34
‰b) )*+Q T$/ V mR <V/14 ),&'4 ![2 $ .T$/ K$1 0#01+ ˜R sb2 #R q:
9# $/ ,&'$ 9dV* K/4 ,'$ K$1 ,&'$ 9()@!14 ?, 41 ,! 5%6 ,1
K2 )@! S sb2 )BC ': 9 DE 8w($ .:vš$ ­Vx ‰¥$ ~ dV* K$1 ,&'$
.K#/#v4 BC [ 9 ( !*4 4 K]3( )@!14 L %+
r14 ,1 u# [ 9‘t P\ :V@# Z V@LX =3 &' IN#2 q—l'# 9 DE 8w($
.!„,4 sb $/ V@LX$ ®@j h
._ !14 )#@$ ?8$$ ( !14 @ V@LX /#/ Œ— Ro,! ! <VE !,5 M3HE
#> K$V@4 ) L!—3$ ¯l q$ )@j J2 /h@ l @: Ro4 VE KE
#,! k'1$ Ÿ@ /#/ 62 '$ ‘t P\$ J1 P\ A( K$1+ M/l (%{@,5/#
'l Ÿ@( !14 )#@$ ?8$ S 9k'1$ Ÿ@ F>: /#/ h$ ._ !14 )#@$ ?8$$
'l! "d@j" ?(\ J@L; K2 l 5 -—# 2 %L4 $ .¡ œh Ll++ $2 )@!1,! #@j
.sb2 h I#@h K@# / h I#@h Fl5 S $ 9'14 j( K@: 2 )@!1,! #@j
d@j ?(\ K2 9_ !14 )#@$ ?N+$ #@j Ÿ@ : V/ q:$ 9:l5 $/ ?N+ K2 q—l'#$
.)!,1 A$ 9 'l$ 96@@' 1;( v—# K2 cH]y
#} K2 .I—( I#/ 3+ Z @ MN;$ )@!1,! #@j 'l! #,j u /1#$
ul\ qN# ›E !,1 F>: L!5 d@\'+ Z #@j Ÿ@$ MN;$ )@!1,! #@j 'l
‰(@N /#/$ 9-@1$ 1N R@$ Ro4 %+ [) Ro4 <V¢( kt ),4 5@, ,4
)/* q@+ ;=$ Ro4 <VE A!—34 S (!5; $ 9>;' ‰(@8$ 9„ ;o l$
)™$ )gL' )@!1,! 'l d@ sV s/ I@,5 @+$ . %LL PQ\8 h 5
/1$ 9‰($ 9!k@ )£ K2 /( .{@/# Z )/o! q!1; `@ ?(R DE &'( Ro4 <Vw /
?' u+ 9> gH$ .c -:] $2 \t %( @L( J O!5 </ /§ )@!1,! 'l! r
'l x Œ1+ Z Ro4$ =34 ‰( c6$2 %+ ‘t$ J1 A5\ A( K$1 0#01 gH <v[=
.(:vš$ 9(:E ),g:$ 96@@'+ \52$ 91lR i@= ) .G )#@$2 ?8$$ I#$V c,+ <V5E$ p ': j %+
% )!,5 c/o S 9% Œš I'R$ I p 'R@ g+ ,N+ K2 q—l'#
%+ <V2 J/o( 9K/!l! S$ .%5/4 % /L6 $2 -#/ M0g= FzhE d” d> J/! €>
m/: ? ˜+ u Œ— !,5 “3'+ K2$ rR@ :RE ',4 )—[$ <@ R@ V/ K2 9=3
¯l #}/rR@ /1* O!5 p €> %! )$V2 )*+ ,'+ - ]3H2) .<@64
.(),4 N]( !14 „@ F>x lh* K@+ q (CIIP) )@!1,! 6j
.L ;=$ -#/ )l!\ /#/
K]3( j c+™ ? # >: <V@ _ Ok@4 ),4 N2 H4 g'= 9K/!l /h2 /” /
j K@# /$ .A DE ’ ( '1 cH( -H@6 ': K2 9()—[! ! M6E d2) vš @! X14 </#/6 ž@ $2 AH@ šk [) IH@H $2 (</#/X ) $2 <0L6 [) I'+
#3l )/ M'( /#0 DE ’ Z = 5 IN#2 )—[ ! 3# /$ .I,&'+ $2 (%Q4
.(-#/)
(2
(3
7.B.I
(1
(2
8.B.I
(1
9.B.I
(1
22/1
II
10
)* +, " #$ %& '(
BG H
I ) J% 0K L! EM
NO )<P Q( &'( R
0 !! 9 2 S T <2! H< H YZ ;.S+
G .2 S ) US SV
% W!P X- ;?
@ A
+1 ( .6 L! <9
! )[ 8V[ H ) _` L! JVaG bc H
<d e[ ) .-\ ] X 7 ^U,[ !<
!G ) US S )
S ] <S D-E <E HfK ;
G g5 hS i0SG !3 jS k! !G
] US l mO n2S5
.c G _( )* p
8V $% Mq H JVa" ) i!k 8V[ D-E /<
BG H
HfK ;W- .,o
K¢ 9 O!5 °M'($ .)/* q@+ O!5 Y/$ 'l H$ K,8 ,V !* ‘t P\$ @j $
'l! #,j @# K2 /h$ K S cH 0#01 q2 2 ‘t$ J1 A5\ A( =3
K2 >l¥ , 9‘t P\ L!—3( J@# $2/$ =@!™ <v[= K/!( H 'l u %&1 K2 DE &'($ .L!(
‘t$ J1 A5\ A( K$1 ± qN#$ .V: #\( °I1 ,1( 9c( ˆ@'4 $/ = 95'*$ @j J@+
.[ (3) a)$C4$ $Vp ž8$ k$ (2) aK$1 >: ,( ž8$ Œ5 (1) :: k'5 „Q„ @+
( J @j L Z ?'4 [,+$ .‘t P\$ @j M=3 A( Vl4 ?'4 /#/ O!5 =34 ± @#
:l 9@! )k*b ˜\H ’b I<V5 ?+ Z )/ v@( L!—3$ 'l dV@
aK/!l v[= $ 9<v[= )5\ #@j 'l %&1 <VE$ !
•
a)/ :vš$ 9JL4$ 9u4$ 9,&H$ 9)l3$ 9@k %L;+
•
aiV@! (g #/ $2 <t
•
a)6h O!5 I1# 0=+ </#/6 )6@@'+$ )/b$ )g' v@+$ ( O!5 </
•
.LHk$ YVE$ L!—3+$ :3H$ 41 `HHw ly %,*+
•
'l #} 0#01 @j ? ,1 8$ 1;' ': K¢ 9‘t P\ DE l'( , Œ5 %( u!1# ,$
:L'( 9l V/1( H$1 Q1 F>: , z01+ K2 )@! S$ . $ )@!1,! #@j
'l c6@+ Z Ro4 K]3( 9-'4 `@ 9</;4$ 1,$ /$ !! )@!14( A!—34$ Q4 /#$0+
•
a#@j a#@j 'l #,‹ !14 )$ )Vl4 ?8$ #/l >' ‘t P\ yE
•
,5 s@ O!5 °M@ ¥ ?'4 9yl4 *+($ @,1 ¥ u#R 5 9)C4 <V ž8@+ K2
•
a%_ kt #g ,5 )g+ V z$g+ '2 v(/+ ,[ u#R 5 q@ s@ $2
˜\H O!5 @l4$ ,! ' ),4 V,5( 5@R J@+ q )=3! 0@j %5V$ ?g3 ( Y
•
#g Lj* cl!\+ ˜\H ’b ' Y™$ Y!,5 A$ œ#/( 9MN -h 9J$ 9?$
a<V$/¥
aLhQkE $2/$ L#} O!5 </54$ _ kt )#@$ /#/$ x JL /#/ ‘t P\ ? ,1
•
a#@j )@!14 #} $>l4 V@LX l 0#01 zQ i@l! %5/ v@+
•
)$/'$ )l#/ u#R 5 9)5\ A( =3 !y )/( PQ\8 =3,! zQ V@4 /#/
•
a,5 !k@4 ‰\o 62 ) c6@+ %5V 5 ;# ™ (@j 6>,'$ l#/ )$/$
11
22/1
) )/t$ 'l u4 ¬1Hw$ Qkw( u!14 %5/ v@+$ '0 j ) )@!14 %+ h+E
.iV@j )$2 Qb #@$
•
$
)*) )"
S$ . ( u!1# , ,L' = )$C$ $V I=3 I¡;+ I#@ 1N+ K2 ‘t P\$ @! S
'l @+$ K,8 -!\# @j , K¢ 9[4 l O!5$ .#,j V@LX <V$ u' @+ K2 @!
q'+ $/( J@+ K2 @! S 9 DE 8w($ . Y/b$ LL %5/ @j H \3Hp #V4
S$ .A1 iVj (gQ V@4 DE ‘t P\ L ;# Z )j </54 L'S $2 „= P@$ h
% @=@+$($ ) ?8$ 9
A 62 ‘t P\! 5@\ V@LX ?g3+ z01+ K2 @!
d> ˜\' ’b 0#01+ 62 ‘t P\! 0@j v@+$ 9Ro4 K]3( `@ 'h$ </;4$ !! )@!14
#@B$ #@\$ œl( J$ )V M6E )!,5 O!5 m3+ K2 @! S 9Ivb2$ .)C4 «* V$/h cl!\+
.Y$V2$ )!,5 A 62 )!,1 F>:
,+
A( Vl4 )Q1 0#01+$ #@\+$ V”w z [ K2 ,= .5'*$ @j A( K$1 g' q2 *'5 q: [
)j( q5@ z01# K2 @j$ ‘t P\ A( )@!14 Vl+$ d@ K$1 K]y $ .‘t P\$ @j
Qb $ .¬1Hw$ (g \3H2 %5V$ H Ro4 <VE O!5 </54$ 9g+ 4 K]3( K$1 v+$
Vl+$ 91N R@$ Ro4 /#/ IV/5E N2 ‘t P\$ @j K@ 9L!!$ )@!14 %+ A
.@$ ;;o V@4$ )
.‘t P\ ? {$1+ s/ l5 )@j L1N+ K2 q—l'# Z 1 m/: FHV2 ’/+$
-. A.II
H Ro4 <VE DE 1 3( dVC+ K2 {]y Z ‘t P\$ @j A( H$1 ‰($ E 1.A.II
. MN; #}$
I/ qN4$ M~ u@+ DE k@ Œ— m14$ @k$ )@&'4 5@' 5@, A( ?,g! … v@+ 2.A.II
.rR@ s@4 O!5 A 62 I1
/ !"# $%&'
._ !*4 V@LX$ >;'+$ ?8@ <l4 h4 ‘t P\( !14 )@&'4 ’VE
d”$ kb ! =@!™ 9L!5 /,1+ Z H k'1$ 9#@j ¯l %&1 K@+ 9</#/5 K/!( 3+ Z )6@@' O!5 ?# @\+ 2\# ‘t P\ )( N;($ .‘t P\ u#R 5 L!—3+
c, c ™$ . MN;! @+ K2 :V; )@! S cH¢ 9>$ .c,5/+$ MN;
9Ro4 <Vw R2$ p >;'+$ ?8@ )@j x>l+ Z V@LX l'( —l
S$ .V@LX F>: #@j 'l! A A!—34$ Q4 ’VE$ ‘t P\ &H )L6$ VE
)@j A( =34 !1 =34 u#R 5 K]3 >: ‘t P\ M… O!5 ?!\+ K2 )@!
u'+$ 9 )g+$ ) ?8$ K]3( ‘t P\ )!1 ,$ 9‘t P\$
‘t P\ =3 ;+ K2 @! q—l'#$ .)@!14 %+ )… u#R 5 ‘t P\ ),&' ? V@LX
._ ,1 !k@$ :>;'+$ )$ )Vl4 ?8@ $ h4 'l /#/ ‘t P\$ @! ž# Ro4 <Vw G{ V,5 O!5 ‘t P\$ )@j K$1+ K2 q—l'#
;o l /#/$ 9Ro4 5 7' „~ %+$ 91N R@ %+$ 9Ro4 !$ H .„~ F>:
B.II
1.B.II
(1
(2
22/1
.H Ro4 <VE m/L+ Z #@\$ œl \3H2 1( O!5 ‘t P\$ )@j K$1+ K2 q—l'#
‘t P\ = _ ?!\N# Z )Vl4$ #@\$ œl )#@$]( u!1# , #³ @8$ K]y $
%Q 2 O!5 #@\$ œl )Vl ?8$$ 91 @ O!5 L/o$ V@4 n*† ;# K2 @j$
0#01+ 62 %Q `$ m\4 #{ V/5w / )/t$ G+@' žl*+ K2$ 9`@ œh
.rR@
12
(3
=34 ' ),: X14 #@j 'l )5'k !| ‘t P\! 2 M3HE O!5 ?g3 2.B.II
.@j ? K$1(
/5+ K2 9 'l )5\ !| 9#g ,5 )\( [ 9 F>: </,4 )@!1,! S
(1
$2/$ g+ 4 O!5 0=+ K2 F>x S$ . =34 )6h L6@ O!5
5@$ 9Ro4 <VE 4 F>: ,3+ K2 S$ .= ‘t P\( !*4 ' š@3 <VE$ !—3
? =3,! C !,5 F>: ‘t P\ 2 @+$ .–7 sb2 $ 9:>;'+$ ) ?8$$
. ( !*4 4 K]3( j )@j M6w s/',= _ H1 S$ )@j
% )5\ q![™ A( ?,g! F>: M3H¢( #@j 'l )5\ /#/1 J 9K/!l •1( $
(2
v@( IN#2 F>: J@+ 9<v[= Ḱh2 $ .7' „~$ 91N R@$ 9' Ro4 K]3( )@!14
'l x Œ1+ Z iV@j „… ;o! $>l4 V@LX v MN5p q!1; `@ )>Hw$ )Ll'
.L' 1$ iV@j F>x (g$ #@j P\$ )@j d2) MN5 A( )@!14 Vl+$ K$1 ž+ )™ V,5 &'+ K2 F>x q—l'#$
(3
DE ;' aMN5 #@: 5 *w J/5 :q!# v@+ ),4 F>: •1( ,3+ /$ .c( ˜@„@ s/' (‘t
G+@'$ 1N R@$ Ro4( !14 j G+@' DE ;' a)5\ </1 !3$ @j )@!14
?$ .)'#,$ !—3 ),4$ 9­@\ )h (g u'+ K]3( P@8@4 <b$ a!!
!4 ˜@j ?N† Z )@!14 #} l ’VE %L4 9K$1 h+E 62 ),4 F>: &'
.I#µ j )@!14$
. =34 )#/ 3'4 _ ˜@„@ )#/' @j$ ‘t P\ 2 A( ?,X
‡@ ˜;+ ?8@( Ok@#$ .‘t P\$ @j A( ž6' K$1 0#01+$ „ M'l #$8 ˆ$y </5 ':
.m/x$ #³ %+ DE K@=34 ’§$ .‘t P\$ @j A( Vl$ K$1 K]3( )L6@ @#
!k@4 (@!\4 )0 /#/$ 9V@4 n*†$ 9)#@$ /#/( #@ ,&' $2 #V; )V J@+$
Q5 RE q,&'$ dV; @! c6@ =3,! /5@ V@6$ IN#2 J0!#$ ‘t$ J1 A5\ A( K$1
.K$1
9),&'4$ V A( K$1 ,( Œ5 ?8$ /1#$ . ! !($ @,! GH DE K@=34 k@# K2 -”$
.‘t$ J1 A5\ A( H$1 ‰($ !k@$ #@\ I2 I2 9, F>x ž8@ /#/$
.\(4 )5'* A( K$1 ?g3+
iV@h P@$ DE dVC+$ l1+ „… x K@+ K2 'l /h$ P@H O!5 d@\'+ Z iV@! S
/b$ ;+x )/t \1+ DE dVC# \ P\H K¢ 9[4 l O!5$ . 'l sb2 P@H2
%x q—l'# 9kt %Y5\ RE ­@\ )j K@\\¶ ' •1( K2 %š 9 O!5 <$Q5$ .`HHw
)@!14 % S$ .sb2 )5\ O!5 „… iV@j F>x K@# K2 S l5 $>b]# K2 IN#2
O!5 L¡2 x )5\ </5 ,3# @ O!5 iV@j DE (gQ V@LX /5# K2 ¯l !| 5
.rR@ /1*
3.B.II
(1
(2
4.B.II
(1
13
22/1
.iV@j <Vw ‘t P\$ )@j A( H$1+ )l++ ?8$
Vl+$ 9L!5 ?# m1 Qb H iV@j 5 7' 8 ! <v[= )h S
)Q! M6w ‘t$ J1 A5\$ @j A( K$1 J0!# rR@ s@4 O!5$ .LX1$ 9{]3( )@!14
.(g V@L6 u'+$ )>Hw /kE$
<VE A 62 q;[$ q!—3$ qg+ u'! RE ?8$ 5'*$ )@j K$1+ K2 q—l'#
)( !*4 ,! u'+ )L6 %N# )@!14 % I£ IQy Rw >: ,N# K2 q—l'#$ .iV@j
K]3( )@!14 %( !14 )M6w$ ) IN#2 Rw ,3# K2 q—l'#$ .!—3 )@!14 Vl+$
' )…$ 9(‘t P\$ @j( kt) !4 !g )@!14 3H$ #}$ 9L'5 #+ ‚/+$ iV@j
K2 S )=3! !g ! ) )@!1 ‘t P\ )@!1 ,N+ Ilš$ .:3H$ )@!14 F>:
)@!14 K¢ 9[4($ .sb2 l! „… d2 DE $2 9$' #5V DE $2 ˜@ n*h <b DE :3H dVC#
zQ ' v(/$ ) ?8$ q—l'# · $ .@L,X 1 3'! `$ h $2 # K@+ / @j
K2 )@! S$ .14 @L,X u‹ u!1# , Kz@ u( c+ `@ J ? )@!14 #,j
) !k@ u#R 5 ‘t P\ ? ‰($ E$ )@!14 %+ ) 0#01+ Qb [ M'( k@+
*# , ‘t P\$ @j A( u'$ *+ )HE † K2 H )'#,! IN#2 S$ .%
.!1; )z `$ #,! )… 3H u#R 5 L' 1 V@L6$ H iV@! (g(
5.B.II
(1
(2
22/1
III
14
- ./ +01
. s
t ( R%u BV1 vr R
VO I ) ;, !6 ) ;&'( )[ B(r )<P
.
