{"id":32,"date":"2023-06-22T13:15:30","date_gmt":"2023-06-22T13:15:30","guid":{"rendered":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/?page_id=32"},"modified":"2023-06-23T07:56:58","modified_gmt":"2023-06-23T07:56:58","slug":"standards","status":"publish","type":"page","link":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/ict-action%ef%bf%bc\/standards\/","title":{"rendered":"Cybersecurity\u00a0"},"content":{"rendered":"<div class=\"ituContainer\">\n<h1 class=\"wp-block-heading\">Cybersecurity \u2013 making online lives safer and more secure for all<\/h1>\n<\/div>\n\n    <div class=\"ituContainer grid\">\n        <div data-span=\"12\">\n                                <section>\n        <div class=\"ituContainer grid\">\n            <div class=\"introduction\" data-span=\"8\">\n                <p>\n                    ITU provides its members \u2013 particularly developing countries \u2013 increased cybersecurity capabilities at national level, helping build confidence and trust and making the digital realm safer and more secure for everyone. ITU provides specific guidance for members \u2013\u00a0ITU Cybercrime Legislation Resources\u00a0\u2013 on legislating against the misuse of ICTs for criminal purposes \u2013 legislation aligned with regional and international practices.                <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n                                <section>\n    <div class=\"text-section\">\n        <div class=\"ituContainer grid\">\n                                        <div class=\"text-section-left\" data-span=\"8\">\n                        <p>\n        Organized around the five pillars of the Global Cybersecurity Agenda (GCA), this report shows the complementary nature of existing ITU work programmes, including BDT, TSB, and BR activities in this domain.<br><br><strong>Legal measures<\/strong><br>As part of ITU-D Priority 5 of the Kigali Action Plan, and taking into account ITU-D Q 3\/2, ITU is assisting Member States in understanding the legal aspects of cybersecurity through its <a href=\"http:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/Legal-Measures.aspx\">ITU Cybercrime Legislation Resources<\/a>. ITU collaborates closely with partners such as the United Nations Office on Drugs and Crime (UNODC).<br><br><strong>Technical and procedural measures<\/strong><br><a href=\"http:\/\/www.itu.int\/ITU-T\/studygroups\/com17\/\">ITU-T Study Group 17 (SG-17)<\/a>held two meetings in August\/September 2022 and February\/March 2023, established 32 <a href=\"https:\/\/www.itu.int\/itu-t\/workprog\/wp_search.aspx?sg=17\">new standardization work items<\/a>, and approved 18 new or revised Recommendations on ICT security. ITU-T SGs 5, 11, 13, 16 and 20 also approved recommendations on ICT security (see <a href=\"https:\/\/www.itu.int\/en\/ITU-T\/publications\/Pages\/recs.aspx\">catalogue of ITU-T Recommendations<\/a>) across a wide range of issues from electromagnetic security, signalling procedures and protocols, cloud computing, quantum key distribution networks, JPEG 2000 and oneM2M Security Solutions.<br><br>Several ITU-T focus groups, referenced on <a href=\"https:\/\/www.itu.int\/en\/ITU-T\/focusgroups\/Pages\/default.aspx\">this page<\/a>, are also exploring the trust aspect of various emerging technologies as part of their work.<br><br>ITU-R has established clear security principles for IMT (3G, 4G and 5G) networks. It has also issued Recommendations on security issues in network management architecture for digital satellite systems and performance enhancements of transmission control protocol over satellite networks (see <a href=\"https:\/\/www.itu.int\/pub\/R-REC\">here<\/a>). Information on Futuristic mobile technologies \u2013 \u201cIMT for 2020 and beyond\u201d can be found <a href=\"https:\/\/www.itu.int\/en\/ITU-R\/study-groups\/rsg5\/rwp5d\/imt-2020\/Pages\/default.aspx\">here<\/a>.<br><br><strong>Organizational structures<\/strong><br>Since 2012, ITU has been collaborating with Member States, partners, and global organizations to strengthen cybersecurity by creating national and regional Computer Incident Response Teams (CIRTs). Additionally, ITU conducts CIRT Maturity Assessments to further enhance CIRT capabilities. So far, ITU has assisted 84 countries by evaluating their cybersecurity readiness, leading to the establishment or improvement of National CIRTs. ITU has implemented 21 CIRT-related projects and is currently working on three more.<br><br>ITU actively collaborates with the FIRST community to enhance the Computer Security Incident Response Team (CSIRT) Service Framework and revise training materials for capacity-building in managing national CIRT operations.<br><br>As of May 2023, ITU has organized over 40 international, regional or national <a rel=\"noreferrer noopener\" href=\"https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/cyberdrills.aspx\" target=\"_blank\">CyberDrills<\/a> (including 3 Global CyberDrills), involving more than 120 countries across all six ITU regions. A <a href=\"https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/CyberDrill-2023\/CyberDrill-2023.aspx\">2023 Global CyberDrill<\/a> is scheduled for end of 2023. More details on the other pillars (Capacity building,\u00a0 International cooperation, as well as on the Child Online Protection program can be found in document <a href=\"https:\/\/www.itu.int\/md\/S23-CL-C-0038\/en\">C23\/38<\/a>).    <\/p>\n            <\/div>\n                                        <div class=\"text-section-right data-span-override\" data-span=\"4\">\n                    <div class=\"ituContainer\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-content\/uploads\/sites\/3\/2023\/06\/ICT-action_security-1024x572-1.png\" alt=\"cybersecurity\" class=\"wp-image-99\" width=\"512\" height=\"286\" srcset=\"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-content\/uploads\/sites\/3\/2023\/06\/ICT-action_security-1024x572-1.png 1024w, https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-content\/uploads\/sites\/3\/2023\/06\/ICT-action_security-1024x572-1-300x168.png 300w, https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-content\/uploads\/sites\/3\/2023\/06\/ICT-action_security-1024x572-1-768x429.png 768w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>            <\/div>\n                            <\/div>\n        <\/div>\n    <\/section>\n                    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity \u2013 making online lives safer and more secure for all<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":29,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"obsolete-templates\/page-submenu.php","meta":{"footnotes":""},"class_list":["post-32","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/pages\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":0,"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/pages\/32\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/pages\/29"}],"wp:attachment":[{"href":"https:\/\/www.itu.int\/highlights-report-activities\/2022-2023\/wp-json\/wp\/v2\/media?parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}