A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

One member called for greater recognition to be given

Info icon This preview shows pages 83–85. Sign up to view the full content.

View Full Document Right Arrow Icon
One member called for greater recognition to be given to the ongoing work of ITU-D and Q22/1, although another member suggested that Q22/1 work might not always be scalable to all countries. Recommendations: 3.1. ITU should provide assistance to developing and least developed countries in the elaboration and promotion of national policies in cybersecurity. 3.2. ITU should provide assistance to developing and least developed countries in the elaboration of national, regional and international strategies to fight against cybersecurity incidents in a global perspective; 3.3. ITU should assist governments in putting in place policies and strategies aimed at improving the coordination of cybersecurity initiatives at the national, regional and international levels; 3.4. ITU should assist countries in setting up organizational structures aimed at responding to the specific needs of countries, taking into account resource availability, public-private partnerships, and the level of ICT development in each country within the spirit of multi-stakeholder cooperation, as outlined in WSIS outcomes. One member suggested that there should be greater mention of civil society. The role of civil society is very important, especially the WSIS multi-stakeholder approach. 3.5. ITU should encourage each country to develop its own strategy and organizational structures to address its national cybersecurity needs and should promote assistance through regional and international cooperation. 3.6. Taking into account the broad nature of issues to be addressed in cybersecurity and the characteristics of cybersecurity as outlined in the work of ITU-T SG 17, ITU should support countries in establishing appropriate organizational structures and capacity-building programmes. One member suggested that the recommendations should take into account that the broadness of the cybersecurity issue (given the definition adopted by ITU-T SG 17) and may require different organizational structures, depending on the specific cybersecurity issue being addressed. 4) Capacity Building Summary : General consensus was achieved on the recommendations in WA4. One member suggested the inclusion of additional recommendations:
Image of page 83

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
75 - That the Secretary-General continue to support the work of ITU-D’s regional cybersecurity conferences that bring together key SMEs from public and private sector organizations to address critical challenges related to cyber security/CIIP. - That the Secretary-General advocate for enhancing computer science and telecommunications engineering curricula to ensure that it actually includes security as part of the core focus of study. One member suggested that recommendations should be made clearer, by drawing on more specific substance in direct relation to the other Work Areas, while another member suggested that the recommendations should be more specific with regards to which skills and which efforts are needed.
Image of page 84
Image of page 85
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern