International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Monday, January 08, 2007
Study Group 17 has initiated the approval process for a standard providing an overview of cybersecurity. The work establishes a definition of cybersecurity that is wide enough in scope to cover various and sometimes inconsistent definitions.

The Recommendation (X.1205) provides a taxonomy of security threats from an organizationís point of view. Cybersecurity threats and vulnerabilities including the most common hackerís tools of the trade are presented. Threats are discussed at various network layers.

Various Cybersecurity technologies to remedy threats are discussed including: routers, firewalls, antivirus protection, intrusion detection systems, intrusion protection systems, secure computing and audit and monitoring. Network protection principles such as defense in depth, access management with application to Cybersecurity are also discussed. Risk management strategies and techniques are discussed including the value of training and education in protecting the network. In addition examples for securing various networks based on the discussed technologies are also discussed.