ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf

上传人:刘芸 文档编号:803466 上传时间:2019-02-04 格式:PDF 页数:18 大小:228.17KB
下载 相关 举报
ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf_第1页
第1页 / 共18页
ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf_第2页
第2页 / 共18页
ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf_第3页
第3页 / 共18页
ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf_第4页
第4页 / 共18页
ITU-T SERIES X SUPP 6-2009 ITU-T X 1240 series C Supplement on countering spam and associated threats (Study Group 17)《ITU-T X 290系列 关于抵制垃圾邮件和相关威胁的补充 17号研究组》.pdf_第5页
第5页 / 共18页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T Series XTELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Supplement 6(09/2009) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY ITU-T X.1240 series Supplement on countering spam and associated threats ITU-T X-series Recommendations Suppleme

2、nt 6 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.

3、699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS A

4、ND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1

5、200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 For further details, please refer to the list of ITU-T Recommendations. X series Supplement 6 (09/2009) i Sup

6、plement 6 to ITU-T X-series Recommendations ITU-T X.1240 series Supplement on countering spam and associated threats Summary Supplement 6 to ITU-T X-series Recommendations states that in order to deal effectively with spam, governments need to employ a variety of approaches, including effective laws

7、, technological tools, and consumer and business education. This supplement reviews the international forums where the issue of spam is being addressed. As a case study, for illustrative purposes, it provides some information about the way the U.S. and Japan have approached the spam problem. Source

8、Supplement 6 to ITU-T X-series Recommendations was agreed on 25 September 2009 by ITU-T Study Group 17 (2009-2012). ii X series Supplement 6 (09/2009) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and

9、 communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide bas

10、is. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resol

11、ution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this publication, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and

12、 a recognized operating agency. Compliance with this publication is voluntary. However, the publication may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the publication is achieved when all of these mandatory provisions are met. The wor

13、ds “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the publication is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that th

14、e practice or implementation of this publication may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the publication develo

15、pment process. As of the date of approval of this publication, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this publication. However, implementers are cautioned that this may not represent the latest information and are therefore str

16、ongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2010 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. X series Supplement 6 (09/2009) iii CONTENTS Page 1 Scope 1 2 References.

17、 1 3 Definitions 1 4 Abbreviations and acronyms 1 5 Conventions 2 6 Background . 2 7 National approaches to deal effectively with spam and associated threats 2 8 International (multilateral) countering spam initiatives . 3 8.1 London Action Plan 3 8.2 OECD Spam Toolkit and Council Recommendation on

18、Spam Enforcement Cooperation . 3 8.3 APEC TEL Symposium on spam . 4 9 Case study of some activities to counter spam . 4 9.1 United States . 4 9.2 Japan . 6 Bibliography. 9 X series Supplement 6 (09/2009) 1 Supplement 6 to ITU-T X-series Recommendations ITU-T X.1240 series Supplement on countering sp

19、am and associated threats 1 Scope The topic of this supplement is spam and associated threats. This supplement is intended for national administrators who are newcomers to the concept of spam and would like some basic information about it. This supplement looks at the tools that need to be employed

20、to combat spam effectively and describes the work that some international forums are doing in this area. It provides, as a case study and for illustrative purposes, a description of what the U.S. and Japan are doing to combat spam. 2 References None. 3 Definitions This supplement defines the followi

21、ng terms: 3.1 phishing: An attempt to fool an individual into going to the wrong website with the intent of stealing that individuals private information. 3.2 spam: Although there is no universally agreed definition of spam, the term is commonly used to describe unsolicited electronic bulk communica

22、tions over e-mail or mobile messaging (SMS, MMS). 4 Abbreviations and acronyms This supplement uses the following abbreviations: ADSP Author Domain Sending Practices APEC TEL Asia-Pacific Economic Community Telecommunication and Information Working Group CAN-SPAM Controlling the Assault of Non-Solic

23、ited Pornography and Marketing Act of 2003 (U.S.) CNSA Contact Network of Spam Authorities (European Union) DKIM Domain Keys Identified Mail FCC Federal Communications Commission (U.S.) FTC Federal Trade Commission (U.S.) ISP Internet Service Provider JEAG Japan Email Anti-abuse Group (Japan) LAP Lo

24、ndon Action Plan MAAWG Messaging Anti-Abuse Working Group MMS Multimedia Messaging Service MSCM Mobile Service Commercial Messages 2 X series Supplement 6 (09/2009) OECD Organisation for Economic Co-operation and Development OP25B Outbound Port 25 Blocking SMS Short Messaging Service SPF Sender Poli

25、cy Framework 5 Conventions None. 6 Background 6.1 Spam has gone from being nuisance communications containing commercial advertisements to a facilitator of a more serious cybersecurity problem. For example, spam can be a vehicle for deception, spreading malware such as viruses and spyware, and induc

26、ing consumers to provide confidential information that can later be used to commit identity theft (i.e., phishing). Spammers take advantage of the fact that they can send their messages from anywhere in the world to anyone in the world at an extremely low cost to themselves. This makes spam an inter

27、national problem that must be addressed through international cooperation. 6.2 Phishing takes advantage of the fact that, due to a basic characteristic in the Internets e-mail system1, anyone can send e-mail to anyone with almost no form of authentication. Phishing is an attempt to fool someone into

