1 / 13

It’s a new digital world

with new digital dangers…. It’s a new digital world. Cybersecurity. Global Statistics – Malware attacks 2008-2009. Reported Malware Incidents 2008-2009. Top Malware Hosting Website Categories. Top Malware Source Countries. Top Attack Sectors. Source: Symantec, Kaspersky, McAfee, Sophos.

tadhg
Télécharger la présentation

It’s a new digital world

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. with new digital dangers… It’s a new digital world

  2. Cybersecurity

  3. Global Statistics – Malware attacks 2008-2009 Reported Malware Incidents 2008-2009 Top Malware Hosting Website Categories Top Malware Source Countries Top Attack Sectors Source: Symantec, Kaspersky, McAfee, Sophos Malware:Hostile, intrusive, or annoying software or program code designed to infiltrate a computer system (virus/worms/Trojans/rootkit/backdoors/spyware). Botnets: Software agents/bots that run autonomously and automatically under a common command-and-control structure and perform malicious activities. Phishing:Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. Spamming:Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately in the form of e-mail, instant messaging etc. SQL injection:Code injection technique that exploits vulnerability in the database of an application resulting in unexpected execution of code.

  4. Building a Global Culture of Cybersecurity The World Summit on the Information Society (WSIS 2003) recognized the real and significant threat posed by inadequate confidence and security in the use of ICTs and the proliferation of cybercrime At WSIS in 2005, ITU was entrusted by leaders of the global community to be the Facilitator and Moderator of “Build confidence and security in the use of ICTs”. As a result, the Global Cybersecurity Agenda (GCA) was launched, as a framework for international cooperation on cybersecurity UN General Assembly has outlined elements for creating a global culture of cybersecurity through several resolutions, including: Resolution 64/L.8 (2009)‘Creation of a Global Culture of Cybersecurity’ (Second Committee) Resolution 64/L.39 (2009) ‘Developments in the field of information and telecommunications in the context of international security’ (First Committee)

  5. Global Cybersecurity Agenda A 5-part platform 1. Technical & procedural measures 2. Legal measures 3. Organizational structures 4. Capacity building 5. International cooperation

  6. ITU Cybersecurity Resources package: • Toolkit for Cybercrime legislation; • Understanding Cybercrime: A Guide for Developing Countries; • National Cybersecurity/Critical Information Infrastructure Protection Self-Assessment Tool; • Botnet Mitigation Toolkit; • Study on Financial Aspects of Network Security: Malware and Spam; • Toolkit for Promoting a Culture of Cybersecurity; • Child Online Protection (COP) Initiative; • International Multilateral Partnership Against Cyber Threats (IMPACT).

  7. Creating Confidence in Cyberspace Global problem which cannot be solved by any single entity(country or organization); The Information Society was built by Member States, Private Sector, Civil Society and the Media – the issue of cybersecurity must therefore be dealt with by all stakeholders ; UN agencies need to work together to ensure that WSIS goals are met and that UN is able to ‘Deliver as One’ on cybersecurity; Chief Executive Board is engaged.

  8. Recognizing the need for public trust & network security in building… an equitable, inclusive information society.

  9. More than 1 billion people are connected in cyberspace The internet and ICT’s are one of the most powerful tools the United Nations has for sustainable Peace, Security and Development

  10. Together, the UN can bolster trust and confidence in the global use of Information and Communication Technologies www.itu.int/cybersecurity

More Related