A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

One member wished to delete recommendation 216

Info icon This preview shows pages 82–84. Sign up to view the full content.

One member wished to delete recommendation 2.16. Another member understood rec. 2.16 to refer to information on security management systems, and identity management systems and certification/compliance mechanisms for potential users. This member believed that many ICT markets operate well based on supplier declarations of compliance. The selection of systems and certification/compliance mechanisms is the user’s decision - UN agencies should only undertake selection processes for their own procurement, and not select them for others. 3) Organizational Structures Summary: General consensus was reached on the recommendations for WA3, with no oppositions voiced for removal of any of the recommendations. Discussions focused on a potential framework for the evaluation and assessment of cybersecurity readiness. One member proposed that the ITU could develop a "Cybersecurity Readiness Index" based on a proposed Organizational Structures Framework including: - A national leader for coordination in cybersecurity or National Cybersecurity Council. - A national CERT/CSIRT representing either a government’s IT security infrastructure protection or a national focal point for coordination. Another member suggested that it might not be possible for every member state to create a national cybersecurity council, as there were no simple solutions. Instead, ITU could develop an assessment framework to evaluate cybersecurity. Another member suggested that ITU-D’s work might address some of these issues. One member proposed that SG could consider establishing a new ITU-D programme on capacity- building and skills for cybersecurity and CIIP that could focus on: - identifying best practices of existing programs and developing materials that respond to the needs of member states;
Image of page 82

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

74 - enhancing information security programmes for ICTs; - identifying cyber-risk assessment and risk management methods for ICTs; - developing and maintaining information regarding computer security incident response teams and capabilities for addressing changing threats in ICTs, especially in close collaboration with FIRST and other expert organizations. - identifying methods to support emergency preparedness and continuity planning. - The proposed programme could deliver regional workshops, skills enhancement seminars and conferences. One member further suggested that the recommendations on organizational structures should be scalable and adaptable to different actors, promoting inclusion at the international level. Another member also suggested that member countries could: - Take into account the recommendations issued from the ISO/IEC 27000-family information security standards on Information Security Management Systems to protect the confidentiality, integrity and availability of digital information and information systems. - Develop and adopt national cybersecurity policies and strategies, and to mobilize the required resources for implementing them, with the support of the relevant stakeholders including government, private sector, academia and civil society.
Image of page 83
Image of page 84
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Law, .........

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern