SlideShare a Scribd company logo
Security
ITU-T
STUDY GROUP 17
Arkadiy Kremer
Chairman, SG17
Summary of Results
Study Period 2013-2016
Heung-Youl Youm
Vice Chairman, SG17
on behalf of
Study Group 17
Security
1
Conclusions
3
Acknowledgements
4
Future
perspective
of SG17
2
Contents
Additional
Slides
 Terms of reference
 Management team
 Structure
 Leadership for other groups (JCAs and FGs)
 Highlights of achievements / Projects
 Highlights of WP1, WP2, WP3, WP4, WP5/17, projects
 Statistics
 Workshops (with SG17 leadership / participation)
Study Group 17- Security
Building confidence and security in the use of ICTs
Cloud computing
security
Cybersecurity
ITS security
Countering spam
IoT security
SDN security
Mobile (phone)
security
Smart-grid security
Identity management
Information Security
Management
Application security
Big Data analytics
security
PKI, PMI, Directory
Telebiometrics
Languages
(ASN.1, SDL, MSC, TTCN-3 …)
Future Perspective of SG17
ICT security (I)
Security
Global Experts
Attractiveness of
participation
Separation of security
responsibilities within
ITU-T
Collaboration
Centre of excellence SG13
SG20
SG17
ICT security (II)
Cybersecurity
SG17 as centre of
security competence
Development of
security approaches
Strengthening the
trust framework
Implementation
of ITU-T Recs
Information Society
SG17
ITU-D
ICT security, PII, PKI
Internet of things (IoT)
SG17 as lead study
group for security
Smart grids
Protection of
Personally Identifiable
Information (PII)
Protection of
Children Online
Public key
infrastructure (PKI)
SG17
Questions – LSG – JCAs – Projects
SG17 proposed 12 Questions for the next study period and they shall all continue.
SG17 should be the lead
study group responsible for:
Languages
and
description
techniques
JCA-IdM and JCA-COP
as well as ASN.1 & OID Projects
need to continue given their
important contributions.
Increased
Participation
above 150
participants
SG17 has successfully evolved to:
cover new security issues
address new security challenges
with security experts in core Questions.
SG17 achieved significantly build-up
of participation and energy in:
Identity Management
Cybersecurity
Cloud Computing Security
SG17 has built strong relations with
other key bodies working on
security and conducted numerous
collaborative efforts
SG17 has promoted and
disseminated ITU-T security work
International
Telecommunication
Union
10
ITU-T Study Group 17
Security
Acknowledgements
Delegates with their many contributions
Editors in drafting texts for Recommendations
Rapporteurs in leading work efforts
Liaison officers in coordinating efforts with other bodies
Project leaders and JCA leaders
Management team including Working Party chairmen
TSB support – Counsellors, Assistants and other staff
Great thanks are due to the many people
who have contributed to the enormous
success of SG17 during this study period:
Best wishes to all for the next study period.
Additional Slides
International
Telecommunication
Union
12
ITU-T Study Group 17
Security
Supplemental Slides
Terms of reference
Management team
Structure
Leadership for other groups (JCAs and FGs)
Highlights of achievements / Projects
Highlights of WP1, WP2, WP3, WP4, WP5/17,
projects
Statistics
Workshops (with SG17 leadership / participation).
International
Telecommunication
Union
13
ITU-T Study Group 17
Security
Terms of Reference
Current: Responsible for building confidence and security in the use
of information and communication technologies (ICT). This includes
studies relating to cybersecurity, security management,
countering spam and identity management.
It also includes security architecture and framework, protection of
personally identifiable information, and security of applications and
services for the Internet of things, smart grid, smartphone, Internet
Protocol television (IPTV), web services, social network, cloud
computing, mobile financial system and telebiometrics.
Study Group 17 is also responsible for the application of open
system communications, including directory and object identifiers,
and for technical languages, the method for their usage and other
issues related to the software aspects of telecommunication
systems, and for conformance testing to improve the quality of