28、 going to the wrong website with the intent of stealing that individuals private information. Phishing exists in large part because sometimes people expect to receive e-mail from a popular site and they simply do not realize that the mail is not from the legitimate site. Because there is little auth

29、entication in e-mails, it is difficult to determine whether a message is legitimate without careful inspection of the message. Such careful inspection requires substantial knowledge of the underlying mechanisms used on the web. Phishing also exists because most people find it difficult to verify tha

30、t the websites they are going to are legitimate. Sometimes we do not look closely at the URL of a web page before entering sensitive information, and sometimes we just do not know what the correct URL should be. The web servers used to “phish“ sensitive information are often themselves the victims o

31、f malware, making it again extremely difficult to track phishers. 6.3 Malware, or malicious software that is made to run on a device without the knowledge or permission of the owner, is also a substantial problem. 7 National approaches to deal effectively with spam and associated threats 7.1 Nationa

32、l strategy and spam: With respect to a national strategy, countries should develop and maintain a combination of effective laws, law enforcement authorities and tools, technological tools and best practices, and consumer and business education to effectively deal with spam. 7.2 Legal and regulatory

33、foundation and spam: With respect to a legal foundation and regulatory framework, authorities that have jurisdiction over spam must have the necessary authority to investigate and take action against violations of laws related to spam that are committed from their country or cause effects in their c

34、ountry. Authorities that have jurisdiction over spam should also have mechanisms to cooperate with foreign authorities. Requests for assistance from _ 1The Internet e-mail system was designed in the 1970s when access to the Internet was limited to very few researchers and government members. There w

35、as no need to authenticate the identity of individuals sending e-mail, and therefore no effort was made to design the system to do so. While the e-mail system has evolved since then, this basic omission has been present ever since. X series Supplement 6 (09/2009) 3 foreign authorities should be prio

36、ritized based on areas of common interest and in cases where significant harm occurs. 7.3 Government-industry collaborations and promotion of national awareness of spam and associated threats: All interested persons, including enforcement authorities, businesses, industry groups, and consumer groups

37、 should cooperate in pursuing violations of laws related to spam. Government enforcement agencies should partner with industry and consumer groups to educate users and promote information sharing. Government enforcement agencies should cooperate with the private sector to promote the development of

38、technological tools to fight spam, including tools to facilitate the location and identification of spammers. Phishing is often a preventable crime. Governments should work together with the private sector to improve means of protecting citizens from phishing, and educating consumers and businesses

39、on safe authentication methods. Governments can also play a role in educating the public on the need to keep malware in check by making use of tools such as anti-virus software and by applying the latest operating system patches and trusted computing techniques. 8 International (multilateral) counte

40、ring spam initiatives Several multilateral fora are working on initiatives to combat spam. These include: 8.1 London Action Plan The U.S. Federal Trade Commission (FTC) and the U.K. Office of Fair Trading hosted an International Spam Enforcement Conference in London in 2004, which led to the creatio

41、n of a London Action Plan on international spam enforcement cooperation (LAP). As of July 2008, government agencies and private sector representatives from more than 25 countries have endorsed the plan. The LAP encourages interested parties, including spam enforcement agencies and private sector sta

42、keholders, to consider applying for membership in the organization. The purpose of the LAP is to promote international spam enforcement cooperation and address spam related problems, such as online fraud and deception, phishing, and dissemination of viruses. The LAP builds relationships among these

43、entities based on a short document that sets forth a basic work plan for improving international enforcement and education cooperation against illegal spam. This document is non-binding, asking participants only to use best efforts to move the work plan forward. http:/londonactionplan.org/ Since its

44、 inception, the LAP has held annual workshops, typically in conjunction with the European Unions Contact Network of Spam Authorities (CNSA). In October, 2007, the LAP and CNSA co-located their annual joint workshop with the Messaging Anti-Abuse Working Group (MAAWG) conference in Arlington, Virginia

45、, which facilitated increased law enforcement cooperation with the private sector. In October 2008, the LAP and CNSA co-located their annual joint workshop with Ecos 6th German Anti-Spam Summit in Wiesbaden, Germany. 8.2 OECD Spam Toolkit and Council Recommendation on Spam Enforcement Cooperation In

46、 April 2006, the OECD Spam Task Force released an Anti-Spam “Toolkit“, which contains recommendations to help policy makers, regulators and industry players orient their policies relating to spam solutions and restore trust in the Internet and e-mail. The Toolkit contains eight elements, including a

47、nti-spam regulation, industry driven solutions and anti-spam technologies, education and awareness, and global cooperation/outreach. Recognizing that international cooperation is key to combating spam, the OECD governments also approved a “Recommendation on Cross-Border Co-operation in the Enforceme

48、nt of Laws against Spam“, which urges countries to 4 X series Supplement 6 (09/2009) ensure that their laws enable enforcement authorities to share information with other countries and do so more quickly and effectively. http:/www.oecd-antispam.org/sommaire.php3. 8.3 APEC TEL Symposium on spam In Ap

49、ril 2006, APEC TEL held a symposium on “Spam and Related Threats“ that brought together thirty speakers and panelists to discuss the evolution of the spam problem and establish a common agenda of action for the TEL. The main topics addressed included: 1) the development and application of national anti-spam regulatory regimes, including enforcement and codes of practice; 2) the role of industry in combating spam, including government-industry collaboration; 3) technical responses to spam; 4) cr

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1