T R U S T A N D C O N F I D E N C E I N C Y B E R S P A C E William McCrum Phone:+1 613-990-4493 Fax:+1 613-957-8845

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Meeting of the Working Group Statistics on the Information Society October 6-7, 2005, Luxembourg ITUs statistical work The path towards information society.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Botswana Policy Statement at the WSIS+10 Honourable Nonofo E. Molefhi Minister of Transport and Communications.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Lisbon, Portugal 22 April 2009 Alexander Ntoko Head, Corporate Strategy Division International Telecommunication Secretary-General’s Report to WTPF 2009.
A Case Study of Kenya’s National Broadband Strategy
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
DOCUMENT #:GSC15-PLEN-08 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (4.5) CONTACT(S):Jim MacFie ISACC Activities Since GSC-14 Jim MacFie.
Committed to Connecting the World 1 Joint ITU/G3ict/DCAD Workshop 89 Multi-Stakeholder Engagement: Imperative for Accessibility The ITU-G3ict Model ICT.
© ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 ICTs – Challenges and Opportunities for Africa Alexander NTOKO Chief,
Chaesub Lee, Director ITU Telecommunication Standardization Bureau,
The digital economy: developments in participation and productivity Chris Chapman ACMA Digital Economy Workshop Wednesday 10 Sept 2008 Melbourne.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
1 ITU/EBU Meeting of High-Level Experts on Competitive Platforms for the Delivery of Digital Content Participative web: User-created content Graham Vickery.
Confidential © IDA Singapore APEC-OECD Cooperative Initiative on Regulatory Reform February 2001 Singapore.
ECMM 6010, Fall 2005 Intro 1 Technology issues in Electronic Commerce 1.Basic Networking: How does the internet work 2.Web programming: JavaScript, PHP,
ITU Focal Point for Emergency Telecommunications
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Ng Regenie Fräser Secretary General October 29, 2008 Connecting the Caribbean & Caribbean Internet Forum.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
T R U S T A N D C O N F I D E N C E I N C Y B E R S P A C E I N D U S T R Y C A N A D A P C C - I Q u i t o, E c u a d o r, M a r c h 1 6 – 1 9,
Information Warfare Playgrounds to Battlegrounds.
National Communications Commission 2006 International Digital Cities Convention - Broadband Policies and Regulatory Reform - NCC Chairman, Dr. Su Yeong-Chin.
PAKAMILE PONGWANA South Africa’s International and National Competitiveness 3-4 February 2015.
ITU-T Focus Group on Digital Financial Services 1st Athens Digital Payments Summit Athens, Greece 30 September 2015 Hiroshi Ota, Study Group Advisor, ITU.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
ITU Carla Licciardello Policy Analyst
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Frederic Maduraud European Commission DG Information Society OECD Workshop on Broadband Seoul, June 2002 “Exploiting the Broadband.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
2010 Ministry of Economic Development of Georgia Communications and IT Department Overview of the Georgian ICT Sphere and its Future Development Irakli.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
GSC Global Standards Collaboration GSC August – 2 September 2005 Sophia Antipolis, France August 28 – September 2, ISACC Opening Plenary Presentation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Information Warfare Playgrounds to Battlegrounds.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
GSC9_011 Bill McCrum Executive Secretary TSACC Since GSC 8.
Geneva, Switzerland, September 2014 Towards a partnership-based framework for secure ICT Infrastructure in developing countries Bill McCrum Senior.
International Telecommunication Union Partners in Transition 22 nd Annual Telecommunications Conference and Trade Exhibition, CANTO Punta Cana, Dominican.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Strategy To Action November 13, 2012 Steve Peters Steve Peters Arizona Telecommunications and Information Council.
Broadband Challenges 2017 Christopher Tamarin
WTSA-12 Resolutions addressing security
ISACC Activities Since GSC-16
WTSA-12 Resolutions addressing security
ITU an Overview Combined International SNO and 8th African SNO
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
ISACC Activities Since GSC-16
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Presentation transcript:

T R U S T A N D C O N F I D E N C E I N C Y B E R S P A C E William McCrum Phone: Fax:

TSACC -2

C i t i z e n s, B u s i n e s s e s a n d G o v e r n m e n t s a r e G o i n g O n – L i n e 100% of schools and libraries connected 400,000 computers to schools 12,000 volunteer organizations 7,000 CAP sites 12 Smart Communities CA*net3: World’s 1st research optical Internet backbone-40GHz CA*net4: Initial network capacity of 4-8 times CA*net3 62% Households (HIUS 2003) & 75% SMEs Use the Internet (CFIB 2003) Amongst lowest communications costs in the OECD (OECD, 2003) # 1 in GOL (Accenture 2001, 2002, 2003) 100% of schools and libraries connected 400,000 computers to schools 12,000 volunteer organizations 7,000 CAP sites 12 Smart Communities CA*net3: World’s 1st research optical Internet backbone-40GHz CA*net4: Initial network capacity of 4-8 times CA*net3 62% Households (HIUS 2003) & 75% SMEs Use the Internet (CFIB 2003) Amongst lowest communications costs in the OECD (OECD, 2003) # 1 in GOL (Accenture 2001, 2002, 2003) C a n a d a i s a N e t w o r k e d N a t i o n T R U S T A N D C O N F I D E N C E TSACC-3

e-health e-government e-business e-content e-learning e-research e-meeting B r o a d b a n d, T h e N e x t C h a l l e n g e B r o a d b a n d, T h e N e x t O p p o r t u n I t y T R U S T A N D C O N F I D E N C E Platform for Innovation and Inclusion TSACC -4

South Korea 1000 km Served Community 1584 (29%) Unserved Community 3842 (71%) Total 5426 TSACC -5 Broadband Access Uneven T R U S T A N D C O N F I D E N C E

Next Generation Networks Voice Over IP Peer to Peer GPS WiFi Mesh Networks 3G Ultra Wide Band Broadband Power Line (BPL) Software Defined Radio Next Generation Networks Voice Over IP Peer to Peer GPS WiFi Mesh Networks 3G Ultra Wide Band Broadband Power Line (BPL) Software Defined Radio N e w T e c h n o l o g I e s... T R U S T A N D C O N F I D E N C E N e w V u l n e r a b i l i t y a n d S e c u r i t y I s s u e s TSACC -6 Smart Dust (RFID) New Satellites Satellite Radio Digital Audio Broadcasts DTV/HDTV PVR Video On Demand Grid Computing Quantum Computing Bio Computing Nanotechnology Smart Dust (RFID) New Satellites Satellite Radio Digital Audio Broadcasts DTV/HDTV PVR Video On Demand Grid Computing Quantum Computing Bio Computing Nanotechnology

Privacy Legal Framework Enforcement C h a l l e n g e s o f C y b e r s p a c e T R U S T A N D C O N F I D E N C E I n c r e a s e d C o n n e c t i v i t y = D e c r e a s e d S e c u r i t y TSACC -7 Infrastructure User Content Vulnerability Threats

Telecom Infrastructure Information Security Privacy Spam Illegal and Offensive Content Extraterritoriality “War Driving” Black/Grey Market Lawful Access Cyber Attacks Telecom Infrastructure Information Security Privacy Spam Illegal and Offensive Content Extraterritoriality “War Driving” Black/Grey Market Lawful Access Cyber Attacks C h a l l e n g e s F o r G o v e r n m e n t T R U S T A N D C O N F I D E N C E TSACC -8

Effects of Deregulation Reduced trust Reduced profit margins Reduced investment Reduced security Vulnerable Architecture Effects of Deregulation Reduced trust Reduced profit margins Reduced investment Reduced security Vulnerable Architecture T e l e c o m I n f r a s t r u c t u r e C h a l l e n g e s T R U S T A N D C O N F I D E N C E S e c u r e T e l e c o m I n f r a s t r u c t u r e i s F u n d a m e n t a l t o S o c i e t y TSACC -9