w mO iS< x1 i! $ i$ V'( Pt
-. A.III
.H %X$ ( !* ) AH@ !y 5@, ;HE$ 1.A.III
K/!l! )/54 ‚/+$ H$w ) )M6E$ 9Y /h H %X ¸1+ AH@ /!( = ’§
cH2 „@ F>: Œ;+ 9@ ‰l+ Œš$ .qN J&' /h$ K 9K@+ $2 9AH@ K@+ /$ .sb
u!1+ H@H ‘@*H$ 6w AH@ 5@, DE 8w( H %X 4 K@H /!( = s/ K@
.L!N;+ Z 'l K/!l J/o+ m@ 9j 1l\($ .!* ) Vl4 </54(
/ !"# $%&'
B.III
9Tj q'X cH@H Œ1# K2 /!l O!5 A1#$ .L#;= /=]! j H@H )\! %+ 1.B.III
: )@\t † #$ .(l4$) 8j =34 X14 I= K= E /#/ !* ) )M6w
9,!w )Vl4 9‘@*t c6$ O!5 9O5+ K2 O!5 9!* ) zQ )1#3 ?8@( 9MN -h 9J
(1
K2 )1#3 F>x q—l'#$ .(2001) H SX( '14 ($$2 ^! ;+ 9*j l O!5 ^ 9,3+ Z
9) %5/+ Z 6w )~$ aLQ+E $2 (@j )Hl( 8w 9sb2 !7 9$'+
l ) ,4 T$/ @H K$1 ’VE$ a DE $ 9$w /# /* ?l+ O!5 </ .( vš$ 9V O!5 @*j
K@# 9[4 l O!5$ .{$2 ) 6@@'+ )1@+ DE /'+ c'H@ `H= E , &'# K2 /!( d q—l'#
(2
.IN#2 )Hl E ,3# œ‹ K@H >: [ v—+ ’§ /$ .‰ )@* )E ?l+ ¹'# K@H ':
K@+ / Z '14 1#3 )x$ @j )\! ?7 % ?N¶ K2 /!( d H SX K@H q—l'#
(3
»hQ# $ .</; < d2 /Y ºh 9'X /1 P@8@ !k x + Ž @$ ºh 9K@H >: !* x
</#/6 6@@'+ DE ˜\! m= vš H SX K@H K2 9[4 l O!5 9)@!14 6@@'+ T$C /h2
./!l AH@ q18$ s/ ?$ ˜\H O!5 /1( $1 ` L' /#0 >b… x,1
$2 •1( -H6 !„™ %+ !,1 /!( d2 c( @,14 q'X K@H ?N¶ K]( IN#2 Ok@# 9 DE 8w($
(4
$/$ 9!¥ @j vš ),&'4$ 9T$V ‘b P\ q!¼ P d2$ 9q!¥ ‘t P\ : )LX ?7
.A'R@4 )$ 9%_ m14 Mt$ 9SV=
.sb2 K/!( 4 F>: K]3( <@34 ^,!# K2 /!( d S
(5
.H SX X14 Vl4 )/54( kt$ 6w$ '; AH@ V,5$ šk
c6$ O!5 l5 <>b… 9zQ )1#3 ?8$ 9MN -h 91; =34( K/!l J@+ K]( Ok@#
Ok@#$ .H SX( '14 ($$2 ^! ;+ 9*j l O!5 ^ 9 9,!w )Vl4 ‘@*t
?N+ K2$ 9 0#01+$ H SX Œš T$/$ q,!w K$1 K/!l 3+ K](
)+@($$ <N )$ 9 K$1 A )…
.:vš$ 9‡@j
2.B.III
(1
15
22/1
K2 q—l'#$ .1#3 )x$ @j )\! ?7 % /!( d2 H SX K@H P$3 ?N¶ K2 q—l'#
sb2 d2 $2 )Qb $2 )6@@'+ d2 DE ˜\ Œ—( c!5 u!1! @L,g! IN#2 P$34 >: #
.IQk2 L\—+ %+ Ž !,¼
(@j %X [ 9- #/! H %X H %X( ‘b K@H d2 $'# K2 q—l'#$
.sb %X( u!1# , )l3 O!5 H$w V #} IN#2 $ 9(@j J )!,5$
,Q vš <@*( u1# ™ <g$ H/4 <j /t `18$ Z )Hl #} AH@ v;+ $2 ?@+ J/5 q—l'#
.K/!l A( , 'X V u/+
O!5 myw$ %YQ:C /+ K2 9š* )!,1( J! A#3 M½ H1 + Z K/!l O!5 A1#
/!l K@H RE <V/¼ <@*( -#/ O!5 @!*§ Ž #> ‘oy ’/# /$ .š* !,5 @R %x,52
O!5 <$Q5$ .Vl4 H@H </54$ 6w qh@'( !14 J kb$ 9= <@*( zQ Jh ?7
)l„w / k; DE = <@*( N )t K@!S #> ‘oy &'# K2 /1l4 K¢ 9
AH@! l'( >= @ %{2 E #g AH@ š* A!:C4 A#3 Mt •1( ':$ .)j s/hE
.'X
-!\+ / 9[4 l O!1 .;+ c#@ z$g+ )h O!5 @*! sb K/!l ? $3 z@”$
Ly2 </4 9`@ •1l L,&H2 l5 '¾+ Z )Hl •1l( ¿;h `HHw )/b dV@ K/!l
-!\+ / $2 a'14 ¡ ) ‡@j iV@h •1l( @j )\! fQ(E DE ’ / $2 9Kh -!š2
.IHl OL J/o# K2 l noy d2 %Q 3( #@x )l„E
K/!l ()Q#/1+ $2) H %X K@H P$3 O!5 )!1+ 9`@ ž£ E 9^,!# K2 /!( d z@”$
vy2 ,= 9/;4 K@$ 9*oy ;*( )!1 F>: O!5 @*j S$ .mR <V/14 ),&'4$ sb
.Yb DE IV' K/!l /#/1 &H )L6$ O!5 @*j 9FQ52
) '14 )LX )!1+ 9('R@ )M6w$ u;# ) '™ !h (2 >= -!\# K2 /!l O!5 A1#$
!¥ @j vš ),&'4$ T$V ‘b P\ q!¼ P d2$ q!¥ ‘t P\ :P@8@4( c( m14 J,:
.%:vš$ Al'4 vš A,L4 A'R@4$ SV= $/$
.H %X( '1 'R$ )/h$ /#/ $2 M3HE
d O!5 O!5 2 </ 9LE k$ Z ,' s@ 5 &' m*( 9/!( = s/ K@# K2 %L4 K2 S$ 9' K/!l ºh <@( ?+ / #@!t +@x J/o K¢ 9[4 l O!1 .H %X 5
)l3 DE )$v; E$ À$ @ #@$ h ,52 ‡+ #@!t +@x F>: J/o+
. DE $ 9)g;4 1yE$ H$w
%X 5 )#( n† H %X u! </h@ -#/ @# K2 $2 ¶ K2 /!( = O!5 A1#$
K2 A1# Z K@H ;HE $V $2 <V /#/ Kh •1( ž8@ K@$ .rR@ s@4 O!5 H
m@$ 9b >: O!5 Kh •1( d2 '4 K@H ;HE )=$ •1( !† /$ .>( ?!\N+
8j `@ noy d2 /!l >: /6@# cH2 Al+ E ºh$ .l1k ) >o+ K2 !1 )\! O!5 A1#
I,L K K@H ;HE q;Ÿ@ I/h$ ': K]( IN#2 @ ž* K¢ 9zQ )L4( ?,#
. >: I/ qN4$ /#04 %!1+ O!5 @,R c#/$ H$w 6@@'(
’ qL .A¥ V$/¼ V/5 K@+ `H= E ºh 9%5/ DE H %X ) )/h$ ’$
-H6 %5/ >: €]# /$ .-#/ ,$ )l3( @1 <@*( L!5 /,1# )Qk@+$ [#/h )/1 DE
.‘t P\ L/# Z ž'4 $2 sb K/!l $2 $/ ,&'4 $2 /!l @h
.®@j O53 -\ 9 O!5 92 </ )/h@ s/ K@# K2 I'™ K@# ,[h ‡@*4 $
</ F>: v@+ >14 cH2 q¾ E$) .8E )l#/+$ ( )$V2 @+ </ F>: -!\+ m@$
9m$& •1( $ .(£h #N ºh £h V2 P8 ,h Il l+ K2 K/!l O!5 A1# 9q53 -\
(2
(3
(4
(5
(6
(7
(8
3.B.III
(1
(2
(3
(4
22/1
53 ) O!5 -#/ K¢ 9 O!5 <$Q5$ .'1 #N sb2 K/!( N </5 @+ /
)j (g u# u'+ 0= J/# 9[4 l O!5$ .'14 ),&'4 $2 sb2 K/!( # / H
-#/ •1( (http://www.cert.org) </4 )#@ K@! Á q—H= 16 (@j ­@\
. CD-ROM ‘2 Qb $2 <yl ‰t O!5 #—! N;o' 1]( $2 ( K$V H 53 )
sb K@H ;HE $V s/ Y/$ :V@6$ 5 KQ5w H %X </h$ M3HE Vg A1#$
,!E <@ `H= E ,k1 H %X 4 </h$ /6@+ K2 /;4 ^$ ./!l A1 A5/,!$
%X 4 </h$ ': K2 d/+ {2 E H$E V2 ,N+ 5$ S6 u( J@+ K@H ;Hw
9Iv[= ?3 K¢ p$ .sb2 )/5 ‚/+ $2 r14 ‡@j œl )!,1( J@+ K2 S H
%X 4 </h$ c#/ /!l K]( #V L#/ ^ /!l AH@ ;HE D@+ Z C4 K2 9Ž1 M2 !| .H
DE A$/ M=3 ? )Qk %+ K2 9>( J L'S Z )/h@ $2 H %X )/h@ q—l'#$
K@H ;HE ),&' $2 9sb K/!l </h@ M3HE K]3( <@34 @+ 9D$ h4 q; .
™ /h O*2
9sb K/!l )$ <0L6 ºh $2 <v[= y]( -#/ @# 9hQ h4 $ .$/
F>: K@+ m@$ .‘t P\ $ mR <V/14 '14 ),&'4 $ $/ K@H ;HE ),&' $
L6 </54 -!\# K2 /!l ?\# K2 VR( c\(+ /#0# Ž5 %L4 K¢ :b… -l ,L )Q*
.K@H ;Hw 6b
bV ,L4 $2 !* ) )5\ P\ = ? )Qk %+ K2 H %X )/h@ q—l'# ,=
‘t P\ )H=$ 9®@j iV@j (g 2$ !¥ @j vš ),&'4 l 9{/!(
#+ ‚/+ ;= 1$ 9L1 K$1 %L'S %{]($ 9Y/($ </h@ V@6@( %LQ5E K,N SV= ˆ$$
.!,¼ H %6 d2 5
.‘t P\$ rR@ p 'l sb k'1 ? H$1+ )Q5 E
P\$ rR@ p 'l sb k'1$ @j )H A( , H$1 )Q1 1+
:‡l2 </1 ,L ‘t
6@@'+ ': K2 $2 /#/6 K@H v; d” cH2 5 fQ(w [) )5@, F>: A( , )@!14 Vl ( 2
a(i/ / </#/6
=3 i$/h HE s+ : 9ˆ@\t !+ uH O!5 I/#/6 IH@H '18$ E :" [) &' )L6$ Vl (‡
M6E ,4 &# q 6@@' !+ v—+ xQb S !$ #2 /6@+ :" $2 "Âk@*t( u!1+
a("Â1 Q( u!1+ 5$3 ‡l2 ': `H= E $w /# ?l+ !,5
a@! )j %&1 ‘t P\ c/# m@ -#/ K2 %š O!5 -#/ Vl (’
a1N R@ $2 \b K]3( )>Hw Vl ( V
)h M'„2 %L'( , [ M'l q;# </6 <@*( •1l( %LN1( )5\ !| ' m1# q ( :
.­@\
‘oy( #1+ , ?8@( ' [=2 $2 /h$ J@# K2 )Q1 F>: 3+ </X D$ <@\t [,+
.)*o3 F>_ *+ ;= 5 )@!1 , F>: ’/+ K2 S$ ./!l !* ) )5\ ?7 F>: `6V2 Z *o3 K]3( )5* -'g £ vš <@*( , F>_ ¿;h N K@# $
.L ’/+ Ž Z $2 ,
</5 \H O!5 d@\'+ Z !* ) )5\ /#/1 /!( = /6@# K2 ,¥ $
P\$ SV= ˆ$$ ®@j iV@j (g ˜$ @j vš ),&'4$ )z@$ K@534 Á
.=2 l'62 )H I1(+ b~ •1l$ nt q!¥ ˜\' O!5 MC: •1( K@# /$ .V$ ‘t
16
(5
(6
(7
4.B.III
(1
(2
(3
17
22/1
.H %X #N A534$ <N$ AÃ1 A5Ã/4 A( %L; ,'+
#V O!5 <N$ K@Ä1 K@5Ã/4 K@# K2 %L4 9H SX #N %Q4 @' O!5 d/* 62 K2 q—l'# 9[4($ .H$w Vp </#04 ¡ O!5 <$Q5 )l3$ )$ -@j [ )g @1
.m= @ O!5 H SX ¸1+ %:/!( AH@ `H= E $ )5@8@4 F>_ #/ /( K@534 ?,#
.!34 F>x @!j /h2 @: -#/$
:/!l V@ -‹ ;!| V* €]# K2 , 9I(@!\ q r -#/ K= E$
5.B.III
(1
(2
a)@!14 6@@'( kb <z$ d2 $2 R3 <VE [ '+ )k*b( ?,+ !¼ <z$ $2 <VE d2 ( 2
al'6 )@j (‡
amR <V/14 '14 ),&'4 (’
aq!¥ ‘t P\ ( V
aq!¥ s@4 O!5 ,52 c#/ K= E (I#*h ^ $) kb$ T$/ ‘t P\ ( :
a!* ) SV= ˆ$ ( $
a6t $2 !¥ ®@j iV@j (g ˜ ( z
.!* ) l'6$ !¥ @j vš ),&'4 ( 
)l3 ' \b O!5 %:vš$ A@j A;Ÿ@4$ ) q1Hk l= -#/+ /;4 K@# /$
H$w )l3 L8;+ Z )/#/L 5$ ('R@ m*4 ly 7L _ %# Z ; [) H$w
-#/ @# K2 q—l'#$ .(q'X µ %xQ— M;1N ;R ?@ /#/ `HHw J/o [)
.FQ52 LE 34 V*4 H$w )l3( kt -H@X( u!1# ,
vš $2 H %X( kt ),=¥( u!1# , <N$ A1 A5/,! I(@!\ -#/ K@# /
.T$/ K$1 O!5 @*j $ K]3( $2 H$w V J/o $2 H$E V2 O!5 d@\'+ Z %X
:
-#/ @# K2 S$
(3
(4
a/1 <z$ $2 J1 q5/4 - [ * )k*b( ?,+ Z !¥ <z@ $2 <Vw ( 2
al'6 )@j (‡
amR <V/14 '14 ),&'4 (’
a!* ) SV= ˆ$ ( V
a!* ) l'6$ !¥ @j vš ),&'4 ( :
.K@'14 V ( $
6/4 )5@, -#/ >: @# K2 S$ .H@H š* -#/+ O!5 @*j /!l -š# /
c#/ K= E (I#*h ^ $) kb$ 9T$/ ‘t P\$ q!¥ ‘t P\ ©Å3# /$ .FQ52 <; K@+ m@ ‘t P\ )H= K2 @: ž6 K2 vš .<o! !,¼ V* 9q!¥ s@4 O!5 ,52
AH@$ 'X )M6w$ H %X L' [=2 H$w <g AH@ </54 O!5 <V
.Vl4 H@H )/54( !14 $/
l#/+ )/h$ Œ1+ / $2 -\ /!l L;'( -#/ @+ K2 V*4 Œ1+ / 9-#/ P@H2 ?,X l'($
•1( $ .%L;H]( -#/ )!,5 M6E /!l K@(/4 L/o# K2 S (5@l\ $2 H$E)
S 94.3.B.III % cE 34 (@j ­@\ )j (g ˜ u'+ 0= -#/ [ 9)j
.#—! !8 J@ $2 J@ K$V -#/ >: ‚/+
(5
(6
22/1
l= J/4 %5/ [,# H %X #N( rR@ q5@ <[ q *'1 K= 9K/!l •1( $
$ .)H04 K@,# #> $2 , $ 9@;H d vl= $C Kh •1( ºh $2 9A$C4
Œ1+ / 9@j ( $ − c+z$ K¢ 9 ( J,: /#/y Mz@ /h2 K= E cH2 I/6 m$14
. >: Mqy z±E K@$§ #> A!1 $2 O!5 N2 I,5V
.(7/24) 5 / O!5 I@# h@;4 H %X ly *+ ˆH =34
)2/( 1 6@@' %Æ '1 5 5@, (G8) s H,[ 5'* $/ 5@, 1997 J5 )]3H
$/ </54 A $ G8 5@, !b/$ /1 €z$ <V¢( 24/7 *+ \H ly RE ,1+
(@1k Ç K2 H %X A¥ v[ s2 /$ .H$E V2 ,N+ Z !61 ) )h 9 O!5 <$Q5$ .sb K/!l 1# )/5 O!5 c' @*j S d> K4 O!5 m1 </#/y
O!5 9
,N+ Z @\ 1# )j /5+ Ž Vl4 H@H )/54 )/:1 K2 A¥ v[ s2
%N+ `lk2 ºh l3 F>: `'+ /$ ./!l! 4 ,&H ! *' ‡@! ) 9[4 l
‚/+ O!5 zQ </ c#/ K@+ /!( d2 J,NH h@; l3 F>:$ .2008 J5 $2 I/!( 50 ‡# .FHV2 Al4 @' O!5 </54
7$ J@ 5 24 @R LE @k@ S *+ L6 J/+ K2 9l3 F>: DE %N'+ q 9K/!l O!5 A1#$
@k@ %# I*oy *+ L6 K@+ K2 S$ ."24/7 l3" q£ vš % M6 ': $ Á P@l J#2
S ºh 96@@' (1 :My2 „Q„ no3 >: %L;# K2 A1#$ .-+4 /h2 u#R 5 $2 <yl <@*( cE
(3 ano3 >: /!( d q!¥ K@H (2 a–@\4 6@@' $3 cl!\+ d> vb] K$V )l!\ E
L6 s/ # Ž E$ .sb K/!l </54 _ J( no3 >x q!¥ K@H _ ž,# Z ,5 q: ON E @; O!5 @k@ O!5 IV K@# K2 c!5 A1# 9m14 „Q[ ˆ› F>: I*oy *+
. >: </54 ‚/( c IH$] K@# c@h !:2 d noy d2 DE (T ,1 J@# Qb V ^$)
!„,4 *+ L6 DE A /!l 24/7 l3 *+ L6 9 O!5 #/l 9)Q4 -:>+ K2 A1#$
sb2 -+4 *+ )@!1 *+ )L6 J/+ K2 A1# cH2 r1#$ .
$ ˜+ K,N B /!l <@ [) -\ -4 5 (H $ T$/ *+ dµ K2 *+ )L6 O!5 A1# /($ .{/!(
-'+ K2 9 `lš E 9*+ LX z@” 9
#/!( A( T$ K$1 E /1($ .{/!( (!¥ K@H ;HE
.B /!l( <yl <@*( *+ A /!l !* ) !¥ K@H ;HE x +$ ) K  F>: *+ ly K2 $2 I,V IN1( LN1( /5 {2 9l3 F>: DE L,NH( 9K/!l ,N+ $
-\ /!l *§ K2 s@ ,N+ *+ ly K¢ I/($ .
#/!l A( #V1 Vl4 H@H )/54
(-!\+ $2) K/!l -!\+ / 9$2 )/5 d2 /1($ .! *' ºh <yl <@*( V$ ÈP$ J,: O!5
.I\( [= Vl4 )/54 )@' J/o
A¼$ ‡@j <0L62 A1 V/1( { 0É L -4 K2 J@ 5 24 V/ O!5 @ r1# $
[ K/!l %&1 #/+ $ .$w /#( $2 ;+x )44 O!5 V K$&'# H %X O!5 A;Ÿ@4 V/5 ) K@H ;HE q;Ÿ@ /h2 ': K@# K2 @: 9I5@y [= $ .-4 >:
clHÆ$ J@' DE /!¶ K2 c1@( K@# $ − +x u#R 5 cE @k@ S K/!l /h2 (‡$' 2
.d@!b +:
18
(7
6.B.III
(1
(2
(3
(4
(5
19
22/1
5@, 1 6@@' %Æ r14 q5; u#; ^( *+ 9l3 F>x %N'+ q 9K/!l O!5 A1#$
œh (G8) H,[ 5'* K/!l 5@, MN52 O!5 l3 F>: #@N5 *+ ) (G8) H,[ 5'* K/!l
);+ d2 !,1 F>: -!\+ $ .11<v* \( <, M A1#$ .(I/!( 50 [=2 8j `@ x q,'#
)LX ql3 ‰( )BC$ -#/ 7/24 ly @+ 9b~ K… $ .)/:1 $2 %:;+ <=> [ £ $V
.j ON -h )BC4 F>x )#;! )H5E `/ /$ .*+
%X )/h$ $2 sb '14 R3 )Vw ž+ K2 $C l3 DE %N'+ Z </h@ ,+$
./!l ’b )*+ M6E )/54 ‚/ :@+$ :V@6@( %!1 :/!( H
)q \&? &?;( &>j =Z + \24/7 &?2R \F+#( &# l7 +1 202 514 6113 G L; )A>9 p >)d Ux2#
.richard.green@usdoj.gov 4?B 5 5 "% >)d 6?O .&? 1( *9 \&A3 6b#{ \&? (6
(7
11
22/1
IV
20
=&-> $> 19-4 ;'< :20 3104 56 78-(
9 2 S T &'( R
0 H
0 y
3 i# 8 r R
VfG <9 p1 H _i )
A
+1 <9 V
< BG H
U( z
Vc $i% G
#c -Vu S] iO p
i )0 !!
.{ .| }P$
[ s }?
@
H iV@j <VE$ /k V/5w rR@ s@4 O!5 X1 )@! $V /h2 u!1#$
6@@' )/$ -#/$ #3l V@4$ #@, )l5 &' iV@! 1; <Vw -!\+$ .x (g$
‘t P\ ?$ @j )#@4 ?7 O!5 K$1 1#$ .H@H )l!\4$ ‘t P\$ )@j A( )Q1$
‡@k zQ )@\t$ !,¥ iV@j( q5@ <[$ iV@j <Vw I#$8 I*'5 $/ ),&'4$ SV= $/$
.)H F>: A( u' K,N q $V )@!$ .’Q1
A.IV
:q!# 9L'( , ‰( </#/3 \3H !! iV@j <VE 'R$ )/ M3HE -!\#
1$ x (g$ L5V$ L1l+$ H iV@j Q MN; (gQ u' rR$ J&H E
1.A.IV
.L'
;HE *'5 ) @j ,L4 k'1 LX F>: %N+ œ‹ H iV@j <Vw u'+ L6 M3HE 2.A.IV
.iV@j </h ;o$ Ro4 /j —( #V@4$ 'l q!—3 k'1$ (K@H
.{]3( )@!14 %+$ x (g$ _ >Hw$ iV@j l )… =34
3.A.IV
M'( ;# L!5 #,$ 9:lb$ 9­@\ )j (g K]3( )@=@+$$ )M6w$ ‰\t ?8$ 4.A.IV
.)z `$ 1; %{$1+$ @j vš$ @j )LX AH$14 A( [
!"# $%&'
B.IV
‡@j iV@j (gQ 'R$ $2 'R$ </ M3H¢( 2/l+ 6 !#@R ,L iV@j <Vw 'R$ </ M3HE /1#
.13 ،12(CIRT)
.(CIRT) ; 'R$ )/ M3HE $2 /#/
@+ K,8$ )@!14 ,&H]( u!+ Z 8 /j DE <vl H iV@! 1; (g dVC+ /
‘t$ J1 A5\ ? K( A1#$ .c;+$ ¬1HQ JzQ `@ /2 @R /j$ (gQ 1 $
u!1# , kb$ @j ? *+ Lg= ,1! (CIRT) I'R$ '14 ®@j iV@j (g V@6$
,1+ K2 9)j F>: A1#$ .x d/*$ H iV@j /8 P/ u' 'R@ ¡ ) iV@j(
.Ll $2 L\3H2 c6@( J@+ K2 K$V )@!14$ AH@ ;HE )\! ? ®@j iV@j (g ( !* ) #N Q %5/$ )/t v@( (CIRT) ®@j iV@j (g J@+ K2 ?@#
) )*+$ u'$ iV@h 5 fQ(¨ </h$ *+ Lg= ,1$ x (g$ 1N R@ /j$ )@!14 %+$ >Hw$ ! 'R@ ; F>: JL ,N+ K2 A1#$ .!*
>j 6 fJj &k>, &#N &
1.B.IV
L; ;2 € I F;b .*9T9 GH &( &Ak; 58 )H VW
.(N-SIRT) i>j fJj &k>, &#N & % (NCSIRT)
.p *>)A( <:% 6 Z L; 58 )H Y7‚ *9T9 GH Mb n ;b % e A _=W os % 6?O
CIRT
(1
(2
12
13
21
22/1
; J@+ K2 9‘@*t c6$ O!5 9q—l'#$ .6j )@!1,! 'l! 'R@ ¬1H V@L6 H$1$ ;o$
*+ K2 K$V q!# rR@ s@4 O!5 Ÿ@ /#/1( ®@j iV@j (gQ 'R@
:c!5
a O!5 ’t ˆ3' /#/$ /k •
aH \b( >Hw( !14 )@!14 3H$ 1N R@$ H Ro4 ! •
Mb$ K$V@4 9sb )LX L5z@+ Z 1N R@$ iV@j( !14 )@!14 ?,µ$ ! •
aA,L4 !*4 ‡k J/# %+ v@ 6@@'
) #N X1$ )@!14 % !*4 ‡k2 A( , )*+ v+$ _ ˜@„@ )*+ )… E •
a ( !*
a!,¥ =34$ 1N R@ ;o( !14 )@!14 9l4 >Hw )@!1 v@+ •
aiV@! '4 (g 1;+$ (g$ ;o! )g+ ?8$ •
a!(4 (g$ iV@j 5 )@!14$ )Hl %+ •
a6 !#@R ’Q1 )g+$ ):µ /#/ Œ— )@!14 /k$ ?l+ •
.LQ+$ iV@! (g( !14 )L6@$ ( !14 1 ),4 N2 3H •
.@j$ H/4 )=@ A( u'! @j bV )… $2 … E
)@!14 9)@!14 3H ®@j iV@j (gQ 'R@ ;! $V /h2 [,#
‡k2 /h2 '14 @j )=@ [B$ .A'14 !*4 ‡k2 O!5 j \b$ 1N R@ 5
.(g \3H2 L=yE A1#$ 1, !*4
ly O!5 ?@ E :q!# 9[4 l O!5 9L' y2 </5 )H F>: ? 1; u' >o# K2 S$
):µ #+$ #lbw )3' )Q4 %@ u#R 5 )@!14 v@+ a)@!14 Vl -#@
-H@6 !| 5 )@!14$ </;4 $ )Ll' ,N+ Z )5@l\4 V/5E a!$
.G'$ \b$ 1N R@$ </#/X )6@@' 2.B.IV
(1
(2
x (g$ L1l+$ rR@ s@4 O!5 H iV@j L6@4 V/1Q 5'* $V ? )=y E 3.B.IV
.L' 1$
P\ K I&H$ .‘t P\ ? ®@j iV@j (gQ 'R@ ;$ )@j K$1+ K2 A1#
(1
A1# 9)@!14 6@@'+ @k2$ )@!1,! #@j 'l = M0X !S K/!l v[= ‘t
.iV@! 1; <Vw( ‘t ?X L/: u ‘t P\ ? ,1 )@j O!5
-H@6 v[ ,1 <&H ‡= )@! 9[ O!5 ,$ 9‘t P\ ? H$1 )Q1 ž+
(2
/5# K2 '$ ‘t$ J1 A5\ A( K$1! S$ .‘t P\ :#/#$ L!S Z #@j 'l
Ž1 s@ O!5 P8$( 5@ u$ 97' „~$ 1N R@$ H \b( \l+4 Ro4 <VE
.Vl4 )=34$ 95@$ 9)@!14 %+ Qb !—3 )@!14 %+ ž# @j$ ‘t P\ A( )@!14 %+ )™ #@\+ O!5 ?g3
(3
.q!1; `@
9‘t P\$ @j = O!5 V@1+ Z ?'4 /#/ L' )=3 F>: ?g3 @ •1( ':
(4
K]3( ‘t$ J1 A5\ A( =3 ,5 2 M3HE$ 9j !4 )H( #} ,N+ G( >;'+$ ?8$$
K$1$ 9-#/ V@$ YVE$ iV@! (g )™ N2 %+$ 9iV@j <VE$ H Ro4 <VE
, )@=@+$( ?8$ $ iV@j <VE ‘t P\$ @j( kt )$C4$ $V /#/ .`@ O!5 Cl' O!5 <V$
22/1
22
K$1$ $3 v A$/ M=3$ ‘t P\$ @j )=@ bV *+ )L6 $2 L6 E 4.B.IV
.(CIRT) iV@! (g 5 $C4 rR@ K ? )@!14 Vl+$
I*'5 )@!14 Vl+$ K$1$ $3 Œš H$1+ ,5 )Q5 E$ ,Q4 *+ )L6 /#/ 1#
(1
>Hw )Q1 F>: z01+ K2 S$ .iV@! (g( '14 $/$ 'R@ 1;$ '4 Ê I2
(g )H= A( , )(g$ \b$ ):µ 5 )@!14 Vl+$ !,¥ H iV@j( l4
.
#b~ !*4 ‡k2$ iV@!
l )@!14 Vl+ !*4 ‡k2 $V ? *+ )@'$ „–/¼ *+ )L6 E @+ K2 S$
(2
E 9
™ /h O*2 DE 9%L4 $ .(g( Pw$ \b$ ):µ( u!1# , -'4 `@ $
V # /'5 ºh h@; *+ )@' &+ K2 K,N V DE ^$ )Vw Ÿ$ DE /'+ )*+
I+ [=2 )l++ DE @\+ K2 q—l'# {2 E A'1 V2 ? [ M'l( Kh v[= )Q1 2/l+$ .,&'4
.qC4$ q&' ?(\(
.T$/ s@4 O!5 )@!14 %+ \3H2$ H$1 \3H =34
(g (1) :O!5 P@8@4 >_ A'14 #b~ Mt$ A1l$ ),&'4 ? K$1 @j ?g3+ K2 q—l'#
®@j iV@j (g ˜; )Hw %5/+$ z01+ K2 (2) .@!! 45 </5 :l5( iV@! l4
6@@' cE `!k@+ b… A 62 )/ M'( —( 9,!w$ $/ ¥$ )BC4 DE J,NHQ
DE LšQ(E$ rR@ s@4 O!5 CIRT V@ ,'+ K$1 (3) 9q,!w s@4 O!5 iV@! (g
.1;( CIRT )\!
.@j )H! H V@4 #,j )M6E$ )$V2 ?8$
@k #,j '2 )$V2$ )gL'$ )M6E$ ) >;'+$ ?8$ IN#2 iV@! 1; <Vw !,5 -!\+
iV@j (g ; l'( 9 ,N# K2 S$ .L;Ÿ$$ Yly$ L,&H2$ )@! H
‡k2 ? u'! '2 )$ 6t$ !b/ !,1! L6@+ ­Vl$ #14 —3 )M6E 9®@j
A1#$ .)*+ A]+$ ®@j iV@j (g )!,1 '~ )@!14 )ly >;'+$ !*4
b~ LN1( ? u' 9iV@! (g K]3( *+ L6 L;k@( 9®@j iV@j (g ˜ O!5
-#/ @+ K2 )@j O!5 A1#$ .sb iV@! (g )H= ? K$1 A, </54$
.iV@! (g K]3( Aj$ V/X A;Ÿ@4 ?,X ,4
5.B.IV
(1
6.B.IV
(1
),gL! (gQ @j )!,1 u'+ O!5 </ M3H¢( iV@! (gQ 'R@ ; Qb J 7.B.IV
.L' 1$ ˜\' 1$ H
@j )H ? u'! #0= *+ L6 V@6$ J0! 9'R@ ¡ s@ DE O+ „Vh P@$ h (1
V/1 ;+ Z )M6w$ ‰\t ?8$ %L4 $ .‘t P\ [ 9
#b~ !*4 ‡k2 ?$ sb
.,¼ iVh d d/*! iV@! (gQ 'R@ ;
.H 'l Q$ )!,1 #} 62 $C4( %+ Z *w )™ O!5 ?g3
†E q—l'#$ .) $2 )0Lg= )@!14 6@@'+ )g' 18 R@ 3+¾ / 9b~ Ah M¾# œ‹ 9</h O!5 h = 2 O!5 @L,g! 1N R@ kt )@!14 3( kt )
.F>: )@!14 5 3 )!,5 !,5 d2 l A1l! `@ h+E q—l'#$ .)@!14 F>: ,1
8.B.IV
(1
23
22/1
V
!? @A
%< p\ H ;
~
 7 4
1 %< H ;$
G q ^] ) 3\ Y9 J! n2S5 8V
)- B
.6 L! B ;q 7 D-,€ $9 ' g5 H ;$
G D
V q c
3c !
) -\ H ;&'( )[ 0] _iK ! <S" H\( @ ^$O <! .G H1
_$ &'( )[ K
1 V 7 ^$
1 p
qG W(‚ H <2! /kS .
<S T 7 E$ Y
R%u
.),o B
$i%
-. A.V
914 p 45 „ ME 957/239 </4 %p 1 1,X ? u# p 'R$ [ G#$ 1.A.V
.15)@!1,! #@j ¯l #}$ ®@j MN; 45 „ ME 958/199 $
9)@!1,! 'l J/o$ —3+ A]+ @j $/ ‰ ^ p 'R$ [ G#$ ] ˜\+
(1
>: K¢ 9[4($ .V$ 9/4 ?,$ 9‘t P\ 5@ IN#2 $ 9@j :#/+ Z ,&H $ 9' -H@X O!5 l4 )' bVE$ 9kt$ @j ,&H q!,1 -#/+ ,3# *'1
.<N )$ 9 $ 9k@*t ,3+ : sb2
O!5 p „ d 1/ s@ K¢ 9dV* K/4 ,'$ K$1 ,&' #+ c+V$2 4 I$$
(2
9> gH$ .)@!1,! #@j 'l #}$ 9Y/b$ H$w @j )l\+ [,+ rR@ s@4
)/t v@+$ !b/ Y!,5 A 62 H$w @j )/b$ )l\+ >;'+ 'R@ )V¨ q—l'#
9- q6@@'+ @&' )@!14 )ly$ ,&H2 2 ] $'+ q—l'# $ .A'R@4$ ‘t P\! N
,&' )2$ .A/o4 5@+$ 9Ro4 <VE$ 9Ro4 Q+ l k'5 @&'4 >: ,3# K2 q—l'# $
<Vw z$g# DE H [,# H$w @j \3H /;4 v„] K2 dV* K/4 ,'$ K$1
3H 0#01+ @ 5N *'1= `!,5 / H$w @j )Vl K2 $/l#$ .V$ ‘t P\ ‡@k 1
.
„
)**o V/1 G{ /,1+ K2 );+ P@H Qb N$ 9H$1 L\3H2 Qb K/!l! q—l'#
(3
) >;' s@4 ? <VE : M3H¢( LN1( J@#$ 9 >;'+ MzE !*4 ‡k2 V/1$
E$ ),4 N2 %+ -HÆ 9¡ vl= -H6 O!5 5@$ q5@ <[ )Vl 1+$ .'R@
.$/ v#14 J/o$ A=34 A( , )=3
v+ ,!w ),&'4 $V ? -'6 DE Il'6 9
p „ 0#01+ —( ¡2 T$/ K$1 q#$
(4
.)Vl$ )Q5;
!"# $%&'
.@j :#/+ Z ,&Hp ' \t >;'+
K2 q—l'#$ .'R$ '2 \b >;'+$ ?8$ :#/+ Z ,&H A]+ DE q q@j M6¨ $ <@\t ,N+
= %+ <V5E b~ K… q—l'#$ .F>;'+$ p ‰\| %,*+ 5 IQN 9Ro4 <VE DE \t F>: V/5E ˜\#
q—l'# ,= .:>;'+ $2 \t )' DE ’ Z ) /#/$ J/+ u :>;'+$ \t !14 )Q*$ ¬1H$ >Hw$ l4$ (g 9iV@j <V¢( u!1+ Ih2 \t ,N+ K2
B.V
1.B.V
http://www.itu.int/osg/spu/cybersecurity/docs/UN_resolution_57_239.pdf
http://www.itu.int/osg/spu/cybersecurity/docs/UN_resolution_58_199.pdf
(1
14
15
22/1
24
F>: q/o -#/ 2.B.V <; `l!R Z )M6w ' \t ¸1+ K2 q—l'# ,= .)@!14 %(
1+$ .' )Vl4$ )l#/ K]3( /4 ?,$ ‘t P\$ @j A( , K$1$ @j ,&H
.LX1# K2 -#/ O!5 A1# Z #N %L$C$ A/o4 5@+
.@j )l3$ ,&H q/o4 ' 5@ )Vl$ G( >;'+
@L,X 5 A( , ( 5@ z01# K2 ( 5@! 1 rR$ GH( d q—l'#
62 A@j A**o4 ? ‰($ E$ 9)1, F>: bV$ )1,$
':$ . ( !*4 4 F0#01+$ K$1 ,'+$ 9 )Vl K]3( )@!14 %+
!*4 ‡k2 yE$ 5@+ (1) : >: 5@! GH( ?8$ s/ L &' A1# ;Ÿ$ k'5 „Q„
<V#z 62 SV= ˆ$$ @j$ ‘t P\ A( , [ :V@+ ‰($ 0#01+$ M'( DE dVC# ™
K]3( K$1 ;# K2 cH]y d> u' (2) a MN;! q!1; u$ ( q5@
0= ? 9$ )*+ Vl+ (3) a@j )5\ !| A( ( !*4 \3H$ iV@j
)=@) 6t )*+$ 9(GH >: 5 $C4 @j =@ bV) !b/ )*+ ,'+ O!5
.(@L,X 5$ 90'4 -@j q!,1$ 9,!1 )C4$ 95'* $V$ 9sb @j
.#g ,5 )C bV p „ V”E O!5 ?g3
v[ c¤6$¾ / .<l4 l V/5 u#R 5 #g ,5 )C bV p „ V”E S
@j /5# K2 S$ .%gj \@4$ <v—* #g )À3'4 s/ q5@ <[ @ @j )Vl4
>;'+$ %,*+ O!5 )Vw 9 '$ ‘t$ J1 A5\ A( )=3 $2 ,5 $V ‰($ ? 9q@j
vš #\($ I<yl ‰t O!5) )@!14 h+E :)Vl4 F>: O!5 ![ A( $ .-#/$ 5@! )Vl
-#@ ly O!5 ?@ M3HE$ a%:;4$ 6@,' )$ #Vyw )l$ V$ )l [ 9(<yl
O!5) -#/ v@+$ a
#b~ !*4 ‡k2$ %gj \@4$ <v—* #g )À3'4 DE kb <@*( L6@
0@h d2 $2 qlN %5/$ 4 </54 Œ5$ a<yl ‰t O!5 €> %! )$V2 v@+$ a(<yl ‰t
. A l )@\½ J $2 H@] ,&H2 ’HE 0#01+ Œ—( sb2
2.B.V
(1
3.B.V
(1
d$ ‘oy$ ‡l3$ ;R )6h ‘b J,: c6@+ ? /4 ?,g,! J/+ Z #Vyw )/t %5V 4.B.V
.A!,14 sV$ kt )6h
q—l'# Z v(/$ y' \b( A'R@4 q5$ <[ ,5 P\ ? )@j •1( `H$1+
(1
2 0#01 < v(/+ ? )@!14 2 P@l2 $2 J@# [ <V/¼ )l' K/!l •1( %&'+$ .LL6@4 L/o
kt )6h d$ ‘oy$ ‡l3$ ;R 5@+ DE )Vl4 %&1 m/Y$ .J1 @L,X s/ )@!14
V@4 V* #l+$ .c6@ V@4 yl4 ?#z@ Qb $2 M(~ $2 <>+ $2 A/4 Qb M@ ‡Q\$
- $2 #/# )\l DE <yl ‰t O!5 )$V $2 ‡1 $2 -#@ ly ?@ IM/( 9/o4 H$14
M(Ê l#/ )$/ %&'+ )Vl4 F>: O!5 ![ $ .)H z6 ( )@!(/ ž' $2 /
‰t O!5 -1! )$V]( ;R /#$0+$ aA/,! H$14 V@4 v@+$ a' Ro4 5 )@!14( %:/#$0
)H M6E$ a‡1$ / - ?8$$ a)@!14 ]( !* ) ,!1 %L!+ M'„2 <yl
.-#@ O!5 ~ ž;* ;( #1! z—2 V/5E$ 9)@!(/ ž'$
%!1$ 9A!,14 -#/+$ ' ‰\t ?8$ :l= Z $/ Vl# K2 ‘t P\$ @j ?@($
(2
.)@!1,! !¥ ¯l 2 A O!5 ,1$ aK$b~ Lh Z )($ g' n* J1 @L,X$ 1 !1 /$ ,5 $V − A=34 ?7 ,# ºh 5@! y rR$ GH G#$ 5.B.V
. MN; %:$V2 A]+ d#/$ A!,14 -H6 ( q5@ n' gH )@!14 ,&H2 1N R@ v[ /6@#
(1
K2 S$ .)C4 ^$ )@!14 q;Ÿ@ l=$ A/4$ )/#@ q;Ÿ@$ )6@@' q18$$ ,&H
.Y =x F>: I!1 IM06 F>: + Ž E ºh =x O!5 ,6 R| F>: 1N R@ 3+
−
25
22/1
.C,! ' \o! 18 \H 3# Iv[= ,&H d#/ s/ r q5@ nH K¢ 9[4 l O!5$
m@ A;Ÿ@,! ?$ ˜\H O!5 @l '2 )VLy V,5$ A;Ÿ@4 -#/+ ‘t P\ V@L6 0#01+ K¢ >$
5@$ Vy¨ 'R@ \3Hp q@j u' K¢ 9sb2 hH $ .F>: 1N R@ /j /5+
S$ .=3 $C 5 <l5 .‘t P\ ? [ IN#2 rl# m@ „ A,!
