Page 456 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 456

In the firewall‐centered security environment, all security measures (e.g. passwords, encryption,
            authentication and auditing, among others) can be configured on the firewall. This approach is more
            cost‐effective than a decentralized network security mode.
            If all network accesses go through the firewall, this can record and make a log of these visits, and
            also provide statistical data of network usage. When suspicious actions occur, the firewall can then
            generate the appropriate alarm, and provide detailed information about the incident for threat
            analysis purposes.

                   Protecting intrusion dynamically
            Intrusion detection is another important dynamic security technology, which can collect and analyze
            information from a number of key points of computer network and system, and find out whether
            there is any suspicious behavior, sign of an attack or policy violation. There are three types of
            intrusion detection systems (IDSs):
            (a)     network‐based IDS;
            (b)     host‐based IDS;

            (c)     integrated IDS.

                   Preventing DDoS attacks
            There are different mechanisms that can enhance the ability to withstand DDoS through increasing
            the cost of attack. These include the use of high‐performance network equipment, the guarantee
            of sufficient network bandwidth, the upgrade of the host server hardware, the use of static pages
            whenever  possible,  the  enhancement  of  the  operating  system  transmission  control  protocol
            (TCP)/IP stack, and the installation of specialized anti‐DDoS firewall.
                   Network security audit

            A network security audit carries out compliance management by fine‐grained auditing the network
            operating behavior of the business environment. Through recording, analyzing, and reporting the
            network behavior of system and authorized users, the network security audit can function as a
            mechanism for planning and preventing, concurrently monitoring, as well as reporting and tracking
            the source after the incidents take place. Consequently, network security audits can strengthen the
            internal and external networks behavioural regulation.

                   Child online protection in SSC

            As the analysis conducted thus far has demonstrated, the design of a comprehensive cybersecurity
            strategy for SSC should take into account multiple sources of vulnerabilities, as well as existing and
            emerging threats. Children are among the most vulnerable users of online services. As identified by
            the ITU‐T Joint Coordination Activity on Child Online Protection (ITU‐T JCA‐COP):
                    "Child  online  protection  covers  a  number  of  issues,  and  is  being  addressed  at  national,
                    regional  and  international  levels,  across  a  myriad  of  environments,  including  social  and
                    legal. At the international level, and within the ITU, the Council Working Group on Child
                    Online Protection has received much information on national activities, and has developed
                    guidelines, and the Joint Coordination Activity on Child Online Protection has identified many
                    technical  activities  that  are  contributing  to  the  safety  of  children  on  line  at  a  global
                    level."(ITU‐T JCA‐COP)

            Further details about child online protection can be found in the reports produced by the ITU‐T JCA‐
            COP, at http://www.itu.int/en/ITU‐T/jca/COP/Pages/default.aspx.



            446                                                      ITU‐T's Technical Reports and Specifications
   451   452   453   454   455   456   457   458   459   460   461