Security / Cybersecurity ITU Herbert Bertine, Chairman ITU-T Study Group 17 Submission Date: July 1, 2008 Presentation FOR: GSC13-XXXX-nn DOCUMENT #: Herbert Bertine CONTACT(S): AGENDA ITEM: ITU SOURCE:
Cybersecurity – one of the top priorities of the ITU
Plenipotentiary Resolution 140 (2006), ITU’s role in implementing the outcomes of the World Summit on the Information Society – The important moderator/facilitator role of ITU in action line C5 (building confidence and security in the use of ICTs).
Plenipotentiary Resolution 149 (2006), Study of definitions and terminology relating to building confidence and security in the use of information and communication technologies
WTSA-04 Resolution 50, Cybersecurity – Instructs the Director of TSB to develop a plan to undertake evaluations of ITU-T “existing and evolving Recommendations, and especially signalling and communications protocol Recommendations with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment”
WTSA-04 Resolution 51, Combating spam – Instructs the Director of TSB to “prepare urgently a report to the Council on relevant ITU and other international initiatives for countering spam, and to propose possible follow-up actions” - Done
WTSA-04 Resolution 52, Countering spam by technical means – Instructs relevant study groups “to develop, as a matter of urgency, technical Recommendations, including required definitions, on countering spam”
Highlights of current activities (1)
ITU Global Cybersecurity Agenda (GCA)
A Framework for international cooperation in cybersecurity
ITU response to its role as sole Facilitator for WSIS Action Line C5
Five key work areas : Legal, Technical, Organisational, Capacity Building, International Cooperation
World renowned Group of High-Level Experts (HLEG) working on global strategies
GCA/HLEG met 26 June 2008 to agree upon a set of recommendations on all five work areas for presentation to ITU Secretary-General
ISO/IEC/ITU-T Strategic Advisory Group on Security
Coordinates security work and identifies areas where new standardization initiatives may be warranted. Portal established. Workshops conducted.
Effort jump started by IdM Focus Group which produced 6 substantial reports (265 pages) in 9 months
JCA –IdM and IDM-GSI established – main work is in SGs 17 and 13
First IdM Recommendation – X.1250 , Requirements for global identity management trust and interoperability - now in approval process
Core security (SG 17)
Approved 14 texts in 2007, 17 so far in 2008, 15 more for action in September 2008
Summaries of Recommendations under development are available at: http://www.itu.int/dms_pub/itu-t/oth/0A/0D/T0A0D00000D0003MSWE.doc
Covering frameworks, cybersecurity, countering spam, home networks, mobile, web services, secure applications, ISMS, telebiometrics, etc.
Work underway on additional topics including IPTV, multicast, and USN security; risk management and incident management; traceback
Questionnaire issued to developing countries to ascertain their security needs
All Study Groups have proposed Questions for next study period
Most study groups have Questions concerning security
Questions are mainly evolution of existing work program
See Supplemental Information
The World Telecommunication Standardization Assembly (WTSA) in October 2008 will make decisions on the priorities, work program (Questions) and organization of Study Groups, including security / cybersecurity work
Meanwhile, the present work program continues under the current structure – See Supplemental Information
E.g., Study Groups 17 and 13 will each meet in September to approve additional security Recommendations
A new edition of the ITU-T “Security Manual” is scheduled for October 2008
Proposed revision to Resolution
Resolution GSC-12/19, Cybersecurity
Add a new Resolves follows:
5) supply updated information on their security standards work for inclusion in the ICT Security Standards Roadmap, a database of security standards hosted by the ITU-T at: http://www.itu.int/ITU-T/studygroups/com17/ict/index.html
ITU General Secretariat
Telecommunication Standardization Sector (ITU-T)
Radiocommunication Sector (ITU-R)
Telecommunication Development Sector (ITU-D)
Useful web resources
Supplemental Information ITU General Secretariat Corporate Strategy Division
A Framework for International Cooperation in Cybersecurity ITU Global Cybersecurity Agenda
Constant evolution of the nature of cyberthreats
Issues and Challenges Major challenge is to develop harmonized and comprehensive global strategies at the international level
Vulnerabilities in software and hardware applications and services
Low entry barriers for cyber-criminals
Loopholes in current legal frameworks
Absence of appropriate organizational structures
Inadequate cooperation among various stakeholders
Global problem which cannot be solved by any single entity
(country or organization)
Increasing sophistication of cybercrime
WSIS and Cybersecurity “ Strengthening the trust framework, including information security and network security, authentication, privacy and consumer protection, is a prerequisite for the development of the Information Society and for building confidence among users of ICTs. “ WSIS Geneva Declaration of Principles, Para 35 “ We reaffirm the necessity to further promote, develop and implement in cooperation with all stakeholders a global culture of cyber-security, as outlined in UNGA Resolution 57/239 and other relevant regional frameworks.” WSIS Tunis Agenda, Para 39 Confidence and security are among the main pillars of the information society
ITU’s Role as WSIS C5 FACILITATOR At the World Summit on the Information Society (WSIS), world leaders and governments entrusted ITU to take the leading role in coordinating international efforts on cyber-security, as the sole Facilitator of Action Line C5, “ Building confidence and security in the use of ICTs” The International Telecommunication Union (ITU) provides the global perspective and expertise needed to meet the challenges, with a track record of brokering agreements between public and private interests on a level playing field ever since its inception in 1865. Third Facilitation Meeting 22-23 May 2008, ITU Headquarters, Geneva http://www.itu.int/osg/csd/cybersecurity/WSIS/3rdMeeting.html
A Global Strategy for Action The strategy for a solution must identify those existing national, regional and international initiatives, work with all relevant players to identify priorities and bring partners together with the goal of proposing global solutions to address the global challenges we face today.
A framework for international multi-stakeholder cooperation in cybersecurity
ITU Response to its role as sole Facilitator for WSIS Action Line C5
World renowned Group of High Level Experts (HLEG) to develop global strategies
Representing main stakeholder groups working towards the same goals
: Developing harmonized global strategies
ITU Global Cybersecurity Agenda (GCA)
GCA Work Areas GCA rests on five pillars or work areas:
Technical and Procedural
1 2 3 4 5
Elaboration of global strategies for 1 the development of a model cybercrime legislation 2 the creation of appropriate national and regional organizational structures and policies on cybercrime 3 the establishment of security criteria and accreditation schemes for software applications and systems 4 the creation of a global framework for watch, warning and incident response 5 the creation and endorsement of a generic and universal digital identity system 6 the facilitation of human and institutional capacity-building 7 international cooperation, dialogue and coordination High-Level Experts Group (GCA/HLEG) High-Level Expert Group (HLEG) provided advice on strategies in all five work areas or pillars
A global multi-stakeholder think-tank
made up of high-level experts from:
Regional and international organizations
Research and academic institutions
Argentina Brazil Cameroon Canada China Egypt Estonia Germany Japan India Indonesia Italy Malaysia Morocco Portugal Republic of Lithuania Russian Federation Saudi Arabia South Africa Switzerland United States
Ecole Polytechnique Fédérale de Lausanne
Information Security Institute, Australia
Moscow Technical University of
Communications, Russian Federation
African Telecommunication Union (ATU)
Asia Pacific Economic Cooperation
Council of Europe
Department of Economic and
Social Affairs (DESA)
European Information and Network
Security Agency (ENISA)
International Criminal Police
Organisation for Economic Co-operation
and Development (OECD)
Organisation International de la Francophonie
Society for the Policing of Cyberspace (POLCYB)
United Nations Institute for Training
and Research (UNITAR)
United Nations Office on Drugs and Crime
BITEK International Inc.
