|
ITU Membership has been calling for a greater role to be played by ITU in
matters relating to cybersecurity through various Resolutions, Decisions, Programmes and Recommendations:
-
Resolution 71 of the ITU Plenipotentiary Conference (Antalya, 2006)
This Resolution outlines the Strategic Plan for the Union for
2008-2011, including its mission and nature, strategic
orientations and goals and detailed objectives for the Sectors.
Under Goal 4, ITU should specifically engage in “developing
tools, based on contributions from the membership, to promote
end-user confidence, and to safeguard the efficiency, security,
integrity and interoperability of networks”, with information
and communication network efficiency and security defined as
including, inter alia, spam, cybercrime, viruses, worms and
Denial-of-Service attacks. Under Objective 3, ITU General
Secretariat has been tasked to facilitate the internal
coordination of activities among the three Sectors where work
programmes are overlapping or are related, so as to assist the
membership in ensuring that it benefits from the full complement
of expertise available within the Union.
-
Resolution 130 of the ITU Plenipotentiary Conference (Revised, Antalya, 2006)
“Strengthening the role of ITU in building confidence and security in the use of
information and communication technologies”
-
Doha Action Plan Programme 3 of World Telecommunication
Development Conference (WTDC 2006) Programme 3
“E-strategies and ICT applications”, “Cybersecurity: Enhance security and build confidence in the use of ICT applications”
-
Resolution 2 of the ITU World Telecommunication Development Conference (Doha, 2006)
Annex 2 of Resolution 2 resolves that Study Group 1 will study the
Question 22/1 “Securing information and communication networks:
best practices for developing a culture of cybersecurity.”
-
Resolution 50 of the ITU World Telecommunication Standardization Assembly (Florianopolis, 2004)
“Cybersecurity.”
-
Resolution 149 of the ITU Plenipotentiary Conference (Antalya, 2006)
“Study of definitions and
terminology relating to building confidence and security in the
use of information and communication technologies”.
-
ITU-T Recommendation X.509
Public-key and attribute certificate
frameworks (global standard on identity management)”.
-
ITU-T X.8xx Series Recommendations
Global standards on key
security aspects including authentication, access control,
non-repudiation, confidentiality, integrity, audits and security
architecture for systems providing end-to-end communications.
-
Resolution 45 of the ITU World Telecommunication Development Conference (Doha, 2006)
Mechanisms
for enhancing cooperation on cybersecurity, including combating
spam”.
-
Resolution 51 of the ITU World Telecommunication Standardization Assembly (Florianopolis, 2004)
“Combating spam”.
-
Resolution 52 of the ITU World Telecommunication Standardization Assembly (Florianopolis, 2004)
“Countering spam by technical means”.
-
ITU-R Recommendation M. 1457
Security mechanisms incorporated in IMT-2000”.
-
ITU-R Recommendation S.1711
“Performance enhancements of transmission control protocol over satellite networks”.
-
ITU-R Recommendation M. 1645
“Framework and overall objectives of
the future development of IMT 2000 and systems beyond IMT 2000”
-
ITU-R Recommendation M. 1223
“Evaluation of security mechanisms for IMT-2000”.
-
ITU-R Recommendation S.1250
“Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service “.
- ITU-R Recommendation M. 1078
“Security principles for IMT-2000”.
|