$V$ @j )=@ A, 5@! rR$ GH( ?8@ </; … 3# K2 -#@ O!5 ?@$ >' M3Hw
%_ kt M06 q, Z v(/( J$ !* ) )@!14 O!5 @*j A!L4 sV$ ,5
. MN;
.#@\$ œl$ 6@@'$ %!1( '14 \3H 0#01+
'l 2 ‡@k :V@L6 •1( c6@+ A1# 9#@\$ œl$ 6@@'$ %!1 )@j c( %5/+ d> /(
#@\+ 9  #@\$ i@l )#@$2 :/#/ Qb 9/5+ K2 K/!l ?@l .)@!1,! \3H]( PQ\8 c( %# d> /($ .l1* ' )#/ X1 5 IQN 9+> ' ‘@t ) )g'4
. )Vl ‡Q\ yw ‘; + / 9SV= )C4 #@\$ œl
.yl4 ‰t ( %Q c[#/$ / k@*t J&H Œ1
K$1 ,&' [ 9$/ ),&'4$ K/!l !| Y/,5 Z k@*t )… Œ1 >: &'# K2 q—l'#
u/+$ k@*t #} K]3( ,&'4 F>: L18$ Z L6@ ˆ@\t `z $ .dV* K/4 ,'$
c6@ K]3( M~ I$V I@+ [B 91980 ,l 23 )/,5 Z ˆ@\t q:$ 9V$/j 5 *o3 )Hl
$/( 92 ­Vl c18$ 9L6@ ˆ@\t F>: ?!\N+$ .*o3 )@!14 <VE$ ?,Æ u!14 J1
*o3 )Hl$ k@*t #,j %:V@L6 A!L4 q![™$ ,5 $V$ )@j </5 q
.<yl vš <@*( $2 <yl ‰t O!5 M@ V$/j 5 )Hl u/+ O!5 #$N vš V@ M—E $
.h4 @!j$ H Ro4( q5@ ,'+
?8@ I1 ,1 A!,14 sV$ /4 ?,$ #g ,5$ )@j ++ ' #N $'+ qN#
ž@! $2 #b L6@ ­Vl4 [) (v#14 d2) (%<) ! *'5 A( G/+ Z v(/ >;'+$
.(),4 N2 d2) $K[ *'5$ 9(0w
V/5 ':$ .<N ) [ R| _ ‰l+# $ H Ro4 O!5 ![ /h2$
-'6 DE Il'6 ,1+ 917 ]4 5 $C4 )*+ ^+ P\ 17 )/ 'X L 9),&'4
.N F>: K]3( s@4 1 !y ¥ J/# d> A u!4 &H . ( !14 #N
V/5 ':$ . )6h !| X14 6@@'+ <V2 V@6$ O!5 ![ /h2 q: #@x <VE$
J/#$ .#@x <VE -'6 DE Il'6 ,1+ 9)*+ ^+ P\ 17 )/ 'X 9),&'4
.N F>: K]3( s@4 1 !y #³ B u!4
6.B.V
(1
7.B.V
(1
8.B.V
(1
(2
(3
22/1
1
26
­Vx ‰¥$ … K/!l #V* 5,g! ?( )@!14$ )*+( r14 ,1 u#
(Asia-Pacific Economic CooperationTelecommunications and Information Working Group )
(# </4 )#@) 2003 J1 ‡@!\4 vš u#@$ 3h; @* K@H
(Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (USA))
(# </4 )#@ /1 <z$ ) #; !4$ (@j %X( u!14 %
(Computer Crime and Intellectual Property Section (of US Dept of Justice))
(@j ­@\ )j (g u#
APECTEL
CAN-SPAM
CCIPS
CERT
(Computer Emergency Response Team)
(# </4 )#@ K@! q—H= 16) (@j ­@\! (g ˜ u'+ 0=
(Computer Emergency Response Team Coordination Center (of Carnegie- Mellon University, USA))
(Critical Information Infrastructure) )@!1,! #@j 'l
(Critical Information Infrastructure Protection) )@!1,! #@j 'l #}
(Computer Incident Response Team) (@j iV@! (g u#
(Council of Europe) ($$2 ^!
(</4 !,4) 'R@ 'l #} 0=
(Centre for the Protection of National Infrastructure (UK))
(Computer Security Incident Response Team) ®@j iV@j (g (# </4 )#@) Œ1$ 1N R@4 =3 ,
(Common Vulnerabilities and Exposures List (USA))
(Department of Homeland Security (USA)) (# </4 )#@) q!b/ <z$
(Department of Justice (USA)) (# </4 )#@) /1 <z$
(European Union) ®$$ V
(Federal Acquisition Regulations (USA)) (# </4 )#@) #V M' ž@
(Federal Communications Commission (USA)) (# </4 )#@) #V )*+ 'X
(Forum of Incident Response Security Teams) iV@! (g 2 ˜ s/'
(Group of Eight (Nations)) H,[ 5'* $/ 5@,
(Information & Communication Technologies) )*+$ )@!14 6@@'+
H )/#/L L6@4 mR <V/1 $/ =3
CERT-CC
CII
CIIP
CIRT
COE
CPNI
CSIRT
CVE
DHS
DOJ
EU
FAR
FCC
FIRST
G8
ICT
IMPACT
(International Multilateral Partnership Against Cyber Threats)
)#@ L!!$ )@!14 6@@'+ )@!1 %+ 0= [ ;!| 0= q:$) L!!$ )@!14 %+ 0=
(Information Sharing and Analysis Centers (various, such as IT-ISAC; USA)) (# </4
L!!$ )@!14 6@@'+ )@!1 %+ 0=
(Information Technology Information Sharing and Analysis Center))
ISAC
IT-ISAC
27
22/1
(Information Technology Association of America) #2 )@!14 6@@'+ \(
(London Action Plan) K/' ,5 \b
(Mobile Service Commercial Message) @,¥ +@x #g /b
(#2 )@!14 6@@'+ \( ?() )@!14 K,N rR@ ^!
(National Information Assurance Council (of ITAA))
(# </4 )#@ @:/#E 16 ) )@!14 5@H K,8 %!1$ -#/! rR@ 0=4
(National Information Assurance Training and Education Center (at (USA) University of Idaho)
(# </4 )#@) 6@@'$ v#1,! rR@ /L14
(National Institute of Standards and Technology (USA))
(# </4 )#@ 9#V )*+ 'X) rl —3$ @„@4 ly ^!
(Network Reliability and Interoperability Council (FCC USA))
(# </4 )#@ 9q!b/ <z$) )*+$ p #3 'R@ 'g!
(National Security and Telecommunications Advisory Committee (DHS USA))
(# </4 )#@) 1N R@ K]3( 'R@ )Hl </5
(National Vulnerability Database (USA))
(Organisation for Economic Co-operation and Development ) dV* K/4 ,'$ K$1 ,&'
(Open Vulnerability Assessment Language) 1N R@4 h@;4 % —
(Public Switched Telecommunication Network) !#/l @,1 ;+x l3
(Research and Development) #@\$ œl
(Science and Technology) 6@@'$ %!1
(Small and medium-sized enterprise) \@4$ <v—* #g )À3'4
(Short Message Service) <v* /b
(Standard Operating Procedures) #14 —3 )M6E
(Telephone Consumer Protection Act (USA)) (# </4 )#@) +x q!L #} K@H
(United Nations General Assembly) </4 %p 1 1,X
ITAA
LAP
MSCM
NIAC
NIATEC
NIST
NRIC
NSTAC
NVD
OECD
OVAL
PSTN
R&D
S&T
SME
SMS
SOP
TCPA
UNGA
22/1
2
28
! "#$ %$&
!" '($
%'+$ .'R$ #@$]= p #@ ,&H2 ?8$ @ I/ K/!l( HQ `,,k G( gL' FHV2 Al4 GL' J/o#
Œ5 q!# ,$ .c,+$ GH( >;'+ DE )/! T$ % !h /!l '+ <0, ( h iQ„ DE gL'4 F>:
:h DE %4 GL' >x
!"
._ k@$ K$1 Vl GH \b %+$ #/+ − 1 .2
Qb %#$ .L GH ': ! #/+ M6¢( /!l J [,+ D$ <@\t :3
.</h@ %+ <V2 J/o+ Mt
GH( 1N R@$ <@ -H@X I,L #/ !h Qb L17 %# Z )@!14 @+ :4
.V@LX L!5 0=+ K2 q—l'# Z ) V/§$ /!l Tj ./!l )6h l! \b ?8@ % !,5 -4 %L; @# :5%
•
•
•
.$1+ GH( >;'+$ ?8$ − 2 .2
\3H M@$ 3+$ %,* A$/ %L&H ? $2 I!bV °M@ K@#\ Mt ?,” :6)
7 89
:; <=)
\3H2 ;R O!5 \3H ,3+ K2 S$ .A14 /!l </ m$&$ </#; )6h( M@! zQ
.6 !#@\ #V4 )l!\4 /#/$ K$1$ Vl
.!,1 <@34 ‚/+$ GH >;'( K@$/ $ K@!¥ Mt J@# :89
:; >?@
•
•
.GH ,$ g' $1 GH %+ − 3 .2
c!5 /=]! p $1 GH %+ <V5E b~ K… d” :4. <=
' 6)
7 89
:;
H$1 )Vl4 /#04 I5@8@ @* 1+ {2 s# Z ) žl*+ /$ .A#\ M&' ? $2 I!bV
/!l GH( %+ Vg K$1 >: M{E S 9sb2 K/!( ? K$1# /!l K= E$ ./#/6 ( !,1 M/($
.1 cH](
•
29
22/1
6; E9 F
G ! ?H 89
:I J-?9 :1 ABC
1; •
Z \3Hp $1+ GH( •
<V/¼ m$Ÿ$ )6h Ë!+
GH ': j •
/!l ‰b Á
œ#/ Á
</54$ <@34 v@+ •
Mt -H6
0= )$ <@ R@ •
@\ /#04
l! H$1+ \3H2 \b •
/!l )6h
!! O!5 GL' >: 0=#$ .A$C4 l= O!5 z¥ J/ Œ5$  >: `@ $ MV ‡@!2 q!# ,
g'( (A;Ÿ@4 V@$ 4$ `@ !L+ Z \' $2/$ /!l( kt G) )Qb/4 ‰(+ Z \'4 ^
:FHV2 V@ $/X !! F>: Al+$ .( <V#z) m\4 #L'( <V@3'4
:" 5
?
:KI LM
:3& 89;
`@ •
4 •
K@;Ÿ@4 •
:N
N $OP
: .(# :)
7 $R"
H ST Q A(7
'R@ g+ ?8$ •
,&'$ H@H ^ ?8$ •
iV@j <VE •
5'*$ @j A( )=3 •
„ •
:N
N A(7 $
.(
22/1
30
:E9 "
H$1 )Vl4 $2 )5,6 •
' qh@'$ ) 5 A$C4 l= ? )*+ •
:N
N $
UV
:3& $UX
H %X( '14 </#/X ž@!$ AH@ •
;Hw )M6E •
(CSIRT) ®@j iV@j (g )/h$ M3HE
•
5'*$ @j A( =34 5@ G( •
iV@! (g ); •
$/ ),&'4 \3H2 =34 •
$/ L6@ ˆ@\t$ );+ DE J,NH •
:&N% 8W
?
ˆ@\b$ H %X L6@4 ž@$ AH@$ 'R$ g+ ?8@ gH R| Œ;Ì
.A!L,! +> 5@( Œ@L'$ 5@R L6@+
:4 J:
.q41 $ q!¥ <V#z
:W
-? J?
31
22/1
,- )*+
(Spam)
* &. :
&.( #/
33
22/1
ITU-T
X 6
(2009/09)
:X ITU-T X.1240 !"!# $ % &" ! "#$ %&#' . % ( )*+ , -/# 01' 023 42 -5 .
'
22/1
34
,V : @: (ITU-T) )*+ ^+ P\$ .)*+ K/ </4 %p **o =$ )*+Q T$/ V
{]3( )k@ /kE$ 9;#1$ —3( !14 4$ ' 4 V 5 $C @:$ .)*+Q T$/ V
.q41 /1* O!5 )*+ ^+ Œ—(
)/ KX L/+ K2 -” Z ?8@4 )@' ?(2 = < ?,µ Z (WTSA) )*+ ^ 41 1,X V/$
.{]3( )k@+ /*¾+ K2$ )*+ ^+ P\ 1(
.)*+ ^ 41 1,X 5 V* 1 % ž8@4 M6¨ I$ )k@ F>: O!5 @4 %+$
? K$1 2 O!5 zQ v#14 /1+ 9)*+ ^+ P\ ‘*b ,8 ?+ Z )@!14 6@@'+ ) •1( $
.(IEC) $/ '+L 'g!$ (ISO) q /h@! $/ ,&'4
._ m1 —3+ =$ O!5 $2 )*+ <VE O!5 M@ <06@ <@*( / <@3'4 F>: "<Vw" ,!= J/o+
1#$ .(IQ[ ul\$ rl —3 !( A]+ m/_) 0w Jh •1( %N+ / {2 vš .db <@3'4 F>_ /$
1 [ sb2 0! Ík$ "-”" 1 J/o#$ .0w Jh F>: ?,Æ /à %# /'5 IQkh <@3'4 F>_ /Ã
.q0E <@3'4 F>_ /à K2 Í* F>: ,1 r1# $ 9'1 )l!\ 5 vl1! ' L—k$ "q—l'#"
V >o# $ .#; !4 ˜@h uh ,1 J0!# / :>;'+ $2 <@3'4 F>: ul\+ K2 DE FlH V q5#
mR $2 V MN52 @N5 _ -R M@ Ll\+ ˜\H $2 LhQk $2 #; !4 ˜@‹ !14 @ d2
.@3'4 V/5E !,5 c!,3+ b…
>;' _ l\4 S Pb )M( L, # ! I\bE O!+ / V [
# Ž/K=] 9<@3'4 F>: O!5 @4 /'5$
PQR( <@3'4 F>: >;'+ 5 K@$C4 Ok@# 9i/h q: K@+ / )@!14 F>: K2 DE I&H$ 9 ?$ .<@3'4 F>:
.http://www.itu.int/ITU-T/ipr/ ?@4 (TSB) )*+ ^+ - Pb )M( kt )Hl </5 O!5
© ITU 2009
T$/ V ul q\b K¢( E `H= !$ d]( <@3'4 F>: M06 d2 Î' z@” .Ÿ@;¼ ˜@j ?7
.)*+Q
35
22/1
X 6 !" # $%&' ITU-T X.1240 )*)+ , - * (
)@j ’ ! 1;( d/*! cH2 DE )*+ ^+ P\ X )k@ !! 6 8w v3+
.,5 $V$ !L4 [+$ 96@@'+ )$V2$ 91 AH@ 9GL' 5@' 5@, J/o DE
9h V :l5( @+ q:$ . ] $'+ :RE d” Z $/ ¥ 8w F>: Œ1+$
!3 $'+ K($ # </4 )#@ L1l+ Z - K]3( )@!14 •1( 9ž8@ Œš
.
^+ P\
X
)k@ !!
6
8w O!5
(2012-2009)
)*+ ^+ P\( 17 )/ 'X `$
.2009 ,l 25 ¦#( )*+
22/1
36
*.
ul\ 1
?64
2
#1
3
<*o4 M£$ )*o4
4
)hQ\k
5
2 )@!1
6
)/#/Y _ *# $ ! 1;( d/* 'R@ GL'
7
( u!1# , ('[$ mR <V/14) $/ )Vl4
8
\3H2 •1l h V
9
# </4 )#@
1.9
dg $w /# K@!# 4 )Ry ME K@H
1.1.9
!Q <0L6 O!5 dg $w /# E &h /5@
2.1.9
`HHw O!5 Th /* /! GÏ{Š
3.1.9
K(
2.9
K@H ;HE
1.2.9
v(/( Œ@L' ^!
2.2.9
&' 0=
3.2.9
V$/j ’b 25 (@l /
4.2.9
4 K )6@@'+
5.2.9
!'4 )*+ q!—3 A( )@!1 Vl+
6.2.9
(CAN-SPAM Act)
(CCC)
(OP25B)
?64 `l„
37
22/1
X 6 !" # $%&' ITU-T X.1240 )*)+ , - * (
1
Z 'R@ )V¨ :v@+ 8w F>: m/x$ .)/#/Y _ *# $ @: 8w F>: P@8@
.{]3( )@!14 •1( O!5 @*j -š+$ x l'( /#/6 J@L; ([ 1+
•1( _ ?!\N+ Z ,5 •1( *#$ 1 #\( 4 :3H A1# Z )$V DE 8w F>: &'+
</4 )#@ c( ?!\N+ 4 I;k$ 9ž8@ Œš$ h V 9:l5( 8w F>: J/+$ . >: $/ ¥
. 4 K($
2
./6@# 3
: )!\*4 8w F>: m1+
Œ—( V@*4 vš -#@ ?@ DE b/# q noy O!5 hQ $¼ V @: Á 1.3
.no3 >x *o3 )@!14
ž!\*4 K2 E 9 ! q41 /1* O!5 c( m1 #1+ /6@# K= $ Á 2.3
u#R 5 !4 $2 $w /# u#R 5 (@!\4 vš H$w )*+ %&1 k@ J5 3( J/o#
.((MMS) ‰@ V/1 !4 9(SMS) <v* /b) @,¥ +@x
4
: )*o4 8w F>: ,1+
C4 K/ E )™
­Vx ‰¥$ … K/!l #V* 5,g! ?( )@!14$ )*+( r14 ,1 u#
(Asia-Pacific Economic Community – Telecommunication & Information Working Group)
(Author Domain Sending Practices)
(# </4 )#@) 2003 J1 ‡@!\4 vš u#@$ 3h; @* K@H
(Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (U.S.))
(®$$ V) )\!( *+ ly
(Contact Network of Spam Authorities (European Union))
K/4 ž+; O!5 m1 (Federal Communications Commission (U.S.)) (</4 )#@) #V )*+ 'X
(Federal Trade Commission (U.S.)) (</4 )#@) #V <g 'X
(Internet Service Provider) `HHE /b V@
(Japan Email Anti-abuse Group) K( $w /# ,1 <ME u#
(Domain Keys Identified Mail)
ADSP
APEC TEL
CAN-SPAM
CNSA
DKIM
FCC
FTC
ISP
JEAG
22/1
38
(London Action Plan) K/Ð' ,5 \b
(Messaging Anti-Abuse Working Group) !4 ,1 <ME '14 ,1 (Multimedia Messaging Service) ‰@ <V/1 !4 /b
(Mobile service commercial messages) @,¥ +@x #g /b
dV* K/4 ,'$ K$1 ,&'
(Organization for Economic Cooperation & Development)
V$/j ’b 25 (@l /
(Short Messaging Service) <v* /b
(Sender Policy Framework) 4 ) RE
(Outbound Port 25 Blocking)
LAP
MAAWG
MMS
MSCM
OECD
OP25B
SMS
SPF
!
5
./6@# "#
#$ %&'%
6
p <@\b [=2 !34 v+ DE #µ )HQ5E ,N+ g50 )*+ {@= `@
1.6
)($ )$v; [ [lt ) 3H$ 9P/o! !$ K@+ K2 S 9[4 l O!5$ .
d2) *o3 H )!,5 ‡+ uh `$ J/o+ K2 S # )@!1 ‚/+ O!5 A!L4 MšE$ 9^g
!8 ;!+ s@ %L;!# K2 K$V noy d Ž1 K d2 %L! E A!,! S$ .(Th /*
.T$/ K$1 Qb LX1 /( $V !3 1” @:$ .I/6
y2 y d2 K$V noy d2 DE $E /#( # K2 S noy d2 K2 ?$ /;#
2.6
16
@: Th /*$ . `HHw 5 $w /# J&H _ 0,# Z n*t DE s01#$ 9Il#+ K
/* /6@#$ .no3 >x *o3 )@!14 m/_ V@*4 vš -#@ ?@ DE b/# q noy O!5 hQ $¼
` {@!+ Z K2 K@=/# %:$ m$1 ?@ /#( q!+ IHh2 K@1@# ' K ?$ ˜\H O!5 Th
k `H= E /#/ -1* K¢ 9$w /# 8 K s@ V@6$ J/1 I&H$ .P$34 /*4
.H$w l3 O!5 /o4 )~( <vl= #V u/ n; >: -!\#$ .$w /# u/ n; K$V
-#@ ly O!5 {$$0# Z ?@4 `H= E ™ u (@1k K$/” ' %&1 K IN#2 Th /* >: i/§$
IHh2$ 9h )@!1 bVE l -#@ ;k O!5 (URL) H$w !k@ k;+ &' u/H IHh2$ .5$3
.L1@ DE @b/! * !k@ q: L± „2 q;+ /#/6 5N# ™ <N ) 8 Ilš q: K@+ j )@!14 "/*+" !,14 -#@ )/|$
.
#/*4
.IN#2 !: !3 q:$ 9c' KE K$V$ L #V K$V <V2 ž;*+ 9<N ) $2 !"
(3 4 .!" #$% &'
( )*+ , -. /01 ?H .=56 1 78 7+! ,!9: ;% <5
3 4 =5 > ?!.@ (5 ,AB C!D E ?1@F GH C: ID
.PQL <R F M@@B <NO ?% FH >&" =J 5 K!83 L ?
3.6
16
39
22/1
//5 6% 7 * % "%
()! *+
#' "
,- ./ 0 "12& 341
7
AH@ ;@+ ?8$ 'R@ g+( u!1# , K/!l O!5 A1# : # $%& '(
1.7
? 1; 1 #\( ,5 $V$ A!L4 5@+$ ),4 N2$ 6@@'+ )$V2$ AH@ ;HE )\!$ 1;
. K@# K2 A1# 9q,&' Rw$ @H ( u!1# , : # )*+$# ,&-. /0
2.7
!* ) AH@ );| /8 )M6w †$ u! zQ \! ( !14 4( *o4 )\!!
&'( *o4 )\! s/ K@# K2 A1# ,= .:/!( )v„]+ -l+ $2 :/!( -++ Z (
</54 )l!R )#@$2 -++ q—l'#$ .l'6 )\! ? K$1! zQ )~ ( !14 4
.—( 82 L i/ Z )j $ =34 !*4 ) DE IV' l'6 )\!
‘oy ?7 K$1# K2 A1# : 89.5 $%& 1& ;8;7(# 1$# &23 45 6#7
3.7
. ( !* ) AH@ );| ?l+ A!L4 )5@,$ ,5 $V$ ;Hw )\! 9A'14
.)@!14 %+ !,5 0#01+$ A!L4 5@+ A!L4 )5@,$ 5'* ? @j ;Hw )=$ 3+ K2 A1#$
4 6@@'+ )$V2 i/ !,5 0#01 ‘t P\ ? K$1+ K2 @j ;Hw )=$ O!5 A1#$
.%L*oy O!5 m1$ F>: q! ?@ /#/ 9
A'R@4 #} l A ‘t P\ ? ,1+ K2 q—l'#$ .<v[= Kh2 LÑ@+ S S6 (phishing) Th /*$
.H@]4 K ˜\( #g ,5$ A!L4 5@+$ 9Th /* )$V2 J/o u#R 5 $ [lt ) u DE 6j K]3( @L,X [+ $V MV2 IN#2 )@j ?\+$
.@„@4 l@j )'+$ —3 J&H )5@, i/h2 ul\( $ )$v; )( [
"%
()! *+
#
- ' => ("+
1: ;2 8/) "/ 8
8
: 4 )Vl † :RE %# Z '[$ mR <V/14 )#/'4 /#/1 ':
6$ *1 <=
1.8
( u!1# , ;Hw K]3( I$V IBC </4 !,4 L#0' <g -$ #V <g 'X `N
. ( !* d ;Hw T$/ K$1 K]3( K/' ,5 \b ?8$ DE BC4 >: sV2 /$ .2004 J5 K/' K/' ,5 \b ?g3+$ .I/!( 25 [=2 ‘t P\ 5 A![™$ @h )=$ 2008 @@# ºh 9\t O!5 ˜/k /$
J,NH œ‹ O!5 ‘t P\ !*4 ‡k2$ ( kt ;Hw )=$ 9'14 mR
.,&'4 #@N1
F>_ !* ) =34 X1$ K]3( ;Hw T$/ K$1 0#01+ @: K/' ,5 \b Œ—$
F>: A( )Q5 K/' ,5 \b %+$ .)$v; 3H$ h )!,5$ <yl ‰t O!5 P/t$ h [ vš /8 5@$ ;Hw T$/ K$1 K]3( 2 ,5 \b V/ <v* „$ DE IV' )H
.,1 \b >;'+ J/+ zhw V@LX N2 >( E A=34 -!\+ œh 0! ` „@ F>:$ .5$34
.http://londonactionplan.org/
)\! ®$$ V *+ ly ? u( <V5 9#@' ,5 ¬$ /1( (LAP) K/' ,5 \b J@+ 9Y#/( >'$
)\! ®$$ V *+ ly$ K/' ,5 \b `17 92007 (@=2 $ .(CNSA) DE )V2 Z$ 9'6 9K@—'… !4 ,1 <ME r14 ,1 u# BC ? ,x =34 ,1 !h ? ,x =34 ,1 y$ CNSA$ LAP = `17 92008 (@=2 $ .‘t P\ ? AH@ ;HE K$1 L+
.H4]( KVl 4 V #V* H4 ,
22/1
40
6>5 ?
@ A&(# B2 CD 6 E 6#7# *$ *+$ #DF 1&*!
2.8
D9 GH-I E 6#7
4 ")$V2 5@," 2006 #(2 dV* K/4 ,'$ K$1 ,&' ( r14 JL4 u# /k2
!14 %Y c6@+ 5'* !5; k'1$ A,&'4$ ) q1Hk </54 )k@+ ,N+ HÇ )$V 5@, ,N+$ .$w /#$ `HHw [ <V1$ J/o+ Z @!j(
%!1$ 9 )6@@'+$ 95'*! L6@4 @!j$ 9 ,3+ k'5
K]( dV* K/4 ,'$ K$1 ,&' MN5 )@j I=VE$ .q41 s@4 O!5 Vyw$ K$1$ 5@$
AH@ ;HE V$/j 5 K$1 K]3( k@+" O!5 IN#2 `$ 9 q *'5 @: T$/ K$1
? )@!14 %+ ;Hw )\! L'H@ B K2 ,N+ K2 O!5 K/!l œ Z k@ q:$ 9" .http://www.oecd-antispam.org/sommaire.php3 .1$ 5( 1;+ K2$ sb K/!l
OP# Q 6
CD 6#7
R5 &
7# (5 J7 *7 K8B L.1 M N#$
3.8
6>5 SDT
I@N5$ I„/ 30 I1 `17 "\b2 _ *# $ " K]3( V <$/H 2006 #(2 u#; >: /5
.)@!14$ )*+( r14 ,1 u#; 3 ,52 $/6 ?8$$ !3 @\+ 3'4 **o4 :L3' `B Z ?8@4 `',N+$
a@! )H$/$ ;Hw 4 ,&'+ 'R$ ,&H2 ul\+$ ?8$
(1
a‘t$ J1 A5\ A( )=3 5'* $V
(2
a MzE ' 1; V$V
(3
,'$ K$1 ,&' ^! k@+$ H %X( '14 ($$2 ^! ;+ V$/j 5 ;Hw$ K$1
(4
aK$1 0#01 )$V2 L;k@( ;Hw K$1 K]3( dV* K/4 . V*4 L6@4 q5@ <[$ 5@ DE 6j
(5
:J/+ u :† O!5 )@!14$ )*+( r14 ,1 u# u$ Z !,1 )@\t ,N+$
)$V2 5@, [ V@4 •1( O!5 V,5( )$ ž@! K]3( )@!14 %+ O!5 ?g3
(1
adV* K/4 ,'$ K$1 ,&' V@4 8w ­Vx ‰¥$ … K/!l dV* K$1 )\! )Q , ?8$
(2
a)*+Q T$/ V$ dV* K/4 K$1$ ,' ,&' L18$ Z !„,4
aK@l! - @ ˜;+ $2 K/' ,5 \b [ q5@\ K$1 )#/' DE J,NH O!5 )#V* ?g3+
(3
ac6@( !14 )Vl4$ )@!14 %+ K]3( dV* K/4 K$1$ ,' ,&' ? K$1
(4
. ? 1 !,1( Œ@L'! ' )V* )/ M'( %5V
(5
"%
()! *+
# "(>
B% "?@$ A "
"#8
9
K/!l •1( \3H2 <; F>: Œ1+
(CAN-SPAM Act)
280 N 8&
1.9
C' ,#2I 8" 6&
8 U %V WX 6&-
1.1.9
@:$ 9(“CAN-SPAM Act”) 2003 J1 ‡@!\4 vš u#@$ 3h; @*( J@gx K@H </4 )#@ `'
¢( A, /8 )(@1 V/§$ 9$w /#( #µ ¢( K@@# #> $ ˆ$3 V/§ d> K@H
41
22/1
@l!\# K2 uj A!L4 q\1#$ 9K@H ;o ` E Yg' 5 KQ5w %# Z )=3$ .%LE E 5 @ $w /#( q!
:q!# K@H >x Jh ,3+$
"DE"$ "
" )@!1 K@+ K2 /( Q . U8#$1 E D( M 9 #F H8; &
7 Y
1 Z+ [H8
V/$ /( %+ Á $w /# K@'5$ /*4 % Á sb v )@!1$ $w /#(
.$w /# /* no3
)#@¼ K]3( Òl4 !N+ DE P@8@4 2 dVC# 2 A1# .
9 1&]& /#^ Y
1 Z+ [H8
.L5@8@ $2
$2 $w /# O!5 V! IH@'5 @+ K2 A1# ._# = .8% .*
,#2I `85 a8 6F b
<8
> l4 $w /#( E J/5 ' -!\# K2 l,! ž+ `HHw O!5 /,1+ sb2 V …
’$t ¶ K2 l,! ž+ )b "," i/+ K2 S$ .)l!\ F>: u K2 !5$ K@'1
b … #2 ,+ K2 A1#$ . #µ d2 M{¢( Ib ,N+ K2 !5 K2 E 9 ˆ›2 •1(
O!+ /'5$ .dg $w /#( E /1( O!5 I@# 30 </4 ’$t b )l!R 0Lµ ’$t
'S $ .-\ K@'5 DE $w /# E @ ,5 J#2 10 < ’$t 'S 9’$t b -!R
('( $E /#( ¢( b…° H= !+ K2 $2 K@'1 DE $E /#( E O!5 b… = </5
‘oy( kt $w /# #$'5 E $2 ?l( J@+ K2 @H vš K¢ Ivb2$ .K@'1 DE '5
AB DE I16 K@'1! !#@ # Ž )Q , y ºh $w /#( q!+ J/5 $b #>
.K@H! [ b… K=
A1# .
a CD C8" 6&$7 U*98# 6c1X d-5 C' ,#2I 8" 8e 6&-. b
<8
l J/5 ¶ K2 l4 ?@( K2$ -!R $2 KQ5E F>: K2 O!5 <z($ 8$ <yE ,N+ K2
.ž* dV4 d/# H@'5 ,N+ K2 A1#$ .' $w /#( sb2 #µ •
•
•
•
$ 3h; @* J@g: K@H ;Hw qH/4 K@H ;HE L#/ Z \! ,1( (FTC) #V <g 'X –@†
` /'5 91997 J5 >'$ .;| = 5 q#2 $V 11 000 DE *+ H/ )(@5 *$ (CAN-SPAM) ˆ3'( 'g! `h 9" " $2 qÑ!4 cl!\# IH$E I/#( c( `/L ;HE M6E $2 †( #V <g 'X
c( `/L °M6E 31 L'( K= 9°M6E 94 `—!( ;HE )M6E Qb ! '2 vš$ !!N )™
.CAN-SPAM K@H! A;|
3h; @* J@g: K@H n'#$ .'X c+(@5 ;HE \! (DOJ) /1 <z$ CAN-SPAM K@H ¤@¶$
q!4 g `$ MN ,3+ 9,6 '6 )(@5 O!5 # </4 )#@ 2003 J1 ‡@!\4 vš u#@$
z@”$ 9L#$ ` ?+ Z ),&'4 /8 K@H ;H¢( J@+ K2 )#@! 1(+ $2 #V )=@ S$ . .>= A;o4 q8+ K2 `HHw DE ;' @+ Z )=3!
2
c N;hg0 Y
1 C' ,#2I 8" fX + 1&
2.1.9
O!5 ( ) (@!\4 vš #g q!+ A!L4 #,j /5@ >= </4 )#@ )/,5 /$
/# 9$w /#( #g E 9)M'[ •1( ? 9/5@ &$ .!Q %Y0L62
d+ $ .#g @,¥ 5w )/b @+ Z #@!t +@x [ !Q <0L6 DE *' •1($ $w
vš u#@$ 3h; @* J@g: K@H /o4 "#g" #1+ @+ Z O!5 E /5@ F>:
./b $2 #µ 1! $2 G'4 dg G#$ $2 KQ5w @: L' q Œ— Z !+ O!5$ − 2003 J1 ‡@!\4
œ#/( MQ,1 /h2 Í!l+ Z $2 5 -k'4 Ay4 5 [ #g vš /5@ F>x ?N† $
._h$2 c(h
cH]( m$1) Il IN#@;+ 4 O\52 / cE c6@+ d> # Ž <v* /b J/o &§$
`6V2 / K@+ ) M£2 ,N+ Z #$'1 DE #µ #2 E /5@ F>: &$ .(@l( b ˆy
22/1
42
K2 /( m1# K= E I@# 30 l `$ d2 $2 O!5 I@# 30 </4 $ #V )*+ 'X ,
<0L6 A=34( kt #$'1 /#/ O!5 #g q! </54$ .q! zL6 DE L6@ .!* ) d/#  M£]( #V )*+ 'X /#$0+ !Q )/t $V@ D@# K2 /5@ F>: -!\+ 9!Q
V@ c/# $w /# O!5 K@'5 DE xE %# #µ #2 @,¥ +x )/t #g ,N+ K2 S$
J2 DE ‰ xE %# Z <v* /b ?N† $ .q!Q 34 zLX %!! @,¥ +x /b
.+x q!L #} K@H 1;( L\—# l4 +> )M/' K2 E #,j F>x +x
DE *# A( $+ q! O!5 #/H )š Œ;+ K2 'g! z@” 9#V )*+ 'X /5@ I$$
.*b4 1 /# )=y </h@ ;o,! $V 130 000 DE *# Í!l$ A*b4 v— l'( ;| $V 11 000
d2 K@;¶ #> q! /8 ,1 5 $ @( I2 /*+ K2 'g! S 9#/' )— O!5 <$Q5$
cH¢ 9 O!5 <$Q5$ .K@H %‹ _ nb #V )*+ 'X /5@ </5 d2 $2 )*+ K@H Jh2 %h
(@1 DE 8w() /1 <z$ \@( 'X ,=¥ )M6w K@H Jh2 ¶ noy d2 ?N¶ 9)*+ K@H I$
ºh #V )*+ 'X /*+ Ž$ .(< <@*( Al+,! A5 DE $2) /h$ J5 DE *+ <; g c6@# /$ (#/'
.#g F>_ u!1+ ;HE ?$ d2 K~
i--I Y
1 U jkml
3.1.9
1 J/5 q: K@h K$/*4$ @! LE /'# Z 8; K¢ 9FQ52 c3' )6 ,=$
b-IETF RFC 9(DKIM) K/4 ž+; #1+ 9
#1 (IETF) `HHw /': JL u# /k2 /$ .Ó4 no3
m1 O!5 q! </ '§ K2 ,{]y 9b-IETF- RFC 5617 9(ADSP) C4 K/ E )™$ 94871
/h$ ul\+ O!5 IN#2 ':$ .MQ,1! >;' $ h+E K@1l 2/l 9O14 >: MLH s/$ .4 #@: O!5
0=+ 5'k \( @:$ 9(APWG) Th /* r14 ,1 u# </54 V* /h2 [,#$ .14 >x 17
s/' \( @+$ .$w ¹—$ Th /* !3 /#0+ 5 7' ^/$ #@x )!,5 O!5 MN O!5
PV@ DE ;'$ 9',4 6@@' @!! ),+$ )lb M6E$ 9(APWG) Th /*( !*4 4 3'4
.(http://www.antiphishing.org/index.html) Th /* )!,1( !14 iV@! d0=
* K= E ™ 9[4 l O!5 9u O!5 </ $2 9"MN( u#/*+ ," h+E S ‰ 14 >: Qb $
%: %L#$ $2 %:³/k2 K= E ™ `l[ A!L,! S 914 >: u#R 5$ .IQ1 ( *+ $§ d> @: q*o3
.L17 ^ $ 9Th /* y2 •1( / c+ /h 14 >:$ .%_ *+ IQ1 K@$§ #>
65
2.9
6&-. GH-X
1.2.9
#>: k'1 [,+$ . O!5 MN 62 $w /# E / KH@H K( /6@#
:q!# , AH@H
( l @l $2 • #h) $w /# 5 )HQ5w E O!5 /5@ ul\¾+
Á
.%L@ O!5 @*j K$V A!l DE $w /# 5 )HQ5w E &¾#
.%LE )HQ5w E /'5 A!l4 @ O!5 / !4 ,&'4 s/ K@# K2 A1#
. DE $ 4 %$ F>: E $ )M6E 5 )@!1 )HQ5w J/+ K2 A1#
-” 9)HQ5E l Llš J/1( !4 ,&'4 \bw ,! )M6w !l4 LX `1l+ E
.!l4 LX DE sb2 )HQ5E d2 E J/5 !4 ,&'4 O!5
.UVF C. W X D,Y Z [\ X:!] T C^ _5D 5N3 CH GH `\3 a 5D "T" CN
17
43
22/1
@=@+$( K@'5$ $w /# K@'5 [ 94 5 ;#0 )@!1 , $E /#( E &¾#
.K/4 %$ `HHw
.®@h GH( u#R 5 I… :/@+ %# A!l4 b #$'5 DE $E /#( E &¾#
Á
Á
B2 n55 [&h$ ?
!
2.2.9
¢( kt )l\ )/b dV@$ A'!14$ `HHw )/b dV@ [ '14 mR vl= V/5 %&H
$ v(/( Œ@L'! I! 9c(y $ )Vw$ A!L4 ),&'$ ' )g'4 q1($ HQ5w
." * @" IHQ5E 2008 ,@H ^! /,5 /$ .2008 J5 (CCC)
," o+$ ;p
3.2.9
@j A( u„@ K$1 /1( 9<N +@($ G( (*4 ‡@j <0L62 3# d> &' 0= “3HŠ2
:T @' O!5 0=4 >: ,1#$ .A `HHw )/b dV@$ `HHw )/b dV@ kt ),&'4$ H(
+@($ )() <N ) <N \3H l( J@# +@($ )! IVN I,o8 I&H 0=4 #/#
Á
<0L6 `HHw @=@+$( #$'5 ?,Æ +@($ ) J&H J@#$ .(*4 ‡@j <0L62 (<V5
.(+@($ )) <N ) G( );y$ ) F>x !4 ‡@j
Í!l#$ .`HHw )/b dV@ V@ = DE L3= /5@/¦#+$ ;34 `HHw @=@+$( #$'1( %@ +
Á
DE /t V@ # ,= .L' <8 )( ‡*¾+ / %Ll@h K2$ @1 F>_ c=3 `HHw /b V@
.(kw ’Q1 ($ (-#@ ;* ‰() &' 0= 5 )@!1 c=3
( ˆl' %# 9l <V/¼ vš GH <;y `H= ¢ .L1,µ Ô Z G );y !( 0=4 J@#
Á
.LQRE %# · </#/X <N F>: (kw ’Q1 </#/6
¾+ %&1 `H= 4$ .K( <N +@($ )( (kw \3H2 `l= ˆ3' >: %:#$
.K( !4 /j IN#2 %:# ˆ3' >: K¢ 9<8 +@($ )( (* ‡@h <0L62
(OP25B)
D#3 _= 25 5& 4.2.9
`HHE /b V@ L/# $E /#( /b K@!,1# 9$w /# l$ `HHw /b q=3 E /'5
)/| DE F>: $w /# '( )/o4 F>: J@+ · V@4 /#( )/| DE %L! K@=34 # > .<V5
/*4 LX $w /# )/| DE $w %:/#( K@=34 # $ .<yl /*4 LX $w /#
/# )/| DE + )$v;( $2 <8 +@($ )( (*4 ‡@j <0L62 K2 DE I&H$ .<yl
$ ¯+ ¢ .`HHw )/b dV@4 $w /# )/| 5 B F>: K¢ 9<yl /*4 LX $w
‰l /# H @=@+$( ,1( `HHw /b V@ ly 5 B Z A=34 ‡@h <0L62 )*+
v[= ?' L$ S cH¢ 9(25 % c( kt /*4 (@( , ' % @=@+$( 5 <l5) (SMTP)
u„@ K$1( $ #N !* ) ),&'4$ `HHw )/b dV@$ H( @j `V >$ .
