ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf

上传人:confusegate185 文档编号:802946 上传时间:2019-02-04 格式:PDF 页数:5 大小:53.42KB
下载 相关 举报
ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf_第1页
第1页 / 共5页
ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf_第2页
第2页 / 共5页
ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf_第3页
第3页 / 共5页
ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf_第4页
第4页 / 共5页
ITU-T RESOLUTION 50-2008 Cybersecurity《网络安全 17号研究组》.pdf_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

1、 International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Johannesburg, 21-30 October 2008 Resolution 50 Cybersecurity FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency

2、 in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to

3、 standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. ITU 2009 All rights reserved. No part

4、 of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. WTSA-08 Resolution 50 1 RESOLUTION 50 Cybersecurity (Florianpolis, 2004; Johannesburg, 2008) The World Telecommunication Standardization Assembly (Johannesburg, 2008), considering a) the cru

5、cial importance of the information and communication technologies (ICT) infrastructure to practically all forms of social and economic activity; b) that the legacy public switched telephone network (PSTN) has a level of inherent security properties because of its hierarchical structure and built-in

6、management systems; c) that IP networks provide reduced separation between user components and network components if adequate care is not taken in the security design and management; d) that the converged legacy networks and IP networks are therefore potentially more vulnerable to intrusion if adequ

7、ate care is not taken in the security design and management of such networks; e) that the type and number of cyberincidents, including attacks from worms, viruses, malicious intrusions and thrill-seeker intrusions are on the increase, considering further a) that Recommendation ITU-T X.1205 “Overview

8、 of Cybersecurity“ provides a definition, a description of technologies, and network protection principles; b) that Recommendation ITU-T X.805 provides a systematic framework for identifying security vulnerabilities that, together with many new security-related deliverables from ITU and other organi

9、zations, can assist in risk assessment and in the development of mechanisms to mitigate risks; c) that the ITU Telecommunication Standardization Sector (ITU-T) and the Joint Technical Committee for Information Technology (JTC 1) of the International Organization for Standardization (ISO) and the Int

10、ernational Electrotechnical Commission (IEC) already have a significant body of published materials and ongoing work that is directly relevant to this topic, which needs to be taken into account, recognizing a) the relevant outcomes of the World Summit on the Information Society (WSIS) identified IT

11、U as the facilitator and moderator for Action Line C5 (Building confidence and security in the use of ICTs); b) the resolves paragraph of Resolution 130 (Rev. Antalya, 2006) of the Plenipotentiary Conference on strengthening the role of ITU in building confidence and security in the use of informati

12、on and communication technologies, and the instruction to intensify work within the ITU study groups; c) that Programme 3 adopted by the World Telecommunication Development Conference (Doha, 2006) (WTDC-06) includes cybersecurity as one of its priority activities, and that Question 22/1 of the ITU T

13、elecommunication Development Sector (ITU-D) addresses the issue of securing information and communication networks through the identification of best practices for developing a culture of cybersecurity; d) that the ITU Global Cybersecurity Agenda (GCA) promotes international cooperation aimed at pro

14、posing strategies for solutions to enhance confidence and security in the use of ICTs, 2 WTSA-08 Resolution 50 recognizing further a) that new cyberattacks such as phishing, pharming, botnets, distributed denials of service, etc., are emerging and having serious impacts; b) that the source of attack

15、 for spoofed IP addresses needs to be identifiable, noting a) the vigorous activity and interest in the development of security standards and Recommendations in ITU-T Study Group 17 and in other standardization bodies, including the Global Standards Collaboration (GSC) group; b) that there is a need

16、 for national, regional and international strategies and initiatives to be harmonized to the extent possible, in order to avoid duplication and to optimize the use of resources; c) that cooperation and collaboration among organizations addressing security issues can promote progress and contribute t

17、o building and maintaining a culture of cybersecurity, resolves 1 that ITU-T continue to evaluate existing and evolving new Recommendations, and especially signalling and telecommunication protocol Recommendations, with respect to their robustness of design and potential for exploitation by maliciou

18、s parties to interfere destructively with their deployment in the global information and telecommunication infrastructure; 2 that ITU-T continue to raise awareness, within its area of operation and influence, of the need to defend information and telecommunication systems against the threat of cyber

19、attack, and continue to promote cooperation among appropriate international and regional organizations in order to enhance exchange of technical information in the field of information and telecommunication network security; 3 that ITU-T should work closely with ITU-D, particularly in the context of

20、 Question 22/1; 4 that ITU-T Recommendations, including X.805 and X.1205, ISO/IEC products/standards and other relevant deliverables from other organizations, be used as a framework for assessing networks and protocols for security vulnerabilities and to share experiences; 5 that concerned parties a

21、re invited to work together to develop standards and guidelines in order to protect against cyberattacks such as botnet, etc., and facilitate tracing the source of an attack; 6 that global, consistent and interoperable processes for sharing incident-response related information should be promoted; 7