Stein Schjolberg, Chief Judge,
Moss Tingrett Court, Norway
HEC-Université de Lausanne, Switzerland
Sy Goodman, Georgia Institute of Technology,
Nabil Kisrawi, Chairman of WG-Def,
Bruce Schneier, Security Technologist,
Marco Gercke, Professor, Cologne University,
GCA/HLEG Members Diversity of Participation
GCA/HLEG Leveraging expertise for international consensus On a Global level, from government, international organizations to industry For a Harmonised approach to build synergies between initiatives Through Comprehensive strategies on all levels Legal Measures e.g. Cybercrime legislation (Council of Europe), Moss Tingrett Court Norway, Cybex Technical and Procedural Measures e.g. Software (Microsoft) , hardware (Intel), Networking (CISCO), Security Apps/Services (Verisign), Global Standards and Development (ITU) Organisational Structures e.g. Ecole Polytechnique Fédérale de Lausanne (EPFL), Forum of Incident Response and Security Teams, OECD Capacity Building e.g. United Nations Institution for Training and Research (UNITAR), European Network and Information Security Agency (ENISA) International Cooperation e.g. Interpol, United Nations Office on Drug and Crime (UNODC) GCA/HLEG is building synergies with existing initiatives and working with stakeholders in these five key areas: 1 2 3
The HLEG work is an ongoing dynamic process with information-sharing and interaction relating to the elaboration of Global Strategies to meet the goals of the GCA and the ITU role as sole facilitator for WSIS Action Line C.5.
Three meetings held:
First Meeting of the HLEG held on 5 October 2007
Second Meeting of the HLEG held on 21 May 2008
Third Meeting of the HLEG held on 26 June 2008
The results of the work of the HLEG, including recommendations, the views expressed during the meeting and additional information about the previous work of the HLEG are contained in the Chairman’s report which will be available at: http://www.itu.int/osg/csd/cybersecurity/gca/hleg/meetings/third/index.html
GCA Sponsorship Programme – Join us!
This Sponsorship programme – will ensure that all relevant stakeholders are aware of HLEG’s valuable work, will increase also a global understanding about how to work together to implement effective strategies. It will then be up to the stakeholders themselves – within their respective mandates and capabilities – to translate these strategies into concrete actions.
GCA Sponsors will help to promote the goals of this initiative around the world by participating in high-profile business activities including publications, pubic campaigns, an annual conference and other events. In addition to the opportunity to meet with high-level decision makers, Sponsors also stand to enhance their image and credibility with their stakeholders.
Dr Óscar Arias Sánchez Nobel Peace Laureate, President of the Republic of Costa Rica, Patron of the Global Cybersecurity Agenda. "The world must take action. It must stand united. This is not a problem any one nation can solve alone"
Conclusions The threats to global cybersecurity demand a global framework! The magnitude of this issue calls for a coordinated global response to ensure that there are no safe havens for cybercriminals. ITU will act as a catalyst and facilitator for these partners to share experience and best practice, so as to step up efforts for a global response to cybercrime. In this way, working together, we can create a cyberspace that is somewhere safe for people to trade, learn and enjoy. Dr Hamadoun I. Touré Secretary-General, ITU Towards a global Cyberpeace…
ITU Global Cybersecurity Agenda & ITU Activities in Cybersecurity: http://www.itu.int/cybersecurity/ Email: [email_address] For More information on:
ITU-T Telecommunication Standardization Sector
SG 17, Security, Languages and Telecommunication Software
Lead Study Group on Telecommunication Security
SG 2, Operational Aspects of Service Provision, Networks and Performance
SG 4, Telecommunication Management
SG 5, Protection Against Electromagnetic Environment Effects
SG 9, Integrated Broadband Cable Networks and Television and Sound Transmission
SG 11, Signalling Requirements and Protocols
SG 13, Next Generation Networks
SG 15, Optical and Other Transport Network Infrastructures
SG 16, Multimedia Terminals, Systems and Applications
SG 19, Mobile Telecommunication Networks
ITU-T ITU-T Security and Cybersecurity Activities
ITU-T SG 17
ITU-T Study Group 17 Security, Languages and Telecommunication Software
Q.4/17, Communications Systems Security Project
Q.5/17, Security Architecture and Framework
Q.6/17, Cyber Security
Q.7/17, Security Management
Q.9/17, Secure Communication Services
Q.17/17, Countering Spam by Technical Means
Q.2/17, Directory Services, Directory Systems and Public-key/Attribute Certificates
SG 17 – Q.4/17: Communications Systems Security Project
ITU-T SG 17 Question 4
Communications Systems Security Project
Overall Security Coordination and Vision
Outreach and promotional activities
ICT Security Standards Roadmap
ITU-T Security manual
Focus Group on Security Baseline For Network Operators
SG 17 – Q.4/17 results achieved
Successful workshop organized at start of Study Period to consider future direction of security standards
Security Standards Roadmap developed – includes security standards from ITU, ISO/IEC, IEEE, IETF, ATIS, ETSI, OASIS, 3GPP
Security Compendium and Security Manual maintained and updated
Security Baseline for Network Operators developed
SG 17 – Q.4/17 challenges
Overall shortage of participants and contributors
Taxonomy (always a challenge!)