 Privacy/Security tensions  Ensure security, but minimize information collected, used and disclosed  International harmonization  Promote global privacy standards such as OECD Privacy Guidelines  Privacy/Security tensions  Ensure security, but minimize information collected, used and disclosed  International harmonization  Promote global privacy standards such as OECD Privacy Guidelines P r i v a c y C h a l l e n g e s T R U S T A N D C O N F I D E N C E D e l i c a t e B a l a n c e B e t w e e n P r i v a c y a n d S e c u r i t y TSACC -10

T R U S T A N D C O N F I D E N C E TSACC -11 A O L ‘ s D a i l y S p a m P r o b l e m s Source: AOL Spam s blocked daily s delivered daily to subscribers 780 Million 677 Million S p a m, T h e “ K I L L E R " A p p l i c a t i o n

Hijacking of someone else’s Wi-Fi connection Using hijacked connection for illegal activities (e.g. child pornography) November 24, 2003, Toronto First Canadian Charges for Theft of Telecommunications This problem will only intensify: 2002 revenue of Wi-Fi sales was $2 billion Compounded annual growth rate of 30% is projected through to Source: Infonetics Research, San Jose Hijacking of someone else’s Wi-Fi connection Using hijacked connection for illegal activities (e.g. child pornography) November 24, 2003, Toronto First Canadian Charges for Theft of Telecommunications This problem will only intensify: 2002 revenue of Wi-Fi sales was $2 billion Compounded annual growth rate of 30% is projected through to Source: Infonetics Research, San Jose “ W a r D r i v i n g ” T R U S T A N D C O N F I D E N C E W h o ’ s U s I n g Y o u r N e t w o r k... F o r W h a t ? TSACC -12

Incidents Reported Aug Jan 2001 MarMayJulSepNovJan 2002 MarMayJulSepNovJan 2003 MarMayJul Oct Incidents Reported to CanCERT Apr Oct 2003 This graph depicts the number of incidents reported to CanCERT (Canada’s Computer Emergency Response Team), per month, during the period 1 April 2000 to 31 October The majority of these incidents are reported to CanCERT by international incident response teams who are members of FIRST (Forum of Incident Response and Security Teams), or by Canadian businesses and schools. TSACC -13 A t t a c k s O n O u r N e t w o r k s I n c r e a s i n g T R U S T A N D C O N F I D E N C E

Coordinated national strategies for cyber security Collaborate with industry to develop countermeasure strategies Develop plan to enable emergency response Develop education and prevention policy Coordinate international cooperation Coordinated national strategies for cyber security Collaborate with industry to develop countermeasure strategies Develop plan to enable emergency response Develop education and prevention policy Coordinate international cooperation G o v e r n m e n t R o l e T R U S T A N D C O N F I D E N C E TSACC -14 L e a d e r s h i p

Established: New Ministry of Public Safety and Emergency Preparedness Office of Critical Infrastructure Protection and Emergency Preparedness (OCIPEP) Legal framework and enforcement capability Close co-operation with Industry Established: New Ministry of Public Safety and Emergency Preparedness Office of Critical Infrastructure Protection and Emergency Preparedness (OCIPEP) Legal framework and enforcement capability Close co-operation with Industry I n C a n a d a T R U S T A N D C O N F I D E N C E TSACC -15 N e w G o v e r n m e n t N e w A p p r o a c h

Must have the right policy environment to ensure trust and confidence The road ahead includes engagement at: OAS ITU WTSA 2004 WSIS Other forums Must have the right policy environment to ensure trust and confidence The road ahead includes engagement at: OAS ITU WTSA 2004 WSIS Other forums W e M u s t C o n t i n u e T o W o r k T o g e t h e r T R U S T A N D C O N F I D E N C E TSACC -16 M u s t D e m o n s t r a t e P r o g r e s s W o r l d S u m m i t o n t h e I n f o r m a t i o n S o c i e t y ( W S I S ) T u n i s

