Global Cybersecurity Agenda

From Wikipedia, the free encyclopedia

On 17 May 2007, the International Telecommunication Union launched the Global Cybersecurity Agenda (GCA) [1], to provide a framework within which the international response to the growing challenges to cybersecurity can be coordinated and addressed. The Global Cybersecurity Agenda represents an initiative by the ITU to develop a comprehensive framework for international cooperation.

The ITU Secretary-General will benefit from the advice of an expert panel, the High-Level Experts Group [2], representing expertise in policy making, government, academia and the private sector. This advisory group met for the first time in Geneva, on 5 October 2007 , to develop strategies to combat cybercrime and promote cybersecurity. It will formulate proposals to the ITU Secretary-General, which will be consolidated in a Global Strategic Report.


Contents

[edit] Five pillars of the ITU Global Cybersecurity Agenda

The GCA [3] is built upon five strategic pillars [4] :

[edit] Legal measures

This work area focuses on key legal challenges and how best to coordinate legislation. It will develop guidance as to how criminal activities committed through computer networks can best be dealt with through legislation in an internationally compatible manner. This work area will develop model cybercrime legislation that is interoperable with existing national and regional legislative measures and consider how best to deal with loopholes in current legal frameworks that allow criminals to operate between countries with impunity.

[edit] Technical and procedural measures

This work area will focus on the key technical challenges arising to cybersecurity. Cyberthreats are constantly being developed to exploit technical vulnerabilities in Information Communication Technology (ICT) services and applications to gain unauthorized access to information and communication systems. Security vendors and software manufacturers work continuously to identify, resolve and reinforce weaknesses in their products. This work area focuses on technical and procedural measures for addressing vulnerabilities in software products, including accreditation schemes, protocols and standards.

[edit] Organizational structures

Countries’ ability to monitor, prevent and deal with cyberattacks depends in large part on the watch, warning and response systems and capacity that they have established. This work area will focus on optimal response strategies and the institutions that can help countries in dealing with prevention, detection, response to and crisis management of cyberattacks, including the protection of countries’ critical information infrastructure systems. This work area should develop a generic framework for functional organizational structures that can help countries deal with cyberthreats and the misuse of ICTs for malicious purposes.

[edit] Capacity-building

This work area focuses on elaborating strategies for concrete capacity-building mechanisms that can be adopted to raise awareness, transfer know-how and boost cybersecurity on the national policy agenda. User awareness, technical capacity and information exchange are some of the key factors in building cybersecurity from the grassroots upwards. This work area will consider the effective measures, awareness campaigns, training initiatives that can be undertaken to build human, technical and institutional capacity and awareness of the issues key to preserving cybersecurity.

[edit] International cooperation

This work area will develop proposals on a framework for a multi-stakeholder strategy for international cooperation, dialogue and coordination in dealing with cyberthreats. The Information Society is borderless, which means that the response mechanisms dealing with cyberthreats must be as borderless as cybercriminals’ activities. Cooperation is vital at different levels and through different means – from the monitoring of funds and transfers of the proceeds of criminal activities to cooperation in dealing with international crime syndicates and paedophilic rings.

[edit] Setting achievable goals

The Global Cybersecurity Agenda is made up of seven main strategic goals [5] :

  • Elaboration of strategies for the development of a model cybercrime legislation that is globally applicable and interoperable with existing national and regional legislative measures.
  • Elaboration of global strategies for the creation of appropriate national and regional organizational structures and policies on cybercrime.
  • Development of a strategy for the establishment of globally accepted minimum security criteria and accreditation schemes for hardware and software applications and systems.
  • Development of strategies for the creation of a global framework for watch, warning and incident response to ensure cross-border coordination between new and existing initiatives.
  • Development of global strategies for the creation and endorsement of a generic and universal digital identity system and the necessary organizational structures to ensure the recognition of digital credentials across geographical boundaries.
  • Development of a global strategy to facilitate human and institutional capacity building to enhance knowledge and know-how across sectors and in all the above-mentioned areas.
  • Proposals on a framework for a global multi-stakeholder strategy for international cooperation, dialogue and coordination in all the above-mentioned areas.

[edit] High-Level Experts Group on Cybersecurity (HLEG)

In order to assist ITU’s Secretary-General in developing strategic proposals to Member States of the ITU, he will seek the advice of the HLEG [6] on strategies in all five work areas or pillars.

The HLEG will comprise a group of high-level experts from governments, industry, relevant regional/international organizations, research institutes, academic institutions and individual experts from every part of the world appointed by the ITU Secretary-General.

The work of HLEG will be funded primarily through voluntary contributions (cash and in-kind) from its members and other donors.

[edit] Main responsibilities of HLEG to the ITU Secretary-General

  • To further develop the Global Cybersecurity Agenda, by proposing refinements to its main goals.
  • To analyse current developments in cybersecurity, including both threats and state-of-the-art solutions, anticipate emerging and future challenges, identify strategic options, and formulate proposals to the ITU Secretary-General.
  • To meet the goals of the Global Cybersecurity Agenda.
  • To provide guidance on possible long-term strategies and emerging trends in cybersecurity.

[edit] Composition of HLEG

Members of the HLEG will be nominated by the ITU Secretary-General, with due consideration to both geographical diversity and expertise in the five pillars or work areas of the Global Cybersecurity Agenda [7]. General features and characteristics of HLEG include:

  • A global multi-stakeholder think-tank made up of high level experts from governments, industry, international organizations, research and academic institutions and individual experts.
  • To ensure balance in the membership of HLEG, its members will be nominated as follows:
    • Member States – government representatives of countries from the five world regions
    • Industry – manufacturers, operators, service providers, software developers, security and other information technology firms
      • Regional/International organizations
      • Research and academic institutions
      • Individual experts

[edit] Notes

  1. ^ http://www.itu.int/cybersecurity/gca GCA Home Page
  2. ^ http://www.itu.int/osg/csd/cybersecurity/gca/hleg/ High level Experts Group
  3. ^ Cybersecurity for All, ITU's Work for a Safer World http://web.itu.int/publ/S-GEN-CYBER-2008/en
  4. ^ Five Strategic Pillars http://www.itu.int/osg/csd/cybersecurity/gca/pillars.html
  5. ^ Setting Achievable Goals http://www.itu.int/osg/csd/cybersecurity/gca/goals.html
  6. ^ The High-Level Experts Group on Cybersecurity http://www.itu.int/osg/csd/cybersecurity/gca/hleg/#responsibilities
  7. ^ First HLEG Meeting http://www.itu.int/osg/csd/cybersecurity/gca/hleg/first_meeting/index.html

[edit] References

  • United Nations General Assembly, Sixty-second session, 5th plenary meeting, A/62/PV.5, Tuesday, 25 September 2007, 3 p.m. New York
  • United Nations Educational,Scientific and Cultural Organisation, 177th session, Summary records, 177 EX/SR.1-11, Paris, 1-31 October 2007

[edit] External Links