Finding out about new standards and when to post them
Appearance of the database
Need to develop a short guide to the update process
SG 17 – Q.4/17 progress since GSC-12
The listing of standards has been converted to a searchable database
Further updating is planned to ease navigation
A new section (Part 5) has been added on (non-proprietary) Best Practices
SG 17 – Q.4/17 focus for next study period
Will continue to be primary SG contact for security coordination issues
Will maintain and update outreach material
Responsibilities will be limited to coordination and outreach – no Recommendations
SG 17 – Q.5/17: Security Architecture and Framework
ITU-T SG 17 Question 5
Security architecture and framework
Major activities and accomplishments
Actions for the next study period
SG 17 – Q.5/17 scope Recommendation X.805 has been a foundation of Q.5/17 security studies and shaped the scope of its work X.1034, X.1035 X.1036 X.1031 Supplement to X.800-X.849, Guidelines for implementing system and network security
SG 17 – Q.5/17 scope (continued)
Q.5/17 has developed Recommendations that further develop the concepts of X.805 and provide guidance on their implementation
X.1031 , Security architecture aspects of end users and networks in telecommunications - provides guidance on applying the concepts of the X.805 architecture for distributing the security controls between the telecommunication networks and the end user’s equipment.
X.1034 , Guidelines on Extensible Authentication Protocol based Authentication and Key Management in a Data Communication Network and X.1035 , Password-Authenticated Key Exchange Protocol (PAK) - specify protocols and procedures that support functions of the Authentication security dimension .
X.1036 , Framework for creation, storage, distribution and enforcement of policies for network security further develops the concept of the security policy described in X.805.
Supplement to X.800-X.849 , Guidelines for implementing system and network security provides guidelines for implementing system and network security utilizing the concepts of X.805 and other security Recommendations and standards.
SG 17 – Q.5/17 strategic direction
Development of a comprehensive set of Recommendations for providing standard security solutions for telecommunications in collaboration with other Standards Development Organizations and ITU-T Study Groups.
Studies and development of a trusted telecommunication network architecture that integrates advanced security technologies.
Maintenance and enhancements of Recommendations in the X.800-series and X.103x-series.
Coordination of studies on NGN security (with Question 15/13)
SG 17 – Q.5/17 c hallenges
Authentication and key agreement is one of the most complex and challenging security procedures. Question 5/17 has developed Recommendations that contribute to the standards solutions for authentication and key management
X.1034 , Guidelines on Extensible Authentication Protocol based Authentication and Key Management in a Data Communication Network
Establishes a framework for the EAP-based authentication and key management for securing the link layer in an end-to-end data communication network.
Provides guidance on selection of the EAP methods.
X.1036 , Framework for creation, storage, distribution and enforcement of policies for network security
A Supplement developed by Q.5/17
Supplement to X.800 - X.849 series Guidelines for implementing system and network security
Other technical documents prepared by Q.5/17
In response to the WTSA Resolution 50 , Question 5/17 has prepared Guidelines for designing secure protocols using ITU-T Recommendation X.805.
Major coordination activity conducted by Q.5/17
Question 5/17 has coordinated security studies with Question 15 of SG 13, NGN Security ensuring alignment of the standards work in both groups.
SG 17 – Q.5/17 actions for next study period
How should a comprehensive, coherent communications security solution be defined?
What is the architecture for a comprehensive, coherent communications security solution?
What is the framework for applying the security architecture in order to establish a new security solution?
What is the framework for applying security architecture in order to assess (and consequently improve) an existing security solution?
What are the architectural underpinnings for security?
What new Recommendations may be required for providing security solutions in the changing environment?
How should architectural standards be structured with respect to existing Recommendations on security?
How should architectural standards be structured with respect to the existing advanced security technologies?
How should the security framework Recommendations be modified to adapt them to emerging technologies and what new framework Recommendations may be required?
How are security services applied to provide security solutions?
SG 17 – Q.6/17: Cyber Security
ITU-T SG 17 Question 6
Highlights of activities
Actions for Next Study Period
Collaboration with SDOs
SG 17 – Q.6/17 motivation
Network connectivity and ubiquitous access is central to today’s IT systems
Wide spread access and loose coupling of interconnected IT systems and applications is a primary source of widespread vulnerability
Threats such as: denial of service, theft of financial and personal data, network failures and disruption of voice and data telecommunications are on the rise
Network protocols in use today were developed in an environment of trust
Most new investments and development is dedicated to building new functionality and not on securing that functionality
An understanding of cybersecurity is needed in order to build a foundation of knowledge that can aid in securing the networks of tomorrow
SG 17 – Q.6/17 scope
Definition of Cybersecurity
Security of Telecommunications Network Infrastructure
Security Knowledge and Awareness of Telecom Personnel and Users
Security Requirements for Design of New Communications Protocol and Systems
Communications relating to Cybersecurity
Security Processes – Life-cycle Processes relating to Incident and Vulnerability
Security of Identity in Telecommunication Network
IP traceback technologies
SG 17 – Q.6/17 challenges
How should the current Recommendations be further enhanced for their wide deployment and usage?
How to harmonize common IdM data models across the ITU
How to define and use the term Identity within the ITU
How to detect and predict future threats and risks to networks
How to harmonize various IdM solutions
What are the best strategies to improve Cybersecurity
How to maintain a living list of IdM terms and definition and use it informally across the ITU
SG 17 – Q.6/17 highlights of activities Completed Recommendations * Currently in the approval process Common Alerting Protocol (CAP 1.1) X.1303 Requirements for global identity management trust and interoperability X.1250* Guidelines for Internet Service Providers and End-users for Addressing the Risk of Spyware and Deceptive Software X.1207 A vendor-neutral framework for automatic checking of the presence of vulnerabilities information update X.1206 Overview of Cybersecurity X.1205 Title No.
SG 17 – Q.6/17 highlights of activities (2) Recommendations under development ITU-T X.eaa | ISO/IEC xxxx, Information technology – Security techniques – Entity authentication assurance This Recommendation | International Standard provides a framework for entity authentication assurance which is the quantification of the risks that an entity is who or what he/she/it claims to be. In other words, entity authentication assurance is a measure of the confidence or risks associated with the authentication process and mechanisms. ITU-T X.gopw, Guideline on preventing worm spreading in a data communication network This Recommendation describes worm and other malicious codes spreading patterns and scenarios in a data communication network. The Recommendation provides guidelines for protecting users and networks from such malicious codes.
SG 17 – Q.6/17 highlights of activities (3) Recommendations under development ITU-T X.idif, User Control enhanced digital identity interchange framework This Recommendation defines a framework that covers how global interoperable digital identity interchange can be achieved and how an entity’s privacy is enhanced by providing an entity more control over the process of identity interchange. In addition, the Recommendation defines the general and functional requirements of the framework that should be satisfied. Based on the requirements, a framework is defined with basic functional building blocks for identity interchange and enhancing entity control. ITU-T X.idm-dm, Common identity data model This Recommendation develops a common data model for identity data that can be used to express identity related information among IdM systems.