.L'( ,
Á
.b-MAAWG.MP25 9OP25B 14( ‘t ' % @=@+$( bVE /'5 A=34 O!5 ?@ v„]
.# H( AH@ RE <V/¼ )*+ / O!5 V@
Á
<ME u#) JEAG u#; -1!#$ . \3H RE OP25B 14 #V@4 v[= ulR 9)/ F>: /1($
bVE O!5 %L[ `HHw )/b dV@4 k@+ 3H Qb !,1 F>: I: I$V (K( $w /# ,1
.OP25B 14
Á
IV@ 52 @ K¢ 9H( `HHw )/b dV@ O!5 I#l6E ^ OP25B 14 bVE K2 %š O!5
.2009 @@# ºh OP25B 14 @!bV2 9A #V@4 l!š2 %L'( 9`HHw )/b dV@
22/1
44
' % @=@+$ 587 % (@l OP25B 14 bVE /'5 `HHw )/b dV@ v[ @#
E A!,1,! S$ ./t <V@6 •;b -'µ @ I1 9)*+Q #/( ‡@!]= 9SMTP AUTH ?
.V@4 >: /#( J/| DE OP25B 14 /,1# b… `HHE /b V@ u#R 5 $w /# Á
6. g&&$2(
5.2.9
bV¢( k@+ JEAG u#; 3H /$ .$w /# /* K@'5 P/t 3+ )'+ q: 4 K )6@@'+
-H6 /'5 4 K bV¢( !14 x H@H 4" „$ )*+$ !b/ K$C3 <z$ )3H$ )' F>:
)/b dV@ •1($ Il#+ !'4 )*+ q!—3 = OLH 9Tj `@ $ ."`HHw /b V@ \@( l
4 K )6@@'+ s/hE Rw >: [S$ 9[b-IETF REC 4408] 9(SPF) 4 ) RE bVE `HHw
"JP" #V,! !g4 <@3'4 SPF )Rw lH `—!( /$ .žy Œš K GH ,1 %L=34 S$
[b-IETF RFC 4871] 9DKIM 14 bVE `HHw )/b dV@ /#/1 2/( ,= .%35,99 @ 2009 ^\š2
.,! 8E K !@=
.$ ( )
q> 45 &
7 fD(
6.2.9
# v[ K= 4$ .1 $w /# $/+ HE K( #@!t +@x -!š2 !B
-h q! kt )@!14 K@Vl# !'4 )*+ q!—3 ?7 K¢ 9K( !' #@!b +@:
: )@\t
,1 <ME ?' K@H" -6@ $ ' +: O!5 @*! /5 J(E -š# V d2 #@: m1 n %#
Á
."@,¥ +@x
K@H" ¶ @:$ ¢( J@# d@!b +: ,1 DE !' )*+ /b —3 k@+ E
Á
.
#b~ !'4 )*+ q!—3 ?7 DE ,14 >_ kt )@!14 J/¾+ 9"V/¼ $E /#( E %&'+
+@x ,1( /1+ @b/ )(@1k c6@ cH¢ 9d@!b +: ¢( ,1 J E cH¢ 9>
.K( !'4
q! 5 )@!1 J/+ q:$ .L!!$ ?,µ$ ^¼ -=( J@+ !k ) ‹ vš ,&' ':$
.sb2 K/!( <V@6@4 )=@ •1( ? )@!14 F>: Vl($ K( #V@6@4 `HHw )/b dV@ DE 45
22/1
/0"1 234
[b-IETF RFC 4871]
IETF RFC 4871 (2007), Domainkeys Identified Mail (DKIM) Signatures.
http://www.ietf.org/rfc/rfc4871.txt
[b-IETF RFC 5617]
IETF RFC 5617 (2009), DomainKeys Identified Mail (DKIM) Author Domain
Signing Practices (ADSP).
http://www.ietf.org/rfc/rfc5617.txt
[b-MAAWG MP25]
MAAWG Recommendation (2005), Managing Port 25 for Residential or Dynamic
IP Space Benefits of Adoption and Risks of Inaction.
http://www.maawg.org/port25
[b-IETF RFC 4408]
IETF RFC 4408 (2007), Sender Policy Framework (SPF) fo Authorizing Use of
Domains in E-Mail, Version 1.
http://www.ietf.org/rfc/rfc4408.txt
[b-contr-spam]
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003
(United States Code). This Act is documented in the following laws: 15 U.S.C. §§
7701-7713; 18 U.S.C. § 1037; 28 U.S.C. § 994; 47 U.S.C. § 227.
http://www.gpsaccess.gov/uscode/index.html
[b-ITU-T cyb]
Messaging Anti-Abuse Working Group Conference reports:
http://www.itu.int/ITU-D/cyb/cybersecurity/spam.html.
47
22/1
49
22/1
ITU-T
X 7 (2009/02)
:X !" #
! "#$ %&#' . %
( )*+ , -/# 01' 023 42 -5 . '
22/1
50
"# $
% &% (ITU-T) ! . '()* +& ,+- /0123 4
5)* 63 4#7 8 4#7 9, :; <=7 &% . .>3 3 ?6; @25*
9, A F9, C GH E B
I& &89 B*,C 4 2 B"D E (WTSA) 3 3"A .'()* +& ,J C 3*
. 3 3"A :; , 1 !, ,2 KI& L2MN OP +& QR% ?6; P& B 3 V9C ?6; W X13 3 / ! YZ :"I B E &63 M&&8S T U3* .(IEC) 82FS 8]6 (ISO) >9
[&6 "\8
.b c23 4
5) ?6; C ,- ?6; L&9 aM& ,&* < ,&)8 QR% ",`" "6 ^7
o31 .(Oi j
k l
k 4
5) 6*! m( cb) a` ^S[e U3* f ! 'C Xg .d,
Z ,&)8 QRb 43P 4i r2ZC a6 s
+ "GH" 43P ^71 .
a` ^S[e QR% B
"p q
1 8; O+[ ,&)8 QRb q
.>a- ,&)8 QRb q
C s
QR% <"39 l31 /8
3 k6 :; Xk36 P8 F5
+ ">5k81"
R1 .12S0 S6 t&[ : j[ <"39 ^a671 ! %R
08 C ,&)8 QR% j
k C u- Qkv >;271
c2w C Lf;C : &f; b Gw L&9 F
k tv C F
[+ C 12S0 S6 t&x 63 :#2 : y!& dC
.,&)8 ;- 6"; {6") 2Zz
R
08 b k :S 2Z L2* F
" 12SP S6~ O,Z- ?6 ! [:S1 }/] /,&)8 QR% ?6; P& 8;
w* ,&)8 QR% R
08 :; &=7 ?+&1 /‚[e >% &S ! &63 QR% C u- O2\v /€ B .,&)8 QR%
.http://www.itu.int/ITU-T/ipr/ B!& (TSB) GS 2Z Lo* +ƒ v
k ;! ?6;
© ITU 2009
: jk7 >Z Š* - ˆv 6
9 d(* ,&)8 QR% : LaM dC ‰789 W&H .„&0… t&† B
‡
.
51
22/1
ITU-T X.1250
X 7 #$
%!& ' ( !" :S {vC ?6; .F6
5) : m87 2); r ?6; (PSTN) 61k &"3 1
6 0‹ Sk) :C <8 r2M
(NGNs) 4
A SkŒ ˆv2v` 4i 3 Z > ;W& &"3 Sk)6 k78* L>) 08* <&
.2† QR‹ :S" <0g` u- PI`* /4"37 2[ 2† S6 2) 4v 8 Sk) QR% 4"37
L9` I23 M&&8S QR% ?6; "# Sk) 43H R% y123 * ˆv2v` <&&2* 2[ 4v :S
/
v2S` ,] /
v2S` 1,] <";e 4i) v2S` ƒ B
‡ .m6"37 GvM : <"39
1W j12w :; O
#aM 4!e ?6; FA3 :S 6S) QR% .^&]F6 I23 (
v2S` &S† /
v2S` 08 j[ F8 /F
Œ : ˆki :S  : /ƒ > Sk) a
FD /m6"37 1&% i
Sk) aFMC 1&% /ƒ ^ 4"37 i v"f : O1a 2P& 1&‹ ,- ŠP €R .Fk!2 /#
d2P& ?6; m31 E Gv&A : &% Žo
7 :e Gv&M : GvA R% .
8e 2w"6 @23 4
6* :e :7
: La] lw& r&7 ?6; F
P 2\8 &S6 >5k81 " /l r&7 <";e r&7 ?6; F
P 2\8 ƒ
.Žo
7 : 8w& ƒ
22/1
52
ƒ > 4i) v
4
i" 6"; 4"37 F
P S &63 ,` 6
9 >% /(IdM) 1&‹ ,C [ de :S .(ƒ /
To k /Sk) a
FD /YŒe /m
#F8 m6"37 "\8
C k6 QR‹ :S /81k 8C k6  Œ Z u- 08 {8S > 1&‹ &3v : 3 ;&"T { &S
.3 B!& M&
>% .v
S m* b t&& ; !- ?6; , 2P& 'e Žo
7 :e 2+8; : >7
#, 28; >% 1&‹ ,-
/(>6S 08 ?6; ,& 08 ) 08 W
: Xk 0#w : j Of1C K
F8S / 1&% : j ;
8e ‘9
7 # j
k "I "\8"6 Of1C 1&‹ ,- K
.
S , X
5 ‚[ [ W
X
5 &F9
ŠP /<& +Z .FM,Z "\8 4Z v
S6 08 XP& 1&‹ ,- j12w :; :S .
S )vC k!2 +, j12w :;
/v
S* +ƒ 1&‹ ,- XP& /1&‹ : j6 b t&& , 2P&1 C {v(Œ : 1&‹ ,` M k &M
.m3 S* Yƒ 08 k!2 /08 W
GvM u- .
v2S` ƒ Sk) u- G6 8; [2 08 mS’ :e ,- 9[ 28; >% 1&‹ ,-
1• O% O, 1&‹ ,- d= /(9X0 : 1"† /^! Bk "\vC /1"† ”#&[ 4i) r2Ze ;P “
 : Q,* R% y;f1 .1&‹ !29 4
k! : vo
7 #2A : Z SkŒ &63
ƒ ˆv2v` <&&2* SkŒ <"39 : 27
1 dR 2e /b t&& v&( v2S` 3 C m6"37
.
v2S`
&63 ! 40S G
9C BI l31 R% .
+&ƒ* 63 99e "% <8 GH /1&‹ ,` ^\v R
08 8;
.F6MC : ˆ3‡ E €6 W] @2ge 1&‹ &63 ^9 : 1!& 1&‹
1
+ : j* € v"f : 1a XP& j12w :; :e m7 {v(Œ : O1&
[ Ov&S %,k;* 1&‹ ,- 2F„
.1A ƒ QR% ()* ; – PI` QR% 2P& .1&‹ &63
.Y&ƒ {M ?6; *H- + 4S)1 .j6 %83~ 1&‹ ,- u- PI` QR% "1&%" Xk3 <"39 X)1 2
.M&1 3
.X.1205 6767 +& 2#9 y1,3 ?6; w :S
(Identity Management) 1&‹ ,-
IdM
(Internet Protocol) ˆv2v` <&&2*
(Public Switched Telephone Network) 61k &"3 0‹ Sk)
4
IP
PSTN
5
.M&1 53
22/1
!"# $" %&' (
()*# (+ (& (
,- (./ 0$1 (2
6
8k :C Wa31 C "
6!` 8w& Sk) ‘9,— 1&‹ ,- ,! <"39 67 R
08 (Œ :
27
9 1&‹ &63 v"I XP& 1,2f ‹ ,&e : %R
08 1&‹ ,- 9,— 4fPC .
3 Sk)6
.
3 Sk)6 8k
‹ ( m6"37 1 <Z : 8w& ˜,& Z ; 1&‹ ,- ,! <"39 :S
.+ƒ ƒ <"39*
m1&7 ?6; *]9 j
78 ; Žo
7 :e ‚&[ : 1!&6 1&‹ ,- ,! <"39 :S /€ u- PI`*
‚&† QR% , Bk %&FM j
78 ?6; v
S 67 1&‹ ,- ;7 C :S /† U3* . lw&
.Q1
34
5 36 (7.8. 9 :;"5 (./ 0$1
7
/mv
?6; d&8 9 6"; ,w- .ƒ Sk) m6"37 : 9 ; /1&‹ ,` ‹ y#„& :
QR% : j m31 ! /Ži S6 :e k6 OP .2Z“ S6 {1&b j63 ( [ ^1 C >5k81
.{W
{8 10S {
P ~ <e S Ži S ji1 C 4k! (
dC) 1&! u- (27 "6 4"37 9 dC) 0
3I : /L>Œ u- 3f* : ™2 9 i : Œ 1&7 š8%
š8% &S ! 9 : # r&7 2w › C :S .((ITU-T X.509) &"3 7
#2 8k
.1&
† , [ S O2\v /Oi /2Z“ : 2iC [ S 9 : ?6;C 1&7
<= :)+' >?
@1' <4
' (./ 4
6 (
A
8
S ?6; , € ~ /F
P S Fv
+ b t&& 1&‹ v
* 1• 1&‹ ,` r2Ze ‹ y#„& 4")
. 1&‹ 1,A †
W] @2ge F9 : 1&‹ v
* 1! 16 6* ) &63 1"x 9
7 C mv& >f C W&H
>S F6"37 E 6 k78* .r2Ze e 4g&) : 1&‹ v
* + ,2"9 "I .F6MC : ˆ3‡ E €6
.ki ˆ
!& :7[ !* 7 œ
x 69 & ?6; 1&‹ v
* v
+ GH /Lk6 6*! &S
.ˆ
5C ! ˆv - P23 1&‹ v
* : j ?6; , 1&‹ v
* &3v 4") C >5k81 /Lf! G7[
(./ 4
(7.8. $
"C
*5"
9
4i) ƒ d2P& 3 B1W& ; $
k .!&& 1&‹ v
* "c)" 2SP ?6; Of1C 1&‹ ,- ^&F0 d&81
06ž B!& BI& C de 6  ( i XP& W 1&‹ v
k :S /( 4
A SkŒ ˆv2v`
&S1 8; .06ž B!& 1&‹ &63 06ž , : 3 "!, 1&% v
S6 &S1 C :S .Sk) ?6;
: # ,*  !; !- B!& 1 u- r2Ze v
S Ÿ9 /
[2 9 6"; mv
S : [
^&
‚› 4— !&& &63 , c) ^&F0 .[2 S 9 6"; 4"S71 œ
x 1&‹ &63
.68 Sk) 1&6ƒ y&‹ <"39
22/1
54
(4')D (.)- "E
10
: ‘,! 0
„& #ƒ 1W i a1a3 /2w U0Z /1&‹ ,- 6"; R
08 4MC : S [&8" 1a 4")
4i" /
v2S` &S† t
9 .
S >% &S† &S "8
[ , 08* †+ ¢k9e QR% .06S U
0¡ 4MC
.m1,] F#2Œ &S† lw& 3P 2iC L0 2iC Z £ 06S U
0¡ Of1C 7
#2 c%e QR%
Kk >S .O
SkŒ ”*2 }; =0S <30 ^9 4i" d /r2Ze v
S (Œ '(Œ /&S† {M&
C F Ba E v2S` ƒ ?6; 2w"6 6 d2D C &S† ?6; GH /3! [ v2S` &S†
: (
v2S` /Oi) v2S` &S† ƒ 97† 3
k G6 C :S .k98 #!& X* R
08* ^&
.1&! 9 z ^9 &S†
(./ 0$D (,F& ;
11
+&ƒ 4i /1&‹ ,- R
08* 63 6"– "
\8 1f : ; "
6!` ;&"¤ 8w& ,` 2\8 C >5k81
&S† 4"37 .6† M& m* a` 1&7 /˜,& † 39 /lw& :e /v
k 1•
.
8e 8w& 9
7 c%C : B9C ›2Œ k6 r2ZC v
?6; Of1C FI20 C :S :S G7P 1&‹ ,- 8
55
22/1
)*+, -./
:>61 18 QR% m* : .1&‹ ,Š* 63 4#7 ()* 4"3 ?6; yS3 Œ 18 š8%
http://www.cdlib.org/inside/diglib/ark/ :(
"!2 v,&0
kS „&0… ,& ™0) (ARK)
„&0– ,& ™0
:3*e > A3 š2… ¦ œi 4
A 4MC : 2) 2)
3GPP SA3: http://www.3gpp.org/SA3-Security?page=type_url
:
&e &63 "\vC :C "\ve Pf "
2C k* 83 7 4"3 !2P
ETSI TISPAN WG7: http://www.etsi.org/tispan/
:
v2S` 1&‹ !* §,e j12w w,Z
http://ec.europa.eu/information_society/activities/ict_psp/documents/eidm_roadmap_paper.pdf
http://europa.eu.int/idabc/servlets/Doc?id=19132 :
*,e
http://www.fidis.net/ :(§,e
8w& !*
B*) &63 B"T 1&‹ 4k7
http://www.first.org/ :(FIRST)
‚&6 *]9 :e !2PC r8
http://www.ist:*,C
4MC
:
4"37
1&%
4MC
:
§,e
2)
world.org/ProjectDetails.aspx?ProjectId=4ddb2e61c84343f0acd370607e5a8499&SourceDatabaseId=7cff9226e58
2440894200b751bab883f
Handle: http://www.handle.net/
Higgins: http://www.eclipse.org/higgins/index.php
:1&‹ ,- X13 LoZ 1&‹ !29 : 1!& X13 >S12e lw& F3
http://www.ansi.org/standards_activities/standards_boards_panels/idsp/overview.aspx?menuid=3
http://www.oracle.com/technology/tech/standards/idm/igf/index.html :ORACLE 1&%
,- ,w-
http://www.idtheftcenter.org/ :1&‹
!29 ,- a2
http://sec.ietf.org/ :ˆv2v`
98% ^F j12P
:1&‹ ,Š* l3 17 9, 8]6 a
2 j12P ¦ !
www.itu.int/ITU-T/studygroups/com17/fgidm/index.html
:10 (7 /:e* 83 17 9, 8A ¦ !
http://www.itu.int/ITU-T/studygroups/com17/index.asp
:13 (7 (4k7 SkŒ) 13 9, 8A ¦ !
http://www.itu.int/ITU-T/studygroups/com13/index.asp
http://www.projectliberty.org/ :12†
4MC : y 2)
http://lid.netmesh.org/wiki/Main_Page :7k
1&‹ 2)
http://www.egov-goodpractice.org :1&‹
,- https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/ProjectConsortium
http://www.homeoffice.gov.uk/passports-and-immigration/id-cards/
:
8w& 1&‹ !* ž
http://en.wikipedia.org/wiki/Identity_document
http://www.oasis-open.org/home/index.php :(OASIS)
"\8 &63 X13~ @&F8 "\8
22/1
9-8
56
/¨128 Trondheim &3 "!2 1&‹ ,- ()* 4"3 Œ, /(OECD) d! "8 3 "\8
http://www.oecd.org/sti/security-privacy/idm :2007 &1
http://www.openmobilealliance.org/ :(OMA)
68 y&F6 ™&0 y
http://www.opengroup.org :Open
http://osis.idcommons.net/wiki/Main_Page :(OSIS)
http://www.pampas.eu.org/ :(§,e
;&"T
[&0 ,& 1&% ^\v
¨v2*) (PAMPAS) 68 y&‹ }; :e +&ƒ* @&F8 1,
,e 1a &63 B"¤ §,e ,k
:*,C 4MC : 1&‹ +&ƒ ,-
https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/ProjectConsortium – PRIME
http://www.w3.org/ :
v2S`
Sk)6 >3 B"]
http://yadis.org/wiki/Main_Page :Yadis
"\8
57
22/1
0* ,
)*+!1 21
>v2k
7 : >"3 <";e <M ¨&v ,k; RZ=1 C ?6; /\8 4S)* 3M2 & "#! œ1 9
17 9, 8A GvM : R08 4"3 /(WTDC-06) 45 ,2 R
08 2) ¨&v 3 3"A ,2! © "
P ( ! 4Z :e <T 7
#2 9, 8A) ()* <";e ¨#v >v2k
7 :e ()* &63 B"¤ 3 "6 5
M 4"3 ”Z 3* :; OfP .(149 131 130 ,2 4i) 2006 ^3 mI&0 m*8 2’= ,2!
