Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
ITU-D STUDY GROUPS A unique and neutral worldwide Forum where developed and developing countries meet to study through Questions matters of priority to.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
Cloud computing security related works in ITU-T SG17
Security Controls – What Works
Telecommunication Development Bureau ITU and ICT Development Trieste, 9 February 2004 Hamadoun I. Touré Director BDT.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
National Cybersecurity Management System
Arkadiy Kremer Chairman ITU-T Study Group 17 Session 2: Role of Standardization in Cybersecurity.
Overview of ITU-T Study Group 5 “Environment and Climate Change” Cristina Bueti, Adviser, ITU.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Session 4.2 Creation of national ICT security infrastructure for developing countries Industry-wide approach: Raising awareness for ICT security infrastructure.
SEC835 Database and Web application security Information Security Architecture.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
WTSA 2012 World Telecommunications Standardization Assembly Debriefing, Durban 2013 WTSA-12 Action Plan for Africa By Dr. Sherif Guinena Advisor to NTRA.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
2010 Ministry of Economic Development of Georgia Communications and IT Department Overview of the Georgian ICT Sphere and its Future Development Irakli.
1 International Telecommunication Union ITU CHALLENGES AND RESPONSES (Fabio Bigi – TSB Deputy Director) (
ENISA efforts for securing European Internet Infrastructure
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Country case study: The Netherlands The views expressed in this paper are those of the authors and do not necessarily reflect the opinions of the ITU,
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Regulatorna agencija za komunikacije Регулаторна агенција за комуникације Communications Regulatory Agency Community access to ICT measuring,
RCC Preparations WCIT-12 Dmitry Cherkesov (Russia) Deputy Head of RCC WP for WCIT-12 Com-ITU Meeting 6 – 8 September 2011 Lisbon, Portugal.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
Securing Information Systems
Regional Commonwealth in the field of Communications
A proposed Security Incident Management Process for WMO Member States
Cybersecurity - What’s Next? June 2017
WTSA-12 Resolutions addressing security
WTSA-12 Resolutions addressing security
Cyber Security coordination in Europe CERT-EU’s perspective
Securing Information Systems
ITU-T Study Group 17 Security
Promoting Global Cybersecurity
Flood Forecasting Initiative
Challenges and Successes in the Zambian ICT Security Sector
Challenges for Regulators: Some ITU Resources
Initiatives of TSB to implement WTSA-08 Resolutions
Malcolm Johnson, Director, Telecommunication Standardization Bureau
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010

National Center for Network Security National administrations are attempting to build confidence and security in the use of information and communication technologies (ICTs). Due to convergence and mobility, telecommunications carrier networks and the associated information systems are exposed to new classes of security threats. 3 Geneva, 6-7 December 2010Addressing security challenges on a global scale

NCNS The risks associated with globally interconnected networks require concerted responses from nations. Member States over the past decade have repeatedly affirmed the need for international cooperation against threats in the sphere of ICT security in order to combat the criminal misuse of information technology, to create a global culture of cyber security, and to promote other essential measures that can reduce risk. 4 Geneva, 6-7 December 2010Addressing security challenges on a global scale

5 Geneva, 6-7 December 2010 NCNS services can be grouped into three categories: Reactive services. These services are triggered by an event or request, such as a report of a compromised host, wide-spreading malicious code, software vulnerability, or something that was identified by an intrusion detection or logging system. Reactive services are the core component of NCNS work. Proactive services. These services provide assistance and information to help prepare, protect, and secure constituent systems in anticipation of attacks, problems, or events. Performance of these services will directly reduce the number of incidents in the future. Security quality management services. These services augment existing and well-established services that are independent of incident handling and traditionally performed by other areas of an organization such as the IT, audit, or training departments.

6 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Informal definition: NCNS that acts as national point of contact (PoC) for information sharing (like incident reports, vulnerability information and other) with other national security centers the ITU Member States and worldwide. NCNS can be considered as “center of last resort”, which is just another definition of a unique national PoC with a coordinating role. In a lot of cases a national security network center also acts as governmental center.

7 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Identification of challenges that may be faced by developing countries with respect to creating these centers: Access to new technologies (in information security too), High-value solution, (not based on open software), Lack of incremental design, Different laws (NDA), Retraining experts (particular R&D department),

8 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Moreover National IP-based Public Networks security center for developing countries is under study by SG 17 RESOLUTION 130 (REV. GUADALAJARA, 2010) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies

9 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Consider the possible need for ITU Recommendations. -Recommendation (New Standard) for cooperation and security exchange between NCNS and over security bodies, -Recommendation (New Standard) for architecture of NCNS, - Guidance for organization security cooperation and coordination.

10 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 NCNS NCNs Internet Telco security BCP\DRP SPAM (include SMS/MMS) Anti-Fraud infrastructure attacks attacks in signaling networks hacking of exchange protocols Network operators (mobile, fixed,conver.) CIRT\CERT FIINA CFCA SOC POLICE Vendor TEM

11 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Dmitry Kostrov JSC “MTS” THANKS !