ITU

Committed to connecting the world

  ITU-D Study Groups

YOU ARE HERE      HOME      > ITU-D      > STUDY GROUPS      > 2014-2018      > RAPPORTEUR'S GROUP QUESTION
Home
Scope
Management
Questions under study
Study Group 1
Study Group 2
Meetings
Circulars
Documents
Registration
Fellowships
Delegate resources
Recommendations
Publications
Previous study periods
Innovation in study groups
Case study library
Collaborative tools
Contact us
 
ITU-D STUDY GROUPS 1 AND 2
 
Rapporteur's Group Question details

Question 3/2
Securing information and communication networks: Best practices for developing a culture of cybersecurity
Question 3/2
Definition
Arabic Chinese English French Russian Spanish
html icon  PDF version html icon  PDF version html icon  PDF version html icon  PDF version html icon  PDF version html icon  PDF version
Word icon  Word version Word icon  Word version Word icon  Word version Word icon  Word version Word icon  Word version Word icon  Word version
Expected output
1 Reports to the membership on the issues identified in paragraphs 2 a) to j) above. The reports in question will reflect that secure information and communication networks are integral to building of the information society and to the economic and social development of all nations. Cybersecurity challenges include potential unauthorized access to, destruction of and modification of information transmitted on ICT networks, as well as countering and combating spam. However, the consequences of such challenges can be mitigated by increasing awareness of cybersecurity issues, establishing effective public-private partnerships and sharing successful best practices employed by policy-makers and businesses, and through collaborating with other stakeholders. In addition, a culture of cybersecurity can promote trust and confidence in these networks, stimulate secure usage, ensure protection of data and privacy while enhancing access and trade, and enable nations to better achieve the economic and social development benefits of the information society.
2 Educational materials for use in workshops, seminars, etc.
3 Accumulation of knowledge, information and best practices on effective, efficient and useful measures and activities to enhance cybersecurity in developing countries resulting from ad hoc sessions, seminars and workshops.
 
Workplan
 
Output Report
 
ITU-D Recommendations
 
Useful Information
 
Reference Material
 
Access to collaborative tools (mailing lists, e-forum, etc.)