Recommendations.
Future perspective: include security aspects of software-defined
networking (SDN), NFV security, and big data analytics.
International
Telecommunication
Union
14
ITU-T Study Group 17
Security
Management Team (I)
Chairman Arkadiy Kremer Russian Federation
Vice-Chairmen Khalid BELHOUL United Arab Emirates
Mohamed M.K. ELHAJ
Mario German
FROMOW RANGEL
Sudan
Mexico
Antonio GUIMARAES Brazil
Zhaoji LIN China (P.R.)
Patrick MWESIGWA Uganda
Koji NAKAO Japan
Sacid SARIKAYA Turkey
Heung Youl YOUM Korea (Republic of)
International
Telecommunication
Union
15
ITU-T Study Group 17
Security
Management Team (II)
WP Chairmen
WP 1/17 Koji NAKAO Japan
WP 2/17 Sacid SARIKAYA Turkey
WP 3/17 Heung Youl YOUM Korea (Rep. of)
WP 4/17 Antonio GUIMARAES Brazil
WP 5/17 Zhaoji LIN China (P.R.)
TSB Martin EUCHNER Advisor
Sarah SCOTT Assistant
International
Telecommunication
Union
16
ITU-T Study Group 17
Security
Study Group Structure (1/2)
WP 1/17, Fundamental security
Telecommunication/ICT security coordination, security
architectures/frameworks, SDN security, network security,
telecommunications information security management.
WP 2/17, Network and information security
Cybersecurity, countering spam.
WP 3/17, Identity management and cloud computing
security
Cloud computing security, SOA security,
identity management and architectures.
International
Telecommunication
Union
17
ITU-T Study Group 17
Security
Study Group Structure (2/2)
WP 4/17, Application security
IPTV security, ubiquitous sensor network security, home
network security, peer-to-peer security, IoT security, ITS
security, smart-grid security, SDN security, application
security services, telebiometrics security, e-health security.
WP 5/17, Formal languages
Directory, PKI/PMI, ASN.1, OID, SDL-2010, ODP, URN, MSC,
TTCN-3, maintenance of OSI Recommendations.
Joint coordination activities
JCA-IdM, JCA-COP
SG17 Regional Group in Africa.
International
Telecommunication
Union
18
ITU-T Study Group 17
Security
Leadership for SG 17-related other
groups (I)
JCA-IdM
– Co-Chairmen: Mr Abbie BARBIR, Aetna,
Mr Hiroshi TAKECHI, NEC
– Represented: SGs 2, 3, 5, 9, 12, 13, 15, 16, 17, American
Bar Association, ENISA, ETSI, ISO/IEC JTC 1/SC 27/WG5,
ISO/IEC JTC 1/SC17, ENISA, ETSI/ISG, GLEIF, GSMA,
OASIS/IdCloud TC, OASIS Trust Elevation TC, OASIS
IBOPS, OpenID Foundation, FIDO Alliance, OASIS TC
IBOPS, Kantara Initiative, American Bar Association, GLEIF,
STORK 2.0 project, and UPU,…
– 10 meetings, 44 documents processed.
International
Telecommunication
Union
19
ITU-T Study Group 17
Security
Leadership for SG 17-related other
groups (II)
JCA-COP
– Chairman: Mr Philip RUSHTON, United Kingdom
– Established April 2012
– Represented: ISO/IEC JTC 1/SC 27/WG5, IETF/ISOC,
ITU-D Q3/2, DeafKidzInternational, ECPAT, EFC, FCACP,
FOSI, GSMA, ICMEC, I-KiZ, and Iran (Islamic Republic of);
outreach to COP stakeholders
– 8 meetings, 3 outgoing liaisons.
International
Telecommunication
Union
20
ITU-T Study Group 17
Security
Highlights of achievements (I)
SG17 successfully transitioned into a core competency
center on security averaging 155 participants.
SG17 examined 592 contributions and 3017 TDs and
developed 49 new, revised 69 Recommendations, and
developed 13 Supplements.
10 Recommendations currently under AAP or TAP.
Up to 81 draft new/revised Recommendations
currently under development for approval in the next
study period.
3 Lead Study Group responsibilities, 2 JCAs,
and 2 Projects were very active.
Increased collaboration with SDOs (e.g., joint texts).
International
Telecommunication
Union
21
ITU-T Study Group 17
Security
Highlights of achievements (II)
Lead study group for Security
– Close coordination and collaboration with other SGs
and SDOs on security; particular focus has been
placed upon partnerships and avoiding potential
conflicts in the work.
– Joint work with several SCs in ISO/IEC JTC 1.
– Produced 6th edition of the “Security Manual” that
promotes ITU-T’s security work.
– Produced Technical Report on successful use of
security standards
– Security Standards Roadmap and Security
Compendium kept up-to-date.
International
Telecommunication
Union
22
ITU-T Study Group 17
Security
Highlights of achievements (III)
Lead study group for Telecommunication Security
