Upload
ashley-black
View
219
Download
0
Tags:
Embed Size (px)
Citation preview
It’s a new digital worldwith new digital dangers…
Cybersecurity
Top Malware Source Countries
Rank Category
1 Business / Financial
2 Computers & Technology
3 Pornography/Sexually Explicit4 Search Engines and Portals
5 Health & Medicine
6 Education
7 Shopping
8 Personal Sites
9 Real Estate
10 Travel
Top Malware Hosting Website Categories
Source: Symantec, Kaspersky, McAfee, Sophos
Global Statistics – Malware attacks 2008-2009Reported Malware Incidents 2008-2009
Top Attack Sectors
Malware: Hostile, intrusive, or annoying software or program code designed to infiltrate a computer system (virus/worms/Trojans/rootkit/backdoors/spyware).
Botnets: Software agents/bots that run autonomously and automatically under a common command-and-control structure and perform malicious activities.
Phishing: Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
Spamming: Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately in the form of e-mail, instant messaging etc .SQL injection: Code injection technique that exploits vulnerability in the database of an application resulting in unexpected execution of code.
Building a Global Culture of Cybersecurity • The World Summit on the Information Society (WSIS 2003)
recognized the real and significant threat posed by inadequate confidence and security in the use of ICTs and the proliferation of cybercrime
At WSIS in 2005, ITU was entrusted by leaders of the global community to be the Facilitator and Moderator of “Build confidence and security in the use of ICTs”.
As a result, the Global Cybersecurity Agenda (GCA) was launched, as a framework for international cooperation on cybersecurity
UN General Assembly has outlined elements for creating a global culture of cybersecurity through several resolutions, including: Resolution 64/L.8 (2009)‘Creation of a Global Culture of
Cybersecurity’ (Second Committee) Resolution 64/L.39 (2009) ‘Developments in the field of information
and telecommunications in the context of international security’ (First Committee)
Global Cybersecurity Agenda
A 5-part platform
2. Legal measures
1. Technical & procedural measures
3. Organizational structures
4. Capacity building
5. International cooperation
ITU Cybersecurity Resources package:
• Toolkit for Cybercrime legislation;• Understanding Cybercrime: A Guide for Developing
Countries;• National Cybersecurity/Critical Information Infrastructure
Protection Self-Assessment Tool;• Botnet Mitigation Toolkit;• Study on Financial Aspects of Network Security:
Malware and Spam;• Toolkit for Promoting a Culture of Cybersecurity;• Child Online Protection (COP) Initiative; • International Multilateral Partnership Against Cyber
Threats (IMPACT).
Creating Confidence in Cyberspace
• Global problem which cannot be solved by any single entity (country or organization);
• The Information Society was built by Member States, Private Sector, Civil Society and the Media – the issue of cybersecurity must therefore be dealt with by all stakeholders ;
• UN agencies need to work together to ensure that WSIS goals are met and that UN is able to ‘Deliver as One’ on cybersecurity;
• Chief Executive Board is engaged.
Recognizing the need for public trust & network security in building…
an equitable, inclusive
information society.
More than 1 billion people are connected in cyberspace
The internet and ICT’s are one of the most powerful tools the United Nations has for sustainable Peace, Security and Development
Together, the UN can bolster trust and confidence in the global use of Information and Communication Technologies
www.itu.int/cybersecurity