SG 17 – Q.6/17 actions for next study period
Enhance current Recommendations to accelerate their adoption
Work with SG 2 in Trusted Service Provider Identifier (TSPID)
Collaborate with Questions 5, 7, 9, 17/17 and with SG 2 in order to achieve better understanding of various aspects of network security
Collaborate with IETF, OASIS, ISO/IEC JTC1, Liberty Alliance and other standardization bodies on Cybersecurity
Work with OASIS on maintaining the OASIS Common Alerting Protocol V1.1 (ITU-T Recommendation X.1303)
Study new Cybersecurity issues – How should ISPs deal with botnets, evaluating the output of appropriate bodies when available.
Study technical aspects of Traceback techniques
Joint work is ISO/JTC1 SC 27 on Entity Authentication Assurance
Progress work with Liberty Alliance on Identity Authntication Frameworks
Working with SG 4 and SG 13 on common IdM Data Models.
Developing frameworks for User control enhanced digital identity interchange framework
Developing guideline on protection for personally identifiable information in RFID application
Developing r equirements for security information sharing framework
Developing guideline on preventing worm spreading in a data communication network
Maintaining the IdM Lexicon document
SG 17 – Q.6/17 collaboration with other SDOs
ISO/IEC JTC 1/SC 27
SG 17 – Q.7/17: Security management
ITU-T SG 17 Question 7
Highlights of activities
Actions for Next Study Period
Collaboration with SDOs
SG 17 – Q.7/17 scope For telecommunications organizations, information and the supporting processes, facilities, networks and communications medias are all important business assets. In order for telecommunications organizations to appropriately manage these business assets and to correctly continue the business activity, Information Security Management is extremely necessary. The scope of this question is to provide GUIDELINES and BASELINES of Information Security Management to be appropriately applied for telecommunications organizations. Studies related on this issue can be a little bit extended to cover the following items: - information security management guidelines (baseline) - information incident management guidelines - risk management and risk profiles guidelines - assets management guidelines - policy management guidelines - information security governance - etc.
SG 17 – Q.7/17 strategic direction s Policy Assets Personnel Physical Operational Security Access Controls Incident Management BCP Compliant Organizational Security Systems Security Vulnerability Handling Announcement Alert Handling Incident Handling Other Incident Management X.1051 Information Security Management Guidelines Policy Mang. Risk Mang. Asset Mang. Incident Mang. Maintenance Mang. Event Mang. Other Managements Risk Management & Risk Profiles Practical Implementation Methodologies Assets Management Methodology * * * Information Security Governance X.sim: Security Incident Mang. X.rmg Framework X.ismf Based on the proposals from NSMF Baseline
SG 17 – Q.7/17 challenges
How should information assets in telecommunications systems be identified and managed?
How should information security policy for telecommunications systems be identified and managed?
How should specific management issues for telecommunications organizations be identified?
How should information security management system (ISMS) for telecommunications organizations be properly constructed by using the existing standards (ISO/IEC and ITU-T)?
How should measurement of information security management in telecommunications be identified and managed?
How should an information security governance framework be identified and managed?
How should the small and medium telecommunications organizations be managed and applied for security?
SG 17 – Q.7/17 highlights of achievements Recommendations * Currently under development Information Security Management Framework for Telecommunications X.ismf* Security incident management guidelines for telecommunications X. sim* Risk management and risk profile guide X. rmg* Information security management guideline for telecommunications organizations based on ISO/IEC 27002 X.10 51 Title No.
SG 17 – Q.7/17 actions for next study period
Review the existing management Recommendations/Standards in ITU-T and ISO/IEC management standards as for assets identification and security policy management.
Study and develop a methodology of assets identification and policy management for telecommunications based on the concept of information security management (X.1051) .
Study and develop information security management framework for telecommunications based on the concept of information security management (X.1051).
Study and develop security management guidelines for small and medium telecommunications based on the concept of information security management (X.1051).
Study and develop a methodology to construct information security management system (ISMS) for telecommunications organizations based on the existing standards (ISO/IEC and ITU-T).
Study and develop an information security governance framework for telecommunications that encompasses information technology and information security management.
SG 17 – Q.8/17 strategic direction Safety in interaction with sensors Authentication infrastructure Biometric Digital key BioAPI interworking protocol System mechanism among Client/Server/TTP Protection procedures Security and Protection for telebiometric application systems
SG 17 – Q.8/17 challenges
How should security countermeasures be assessed for particular applications of telebiometrics?
How can identification and authentication of users be improved by the use of interoperable models for safe and secure telebiometric methods?
What mechanisms need to be supported to ensure safe and secure manipulation of biometric data in any application of telebiometrics, e.g., telemedicine or telehealth?
How should the current Recommendations be further enhanced for their wide deployment and usage?
SG 17 – Q.8/17 highlights of activities Approved Recommendations Telebiometrics authentication infrastructure X.10 89 Telebiometrics digital key – A framework for biometric digital key generation and protection X.1088 Telebiometrics system mechanism – Part 1: General biometric authentication protocol and system model profiles on telecommunication systems X.10 84 BioAPI Interworking Protocol X.10 83 Telebiometrics related to human physiology X.10 82 Title No.
SG 17 – Q.8/17 actions for next study period
Enhance current Recommendations to accelerate their adoption to various telebiometric applications and populate the telebiometric database.
Review the similarities and differences among the existing telebiometrics Recommendations in ITU-T and ISO/IEC standards.
Study and develop security requirements and guidelines for any application of telebiometrics.
Study and develop requirements for evaluating security, conformance and interoperability with privacy protection techniques for any application of telebiometrics.
Study and develop requirements for telebiometric applications in a high functionality network.
Study and develop requirements for telebiometric multi-factor authentication techniques based on biometric data protection and biometric encryption.
Study and develop requirements for appropriate generic protocols providing safety, security, privacy protection, and consent “for manipulating biometric data” in any application of telebiometrics, e.g., telemedicine or telehealth.
Prepare a manual on telebiometrics.
SG 17 – Q.8/17 collaboration with other SDOs
ISO/IEC JTC 1/SCs 17, 27 and 37
ISO/TC 68 and TC 12
International Bureau of Weight and Measurement (BIPM)
ITU-T SG 17 Question 9
Secure Communication Services
Position of each topic
Security work proposed for next study period
SG 17 – Q.9/17: Secure communication services
SG 17 – Q.9/17 focus
Develop a set of standards of secure application services, including
Home network security
Web Services security
Secure application services
NID/USN security Under study
Multicast security Under study
IPTV security Under study
SG 17 – Q.9/17 position of each topic Mobile Terminal Mobile Network Mobile security Home network security Secure application services /Web Services security Home Network IPTV security/Multicast security Content Provider STB Home Gateway Application Server Client Ubiquitous Sensor Network Home Network USN security NID security NID reader NID tag USN gateway USN Application Server NID Application Server Core Open Network
SG 17 – Q.9/17 strategic direction
For developing the draft Recommendations on IPTV security matters:
Participate the ITU-T IPTV-GSI event (January – December, 2008) to develop them being consistent with relevant Recommendations being developed by other Questions
Propose X.iptvsec-1 (Requirements and architecture for IPTV security matter) for consent by September 2008, to meet urgent market need
Based on X.iptvsec-1, continue to study a set of possible draft Recommendations which complement X.iptvsec-1 technologically
Continue to develop a set of draft Recommendations in domain-specific areas:
Mobile network, Home network, (mobile) Web Services, application services, NID/USN service, IPTV service multicasting service, etc.