– Security collaboration arrangements between SG17
and SG13 on cloud computing security,
and between SG17 and SG20 on IoT security.
– Four workshops held on security.
– Maintained an on-line listing of SG17 relationships
with TCs of ISO and IEC and SCs of ISO/IEC JTC 1
(identifies nature of relation of joint work,
common/twin text, cooperation mode, etc)
(In response to WTSA-12 Resolution 7).
International
Telecommunication
Union
23
ITU-T Study Group 17
Security
Highlights of achievements (IV)
Lead study group for Identity Management
– Continued collaboration with OASIS on IdM.
– A WIKI with IdM Roadmap is available from the SG17
web page - provides a compilation of existing and
ongoing IdM standards globally & reflects coordination
with other bodies.
– Continuation of Joint Coordination Activity of Identity
Management (JCA-IdM).
Lead study group for Languages and Description
Techniques
– Collaboration with ETSI on TTCN-3, JTC 1/SC 7 on
ODP, and JTC 1/SC 6 on ASN.1, OIDs and registration.
– Supported SDL-Forum and SAM Workshop on
languages.
International
Telecommunication
Union
24
ITU-T Study Group 17
Security
Fundamental Security
(WP 1/17) Highlights (I)
Telecommunication/ICT security coordination
– Management support of other SG17 security Questions
– Security coordination
– Security project (see separate slide)
Security architecture and framework
– Network security architecture, IPv6 security, …
– 4 new Recs, 1 new Supplement; 3 under development.
Telecommunications information security
management
– In support of WTSA-12 Resolution 58
– ISM framework, risk/asset/incident management, PII code of
practice, …
– 1 revised Rec, 1 new Supplement; 1 in TAP
– 4 under development.
International
Telecommunication
Union
25
ITU-T Study Group 17
Security
Network and Information Security (WP 2/17)
Highlights (II)
Cybersecurity
– In support of WTSA-12 Resolution 50.
– Finalized cybersecurity information exchange (CYBEX),
X.1500 series.
– Intense work program; many collaborations with principal
forums of the cybersecurity community.
– 9 new Recs, 8 Amendments,
2 new Supplements (1 revised); 2 in TAP
– 3 under development.
Countering spam by technical means
– In support WTSA-12 Resolution 52
– Countering spam in voice spam, mobile messaging spam, …
– 2 new Recs, 2 Supplements;
– 4 under development.
International
Telecommunication
Union
26
ITU-T Study Group 17
Security
Identity Management and
cloud computing security
(WP 3/17) Highlights
Identity management architecture and
mechanisms
– Discovery of IdM, IAM taxonomy, telebiometric authentication,
entity authentication assurance, trust elevation, sharing
network authentication with service authentication, …
– 4 new Recs, 3 under development.
Cloud computing security
– Cloud computing security framework, software as a service
security, CaaS/IaaS/NaaS security, Big Data as a Service,
operational security for cloud computing, Code of practice for
information security controls based on ISO/IEC 27002 for
cloud services, …
– 5 new Recs, 1 revised Rec, 5 under development.
International
Telecommunication
Union
27
ITU-T Study Group 17
Security
Application Security
(WP 4/17) Highlights
Security aspects of ubiquitous
telecommunication services
– IoT security, ITS security, SDN security, smart-grid security,
mobile security, mobile phone security, IPTV security and
content protection, ubiquitous network security framework, …
– 2 new Recs; 3 new Supplements, 3 in TAP
– 6 under development
Secure applications services
– Application security mechanisms, XACML, multi-factor
authentication, anonymous authentication, authentication in
IDSP environments, non-repudiation, peer-to-peer security,
fraud detection, …
– 8 new Recs, 2 new Supplements
– 6 under development
Telebiometrics
– Telebiometrics, e-Health & telemedicines security protocols
– 3 new Recs, 1 in TAP, 8 under development.
International
Telecommunication
Union
28
ITU-T Study Group 17
Security
Formal languages
(WP 5/17) Highlights (I)
Generic technologies to support secure
applications
– X.500-series on Directory including X.509 on PKI,
computerized directory assistance, Abstract Syntax Notation
One (ASN.1), Object Identifiers (OIDs) and associated
registration authorities, ODP, certified e-mail.
– ASN.1 and OID project (see separate slide)
– 4 new Recs, 23 revised Recs, 14 technical corrigenda to
X.500 series; 1 TR; 8 under development.
Formal languages for telecommunication
software and testing
– SDL-2010, UML, MSC, URN, Testing and Test Control Notation
(TTCN-3), …
– 6 new Recs, 30 revised Recs; 4 revised Implementer Guides,
1 revised Supplement, 3 in AAP, 19 under development.
International
Telecommunication
Union
29
ITU-T Study Group 17
Security
Telecommunication/ICT security
coordination Project
(Major focus is on coordination and outreach)
Security coordination
– Within SG17, with ITU-T SGs, with ITU-D and externally.
– Kept TSAG, ISO/IEC/ITU-T SAG-S informed on security efforts.
– Made presentations to workshops/seminars and to GSC.
– Maintained reference information on the LSG on security webpage.
Compendium of Security Recommendations
– Includes catalogs of approved security-related Recommendations
and security definitions extracted from approved Recommendations.
Security Standards Roadmap
– Includes searchable database of approved ICT security standards
from ITU-T and others (e.g., ATIS, ENISA, ETSI, IEEE,
ISO/IEC JTC 1, IETF, OASIS, 3GPP, 3GPP2).
ITU-T Security manual
– 6th edition produced.
International
Telecommunication
Union
30
ITU-T Study Group 17
Security
ASN.1 and OID Project
The SG17 ASN.1 & OID project continues to assist:
– Existing users of ASN.1 and object identifiers (OID), within and outside of
ITU-T (e.g., ITU-T SG 16, ISO/IEC JTC 1/SC 27, ISO TC 215, 3GPP, etc.).
– Countries (e.g., Algeria, Andorra, Argentina, Bolivia, Bosnia and
Herzegovina, Brazil, Honduras, Lithuania, Malaysia, Mongolia, Nicaragua,
Oman, Philippines, Rwanda, and Sri Lank), and in particular developing
countries, in setting a national registration authority for OIDs.
This project provided speakers and tutorial material, and
coordinates the provision of tool support to users and the
contents of related websites.
In cooperation with the TSB, a database is being maintained
that contains a machine-processable copy of the current
version of all ASN.1 modules that are included in ITU-T
Recommendations.
Database: http://www.itu.int/ITU-T/asn1/database (>840 modules)
OID Repository: http://www.oid-info.com (>966 000 OIDs).
International
Telecommunication
Union
31
ITU-T Study Group 17
Security
Statistics (I)
44 Rapporteur group meetings held
(stand-alone, e-meetings, or collaborative with ISO/IEC JTC
1/SC 6, 27)
592 contributions received
(excluding Rapporteur meetings)
8 SG meetings held
8 WP 1, 2, 3, 4, 5/17 meetings held in
conjunction with SG17 meetings
Min/Max/Average SG participants:
131/170/152.
International
Telecommunication
Union
32
ITU-T Study Group 17
Security
Statistics (II)
117 New/Revised Recommendations
approved, plus 10 Recommendations
determined or consented.
81 draft new/revised Recommendations
currently under development for approval
in the next study period.
12 Questions assigned by WTSA-12.
2 Questions revised during study period.
12 Questions proposed for next period.
International
Telecommunication
Union
33
ITU-T Study Group 17
Security
Workshops (I)
SG17 organized four workshops:
ITU-UPU mini workshop
Geneva, Switzerland, 21 January 2014.
ICT Security Standardization Challenges for
Developing Countries
Geneva, Switzerland, 15 – 16 September 2014.
Global Cybersecurity Challenges: Collaborating for
effective enhancement of cybersecurity in developing
countries
Geneva, Switzerland, 8 September 2015 afternoon.
ITU-ATU Workshop on Cybersecurity Strategy in
African Countries
Khartoum, Sudan from 24 to 26 July 2016.
International
Telecommunication
Union
34
ITU-T Study Group 17
Security
Workshops (II)
SG17 (through its lead study group function
on Languages) supported the following
workshops:
16th International System Design Languages Forum
Model-driven dependability engineering
Montreal, Canada, June 26-28, 2013.
8th System Analysis and Modeling (SAM-2014) workshop
Valencia, Spain, 29 – 30 September 2014, in collaboration with ACM
and IEEE.
17th SDL Forum
Berlin, Germany, 12 – 14 October 2015.
9th System Analysis and Modeling (SAM-2016) workshop
Saint Malo, France, 3-4 October 2016, in collaboration with ACM
and IEEE.

