(Continuation of part of Q.6/17) Motivation
The cybersecurity landscape is constantly changing. Currently there is a
strong need for securing the cyber environment for protocols, infrastructures,
applications such as those providing voice, multi-media, information assurance,
identity and data services, for conducting business, providing emergency based
services, social networking and as the medium for connecting people and
services.
Cybersecurity involves more than securing the critical infrastructure. It
involves securing and protecting services, and personal information, protecting
privacy and providing information assurance (IA) among interacting entities.
Cyber attacks have become a widespread problem causing a complex range of
problems to users, service providers, operators and networks. Tracing cyber
attacks by technical means requires development of framework and requirements
for detecting, protecting against, mitigating the effects of and recovering from
cyber attacks, and covering important technical issues facing network operators,
enterprises, and governments. ITU-T can help to make the cyber-world a safer
place by investigating the technologies for tracing cyber attacks.
Recommendations under responsibility of this Question as of 1 December 2008:
X.1205, X.1206, X.1207 and X.1303.
Question
Study items to be considered include, but are not limited to:
- How should telecommunications network providers secure their
infrastructure, maintain secure operations and use security assurance mechanisms
in telecommunication networks?
- What are the security requirements that software, telecommunications
protocols, communications systems designers and manufacturers need to consider
in the design, development and sharing of best practices in the cyber
environment?
- How should vulnerabilities information be shared efficiently to aid in the
vulnerability life-cycle processes?
- What requirements and solutions are needed for telecommunications/ICT digital
forensics, trace-back, cyber stalking and fraud?
- What framework for supporting telecommunications/ICT digital forensics and
trace-back is needed across domains?
- What framework for security information sharing is needed?
- What are the necessary guidelines and best practices that should be
considered by telecommunication providers and Internet service providers (ISPs)?
- How can networks be used to provide critical services in a secure fashion
during national emergency?
- What enhancements to existing Recommendations under review or new
Recommendations under development should be adopted to reduce impact on climate
changes (e.g., energy savings, reduction of green house gas emissions,
implementation of monitoring systems, etc.) either directly or indirectly in
telecommunication/ICT or in other industries?
Tasks
Tasks include, but are not limited to:
- Collaborate with ITU-T study groups, IETF, OASIS, ISO/IEC JTC 1, 3GPP,
3GPP2, OMA, and other standardization bodies on cybersecurity.
- Work on framework for secure network operations to address how
telecommunications network providers secure their infrastructure and maintain
secure operations.
- Produce a set of Recommendations for providing security solutions for
telecommunications/ICT forensics and trace-back technologies.
- Study and specify the security techniques and capabilities for service
providers to coordinate and exchange information regarding cyber attacks.
- Specify how to apply a trace-back and digital forensics mechanism in the
telecommunication network.
- Work on network security framework to address how telecommunication operators
can uniformly operate various kinds of security functions.
- Develop guidelines and techniques to protect personal information and also to
protect personally identifiable information (PII).
- Provide assistance to other ITU-T study groups in applying relevant
cybersecurity Recommendations for specific security solutions. Review
project-oriented security solutions for consistency.
- Develop best practices and guidelines for the sharing of vulnerabilities
information and updates and patches to aid in the vulnerability life-cycle
processes.
- Study and develop the requirements for safe software programs that can
effectively deal with rogue programs like spam, virus etc.
Relationships
Recommendations: X-series, and others related to security
Questions: ITU-T Qs 1, 2, 3, 5, 6, 7, 8, 9, 12/17 and 16/13
Study groups: ITU-T SGs 2, 11, 13 and 16; ITU-D SG 2
Standardization bodies: ISO/IEC JTC 1/SC 27; IEEE, IETF; OASIS; 3GPP; 3GPP2;
OMA; ETSI/TISPAN; NIST
Other bodies: OECD; FIRST; CERT/CC |