Continue to adopt or update the mature standards (i.e., SAML, XACML) developed by other SDOs, especially by OASIS, in the area of Web Services security
Develop a common text of X.usnsec-1 (Security framework for USN) with ISO/IEC JTC 1/SC 6 (as of June 2008)
Keep maintaining liaison activities with 3GPP, 3GPP2, JTC 1/SC 6, 25, 27 to develop the relevant draft Recommendations
SG 17 – Q.9/17 challenges
For the domain-specific draft Recommendations, it needs to strengthen the coordination work with other relevant Questions/SDOs to develop them to be consistent with their work.
During this Study period, Q.9/17 has been focused on the security framework for various domain-specific networks. However, from now on it should be emphasized to develop the pragmatic draft Recommendations which have significant impact on industry for the domain-specific networks with the collaboration with industries, other relevant SDOs and network/service providers.
For developing the draft Recommendations on IPTV security matters, the various detailed work items should continue to be identified in the future .
SG 17 – Q.9/17 major achievements
X.1123, G eneral security value added service (policy) for mobile data communication , Approved 2007
X.1124, Authentication architecture in mobile end-to-end data communication, Approved 2007
X.1125, Correlative reacting system in mobile network, Approved 2007
X.1171, Framework for Protection of Personally Identifiable Information in Networked ID Services, Consented 2008
Home network security
X.1111, Framework for security technologies for home network, Approved 2007
X.1112, Certificate profile for the device in the home network, Approved 2007
X.1113, Guideline on u ser authentication mechanisms for home network service, Approved 2007
X.homesec-4 Authorization framework for home network, to be consented 2008
X.usnsec-1 Requirement and Framework for Ubiquitous Sensor Network , New work item in 2007
SG 17 – Q.9/17 major achievements (2)
X.mcsec-,1 Security Requirement and Framework in Multicast communication , New work item in 2007
X.iptvsec-1, Functional Requirements and architecture for IPTV security aspects , New work item in 2008
X.iptvsec-2, Requirement and mechanism for Secure Transcodable Scheme New work item in 2008
X.iptvsec-3, Key management framework for secure IPTV communications , New work item in 2008
Web Services security
X.1143, Security architecture for message security in mobile Web Services, Approved 2007
Secure applications services
X.1151, Guideline on strong password authentication protocols, Approved 2007
X.1152, Secure end-to-end data communication techniques using Trusted Third Party services, Consented 2008
X.1161, Framework for secure peer-to-peer communications, Consented 2008
X.1162, Security architecture and operations for peer-to-peer network, Consented 2008
SG 17 – Q.9/17 work for next study period Q.9/17 for current Study Period
Home network security
Web Service security
Secure application security
Home network security
IPTV security, etc.
Web Service security
Secure application service, etc.
Q.O/17 for Next Study Period Q.P/17 for Next Study Period Secure Communication Service Security aspects for ubiquitous telecommunication service Secure application services
Divide Q.9/17 into two Questions: Q.O/17 and Q.P/17, considering the enormous workloads.
SG 17 – Q.17/17: Countering spam by technical means
ITU-T SG 17 Question 17
Countering spam by technical means
Highlights of activities
Actions for next study period
Collaboration with SDOs
SG 17 – Q.17/17 s cope
Develop a set of standards for countering spam by technical means, including:
General technical strategies and protocols for countering spam
Guidelines, frameworks and protocols for countering email spam, IP multimedia spam, SMS spam and other new types of spam
SG 17 – Q.17/17 s trategic direction Technologies involved in countering email spam (X.1240) Framework Recommendations IP multimedia application area (X.fcsip) Technical framework for countering email spam (X.1241) Overall aspects of IP multimedia application spam (X.1244) Technology Recommendations: Interactive countering spam gateway system (X.tcs-1) etc. Technical means for countering email spam (X.tcs) TBD Technical strategies on countering spam (X.1231) SMS spam Filtering System Based on Users’ Rules (X.ssf)
SG 17 – Q.17/17 c hallenges
What risks does spam pose to the telecommunication network?
What technical factors associated with the telecommunication network contribute to the difficulty of identifying the sources of spam?
How can new technologies lead to opportunities to counter spam and enhance the security of the telecommunication network?
Do advanced telecommunication network technologies (for example, SMS, instant messaging, VoIP) offer unique opportunities for spam that require unique solutions?
What technical work is already being undertaken within the IETF, in other fora, and by private sector entities to address the problem of spam?
What telecommunication network standardization work, if any, is needed to effectively counter spam as it relates to the stability and robustness of the telecommunication network?
SG 17 – Q.17/17 h ighlights of activities Approved Recommendations * Currently in approval process Overall aspects of IP multimedia application spam X.1244 * Technical framework for countering email spam X.1241 Technologies involved in countering email spam X.1240 Technical Strategies on Countering Spam X.1231 Title No.
SG 17 – Q.17/17 a ctions for next study period
Act as the lead group in ITU-T on technical means for countering spam
Establish effective cooperation with the relevant ITU Study Groups, other standard bodies and appropriate consortia and fora.
Identify and examine the telecommunication network security risks introduced by the constantly changing nature of spam.
Develop a comprehensive and up-to-date resource list of the existing technical measures for countering spam in a telecommunication network that are in use or under development.
Determine whether new Recommendations or enhancements to existing Recommendations, including methods to combat delivery of spyware, worm, phishing, and other malicious contents via spam and combat compromised networked equipment including botnet delivering spam.
Provide regular updates to the Telecommunication Standardization Advisory Group and to the Director of the Telecommunication Standardization Bureau to include in the annual report to Council.
SG 17 – Q.17/17 c ollaboration with SDOs
Standardization bodies :
ISO/IEC JTC 1
Other bodies :
SG 17 – Q.2/17 - X.500 security aspects
ITU-T SG 17 Question 2
Directory Services, Directory Systems and Public-key/Attribute Certificates
X.509 as basis for other specifications
Public-Key Infrastructure (PKI)
Privilege Management Infrastructure (PMI)
Protecting directory information
Data privacy protection
SG 17 – Q.2/17 - X.509 applicability
Secure Socket Layer (SSL)
The IETF Internet X.509 Public Key Infrastructure (PKIX) activity
The IETF Secure / Multipurpose Internet Mail Extensions (S/MIME) activity
The ETSI Electronic Signatures and Infrastructures (ESI) activity
The X.509 specification is the base for many other specifications:
SG 17 – Q.2/17 - X.509 applicability (2)
Medical electronic journals
Online public service
The X.509 specification is the base for: In short: The whole electronic world
SG 17 – Q.2/17 - Public-Key Infrastructure (PKI)
PKI is an infrastructure for managing certificates. It consists of one or more Certification Authorities for issuing certificates in a secure way following a set of policies.