More Related Content

What's hot

Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
Abbie Barbir
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
ITU
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
Chaesub Lee
 
ITU-T Study Group 15 Introduction
ITU-T Study Group 15 IntroductionITU-T Study Group 15 Introduction
ITU-T Study Group 15 Introduction
ITU
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 Introduction
ITU
 
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Fabian Morais
 
Is 5G The Future of Mobile App Development?
Is 5G The Future of Mobile App Development?Is 5G The Future of Mobile App Development?
Is 5G The Future of Mobile App Development?
Consagous Technologies
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6
Miguel Ponce de Leon @ TSSG / Waterford Institute of Technology
 
IEEE IoT Open Standards Committee
IEEE IoT Open Standards CommitteeIEEE IoT Open Standards Committee
IEEE IoT Open Standards Committee
Tiago Barros
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
Edge AI and Vision Alliance
 
IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology
Manuel Castro
 
The Future with 5G
The Future with 5GThe Future with 5G
The Future with 5G
Musa Enderer
 
ITU - Setting the standard
ITU - Setting the standardITU - Setting the standard
ITU - Setting the standard
ITU
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
EUBrasilCloudFORUM .
 
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
Agence du Numérique (AdN)
 
Channel Coding for Beyond 5G: Primitive Rateless Codes
Channel Coding for Beyond 5G: Primitive Rateless CodesChannel Coding for Beyond 5G: Primitive Rateless Codes
Channel Coding for Beyond 5G: Primitive Rateless Codes
Mahyar Shirvanimoghaddam
 
Security Research Day Summary of Input
Security Research Day Summary of InputSecurity Research Day Summary of Input
Security Research Day Summary of Input
IoTUK
 
Zte communication 2015
Zte communication 2015Zte communication 2015
Zte communication 2015
Sitha Sok
 
ZTE Communications - Vol No.4
ZTE Communications - Vol No.4ZTE Communications - Vol No.4
ZTE Communications - Vol No.4
Sitha Sok
 

What's hot (20)

Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
 
ITU-T Study Group 15 Introduction
ITU-T Study Group 15 IntroductionITU-T Study Group 15 Introduction
ITU-T Study Group 15 Introduction
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 Introduction
 
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
 
Is 5G The Future of Mobile App Development?
Is 5G The Future of Mobile App Development?Is 5G The Future of Mobile App Development?
Is 5G The Future of Mobile App Development?
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6
 
IEEE IoT Open Standards Committee
IEEE IoT Open Standards CommitteeIEEE IoT Open Standards Committee
IEEE IoT Open Standards Committee
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
 
IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology
 
The Future with 5G
The Future with 5GThe Future with 5G
The Future with 5G
 
ITU - Setting the standard
ITU - Setting the standardITU - Setting the standard
ITU - Setting the standard
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
Taiwan Rapid Innovation Prototyping League for Entrepreneurs (TRIPLE) Introdu...
 
Channel Coding for Beyond 5G: Primitive Rateless Codes
Channel Coding for Beyond 5G: Primitive Rateless CodesChannel Coding for Beyond 5G: Primitive Rateless Codes
Channel Coding for Beyond 5G: Primitive Rateless Codes
 
Security Research Day Summary of Input
Security Research Day Summary of InputSecurity Research Day Summary of Input
Security Research Day Summary of Input
 
Zte communication 2015
Zte communication 2015Zte communication 2015
Zte communication 2015
 
ZTE Communications - Vol No.4
ZTE Communications - Vol No.4ZTE Communications - Vol No.4
ZTE Communications - Vol No.4
 

Viewers also liked

Overview of Non-Planned Procedures
Overview of Non-Planned ProceduresOverview of Non-Planned Procedures
Overview of Non-Planned Procedures
hfng
 
