ITU Home Page International Telecommunication Union Français | Español 
Print Version 
ITU Home Page
Home : ITU News magazine
NETWORK SECURITY – OVERVIEW


ITU 020101/Eyewire

CREATING TRUST IN CRITICAL NETWORK INFRASTRUCTURES

Just how secure are our networks?


ITU 020133/Yong-Hwan Lee, TTA

As more and more information is exchanged over electronic networks, they become an increasingly interesting target for malicious intrusions...

World Cup 2002 is in its quarter-final stage as we write these lines. It is an exciting moment for those who win, and their fans. The World Cup is probably the biggest single global media event, with billions watching on television, listening to the radio, or following the results on the Internet. In the two host countries for World Cup 2002, the Republic of Korea and Japan, the main concern before and during that event is for physical security.

For football fans around the world, the main concern must surely be the reliability of the networks that broadcast the World Cup so that they can share in those moments of emotion, great joy, or disappointment.

“As more and more information is exchanged over electronic networks, they become an increasingly interesting target for malicious intrusions. On the Internet, viruses and denial of service attacks are becoming more common and virulent every day. As mobile phones become a key means of communicating, they are also vulnerable to eavesdropping,” ITU Secretary-General, Yoshio Utsumi, told participants at an ITU Strategic Planning Workshop, held in Seoul at the invitation of the Government of the Republic of Korea.

“Creating Trust in Critical Network Infrastructures” was the topic of the Seoul meeting (20–22 May 2002), which marked the eighth in a series of expert workshops carried out under the ITU New Initiatives Programme* that has been running since 1999.

The event was intended to complement a technical workshop on “Network Security”, also held in Seoul a week earlier by the ITU Telecommunication Standardization Sector (ITU–T). ITU has considerable technical expertise in many of the areas concerned by the security of info-communication networks, such as traditional telephone networks, mobile telephony and IP technology, as well as broadcasting networks .

Holding workshops away from ITU’s Geneva headquarters, at the invitation of Member States, brings ITU closer to the direct interests of its membership. The main objective of this Strategic Planning Workshop was to provide a forum for both Member States and the private sector to discuss the protection of critical network infrastructures from policy and regulatory perspectives. A further aim was to promote the international exchange of views and information, as well as to share experiences internationally.

* One of the main objectives of the ITU New Initiatives Programme is to advise the Secretary-General on new topics of a regulatory, policy or other nature of high-current interest, which cut across the work of the ITU Sectors, with a view to possible inclusion of these topics in the regular work programme of the Union. This work is reported on annually to the ITU Council, the Union’s governing body. The topics of the workshops are selected by the Secretary-General in consultation with Member States and Sector Members.

Recent events have covered the topics of multilingual domain names, Internet diffusion, IP connectivity and the licensing of third-generation mobile communication systems. This work has been supported by voluntary contributions, for instance from the Ministry of Information and Communication of the Republic of Korea and from the Ministry of Public Management, Home Affairs, Posts and Telecommunications of Japan. This assistance has enabled ITU to commission research and to create forums for its membership to examine issues of high-current international policy interest.

Mr Utsumi remarked that the global reach of communication networks had resulted in a huge increase in cybercrimes of an international nature. “Vandals and criminals are no longer restricted to a single geographic location. A hacker in one country can attack a network in another country, using tools — such as user accounts — from a third country. To counter such international threats to our information security, greater international coordination and cooperation is needed”, he remarked.


ITU 020104/PhotoDisc

Mr Utsumi went on to explain that the longer-established telecommunication community “has long had to deal with these issues” and that “generally, there are reliable security standards and procedures already in place”. He added: “The Internet, however, has gone through a less formal growth process. When problems occur in the infrastructure underlying critical applications, the Internet’s vulnerabilities are made evident. Similarly, as mobile networks are increasingly used for data communications as well as voice, a whole new set of security issues is arising.”