It includes maintaining information about certificates been revoked.
Directories are major components of the infrastructure.
E.409 Incident organization and security incident handling: Guidelines for telecommunication organizations
Numerous Recommendations on operational aspects of network management
ITU-T SG 4
ITU-T Study Group 4
SG 4 – Scope of security study
Security of management plane
Management of security for telecommunications management
Protocols of securities for management
SG 4 – Strategic direction
Establishment of interface Recommendations among security function groups or entities for management of security (Enhancement of M.3410)
Study on use of IdM in management plan
Study on the management of IdM
Continuation of protocol profiling for security management
SG 4 – Challenges
Fill the gap in security on management plane and management of its security
Collaboration with ATIS TMOC and ETSI TISPAN on the subject
SG 4 – Accomplishment
Consent of Recommendation M.3410
Guidelines and Requirements for Security Management Systems to Support Telecommunications Management
SG 4 – Next steps
Enhancement of M.3016 series Recommendations for security of management plane
Enhancement of M.3410 Recommendation for management of security for telecommunications management
Enhancement of Q.811 and Q.812, management protocol profiles from security subject perspective
SG 4 – Questions
What security mechanisms and protocols are required to support security of management for NGNs?
What management mechanisms and protocols are required to support management of security for NGNs?
What use of Service-Oriented Architecture concepts should be applied in specifying protocol and security Recommendations?
What collaboration inside and outside the ITU-T is needed to develop protocol and security functions?
ITU-T SG 5
ITU-T Study Group 5
Protection against electromagnetic environment effects
SG 5 – Scope
To provide guidance on the protection of Telecommunications and Data Centres against disruption of service and/or physical damage due to:
Natural EM phenomena
Lightning, Electrostatic Discharge (ESD)
Interactions with the RF Spectrum
Electromagnetic Compatibility (EMC)
Man-Made/Malicious Electromagnetic threats
High-altitude EM Pulse (HEMP);
High-Power EM weapons (HPEM);
To provide guidance on the protection of electronic data from interception via EM means
SG 5 – Strategic direction
Do not reinvent the wheel
Reference existing K-Series Recommendations wherever possible
Lightning, ESD, EMC
Develop effective liaisons with other International Standardization Organizations to exploit additional expertise
Liaison with IEC TC 77 – Electromagnetic Compatibility (EMC) – SC 77C – High Power Transient Phenomena – provided expertise in HEMP and HPEM
Liaison with National Institute of Information and Communications Technology (NICT) of Japan – provided expertise on EM interception of data
Apply existing expertise to the telecommunications and data centre domain
SG 5 – Challenges
Liaisons with other bodies has granted access to rich veins of existing expertise
This has taken time to assimilate and present within the context of a telecommunications and data centre
Previously officially secret in some regions (i.e. previously known as TEMPEST within the US)
SG 5 – Recent accomplishments
A document set is planned
K.sec – basic introduction that references the following:
Existing K-series Recommendations on lightning
Existing K-series Recommendations on EMC
Steady progress has been made on developing the document set
SG 5 – Next steps/actions Development of document set continues with the following timing 2011 Mitigation methods against EM security threats K.secmiti 2009 Test method and requirements against information leak through unintentional EM emission K.leakage 2008 Application of requirements against HPEM to telecommunication systems K.hpem 2008 Application of requirements against HEMP to telecommunication systems K.hemp 2011 Guide for the application of electromagnetic security requirements - Basic Recommendation K.sec Timing Title of the Recommendation Document
ITU-T SG 9
ITU-T Study Group 9
Integrated broadband cable networks and television and sound transmission
SG 9 – Scope of security work
Security requirements are spread across multiple questions:
Improve the security of conditional access systems used for television subscription, pay-per-view and similar services distributed to the home by cable television (Q3)
Security, conditional access, protection against unauthorized copying, protection against unauthorized redistribution requirements to be supported by an universal integrated receiver or set-top box for the reception of cable television and other services (Q5)
Security requirements and protocols associated with high-speed bidirectional data facilities intended to support, among other payloads, those utilizing Internet Protocols (IP) exploiting the broadband capacity provided by hybrid fiber/Coaxial (HFC) digital cable television systems (Q8)
Security requirements and protocols for Voice over IP/Video over IP applications in IP-based cable television networks (Q9)
Extend the security requirements for entertainment video delivery associated with cable network video service onto the home network (Q10)
Provide all the security requirements for the network elements and services offered by cable operators
SG 9 – Strategic direction for security for Cable Networks Network Elements Home Networking – Devices and Applications - Link privacy for cable modem implementations J.125 - Third generation Transmission systems – security services J.222.3 - IP Cablecom security specification J.170 - IP Cablecom 2 architecture including securityJ.360 - Security features based on 3G mobile telecom system as modified for Cable J.366.7 - IMS network domain security specification J.366.8 - Generic authentication architecture specification J.366.9 - A Residential Gateway to support delivery of cable data services J.192 - Requirements for next generation set-top boxes J.193 - High level requirements for DRM Bridge for Cable access Network to home network J.197 - Next generation set-top box architecture J.290 - IPTV requirements for secondary distribution J.700
SG 9 – Challenges for cable networks security
Authentication, privacy, access control and content protection both on the access network and the bridge to home network are key considerations for multi-media applications/services
Security requirements for network elements in the access networks determine how the applications (voice, video and data) are transmitted securely to authenticated users/subscribers
Security requirements for network elements in the home network such as residential gateway and set-top boxes meet the access control for the user
SG 9 – Major accomplishments
Approved 2 security requirements Recommendations:
“ Link Privacy for cable modems” (J.125)
“ Third generation transmission systems” (cable Modem and Cable Modem Termination System, J.222.3)
Approved “IPTV requirements for secondary distribution” (J.700)
Approved the Recommendation on “Component definition and interface specification for next generation set-top box” (J.293)
SG 9 – Security work for next study period
Security studies for the next study period will be continued in the following questions:
Cable television delivery of digital services and applications that use Internet Protocols (IP) and/or packet-based data
Voice and video applications over cable TV networks
Functional requirements for a universal integrated receiver or set-top box for the reception of cable television and other services
The extension of cable-based services over broadband in Home Networks
Security requirements for IPTV interfaces for secondary distribution (identified in J.700)
ITU-T SG 11
ITU-T Study Group 11
Signalling Requirements and Protocols
SG 11 – Scope of security work
Each Question of SG11 has to consider security aspects to develop protocol Recommendations used for network control signalling, based on the general requirements developed by other SGs, such as SG 2, SG 13, SG 17 and SG 19.