Information sharing event on Cyber Security planned for 4 th October, 2004: Security and vulnerability issues in telecommunications and information interchange Raise awareness of the critical nature of these issues Sponsored by ITU-T Information sharing event on Cyber Security planned for 4 th October, 2004: Security and vulnerability issues in telecommunications and information interchange Raise awareness of the critical nature of these issues Sponsored by ITU-T C y b e r S e c u r i t y S ymposium a t W T S A T R U S T A N D C O N F I D E N C E TSACC -17 C y b e r S e c u r i t y Symposium i n F l o r i a n o p o l i s i s an e x c e l l e n t o p p o r t u n i t y f o r C I T E L c o u n t r i e s t o p a r t i c i p a t e a n d s h a r e v i e w s f r o m t h e R e g i o n.

Target audience: Senior management responsible for telecom system design, deployment, operation, policy, regulation, standards and related matters Issues covered include: Technical – networks architectures and protocols, telecom network infrastructure Policy, regulation, legal framework, user responsibilities, etc. Target audience: Senior management responsible for telecom system design, deployment, operation, policy, regulation, standards and related matters Issues covered include: Technical – networks architectures and protocols, telecom network infrastructure Policy, regulation, legal framework, user responsibilities, etc. C y b e r S e c u r i t y Symposium a t W T S A ( C o n t ‘ d ) T R U S T A N D C O N F I D E N C E TSACC -18 S ymposium R e p o r t w i l l b e s u b m i t t ed t o t h e W T S A for information and action as appropriate.

Recognizing: The crucial importance of the telecommunications infrastructure to practically all forms of social and economic activity That the legacy PSTN network has a level of inherent security properties because of its hierarchical structure and built-in management systems That IP networks with their flat architecture provide much reduced separation between users and network components That the converged legacy network and IP networks is therefore potentially more vulnerable to intrusion Recognizing: The crucial importance of the telecommunications infrastructure to practically all forms of social and economic activity That the legacy PSTN network has a level of inherent security properties because of its hierarchical structure and built-in management systems That IP networks with their flat architecture provide much reduced separation between users and network components That the converged legacy network and IP networks is therefore potentially more vulnerable to intrusion R e s o l u t i o n o n C y b e r s e c u r i t y T R U S T A N D C O N F I D E N C E TSACC -19

Further recognizing: That the number of cyber attacks in terms of worms, viruses, malicious intrusion and thrill-seeker intrusions is on the increase Resolves: To recommend to the ITU-T that current recommendations, and especially signaling and communications protocol Recommendations be evaluated with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment in the global telecommunications infrastructure. Further recognizing: That the number of cyber attacks in terms of worms, viruses, malicious intrusion and thrill-seeker intrusions is on the increase Resolves: To recommend to the ITU-T that current recommendations, and especially signaling and communications protocol Recommendations be evaluated with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment in the global telecommunications infrastructure. R e s o l u t i o n o n C y b e r s e c u r i t y ( C o n t ’ d ) T R U S T A N D C O N F I D E N C E TSACC -20

Industry Canada - Connecting Canadians - Consumer Connection - Strategis - Electronic Commerce - Innovation Strategy - Dot Force - Broadband - broadband.gc.ca Smart Communities - Investment Partnership Canada - Cybertipline - Illegal and Offensive Content - Industry Canada - Connecting Canadians - Consumer Connection - Strategis - Electronic Commerce - Innovation Strategy - Dot Force - Broadband - broadband.gc.ca Smart Communities - Investment Partnership Canada - Cybertipline - Illegal and Offensive Content - F o r F u r t h e r I n f o r m a t i o n T R U S T A N D C O N F I D E N C E TSACC -21