Page 34 - FerMUN 2020 - Futurecasters Global Young Visionaries Summit, 8th-10th January 2020
P. 34

b.  International cooperation in the area of contingency provisions,
                          c.  Educating governments on the pressing need to draft their own national cyber
                              security plans;


                   2.  Encourage the regulation on the Internet of illegal or inappropriate material including
                      but not limited to:

                          a.  Child pornography,
                          b.  Suicide footage,
                          c.  Highly  explicit  footage  of  real  violence,  such  as  beheadings  and  explicit

                              shootings;

                   3.  Encourages all member States to practice the reduction of taxes and the establishment
                      of  subsidies  on  ICT  distributors  and  cybersecurity  defense  technologies,  with  the

                      purpose  of  making  the  aforementioned  technologies  more  accessible,  thereby
                      improving the ease of setting high standards for cyber security;


                   4.  Reminds the international community that espionage is legal under international law,
                      and that under the definition of espionage, cyber-espionage should be officially and
                      formally defined as such, and invites the following methods  to be defined as legitimate
                      methods of conducting espionage:

                          a.  Denial of Service,
                          b.  Direct Denial of Service,
                          c.  Man-in-the-Middle,

                          d.  Phishing,
                          e.  Password decryption,
                          f.  Eavesdropping attacks,

                          g.  File infectors,
                          h.  Boot-record viruses,
                          i.   Polymorphic viruses,

                          j.   Stealth viruses,
                          k.  Trojans,
                          l.   Logic bombs,
                          m.  Worms,

                          n.  Droppers;

                   5.  Responds to concenrs about how easy it would be for a non-state actor or state actor

                      to carry out a cyberattack that would damage civilian infrastructure, but more than
                      that cause physical harm and even casualties to civilians, by defining any cyberattack





                                                                                                       33
   29   30   31   32   33   34   35   36   37   38   39