Q.7/11, entitled as “ Signalling and control requirements and protocols to support attachment in NGN environments”, has specific requirements for authentication and authorization of users and terminals.
SG 11 – Strategic direction
Security consideration has been incorporated within the text for each Question of SG11.
Various security arrangements are embedded within the protocols defined at various reference points, by reusing existing mechanisms defined by other organization (e.g., IETF and 3GPP).
Strengthen the coordination on security issues across SGs, as well as among Questions within SG 11 by proposing a dedicated new Question on security coordination for the next study period.
SG 11 – Challenges for secure protocols
Design interface protocols which have various security mechanisms based on Recommendations / specifications developed by SG 17 and other SDOs.
Special attention should be drawn to the interface between legacy telephone networks and emerging NGN.
It would also be necessary to guide actual protocol implementations so that there will be no security holes, for example, by defining implementers’ guides.
SG 11 – Recent accomplishments
24 Recommendations and 6 Supplements have been approved so far, regarding NGN protocols with security mechanisms embedded.
The following two Recommendations have been approved at the January 2008 SG11 meeting in Q.7/11 in Network attachment control protocol work:
Q.3202.1, “Authentication protocols for interworking among 3GPP, WiMax and WLAN in NGN.”
SG 11 – Security work for next study period
New Question on security coordination
What is the content of an appropriate policy for the consideration of protocol security in the work of the Study Group?
What are the means to assure that such a policy is being followed in practice?
What exceptions to the general policy are permissible in the case of specific Recommendations?
What is the impact of security-related work in other groups on the work of protocol security within this Study Group at the policy level?
What are the means by which technical developments in protocol security achieved in other groups may be communicated to interested Questions in this Study Group, and the reverse?
ITU-T SG 13
ITU-T Study Group 13
Next Generation Networks
SG 13 – Scope of NGN security work in Q.15
Conduct NGN Security studies to develop network architectures that:
Provide for maximal network and end-user resources protection
Allow for highly-distributed intelligence end-to-end
Allow for co-existence of multiple networking technologies
Provide for end-to-end security mechanisms
Provide for security solutions that apply over multiple administrative domains
Provide for secure Identity Management
Provide for security solutions for IPTV that are cost-effective and have acceptable impact on the performance, quality of service, usability, and scalability
Provide security guidance on NGN security to all Questions of SG 13 and other Study Groups
SG 13 – Strategic direction for NGN security Y.2701 is built on application of the concepts of X.805 to Y.2201 , NGN requirements and Y.2012 , NGN Functional Require- ments and Architecture Y.2702 NGN Authentication and Authorization Requirements Y.2701 Security Requirements for NGN Release 1 NGN Security Mechanisms NGN Certificate Management NGN AAA Y.2701 is a base for development of the detailed Recommendations on NGN Security NGN IdM Framework Identity Management has evolved into a separate topic of the NGN security work NGN IdM Use cases NGN IdM Requirements NGN IdM Mechanisms
IdM Framework defines the concepts of the IdM
IdM Use cases is a base for deriving the IdM requirements
IdM Mechanisms provide support for the requirements
SG 13 – Challenges for NGN security
Authentication is one of the most complex and challenging procedures in NGN security. The following study items of SG 13 are focused on various aspects of authentication:
Y.2702 , NGN Authentication and Authorization Requirements
NGN Security Mechanisms
NGN Certificate Management
NGN Authentication Authorization and Accounting
NGN IdM Requirements
NGN IdM Mechanisms
SG 13 – Major security accomplishments
Question 15/13 has:
Achieved determination of the draft ITU-T Recommendation Y.2702 , NGN Authentication and Authorization Requirements
Defined the direction for the studies of Identity Management (IdM) for NGN and started development of four ITU-T Recommendations on IdM
Provided security expertise to other Questions and Study Groups through active participation in NGN-GSI and IdM-GSI
Continued productive collaboration with ITU-T SG 17 - Lead Study Group on Telecommunication Security and started joint (with Q.6/17) development of Recommendation X.idm-dm, Identity Data Model
Initiated a liaison exchange with 3GPP SA 3 aimed at harmonization of the standards on media security
SG 13 – Security work for next study period
Security studies for the next study period will address:
What new Recommendations or guidance to other Study Groups are needed to standardize identification of NGN threats and vulnerabilities ?
What are the security requirements of NGN to effectively counter these threats ?
What new Recommendations are necessary to enable comprehensive, end-to-end security in NGN that span across multiple heterogeneous administrative domains ?
What new Recommendations or guidance are necessary to enable attachment of terminals in a secure fashion , including Authentication, Authorization, and Accounting ( AAA ) considerations, to NGN?
How to define security architecture of Identity Management in NGN?
What are security requirements to Identity Management in NGN?
What new Recommendations are needed for supporting security requirements of Identity Management in NGN?
What new Recommendations are needed for supporting secure interoperability among different Circles of Trusts (CoT) in NGN?
What new NGN Recommendations are needed for supporting security requirements of IPTV ?
ITU-T Study Group 15
Optical and Other Transport Network Infrastructures
ITU-T SG 15
SG15 is responsible for the development of standards on optical and other transport network infrastructures, systems, equipment, optical fibres, and their management and the corresponding control plane technologies to enable the evolution toward intelligent transport networks. This encompasses the development of related standards for the customer premises, access, metropolitan and long haul sections of communication networks. This responsibility includes security-related aspects, including encryption, protection and restoration, and security management. SG 15 - Responsibilities
SG 15 – Security related work in SG 15 Management and control of transport systems and equipment Security requirements for managing the transport network/system/equipment and the supporting management communication network and signalling communication network 14/15 Transport network architectures Architecture aspects, including security-related issues 12/15 Optical fibres and cables for the access network to and in buildings and homes Safety and reliability requirements 10/15 Transport equipment and network protection/restoration Security requirements for equipment functions and protection switching processes for transport networks 9/15 Characteristics of optical systems for terrestrial transport networks Safety and reliability requirements 6/15 Transceivers for customer access and in-premises networking systems on metallic conductors Example: Notching out frequency bands used by amateur radio etc. 4/15 General characteristics of optical transport networks OTN planning security aspects 3/15 Optical systems for fibre access networks Example: Link level encryption 2/15 Coordination of Access Network Transport standards Access Network Transport planning security aspects 1/15 Topic and security-related issues Question
SG 15 – Major security accomplishments The common transport equipment management requirements Recommendation G.7710/Y.1701 (7/2007) has added M.3016 Series (2005) as normative reference for management plane security requirements. The requirements in G.7710/Y.1701, including the security requirements, continue to be the base for managing technology-specific transport equipment, including EoT in G.8051/Y.1345 (10/2007) and T-MPLS in G.8151/Y.1374 (10/2007).