LM% N (&O' (P9Q !R*6 S
T9 U#; .-' V' :I GHIJ
(2.B.I 1.B.I) 1.C.I
:"
2M- @2ge &63 M&&8S <"39 L9- PS" ()* 55/63 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r55.htm
:"
2M- @2ge &63 M&&8S <"39 L9- PS" ()* 56/121 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r56.htm
:"Žo
7 :e ()* ; P L)v-" ()* 57/239 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r57.htm
M2† ?8k 1• Žo
7 :e ()* ; P L)v-" ()* 58/199 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r58.htm :"&63"6
4"; ¨v2* ^a 3* &63 B"¤ 3 " :; , y
8M 4"; Z ˜k ;.http://www.itu.int/WSIS/index.html :&63 B"T ()* v&
:(2005) 8C P & :&63 SkŒ "\vC :C ()* d! >P 3 "\8" F
M& ˜k"
.http://www.oecd.org/document/42/0,3343,en_2649_34255_15582250_1_1_1_1,00.html
:(1 6]") 2006 ^3 &63"6 M2† 8k 1• Gª
.http://www.isn.ethz.ch/pubs/ph/details.cfm?id=250
.http://www.itu.int/cybersecurity/ :Žo
7 :e* 63 ,&
.http://www.itu.int/cybersecurity/gca/ : Žo
7 : >"3 <";e <M
.http://www.itu.int/cybersecurity/gateway/ :Žo
7 : *&*
: * "8 GS >v2k
7 :e* +ƒ G1& 0+
.http://www.itu.int/ITU-D/cyb/
.http://www.itu.int/cop/ :6  F
M& ˜k ”ƒ ?6; <0we 1"† ,k
•
(6.B.I 5.B.I 4.B.I 3.B.I 2.B.I) ! "#$%&
2.C.I
•
•
•
•
•
•
•
•
•
•
•
:&63"6 M2† 8k 1"† «R C ;&"T/ lw& Žo
7 :e
.http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html
•
22/1
8k 1"† ^; lw ,w- –
(ETH Zurich)
M&&8S6 1271&7 1 79= :&63"6 M2† .http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf
P L9,- <T 9," 4fPC : &63 SkŒ m( :22/1 (7 / "8 !
:Žo
7 :
58
•
•
http://www.itu.int/ITU-D/study_groups/SGP_2006-2010/documents/DEFQUEST-SG1/DEFQUEST.Q22-1-E.pdf
.http://www.itu.int/cybersecurity/gca/ :Žo
7 :e ()* >3 <";e <M
:2009 BM2 /
8 <6 Žo
7 :e 4
.http://www.itu.int/ITU-D/cyb/publications/2009/cgdc-2009-e.pdf
PS € ~ /Žo
7 :e <T 3 a1a3 z : "8 >3 2’= :; , 45 ,2
:(2006 /[) ! 4#92
•
•
•
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/WTDC06_resolution_45-e.pdf
ˆ’ E ! +& "#! ¦
4
(7 6 /17 9, 8A / !
: :(* 63 F
6; P&
.http://www.itu.int/dms_pub/itu-t/oth/0A/0D/T0A0D0000090001MSWE.doc
:&63 M&&8S :e – 4 (7 /17 9, 8A / !
.http://www.itu.int/pub/T-HDB-SEC.03-2006/en/
:
! 4#92 ,f To :Sk) :e Gv&A ()* "8 GS 9,
.http://www.itu.int/ITU-D/cyb/presentations/2008/bauer-financial-aspects-spam-malware-april-2008.pdf
:
8C P & :&63 SkŒ "\vC :C ()* d! "8 3 "\8 F
M& ˜k
.http://www.oecd.org/document/42/0,3343,en_21571361_36139259_15582250_1_1_1_1,00.html
:78 8w& Ž2S` :e 9
9 ()* d! "8 3 "\8 R
08 Z
.http://www.oecd.org/dataoecd/23/11/31670189.pdf
:"Sk) 1"† 1M Ÿ&­ :Žo
7 :e" :; €8k 212
•
•
•
•
•
•
http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2006/12/12/000020953_200
.61212113151/Rendered/PDF/381170CyberSec1uly0250200601PUBLIC1.pdf
:&63 :C ()* Lf
* !, /(ITAA) &63 M&&8S S12e *2
.http://www.itaa.org/eweb/upload/ITAA%20Infosec%20White%20Paper.pdf
•
'
]
29 ¦
/(2005)
(APEC)
˜‹ ”
– 9“ d! 3 *2 B* &63 * l3 4"3 j12P
:(2002) *26 Žo
7 :e
.http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN012298.pdf
S12e 6k 9
9 :(CITEL) S12e 6k 8]6 t,We ¢S
.http://www.citel.oas.org/publications/azul-fin-r1c1_i.pdf :5.8 4.8 "7
:(2007) m7 2Œ ,&[ ¦ := &63 B"T 4MC : ]
29 ¦ §,e 6T ,2!
. http://eur-lex.europa.eu/LexUriServ/site/en/oj/2007/c_068/c_06820070324en00010004.pdf
•
•
•
59
22/1
:(2008) Žo
7 :e ()* [ ;http://www.itu.int/ITU-D/cyb/events/2008/doha/docs/doha-regional-cybersecurity-forum-output-20-feb.08.pdf
•
:(2006) ":= &63 B"T 4MC : ]
29" ()* §,e 9,
.http://ec.europa.eu/information_society/doc/com2006251.pdf
:O8C 2iC ˆv2v- ()* §,e ¨v2*
.http://europa.eu.int/information_society/activities/sip/index_en.htm
"
6Z t&7 :e 1!" ()* 9, & C* /(ENISA) &63 Sk) :e *,e &
.http://www.enisa.europa.eu/pages/analys_barr_incent_for_nis_20080306.htm :(2008)
:(2004) Žo
7 :e 1‘ PS (OAS) S12e 6k "\8 ]
29
•
•
•
•
http://www.oas.org/XXXIVGA/english/docs/approved_documents/adoption_strategy_combat_threats_c
.ybersecurity.htm
!
:(CIPMA) 1&
† 8k 1• 4
6 MR"8 29e ¨vo
.http://www.csiro.au/partnerships/CIPMA.html
8w& 1"† 9
7 2M :2w We SkŒ :; , &63"6 1&
† 8k 1"† 4
.http://www.crn.ethz.ch/publications/crn_team/detail.cfm?id=250 :F6
6
:&63"6 8k 1"† ve 8w& ƒ
•
•
•
http://www.en.bmi.bund.de/cln_028/nn_148138/Internet/Content/Common/Anlagen/Nachrichten/Presse
mitteilungen/2005/08/National__Plan__for__Information__Infrastructure__Protection,templateId=raw,prope
.rty=publicationFile.pdf/National_Plan_for_Information_Infrastructure_Protection.pdf
:(!= ‡2) &63 :C ()* v*
8w& ]
29
.http://www.nisc.go.jp/eng/pdf/national_strategy_001_eng.pdf
:d! "8 3 "\8 O&f; 11 3 8w& R
08 ]
29
•
•
http://www.oecd.org/document/63/0,2340,en_21571361_36139259_36306559_1_1_1_1,00.html
.http://www.digitalstrategy.govt.nz :861W&
8 "!2 ]
29
:,&P589 &63 :e vi 7
#2 ƒ
•
•
http://www.ida.gov.sg/doc/News%20and%20Events/News_and_Events_Level2/20080417090044/
.MR17Apr08MP2.pdf
:Žo
7 Lf0 m( ,&P589 ]
29
.http://www.ida.gov.sg/News%20and%20Events/20050717164621.aspx?getPagetype=21
.http://www.cpni.gov.uk/ :(CPNI) 8w& 8k 1"† S6" a2
.http://www.whitehouse.gov / :Žo
7 Lf0 1"† S12e 1&6 8w& ]
29
(8.B.I 07.B.I 05.B.I) -./ %*+$ ,
:4.1 ,+` /(COBIT) b 6 M&&8S &63 k!2 c%C
•
•
•
3.C.I
•
http://www.isaca.org/Template.cfm?Section=COBIT6&Template=/TaggedPage/TaggedPageDisplay.cfm&TP
.(6S 78 4
" 4
]7 m31 ®¤* dR
08 6) LID=55&ContentID=7981
4* ¢&6)
http://www.itil-itsm-world.com/:(ITIL)
&63 M&&8S 8k kS :C ,.(4
"6
•
22/1
¦ :e 8 ¦ &63 M&&8S /27000 6767 /(ISO/IEC) 82FS 8]6/>9
[&6 "\8
.http://www.iso27001security.com/index.html :&63 :C ,- "\vC
:C ,- ¦ :e 8 ¦ &63 M&&8S /13335 6767 /
82FS 8]6/>9
[&6 "\8
: &63 M&&8S :C ,` Ÿ­ %0 :1 LaA ¦ &63 M&&8S
^&9, ¢&6) http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39066
.(4
"6
8 ¦ &63 M&&8S /2005 /17799 6767 /
82FS 8]6/>9
[&6 "\8
:&63 :C ,` 9,— v ¦ :e
60
•
•
•
http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39612
<" Ÿ&­ ¦ "\ve :C 98% /21827
.(4
"6 4* ¢&6)
6767 /
82FS 8]6/>9
[&6 "\8
:(SSE-CMM®) ,
•
http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=34731
.(4
"6 4* ¢&6)
,f To :Sk) :e Gv&A ()* 9, / * "8 GS
:
! 4#92
.http://www.itu.int/ITU-D/cyb/presentations/2008/bauer-financial-aspects-spam-malware-april-2008.pdf
/¯o7v%&M BM2) "Žo
7 :e" ()* * 3 3"]6 50 ,2
.http://www.itu.int/dms_pub/itu-t/opb/res/T-RES-T.50-2008-PDF-E.pdf :(2008
"F*,… ! 4#92 PS" ()* * 3 3"]6 52 ,2
.http://www.itu.int/dms_pub/itu-t/opb/res/T-RES-T.52-2008-PDF-E.pdf :(2008 :go7v%&M BM2)
!2PC 4
S) B
]) :(2008 /¯o7v%&M) * 3 3"]6 58 ,2
:(
8 6k +Z /
*&9† ‚&6 *]9 8w
•
•
•
•
http://www.itu.int/dms_pub/itu-t/opb/res/T-RES-T.58-2008-PDF-E.pdf
:¢&9† aFMC :e /800-12 !, +ƒ 2)8 /(
S12e 1&) M&&8S X13"6 lw& F3
.http://csrc.nist.gov/publications/nistpubs/800-12/ :(1996 /21oP) F3 G
"\ve 2w ,- 4
/800-30 !, +ƒ 2)8 /(
S12e 1&) M&&8S X13"6 lw& F3
.http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf :(2002 /&
&1) &63 M&&8S
b ?+& :e ”*&I /800-53 !, +ƒ 2)8 /(
S12e 1&) M&&8S X13"6 lw& F3
:(2007 /o"71) 1 &63 "\ve
.http://csrc.nist.gov/publications/nistpubs/800-53-Rev2/sp800-53-rev2-final.pdf
4
/800-53A !, +ƒ 2)8 2) /(
S12e 1&) M&&8S X13"6 lw& F3
:(2007 /o"71) 1 &63 "\vC :e ”*&I
.http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53-A
:(* ^; >; L8* /800-50 !, +ƒ 2)8 /(
S12e 1&) M&&8S X13"6 lw& F3
:(2003 /2*&C) G1,6 ¨v2* &63 M&&8S
. http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
•
•
•
•
•
61
22/1
2w ,- 4
/800-30 !, +ƒ 2)8 /(
S12e 1&) M&&8S X13"6 lw& F3
:(2002 /&
&1) &63 M&&8S "\ve
.http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
:(OCTAVESM) y3f :w& 6
5) [8 : M2† <&+e 1F :C ,.http://www.cert.org/octave/
•
12$ "34
.http://www.antiphishing.org :(APWG) v2S` &63 ?6; <
[ PS~ l3 4"3 j12P
.http://www.first.org :(FIRST) ‚&† [ *]9 :C !2PC r8
.http://www.ieee.org :
v2S` L*2FS >98F F3
.http://www.ietf.org :ˆv2v` 98% ^F j12P
.http://www.maawg.org :O
v2S- 4#92 <k <"39 L9- PS~ l3 j120
.http://www.witsa.org :&63 M&&8S ƒ >3 y
.http://www.w3c.org :G1& 2) >3 4.C.I
(6.B.I)
•
•
•
•
•
•
•
•
WO. " U#; (;
&' (.)- 36 !'
(
71 :II GHIJ
2 56 78 9: ;<=
1.C.II
.http://www.csialliance.org/about_csia/index.html :Žo
7 :e ;8+ y
4#92 I v3 2Œ ¦ ! 4#92 PS d! "8 3 "\8 C ;&"T
.http://www.oecd-antispam.org/article.php3?id_article=243 :
!
.http://stopspamalliance.org/ :
! 4#92 ?6; Lf y
•
•
•
'
ƒ v2S` &S† ()* *23 ¨
6ƒ < 3 6¤ 2); B*2 r8 :; 212 :”9e t2)
:
v2S`
http://www.zawya.com/Story.cfm/sidZAWYA20080529073202/SecMain/pagHomepage/
.chnAll%20Regional%20News/obj2A17E941-F5E0-11D4-867D00D0B74A0D7C/
•
!
:M2† 8k 1"† !&& &63 <k SkŒ :1,] <";e 2# &S† m* 29e 2)
•
http://www.tisn.gov.au/www/tisn/tisn.nsf/Page/CIPPrograms_CriticalInfrastructureProtectionModelling
.andAnalysis(CIPMA)
:
S12e 1&* j
78 T (ISAGs) &63 4
6 <k a2
.http://www.fsisac.com/ :
6 ISAC a2 ¦
.http://www.esisac.com/ :>#*2FS 6 ISAC a2 ¦
.http://www.it-isac.org :&63 M&&8S ISAC a2 ¦
•
22/1
62
.http://www.ncs.gov/ncc/ : ISAC a2 ¦
.http://www.nric.org/ :(NRIC) O
8
* F6
5) 6*! Sk) 1";* l3 6¤ ¦
.http://www.ncs.gov/nstac/nstac.html :(NSTAC) lw& : 1,)9 8]6 ¦
j120 ¦ X13"6 >S12e lw& F3 :X13 ()* S12e 1& ;8 &S† m* 3 $
%
::e X13 lw&
.http://www.ansi.org/standards_activities/standards_boards_panels/hssp/overview.aspx?menuid=3
:&63 :C ()* S12(* &63 M&&8S *2 Lf
k !,&
.http://www.itaa.org/eweb/upload/ITAA%20Infosec%20White%20Paper.pdf
.http://www.it-scc.org :(SCC) &63 M&&8S ! j
78 >S12e 6¤
.http://www.cyberpartnership.org/ :Žo
7 : S12e 8w& 2)
: 2Œ Ÿ&"8* l3 4"3 j12P :; 212 /(NIAC) &63 :e >S12e lw& 6¤
.http://itaa.org/eweb/upload/NIAC_SectorPartModelWorkingGrp_July05.pdf
.http://www.dhs.gov/xprevprot/programs/editorial_0827.shtm :
8k 1"† S12e 8w& ƒ
.http://www.dhs.gov/xprevprot/programs/gc_1179866197607.shtm : G7[ … S12C ”Z
.http://www.dhs.gov/xlibrary/assets/IT_SSP_5_21_07.pdf :&63 M&&8S * +Z S12C Z
.http://www.ntia.doc.gov/ :&63 S12e 8w& ,`
>/ ?@ "
: 1A$
•
•
•
•
•
•
•
•
•
2.C.II
.http://www.maawg.org :O
v2S- 4#92 <k <"39 L9- PS~ l3 4"3 j12P
•
!
.http://csrc.nist.gov/ :¢&9† ‚xC :C a2 /
M&&8S X13"6 >S12e lw& F3
:Žo
7 ,RvN lw& ^\8 /US-CERT *&9† ˜,&6 >S12e *]9 j12P
.http://www.us-cert.gov/cas/
•
*# 1@ %D "56 ;4E ? "E : *B
3.C.II
•
.http://www.gideonrasmussen.com/article-01.html :lC >; j6Z ¨v2*
.http://www.cisecurity.org/resources.html :79= :(* 83 ˆv2v` :C ,&)8 ,& a2
:le >;&6 2) ]
29
.http://articles.techrepublic.com.com/5100-10878_11-5193710.html
:X5 1,] <"; Žo
7 : [& 4
.http://www.uschamber.com/publications/reports/0409_hs_cybersecurity.htm
•
•
•
•
63
22/1
:;8 &S6 EDUCAUSE *2 le >;& ,&
http://www.educause.edu/Security%20Task%20Force/CybersecurityAwarenessResource/Browse
.SecurityAwarenessResourc/8770?time=1215527945
•
:(5 3* [) &63 Sk) :e *,e &6 &63 :(* >;& ,k
.http://www.enisa.europa.eu/Pages/05_01.htm
:(2) #2A : 1!&6) F"#2M : 1!& &63 M&&8S :C <T <&*2ve G
9C
.http://www.interpol.int/Public/TechnologyCrime/CrimePrev/ITSecurity.asp
:&63 M&&8S #2M 3f 2)6 <&*2ve "#!
•
.http://www.interpol.int/Public/TechnologyCrime/CrimePrev/companyChecklist.asp
.http://www.noticebored.com/html/posters.html :le >;&6 NoticeBored 2Œ 6
http://www.oecd-:>;& 63 ¦ ! 4#92 PS d! "8 3 "\8 C ;&"T
.antispam.org/article.php3?id_article=242
.http://www.sans.org/resources/policies/ :
8e 9
7 ,& /(SANS) {8
( O
SkŒ {*, ^\8 ,- 79=
:&63 ¢2[ B!& ¦ le >;& C ;&"T
.http://www.iwar.org.uk/comsec/resources/sa-tools/
:%,& a2 X5 1,] <"; k78* >;& 1W ¦ Žo
7 : S12e 8w& 2)
.http://www.cyberpartnership.org/init-aware.html
•
•
•
•
•
•
•
!
.http://www.ftc.gov/infosecurity :,]6 S12e ,
0 8]6
:G1, le >;& ¨v2* /(
S12e 1&) M&&8S X13"6 lw& F3"6 800-50 !, 2)8
.http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
•
•
[
\4D' L.4
\ ]
Q/(4M% (XJ Y$ :III GHIJ
:(2001) vo
7 #2A* 83 !0 :§,e 6¤
.http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Default_en.asp
:(G8) Ž"i < ;&"¤ 8 ; #2A ˜k
.http://www.usdoj.gov/criminal/cybercrime/g82004/g8_background.html
Ž&v j
78 8w& v&v ¨F8 j
78 ()* 99C & : Žo
7 :e *&*
.http://www.itu.int/cybersecurity/gateway/laws_legislation.html :0v`
: &63 M&&8S \8 C ;&"T /&63 k3Œ/ .http://www.ictregulationtoolkit.org/
:
8 6k6 4
:
vo
7 2A FP ()* ,&)8
•
•
•
•
•
http://www.itu.int/ITU-D/cyb/cybersecurity/projects/crimeguide.html
:
vo
7 2A 312) )* C ;&"T
http://www.itu.int/ITU-D/cyb/cybersecurity/projects/cyberlaw.html
•
22/1
:&63 M&&8S #2p +ƒ <&*2ve ,&
.http://www.interpol.com/Public/TechnologyCrime/
:d! "8 3 "\8 ! 4#92 PS "
\8 ¨F8
.http://www.oecd-antispam.org/article.php3?id_article=1
:d! "8 3 "\8 ! 4#92 PS C ;&"T
.http://www.oecd-antispam.org/article.php3?id_article=265
:"
2M- @2ge &63 M&&8S <"39 L9- PS" ()* 55/63 !, 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r55.htm
:"
2M- @2ge &63 M&&8S <"39 L9- PS" ()* 56/121 !, 3 3"A ,2!