Itu world slideshare
Itu world slideshareItu world slideshare
Itu world slideshare
ITU
 
Brindavan Group HR And Training
Brindavan Group HR And TrainingBrindavan Group HR And Training
Brindavan Group HR And Trainingsethunnv
 
System Transformation
System TransformationSystem Transformation
System Transformation
ITU
 
Technologies for future mobile transport networks
Technologies for future mobile transport networksTechnologies for future mobile transport networks
Technologies for future mobile transport networks
ITU
 
Teacher study groups -student presentation
Teacher study groups -student presentationTeacher study groups -student presentation
Teacher study groups -student presentation
jistudents
 
Using ICN to meet the IMT-2020 goals
Using ICN to meet the IMT-2020 goalsUsing ICN to meet the IMT-2020 goals
Using ICN to meet the IMT-2020 goals
ITU
 
ITU-T Study Group 16 Meeting Achievements
ITU-T Study Group 16 Meeting AchievementsITU-T Study Group 16 Meeting Achievements
ITU-T Study Group 16 Meeting Achievements
ITU
 
High Quality 360 Video Rendering and Streaming
High Quality 360 Video Rendering and StreamingHigh Quality 360 Video Rendering and Streaming
High Quality 360 Video Rendering and Streaming
ITU
 
The Bombay Labour Welfare Fund Act, 1953
The Bombay Labour Welfare Fund Act, 1953The Bombay Labour Welfare Fund Act, 1953
The Bombay Labour Welfare Fund Act, 1953Sanman Kulkarni
 
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
IoT Tunisia
 
Imed Ammar: réseaux bas débit iot - IoT Tunisia 2016
Imed Ammar:  réseaux bas débit iot  - IoT Tunisia 2016Imed Ammar:  réseaux bas débit iot  - IoT Tunisia 2016
Imed Ammar: réseaux bas débit iot - IoT Tunisia 2016
IoT Tunisia
 
Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020
ITU
 
EBU's report on DVB and VR
EBU's report on DVB and VREBU's report on DVB and VR
EBU's report on DVB and VR
ITU
 
Immersive Telepresence
Immersive TelepresenceImmersive Telepresence
Immersive Telepresence
ITU
 
Homoeopathic materia medica group study - Carbon group slide show presentatio...
Homoeopathic materia medica group study - Carbon group slide show presentatio...Homoeopathic materia medica group study - Carbon group slide show presentatio...
Homoeopathic materia medica group study - Carbon group slide show presentatio...
Dr.hansraj salve
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5G
ITU
 
Helping students dvelop good study habits
Helping students dvelop good study habitsHelping students dvelop good study habits
Helping students dvelop good study habitsJean Rose Palacio
 
5G End to-end network slicing Demo
5G End to-end network slicing Demo5G End to-end network slicing Demo
5G End to-end network slicing Demo
ITU
 
MPEG Immersive Media
MPEG Immersive MediaMPEG Immersive Media
MPEG Immersive Media
ITU
 

Viewers also liked (20)

Overview of Non-Planned Procedures
Overview of Non-Planned ProceduresOverview of Non-Planned Procedures
Overview of Non-Planned Procedures
 
Itu world slideshare
Itu world slideshareItu world slideshare
Itu world slideshare
 
Brindavan Group HR And Training
Brindavan Group HR And TrainingBrindavan Group HR And Training
Brindavan Group HR And Training
 
System Transformation
System TransformationSystem Transformation
System Transformation
 
Technologies for future mobile transport networks
Technologies for future mobile transport networksTechnologies for future mobile transport networks
Technologies for future mobile transport networks
 
Teacher study groups -student presentation
Teacher study groups -student presentationTeacher study groups -student presentation
Teacher study groups -student presentation
 
Using ICN to meet the IMT-2020 goals
Using ICN to meet the IMT-2020 goalsUsing ICN to meet the IMT-2020 goals
Using ICN to meet the IMT-2020 goals
 
ITU-T Study Group 16 Meeting Achievements
ITU-T Study Group 16 Meeting AchievementsITU-T Study Group 16 Meeting Achievements
ITU-T Study Group 16 Meeting Achievements
 
High Quality 360 Video Rendering and Streaming
High Quality 360 Video Rendering and StreamingHigh Quality 360 Video Rendering and Streaming
High Quality 360 Video Rendering and Streaming
 