Will continue to study security requirements for managing transport network/system/equipment and their control plane and revise the recommendations are necessary G.806 (Generic Equipment Functions) will be revised and security requirements will be included. SG 15 – Security work for next study period
ITU-T Study Group 16
Multimedia terminals, systems and applications
ITU-T SG 16
SG 16 – Q.25/16, M ultimedia security in NGN
Study Group 16 concentrates on m ultimedia systems.
Q.25/16 focuses on the application-security issues of MM applications in existing and next generation networks
Standardizes multimedia security
So far Q.25/16 has been standardizing MM-security for the “1st generation MM/pre-NGN systems”:
SG 16 – Evolution of H.235 1997 1998 1999 2000 2001 2002 Initial Draft H.323V2 H.323V4 H.235V1 approved Core Security Framework Engineering Consolidation Improvement and Additions 1st Deployment 2003 H.235V2 Annex D Annex E approved Annex F H.530 consent H.235V3+ Annex I Security Profiles Annex D Annex E started 2004 H.235V3 Amd1 + Annex H H.235V3 Amd1 H.235 Annex G H.323V5 1996 2005 H.235V4 H.235.0 ~ H.235.9 approved Reorganization H.323V1 H.323V6 2006
SG 16 – H.235 V4 sub-series Recommendations
Major restructuring of H.235v3 Amd1 and annexes in stand-alone sub-series Recommendations
H.235.x sub-series specify scenario-specific MM-security procedures as H.235-profiles for H.323
Some new parts added
Some enhancements and extensions
Approved in September 2005
SG 16 – H.323 Security Recommendations (1)
H.235.0 “Security framework for H-series (H.323 and other H.245-based) multimedia systems”
Overview of H.235.x sub-series and common procedures with baseline text
H.235.1 "Baseline Security Profile”
Authentication & integrity for H.225.0 signaling using shared secrets
H.235.2 "Signature Security Profile”
Authentication & integrity for H.225.0 signaling using X.509 digital certificates and signatures
SG 16 – H.323 Security Recommendations (2)
H.235.3 "Hybrid Security Profile"
Authentication & integrity for H.225.0 signaling using an optimized combination of X.509 digital certificates, signatures and shared secret key management; specification of an optional proxy-based security processor
H.235.4 "Direct and Selective Routed Call Security"
Key management procedures in corporate and interdomain environments to obtain key material for securing H.225.0 call signaling in GK direct-routed/selective routed scenarios
SG 16 – H.323 Security Recommendations (3)
H.235.5 "Framework for secure authentication in RAS using weak shared secrets"
Secured password (using EKE/SPEKE approach) in combination with Diffie-Hellman key agreement for stronger authentication during H.225.0 signaling
H.235.6 "Voice encryption profile with native H.235/H.245 key management"
Key management and encryption mechanisms for RTP
Amendment 1 ( June 2008 ) added support for cipher key lengths of 192 and 256 bit to AES
SG 16 – H.323 Security Recommendations (4)
H.235.7 "Usage of the MIKEY Key Management Protocol for the Secure Real Time Transport Protocol (SRTP) within H.235"
Usage of the MIKEY key management for SRTP
H.235.8 "Key Exchange for SRTP using Secure Signalling Channels"
SRTP keying parameter transport over secured signaling channels (IPsec, TLS, CMS)
H.235.9 " Security Gateway Support for H.323 "
Discovery of H.323 Security Gateways (SG = H.323 NAT/FW ALG) and key management for H.225.0 signaling
SG 16 – Other MM-SEC results
H.350.2 (2003) “H.350.2 Directory Services Architecture for H.235”
An LDAP schema to represent H.235 elements (PWs, certificates, ID information)
H.530 (2002) “Symmetric security procedures for H.323 mobility in H.510” + Cor.1 (2003)
Authentication, access control and key management in mobile H.323-based corporate networks
F/19 : Convergence of existing and evolving IMT and fixed networks
FMC cannot be studied in isolation
Has to take into account the ongoing work on NGN scenarios, services, architecture, mobility, security and QoS, and on mobile network technologies outside of ITU-T
Study of specific FMC scenarios and solutions requires a solid understanding of mobile network technologies and close liaison with mobile network SDOs
SG 19 – Specific actions member organizations of GSC should take
Aim for globally consistent end-user security support
Identify FMC security requirements for uniform authentication and authorization mechanisms (i.e., authentication and authorization combined)
Network specific requirements for T-SPID
Telecommunication Development Sector
ITU-D Cybersecurity Activities: Two Main Pillars
ITU-D Study Group 1 Question 22/1: Securing information and communication networks: Best practices for developing a culture of cybersecurity
Developing a Framework for Organizing National Cybersecurity Efforts
ITU-D Programme 3 ITU Cybersecurity Work Programme to Assist Developing Countries. Example activities include:
Assistance related to Establishment of National Strategies and Capabilities for Cybersecurity and Critical Information Infrastructure Protection (CIIP)
Assistance related to Establishment of appropriate Cybercrime Legislation and Enforcement Mechanisms
Assistance related to establishment of Watch, Warning and Incident Response (WWIR) Capabilities
Assistance related to Countering Spam and Related Threats, Establishment of an ITU Cybersecurity/CIIP Directory, Contact Database and Who’s Who Publication
Fostering Regional Cooperation Activities
ITU-R Cybersecurity Activities
Radio spectrum global frequency management is increasingly important for building confidence and security and creating an enabling environment in the use of ICTs. ITU-R plays a central role in facilitating complex intergovernmental negotiations needed to develop legally binding agreements between sovereign states in an increasingly ‘unwired’ world.
ITU-R activities related to cybersecurity
Recommendation ITU-R M.1457 “Security mechanism incorporated in IMT-2000”
Recommendation ITU-R S.1711 “Performance enhancements of transmissions control protocol over satellite”
Recommendation ITU-R M.1645 “Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000”
Recommendation ITU-R M.1223 “Evaluation of security mechanism for IMT-2000”ITU-R
Recommendation ITU-R S.1250 “Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service”
Recommendation ITU-R M.1078 “Security principles for IMT-2000”
Some useful web resources
ITU-T Home page http://www.itu.int/ITU-T/
Study Group 17 http://www.itu.int/ITU-T/studygroups/com17/index.asp
LSG on Security http://www.itu.int/ITU-T/studygroups/com17/tel-security.html