Seung Taik Yang, Minister of Information and Communication (Republic of Korea), remarked that the tremendous benefits of the Internet we are enjoying come at a price. “We are experiencing a rapid increase in spam mails, hacking and computer viruses brought into our lives through informatization. What is more serious is that the hostile cyberattacks on our critical network infrastructure are not only threatening the social and economic stability, but are also putting national security in danger,” he said.

ITU 020109/Yong-Hwan Lee, TTA

From left to right: Seung Taik Yang, Minister of Information and Communication, Republic of Korea; and Professor Deborah Hurley of the Harvard University Information Infrastructure Project (United States) chairing the ITU Strategic Planning Workshop.
For the purposes of the workshop, critical network infrastructures were defined as those networks, public or private, capable of transporting large quantities of data across international borders and which carry information relevant to national security and safety or information of high financial value

“Nations worldwide, aware of the seriousness of these problems, have been making a significant effort to enact laws and regulation, and to develop technologies in order to protect themselves from this cyberterrorism,” he told participants, adding that the Republic of Korea was no exception.

Indeed, the Republic of Korea has enacted the “Information Communication Infrastructure Protection Act”, which requires mandatory protection measures for the critical network infrastructure as designated by the government. It has also established an “Anti-Hacking and Virus Reporting Centre”, where incidents of hacking and viruses can be reported round-the-clock.

“But such attacks in cyberspace often go beyond nations’ boundaries and that is why, on top of the unilateral effort by each nation to counter cyberterrorism, nations should also put a top priority to a cooperative effort such as joint development of information security technologies and sharing information gained through experience. In this sense, it is obvious that international cooperation is one of the most effective ways to solve such a problem,” added the Minister.

Some 70 security experts participated in the workshop, acting in an individual capacity, including representatives of a range of regulatory and policy-making agencies, public telecommunication operators, private sector bodies, academic institutions and others. Professor Deborah Hurley of the Harvard University Information Infrastructure Project (United States) chaired the workshop.

What exactly do we mean by critical network infrastructures?

For the purposes of the workshop, critical network infrastructures were defined as those networks, public or private, capable of transporting large quantities of data across international borders and which carry information relevant to national security and safety or information of high financial value.

ITU 020108/EyeWire

Where are the weak links?

Some of the questions posed for the workshop included:

  • Is there anything about the architecture of the Internet that makes it more or less vulnerable when compared to other info-communication networks? Where are the weak links?

  • If vulnerabilities continue to emerge, what are the costs in terms of users’ loss of confidence?

  • How do we increase global awareness of the issues?

  • Do we need active global security monitoring?

  • Is securing network infrastructure a technology or policy problem — or a combination of both?

  • Do we need an integrated risk management strategy involving prevention, detection, monitoring and response? If so, what are the respective roles of the private sector and government?

  • In a world of intertwined global networks, is there a need for a coordinated, sustained and institutionalized approach to protecting critical network infrastructure?

  • How can ITU help its membership in gaining access to the information required to respond to these challenges?

Three background issues documents were prepared in advance and were presented and discussed during the workshop. These dealt with:

In addition, a number of country case studies were commissioned, covering Brazil, Canada, the Republic of Korea and the Netherlands**. These were discussed along with the experiences of other countries and regional groups, notably India, Japan, Kenya, Malaysia and the Association of South East Asian Nations (ASEAN).

The Chairman’s Report and the POLICY AND STRATEGY TRENDS  highlight the discussions and conclusions of the workshop.

** These case studies are available on the ITU website:

Brazil: www.itu.int/osg/spu/ni/security/docs/cni.06.doc
Canada: www.itu.int/osg/spu/ni/ security/docs/cni.07.doc
Republic of Korea: www.itu.int/osg/spu/ni/security/docs/cni.05.doc
The Netherlands: www.itu.int/osg/spu/ni/security/docs/cni.08.doc

 

Top - Feedback - Contact Us - Copyright © ITU 2010 All Rights Reserved
Contact for this page : Corporate Communication Unit
Updated : 2002-07-30