22、 that ITU-T study groups continue to provide regular updates to the Telecommunication Standardization Advisory Group on progress in evaluating existing and evolving new Recommendations; 8 that ITU-T study groups continue to liaise with other bodies active in this field, such as ISO/IEC JTC1, the Org

23、anisation for Economic Co-operation and Development (OECD), the Asia-Pacific Economic Cooperation Telecommunication and Information Working Group (APEC-TEL) and the Internet Engineering Task Force (IETF), instructs the Director of the Telecommunication Standardization Bureau 1 to prepare, in buildin

24、g upon the information base associated with the ICT Security Standards Roadmap and the ITU-D efforts on cybersecurity, and with the assistance of other relevant organizations, an inventory of national, regional and international initiatives and activities to promote, to the maximum extent possible,

25、the worldwide harmonization of strategies and approaches in this critically important area; WTSA-08 Resolution 50 3 2 to report annually to the ITU Council, as specified in Resolution 130 (Rev. Antalya, 2006), on progress achieved in the actions outlined above, further instructs the Director of the

26、Telecommunication Standardization Bureau 1 to continue to follow up WSIS cybersecurity activities, in cooperation with relevant stakeholders, as a way to share information on national, regional and international and non-discriminatory cybersecurity-related initiatives globally; 2 to continue to coop

27、erate with the Secretary-Generals initiative on cybersecurity, and with the Telecommunication Development Bureau in relation to any item concerning cybersecurity in accordance with WTDC Resolution 45 (Doha, 2006), and to ensure coordination among these different activities, invites Member States, Sector Members and Associates, as appropriate to participate actively in the implementation of this resolution and the associated actions.

展开阅读全文
相关资源
猜你喜欢
  • GOST 13112-1983 Die bases for cold plastic working dies with guide posts rear located Construction and dimensions《带后导柱和衬套的板材冲模用料板 结构及尺寸》.pdf GOST 13112-1983 Die bases for cold plastic working dies with guide posts rear located Construction and dimensions《带后导柱和衬套的板材冲模用料板 结构及尺寸》.pdf
  • GOST 13113-1983 Die bases for cold plastic working dies with guide posts located on central line Construction and dimensions《带中间导柱和衬套的板材冲模用料板 结构及尺寸》.pdf GOST 13113-1983 Die bases for cold plastic working dies with guide posts located on central line Construction and dimensions《带中间导柱和衬套的板材冲模用料板 结构及尺寸》.pdf
  • GOST 13114-1975 Die plate without shelves for cold plastic working dies Construction and dimensions《板材冲模用无托架料板 结构及尺寸》.pdf GOST 13114-1975 Die plate without shelves for cold plastic working dies Construction and dimensions《板材冲模用无托架料板 结构及尺寸》.pdf
  • GOST 13115-1975 Die plates with shelves located along the width of cold plastic working dies Construction and dimensions《板材冲模用宽向带托架料的板 结构及尺寸》.pdf GOST 13115-1975 Die plates with shelves located along the width of cold plastic working dies Construction and dimensions《板材冲模用宽向带托架料的板 结构及尺寸》.pdf
  • GOST 13116-1975 Die plates with shelves located along the length of the die plate for cold plastic working dies Construction and dimensions《板材冲模用长向带托架的料板 结构及尺寸》.pdf GOST 13116-1975 Die plates with shelves located along the length of the die plate for cold plastic working dies Construction and dimensions《板材冲模用长向带托架的料板 结构及尺寸》.pdf
  • GOST 13118-1983 Guide posts smooth for cold plastic working dies Construction and dimensions《低温塑料加工模用导柱 结构和尺寸规格》.pdf GOST 13118-1983 Guide posts smooth for cold plastic working dies Construction and dimensions《低温塑料加工模用导柱 结构和尺寸规格》.pdf
  • GOST 13119-1981 Die posta with flute for cold plastic working dies Construction and dimensions《低温塑料加工模用带槽导柱 结构和尺寸规格》.pdf GOST 13119-1981 Die posta with flute for cold plastic working dies Construction and dimensions《低温塑料加工模用带槽导柱 结构和尺寸规格》.pdf
  • GOST 13120-1983 Guide bushes smooth for cold plastic working dies Construction and dimensions《板材冲模 光滑导向衬套 结构及尺寸》.pdf GOST 13120-1983 Guide bushes smooth for cold plastic working dies Construction and dimensions《板材冲模 光滑导向衬套 结构及尺寸》.pdf
  • GOST 13121-1983 Guide bushes with shoulders for cold plastic working dies Construction and dimensions《低温塑料加工模用带肩导套 结构和尺寸规格》.pdf GOST 13121-1983 Guide bushes with shoulders for cold plastic working dies Construction and dimensions《低温塑料加工模用带肩导套 结构和尺寸规格》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1