ImageVerifierCode 换一换
格式:PDF , 页数:5 ,大小:53.42KB ,
资源ID:802946      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-802946.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf)为本站会员(confusegate185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf

1、 International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Johannesburg, 21-30 October 2008 Resolution 50 Cybersecurity FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency

2、 in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to

3、 standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. ITU 2009 All rights reserved. No part

4、 of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. WTSA-08 Resolution 50 1 RESOLUTION 50 Cybersecurity (Florianpolis, 2004; Johannesburg, 2008) The World Telecommunication Standardization Assembly (Johannesburg, 2008), considering a) the cru

5、cial importance of the information and communication technologies (ICT) infrastructure to practically all forms of social and economic activity; b) that the legacy public switched telephone network (PSTN) has a level of inherent security properties because of its hierarchical structure and built-in

6、management systems; c) that IP networks provide reduced separation between user components and network components if adequate care is not taken in the security design and management; d) that the converged legacy networks and IP networks are therefore potentially more vulnerable to intrusion if adequ

7、ate care is not taken in the security design and management of such networks; e) that the type and number of cyberincidents, including attacks from worms, viruses, malicious intrusions and thrill-seeker intrusions are on the increase, considering further a) that Recommendation ITU-T X.1205 “Overview

8、 of Cybersecurity“ provides a definition, a description of technologies, and network protection principles; b) that Recommendation ITU-T X.805 provides a systematic framework for identifying security vulnerabilities that, together with many new security-related deliverables from ITU and other organi

9、zations, can assist in risk assessment and in the development of mechanisms to mitigate risks; c) that the ITU Telecommunication Standardization Sector (ITU-T) and the Joint Technical Committee for Information Technology (JTC 1) of the International Organization for Standardization (ISO) and the Int

10、ernational Electrotechnical Commission (IEC) already have a significant body of published materials and ongoing work that is directly relevant to this topic, which needs to be taken into account, recognizing a) the relevant outcomes of the World Summit on the Information Society (WSIS) identified IT

11、U as the facilitator and moderator for Action Line C5 (Building confidence and security in the use of ICTs); b) the resolves paragraph of Resolution 130 (Rev. Antalya, 2006) of the Plenipotentiary Conference on strengthening the role of ITU in building confidence and security in the use of informati

12、on and communication technologies, and the instruction to intensify work within the ITU study groups; c) that Programme 3 adopted by the World Telecommunication Development Conference (Doha, 2006) (WTDC-06) includes cybersecurity as one of its priority activities, and that Question 22/1 of the ITU T

13、elecommunication Development Sector (ITU-D) addresses the issue of securing information and communication networks through the identification of best practices for developing a culture of cybersecurity; d) that the ITU Global Cybersecurity Agenda (GCA) promotes international cooperation aimed at pro

14、posing strategies for solutions to enhance confidence and security in the use of ICTs, 2 WTSA-08 Resolution 50 recognizing further a) that new cyberattacks such as phishing, pharming, botnets, distributed denials of service, etc., are emerging and having serious impacts; b) that the source of attack

15、 for spoofed IP addresses needs to be identifiable, noting a) the vigorous activity and interest in the development of security standards and Recommendations in ITU-T Study Group 17 and in other standardization bodies, including the Global Standards Collaboration (GSC) group; b) that there is a need

16、 for national, regional and international strategies and initiatives to be harmonized to the extent possible, in order to avoid duplication and to optimize the use of resources; c) that cooperation and collaboration among organizations addressing security issues can promote progress and contribute t

17、o building and maintaining a culture of cybersecurity, resolves 1 that ITU-T continue to evaluate existing and evolving new Recommendations, and especially signalling and telecommunication protocol Recommendations, with respect to their robustness of design and potential for exploitation by maliciou

18、s parties to interfere destructively with their deployment in the global information and telecommunication infrastructure; 2 that ITU-T continue to raise awareness, within its area of operation and influence, of the need to defend information and telecommunication systems against the threat of cyber

19、attack, and continue to promote cooperation among appropriate international and regional organizations in order to enhance exchange of technical information in the field of information and telecommunication network security; 3 that ITU-T should work closely with ITU-D, particularly in the context of

20、 Question 22/1; 4 that ITU-T Recommendations, including X.805 and X.1205, ISO/IEC products/standards and other relevant deliverables from other organizations, be used as a framework for assessing networks and protocols for security vulnerabilities and to share experiences; 5 that concerned parties a

21、re invited to work together to develop standards and guidelines in order to protect against cyberattacks such as botnet, etc., and facilitate tracing the source of an attack; 6 that global, consistent and interoperable processes for sharing incident-response related information should be promoted; 7

22、 that ITU-T study groups continue to provide regular updates to the Telecommunication Standardization Advisory Group on progress in evaluating existing and evolving new Recommendations; 8 that ITU-T study groups continue to liaise with other bodies active in this field, such as ISO/IEC JTC1, the Org

23、anisation for Economic Co-operation and Development (OECD), the Asia-Pacific Economic Cooperation Telecommunication and Information Working Group (APEC-TEL) and the Internet Engineering Task Force (IETF), instructs the Director of the Telecommunication Standardization Bureau 1 to prepare, in buildin

24、g upon the information base associated with the ICT Security Standards Roadmap and the ITU-D efforts on cybersecurity, and with the assistance of other relevant organizations, an inventory of national, regional and international initiatives and activities to promote, to the maximum extent possible,

25、the worldwide harmonization of strategies and approaches in this critically important area; WTSA-08 Resolution 50 3 2 to report annually to the ITU Council, as specified in Resolution 130 (Rev. Antalya, 2006), on progress achieved in the actions outlined above, further instructs the Director of the

26、Telecommunication Standardization Bureau 1 to continue to follow up WSIS cybersecurity activities, in cooperation with relevant stakeholders, as a way to share information on national, regional and international and non-discriminatory cybersecurity-related initiatives globally; 2 to continue to coop

27、erate with the Secretary-Generals initiative on cybersecurity, and with the Telecommunication Development Bureau in relation to any item concerning cybersecurity in accordance with WTDC Resolution 45 (Doha, 2006), and to ensure coordination among these different activities, invites Member States, Sector Members and Associates, as appropriate to participate actively in the implementation of this resolution and the associated actions.

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1