International Telecommunication Union   ITU
عربي  |  中文  |  Espa˝ol  |  Franšais  |  Русский
 
 Advanced Search Advanced Search Site Map Contact us Print Version
 
Home : Cybersecurity
   
ITU Activities

A fundamental role of ITU, following the World Summit on the Information Society (WSIS) and the 2010 ITU Plenipotentiary Conference, is to build confidence and security in the use of Information and Communication Technologies (ICTs). At WSIS, Heads of States and world leaders entrusted ITU to take the lead in coordinating international efforts in the field of cybersecurity, as the sole Facilitator of Action Line C5, "Building confidence and security in the use of ICTs".

spacer

In response, ITU Secretary-General, Dr. Hamadoun I. Touré launched the Global Cybersecurity Agenda(GCA), which is a framework for international cooperation aimed at enhancing confidence and security in the information society.

ITU CYBERSECURITY RELATED RESOLUTIONS
ITU Plenipotentiary Resoultions: 130, 174 , 179 , 181 (Guadalajara, 2010)
ITU WTDC Resolutions: 45 , 69 (Hyderabad, 2010)
ITU WTSA Resolutions:50 , 52 , 58 (Dubai, 2012)

UN CYBERSECURITY RELATED RESOLUTIONS
Resoultions: 55/63(2000), 56/121(2002) , 57/239(2002) , 58/199(2004) , 64/211(2009)

The Latest Buzz on Cybersecurity
 

  • The 2013 Annual Security Roundup provides useful information on the evolution of cybercrimes. Malware in 2013 targeted victims in many regions of the world with the key purpose of getting money hence cashing on digital information. Get to know the trends in mobile threats, targeted attacks, exploits and vulnerabilities and what happened to digital life security issues.
     
    Full report

       

  • Have a glimpse of new and exciting technologies coming up that would offer cybercriminals new attack vectors. Using these new technologies securely should be a priority.
     
    Full infographic

       

  • Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond
    A report on 2014 cyber threat predictions, with a foreword from ITU Secretary-General, to give Member States foresight in future cyber-attack trends. This report is a first of a series of information campaigns and relevant materials which will be shared with Member States through a partnership between Trend Micro and ITU.
     
    Full report

       
  • E-Guide 'How To Protect Data In Mobile Devices'
    The E-Guide 'How To Protect Data In Mobile Devices' highlights the importance of protecting data in mobile devices.
    Full report

       
  • TrendMicro E-Guide 'The Who, What, Why and How of Mobile Privacy'
    the TrendMicro E-Guide 'The Who, What, Why and How of Mobile Privacy' aims at giving suggestions and guidelines on how to protect privacy from mobile threats.
    Full report

       
  • SG'S FOREWORD ON SYMANTEC INTERNET SECURITY THREAT REPORT
    Aiming at raising awareness of the Member States on today's trends of cyber threats and vulnerabilities, ITU Secretary-General presents his foreword on the Symantec Internet Security Threat Report which was published on May 2013. Read more...
    Full Symantec report

       
  • SG'S FOREWORD ON SYMANTEC INTELLIGENCE QUARTERLY REPORT
    ITU Secretary General presents to you his foreword on the Symantec Intelligence Quarterly report with the aim to increase Member States' awareness on the latest trends of cyber threats and vulnerabilities. [Read More]
    The full Symantec report can be found [Here].

       
  • THE QUEST FOR CYBER PEACE
    "To achieve the mutual goal of ensuring Cyber Peace, collaboration between ITU and members of the science and technology community is critical." [EN] [AR] [ZH] [FR] [RU] [ES]

    CYBER NORM EMERGENCE AT THE UNITED NATIONS
    An Analysis of the UN's Activities Regarding Cyber-security [Read More]

  • CYBERSECURITY: PUBLIC SECTOR THREATS AND RESPONSES "On May 17, 2007, the ITU Secretary General launched the Global Cybersecurity Agenda (GCA) to provide a framework within which an international response to the growing challenges to cybersecurity can be coordinated and addressed" Read More (December 2011)

    Parliamentarians want more coopration on cybersecurity Read More (May 2011)

  • CYBERSPACE United States Faces Challenges in Addressing Global Cybersecurity and Governance
    The US Government accountability office (GAO) identifies ITU as one of the 19 most influential cybersecurity organizations in the world. Read More (July 2010)

    "Lots of times, there's confusion in these [Cybersecurity] treaty negotiations because of lack of clarity about which problems they're trying to solve" Scott Charney, Vice president of Microsoft's Trustworthy Computing Group, spoke at the Worldwide Cybersecurity Summit (May 2010)

  • The criminal conducts in cyberspace are global and a global harmonization of cybercrime legislation covering new conducts should be established in a Cyberspace Treaty. A proposal for a United Nations cyber crime treaty presented by judge Stein Schjolberg at the United Nations Crime Congress in Salvador, Brazil, April 12-19, 2010.

Videos
ITU Meetings and Events
Upcoming Past

 

Top - Feedback - Contact Us -  Copyright ę ITU 2014 All Rights Reserved
Contact for this page : strategy@itu.int
Updated : 2014-04-10