.http://www.un.org/Depts/dhl/resguide/r56.htm
1M 2Œ !- c,3 m7 ,& /(UNICRI) 3 2A ‚&k >"
!e e F3
.http://www.unicri.it/ :
vo
7 #2A FM&
3
!& v2S` ,] Y&° (UNCITRAL) d,] &v6 e 8]6 M&­ mv&!
:
v2S`
.http://www.uncitral.org/uncitral/en/uncitral_texts/electronic_commerce/2001Model_signatures.html
.http://www.unodc.org/ :2A ,* l3 e GS ,&
64
•
•
•
•
•
•
•
•
'
:
vo
7 #2A* +Z 1,W v
* @2; j# :(APEC) ˜‹ ”
– 9“ d! 3 *,
.http://www.apectelwg.org/
:
vo
7 #2A* l3 2’= :; , 2% ;-
•
•
http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/cy%20activity%20Cairo/CairoDe
.clarationAgainstCC2007_EN.pdf
:
*&9† #2A ¢&9† ()* 67 < œ&8&S >M&­ &v!
.http://www.thecommonwealth.org/Internal/38061/documents/
:(2001) vo
7 #2A* 83 !0 :§,e 6¤
.http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Default_en.asp
:
vo
7 #2A ()* S12e 6k m* 3 *&* :
S12e < "\8
.http://www.oas.org/juridico/english/cyber.htm
:
*&9† #2A (FBI) ,
0 GS j› y
:
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/tech_tips/FBI_investigates_crime.html
:
vo
7 #2A* +ƒ 312)6 >; K7 :
vo
7 #2A &v!
.http://www.cybercrimelaw.net/index.html
:6¤ 6* vo
7 #2A* +ƒ 312)6 K7 :§,e 6¤
http://www.coe.int/t/e/legal_affairs/legal_co-operation/combating_economic_crime/
.3_Technical_cooperation/CYBER/Legprofiles.asp#TopOfPage
•
•
•
•
•
•
65
22/1
v2S` 7 ()* S
Œ& † mv& :˜‹ ”
– 9z 8 312)6 4
6" :ˆP&92S
2Œ
:"
vo
7 #2A
.http://www.itu.int/ITU-D/cyb/cybersecurity/docs/microsoft_asia_pacific_legislative_analysis.pdf
:d! "8 3 "\8 Lf;e < r ! 4#92 PS mv&!
.http://www.oecd-antispam.org/countrylaws.php3
e :; , "(ESCWA) 9z ¢25 ;"M 1! 8]6 Lf;e < r vo
7 312)6 Ÿ­"
. http://www.escwa.un.org/information/publications/edit/upload/ictd-07-8-e.pdf:
:(USDOJ) S12e <3 ,W&* 12S0 S6 *&9† #2A 7 G1& B!&
.http://www.cybercrime.gov
<"39 L9- <
[ &v! ¦ 1 40) *&9† #2A "… ()* (USDOJ) S12e <3 ,W G
.http://www.cybercrime.gov/ccmanual/ :(¢&9† <T :
v2S- C ?6; <&† 9," 4fPC ¦ S12e Yƒ :e 2#
.http://www.forwardedge2.com/pdf/bestPractices.pdf
•
•
•
•
•
•
_
4D' (6
PQ' `4D' (7 :^$.- 0$D (&O' (,F& G
*41 :IV GHIJ
G6 ?@ H6 ! 8#& I%J ! 8#& K+L
1.C.IV
:
S12e 1& &6
>581, 3p
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/
:§&9† :e ‚&† lw *]9 j12P L)v- L2MŠ* "#! :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/action_list.html
:Lk6 6"; §&9†/:e ‚&† lw *]9 j12P L)v- :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/Creating-A-CSIRT.html
:e ‚&† 8w& *]9 t20 ‚&† ,- 6"; 1 :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/04tr015.pdf :,M 4"; :§&9†
:§&9† :e ‚&† *]9 t2P u- OXi {M& E 6$9e :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/csirt_faq.html
:§&9† :e ‚&† *]9 t2P Y&° G
:
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/csirt-handbook.pdf
:0.1 ,+` /‚&† ,- ,! V
! :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/07tr008.pdf
:§&9† :e ‚&† *]9 t20 "
\8 Ÿ­ :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/03hb001.pdf
:§&9† :e ‚&† *]9 t2P Z :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/services.html
(CERT/CC)
•
•
•
•
•
•
•
•
•
22/1
>% ¦ €1 §&9† :e ‚&† *]9 j12P m63 ,
Z :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/csirts/csirt-staffing.html :±*&6 99e ,F
:§&9† :e ‚&† *]9 j120 k78* 4"3 BI :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/03tr001.pdf
:§&9† :e ‚&† *]9 8w& t20 L)v- &Z :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/archive/pdf/NationalCSIRTs.pdf
.http://www.vte.cert.org/ :
*&9† ˜,&6 *]9 t2P j
78 a2 (VTE) >I2P G1, $
*
:e ‚&† *]9 j12P 4
S) 0
()* &° &Z ¨' :&63 Sk) :e *,e &
.http://www.enisa.europa.eu/pages/05_01.htm :§&9†
:6  ,& IMPACT ITU m* 3 $
%
66
•
•
•
•
•
•
http://www.itu.int/ITU-D/cyb/cybersecurity/impact.html
:Žo
7 :e ‚&† *]9 j12P 4
S) :; &63 ¦ §&9† :e ‚&† *]9 j120 3 Ÿ&­
.http://www.govcert.nl/render.html?it=69
:(WARP) ¯*` ,&) £ ,Rv` 8 C ;&"T : S6"* 8w& 8k 1• a2
.http://www.warp.gov.uk/
•
•
'
.http://www.apcert.org/index.html :˜‹ ”
– 9z 8 *&9† ˜,&6 *]9 j12P
.http://www.ecsirt.net/ :
*&9† ˜,&6 §,e *]9 j120 Sk) ,&
.http://www.egc-group.org/ :
*&9† ˜,&6 *,e &S† *]9 !2PC j12P
•
•
•
!
.http://www.auscert.org.au :
*&9† ˜,&6 *]9 29e j120 :
29C
.http://www.cert.at :7"8* *&9† ˜,&6 *]9 j12P :7"8
.http://www.cert.br/ :41Wo* *&9† ˜,&6 *]9 j12P :41Wo
.http://www.clcert.cl/ :>6
)* *&9† ˜,&6 *]9 j12P :>6
Œ
.http://www.cert.org.cn/ :m* *&9† ˜,&6 *]9 t2P j
78 a2 :m
.http://www.cert.fi :8680* *&9† ˜,&6 *]9 j12P :868P
.http://www.cert-hungary.hu :1,58b *&9† ˜,&6 *]9 j12P :1,58%
.http://www.cert-in.org.in :8‹* *&9† ˜,&6 *]9 j12P :8‹
.http://security.dico.unimi.it/ :
1Š* *&9† ˜,&6 *]9 j12P :
1.http://www.jpcert.or.jp/ :*
* *&9† ˜,&6 *]9 t2P j
78 a2 :*
.http://www.krcert.or.kr/ :1,&S* *&9† ˜,&6 *]9 t2P j
78 a2 :1,&
.http://www.cybersecurity.org.my :1a
~ *&9† ˜,&6 *]9 j12P :1a
.http://www.csirt.dk/ :8&%
.http://www.cert.pl/ :8&k* *&9† ˜,&6 *]9 j12P :8&*
•
•
•
•
•
•
•
•
•
•
•
•
•
•
67
22/1
.http://www.arnes.si/en/si-cert/ :
8
P&67* *&9† ˜,&6 *]9 j12P :
8
P&69
.http://www.singcert.org.sg/ :,&P587* *&9† ˜,&6 *]9 j12P :,&P589
.http://www.sitic.se :1&7* &63 M&&8S ‚&[ a2 :1&7
.http://www.melani.admin.ch :MELANI a2 :271&9
.http://www.thaicert.nectec.or.th/ :v1* *&9† ˜,&6 *]9 j12P :v1
.http://www.ansi.tn/en/about_cert-tcc.htm :
*&9† ˜,&6 *]9 j120 B* TCC a2 :v&
.http://www.qcert.org :2!
.http://aecert.ae/ : *23 ,`
:
S12e 8w& *]9 Z
.http://www.dhs.gov/dhspublic/interapp/editorial/editorial_0566.xml
.http://www.us-cert.gov/ :
*&9† ˜,&6 >S12e *]9 j12P :
S12e 1&
.§&9† :e ‚&† *]9/
*&9† ˜,&6 *]9 r2Ze 8w& t206 G1& B!&
•
"
: 1A$ 9:
2.C.IV
•
•
•
•
•
•
•
•
•
•
aI'$
:<&6† 8e y3f :w& :
*&9† ˜,&6 *]9 t2P j
78 a2
.http://www.cert.org/nav/index_red.html
.http://chiht.dfn-cert.de/ :(CHIHT) ‚&† B 43 C ()* &63 <k a2
.http://www.first.org/ :(FIRST) 8e t20 ‚&6 *]9 r8 ,&
.http://www.donelan.com/ispsupport.html :ˆv2v` Z d,& :e ; Z ,&
:'()* *]9 ,Rv` ‚&† k!2~ j63 99C & :Žo
7 : *&*
.http://www.itu.int/cybersecurity/gateway/watch_warning.html
:2Pe X5 1,] <";e 4MC : &63 M&&8S :z ,Rv- ^\v
.http://www.itsafe.gov.uk/
:
! 4#92 PS C ;&"T :d! "8 3 "\8
.http://www.oecd-antispam.org/article.php3?id_article=265
•
•
•
•
•
•
•
'
.http://www.terena.org/ :(TERENA) *,C o; 63 ‚&k SkŒ *,
•
!
:(WARP)
.http://www.waarschuwingsdienst.nl/render.html?cid=106 :18&‹ 8w& ,Rv` Z :8&%
¯*` ,&) £ ,Rv` v C ;&"T :(
8w& 8k 1• a2) S6"
.http://www.warp.gov.uk/
.https://www.it-isac.org/ :
S12e 1&* F6
6 &63 M&&8S &63 <k a2
•
•
•
22/1
68
,& Z M2† 8k :&63 M&&8S :(ISCC) &63 M&&8S ! j
78 >S12e 6¤
:* +ƒ 7
#2
.http://www.it-scc.org/documents/itscc/Information_Technology_SSP_2007.pdf
.http://csrc.nist.gov/ :
S12e 1&* (NIST) M&&8S X13"6 lw& F3
•
" N:O ?! "E/"
:
:8z "\vC L)v- ;7"6 To :C (* +ƒ &63 B"p :e L8*
.https://buildsecurityin.us-cert.gov/daisy/bsi/home.html
.http://www.cve.mitre.org/about/ :(CVE) @23 y3f :w&~ 2) "#!
.http://oval.mitre.org/ :(OVAL) y3f :w& [&0 5
.http://nvd.nist.gov/nvd.cfm :
To6 k78* (NVD) y3f :w& S12e 8w& v
k ;!
3.C.IV
•
•
•
•
•
LM% N (&O' (=
\b c' :V GHIJ
(7.B.V 2.B.V 1.B.V) 56 "5AP Q.@
1.C.V
:4"; Z /&63 B"¤ 3 5
M 4"3 ”Z
.http://www.itu.int/wsis/implementation/index.html
.http://www.itu.int/osg/csd/cybersecurity/gca/ :Žo
7 :e ()* >3 <";e <M
: &63 B"¤ 3 "6 ! 4#92 PS~ l3 >3
I& "M
.http://www.itu.int/osg/spu/spam/meeting7-9-04/index.html
:<e "M #, 212 /&63 B"¤ 3 "6 5
M 4"3 ”Z
.http://www.itu.int/osg/spu/cybersecurity/2006/chairmansreport.pdf
:Ži "M #, 212 /&63 B"¤ 3 "6 5
M 4"3 ”Z
.http://www.itu.int/wsis/docs/geneva/official/poa.html
:6 Okw Ži "M <";C <M
.http://www.itu.int/osg/csd/cybersecurity/WSIS/meetingAgenda.html
:œi "M 212 /&63 B"¤ 3 "6 5
M 4"3 ”Z
•
•
•
•
•
•
•
http://www.itu.int/osg/csd/cybersecurity/WSIS/3rd_meeting_docs/WSIS_Action_Line_C5_Meeting_Re
.port_June_2008.pdf
:6 Okw œi "M <";C <M
.http://www.itu.int/osg/csd/cybersecurity/WSIS/agenda-3_new.html
9
7 >3v+ 4MC : ˆv2v` :C 9 &63 /k9– +&Z :ˆP&92S
2Œ
.http://www.microsoft.com/mscorp/twc/policymakers_us.mspx :}3 LC B
‡ .http://www.oecd.org/sti/cultureofsecurity :%,& B :e P *&* /d! "8 3 "\8
:(2002) "
8C P & :&63 SkŒ "\vC :C ()* F
M& ˜k" d! "8 3 "\8
.http://www.oecd.org/document/42/0,2340,en_2649_34255_15582250_1_1_1_1,00.html
"† o; ) v
k P +&ƒ 1• ()* F
M& ˜k" :d! "8 3 "\8
.http://www.oecd.org/document/20/0,2340,en_2649_34255_15589524_1_1_1_1,00.html :(1980)
•
•
•
•
•
69
22/1
""\8 6* &63 SkŒ "\vC :e Pi ¨12 ()* d! "8 3 "\8 212"
.http://www.oecd.org/dataoecd/16/27/35884541.pdf :(2005)
:
&S† 9
7 &63 :C ¦ €8k6 &63 M&&8S :C G
.http://www.infodev-security.net/handbook/part4.pdf
.http://www.un.org/Depts/dhl/resguide/r57.htm :(¢ C P2) 3 3"]6 57/239 !, ,2
•
•
•
'
:(2007) "™]8 V
! † 9," :&63 :(* ;& ,k" :&63 Sk) :e *,e &
.http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_measuring_awareness.pdf
:(2006) "&63 :(* >;& 1W 0
:m6"37"6 4
" &63 Sk) :e *,e &
.http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf
:(InSafe) ˆv2v` 9 &63 §,e ,
.http://www.saferinternet.org/ww/en/pub/insafe/index.htm
¨' :Žo
7 :e ‹ @231 E 1F PS S12e 6k ]
29 :(OAS) S12e < "\8
:(2004) (60 1R) Žo
7 : P L9,` "\ve 3 3*e 3
•
•
•
•
http://www.oas.org/XXXIVGA/english/docs/approved_documents/adoption_strategy_
.combat_threats_cybersecurity.htm
!
:
! 4#92 PS GS ,& :41Wo
:CGI.br – ˆv2ve* 83 61Wo {
M& 8]6 ˆv2v` 9 ()* F
M& ˜k :41Wo
http://antispam.br/
•
•
http://cartilha.cert.br/
:(6* 4S) : Pi ¨126 d! "8 3 "\8 ,k
.http://www.oecd.org/document/63/0,3343,en_21571361_36139259_36306559_1_1_1_1,00.html
.http://www.us-cert.gov/ :
S12e 1&* *&9† ˜,&6 *]9 j12P B!&
:
S12e 1&* >6Z :e ,W& M2† 8w& 8k 1"† 21& œk Z
.http://www.dhs.gov/xres/programs/gc_1159207732327.shtm
.http://csrc.nist.gov/fasp/ :
S12e 1&* 1 &6 8e 9,"
:39 11 7 2 1 LaMe /(FAR) S12e 1&* 1 L8! K#&
.http://www.acqnet.gov/FAR/
:&63 :C Žo
7 :e Y&° S12e 1&* 1 21& œk Z
.http://www.nitrd.gov/pubs/csia/FederalPlan_CSIA_RnD.pdf
:
+&ƒ &63 :e S12e 1&* d,)9 6¤
.http://csrc.nist.gov/ispab/
G
2 M2† ³k 1" /HSPD-7 !, {
M& /
S12e 1&* >6Z : >9#2 {
M&
.http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html :"F1• ‘1&C
.http://www.msisac.org/ :S12(* 3 1&6 F6
6 &63 <k a2
.http://www.whitehouse.gov/pcipb/ :Žo
7 Lf0 m( S12e 8w& ]
29
‚&k 1&C Y&° &63 M&&8S* 83 S12e 1& #2 1,)9 8]6 212
:Žo
7 :e <T
.http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf
•
•
•
•
•
•
•
•
•
•
•
22/1
70
(7.B.V 5.B.V 3.B.V) RS T+ *# 1@ "Q
http://www.internetsegura.org/ :41Wo 8z ˆv2v- 2[
.http://tools.cisco.com/security/center/home.x :(9," 4fPC 7!) : Cisco a2
.http://www.microsoft.com/mscorp/twc/default.mspx :ˆP&92S
2) "3 *&9†
:(NIATEC) &63 ;&v "I <T 63 G1,6 lw& a2"6 71, &
.http://niatec.info/index.aspx?page=105
:"\8"6 :e ¦ €8k6 &63 M&&8S :C 4
.http://www.infodev-security.net/handbook/part3.pdf
:
S12e 1&* *&9† ˜,&6 *]9 j12P :; ,+ 4"3 :e ;- !* 6
.http://www.uscert.gov/reading_room/distributable.html
:
S12e 1&* ;8 2#/>6Z :e ,W& "
vo
7 0+3" 9,—
.http://www.dhs.gov/xnews/releases/pr_1158340980371.shtm
2.C.V
(7.B.V 6.B.V 4.B.V) > UV %J@
http://www.safernet.org/ :41Wo* SaferNet "\8 :41Wo
:(SUSI ¦ ˆv2v` ?6; 6 O8C 2ie ^9) ”ƒ ?6; O8z :S
.http://www.besafeonline.org/
.http://casescontact.org/tips_list.php :CASEScontact "\8 8C Œ,.http://www.childnet-int.org :Childnet <0w Sk) ,&
.http://www.cyberpeaceinitiative.org/ :Žo
7 ^7 ,k
.http://tcs.cybertipline.com/ :”ƒ ?6; e j
0
m%2 63 :CyberTipline B!&
.http://www.internetsafetyzone.co.uk/root/ ::1& <0w ˆv2v` C tv ,&
:&63 M&&8S #2M ()* <&*2v +ƒ 3M2 "#
.http://www.interpol.int/Public/TechnologyCrime/CrimePrev/privateChecklist.asp
http://www.itu.int/cop/ :6  F
M& ˜k ”ƒ ?6; <0we 1"† ,k
.http://kids.getnetwise.org/tools/ :29 GetNetWise "\8 C
.http://onguardonline.gov/index.html :<
[ : 1"6 Œ,- ¦ ”ƒ ?6; OnGuard B!&
.http://www.makeitsecure.org/en/index.html :3#) ˆv2v` ,ZC :; &63 ¦ MakeItSecure B!&
.http://www.esecurity.org.my/ :1a
Ž2S` :e ,k
.http://www.netsmartz.org/netparents.htm :L
+e :1&6 ,& :NetSmartz B!&
.http://www.netsafe.org.nz :1861W&
8 Netsafe SkŒ
.http://www.safeline.gr/ :
v&v Xg 1&– :; ¯*N SafeLine :Z7 ”ƒ
.http://www.securitycartoon.com/ ::e Y&° 1,&S1, ^&9,
.http://www.staysafeonline.info/ :”ƒ ?6; O8z 4\6P
.http://www.wiredsafety.org/ :WiredSafety "\8
:2P :e ¦ €8k6 &63 M&&8S :C 4
.http://www.infodev-security.net/handbook/part2.pdf
3.C.V
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
71
22/1
.http://www.ceop.gov.uk/ : S6"* ”ƒ ?6; 1"† <0we <59 I 1"† a2 ,&
.http://www.getsafeonline.org/ : S6""6 ”ƒ ?6; O8z :S6P B!&
:m
8 Xg m6"37"6 1& *&9† ˜,&6 *]9 j12P
.http://www.us-cert.gov/nav/nt01/
•
•
•
m
#F8 m6"37 r >;& 1a 8w& "
6!` ,k : € Xg
22/1 

(2010-2006)1
:22/1




2010

Download