Page 34 - FerMUN 2020 - Futurecasters Global Young Visionaries Summit, 8th-10th January 2020
P. 34
b. International cooperation in the area of contingency provisions,
c. Educating governments on the pressing need to draft their own national cyber
security plans;
2. Encourage the regulation on the Internet of illegal or inappropriate material including
but not limited to:
a. Child pornography,
b. Suicide footage,
c. Highly explicit footage of real violence, such as beheadings and explicit
shootings;
3. Encourages all member States to practice the reduction of taxes and the establishment
of subsidies on ICT distributors and cybersecurity defense technologies, with the
purpose of making the aforementioned technologies more accessible, thereby
improving the ease of setting high standards for cyber security;
4. Reminds the international community that espionage is legal under international law,
and that under the definition of espionage, cyber-espionage should be officially and
formally defined as such, and invites the following methods to be defined as legitimate
methods of conducting espionage:
a. Denial of Service,
b. Direct Denial of Service,
c. Man-in-the-Middle,
d. Phishing,
e. Password decryption,
f. Eavesdropping attacks,
g. File infectors,
h. Boot-record viruses,
i. Polymorphic viruses,
j. Stealth viruses,
k. Trojans,
l. Logic bombs,
m. Worms,
n. Droppers;
5. Responds to concenrs about how easy it would be for a non-state actor or state actor
to carry out a cyberattack that would damage civilian infrastructure, but more than
that cause physical harm and even casualties to civilians, by defining any cyberattack
33