The Bombay Labour Welfare Fund Act, 1953
The Bombay Labour Welfare Fund Act, 1953The Bombay Labour Welfare Fund Act, 1953
The Bombay Labour Welfare Fund Act, 1953
 
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
 
Imed Ammar: réseaux bas débit iot - IoT Tunisia 2016
Imed Ammar:  réseaux bas débit iot  - IoT Tunisia 2016Imed Ammar:  réseaux bas débit iot  - IoT Tunisia 2016
Imed Ammar: réseaux bas débit iot - IoT Tunisia 2016
 
Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020Emerging 8K services and their applications towards 2020
Emerging 8K services and their applications towards 2020
 
EBU's report on DVB and VR
EBU's report on DVB and VREBU's report on DVB and VR
EBU's report on DVB and VR
 
Immersive Telepresence
Immersive TelepresenceImmersive Telepresence
Immersive Telepresence
 
Homoeopathic materia medica group study - Carbon group slide show presentatio...
Homoeopathic materia medica group study - Carbon group slide show presentatio...Homoeopathic materia medica group study - Carbon group slide show presentatio...
Homoeopathic materia medica group study - Carbon group slide show presentatio...
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5G
 
Helping students dvelop good study habits
Helping students dvelop good study habitsHelping students dvelop good study habits
Helping students dvelop good study habits
 
5G End to-end network slicing Demo
5G End to-end network slicing Demo5G End to-end network slicing Demo
5G End to-end network slicing Demo
 
MPEG Immersive Media
MPEG Immersive MediaMPEG Immersive Media
MPEG Immersive Media
 

Similar to ITU-T Study Group 17 Introduction

ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
ITU
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
AM Publications,India
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
Elsa Prieto
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IJNSA Journal
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IJNSA Journal
 
The red book
The red book  The red book
The red book
habiba Elmasry
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
BigData_Europe
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
BL4CKSWAN Srl
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
Asst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementimec.archive
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
PremBorse1
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
INFOGAIN PUBLICATION
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 

Similar to ITU-T Study Group 17 Introduction (20)

ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 
The red book
The red book  The red book
The red book
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departement
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 

More from ITU

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
ITU
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
ITU
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
ITU
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
ITU
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
ITU
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
ITU
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
ITU
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
ITU
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
ITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
ITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
ITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
ITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
ITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
ITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
ITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
ITU
 

More from ITU (20)

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

ITU-T Study Group 17 Introduction

  • 1. Security ITU-T STUDY GROUP 17 Arkadiy Kremer Chairman, SG17 Summary of Results Study Period 2013-2016 Heung-Youl Youm Vice Chairman, SG17 on behalf of
  • 2. Study Group 17 Security 1 Conclusions 3 Acknowledgements 4 Future perspective of SG17 2 Contents Additional Slides  Terms of reference  Management team  Structure  Leadership for other groups (JCAs and FGs)  Highlights of achievements / Projects  Highlights of WP1, WP2, WP3, WP4, WP5/17, projects  Statistics  Workshops (with SG17 leadership / participation)
  • 3. Study Group 17- Security Building confidence and security in the use of ICTs Cloud computing security Cybersecurity ITS security Countering spam IoT security SDN security Mobile (phone) security Smart-grid security Identity management Information Security Management Application security Big Data analytics security PKI, PMI, Directory Telebiometrics Languages (ASN.1, SDL, MSC, TTCN-3 …)
  • 5. ICT security (I) Security Global Experts Attractiveness of participation Separation of security responsibilities within ITU-T Collaboration Centre of excellence SG13 SG20 SG17
  • 6. ICT security (II) Cybersecurity SG17 as centre of security competence Development of security approaches Strengthening the trust framework Implementation of ITU-T Recs Information Society SG17 ITU-D
  • 7. ICT security, PII, PKI Internet of things (IoT) SG17 as lead study group for security Smart grids Protection of Personally Identifiable Information (PII) Protection of Children Online Public key infrastructure (PKI) SG17
  • 8. Questions – LSG – JCAs – Projects SG17 proposed 12 Questions for the next study period and they shall all continue. SG17 should be the lead study group responsible for: Languages and description techniques JCA-IdM and JCA-COP as well as ASN.1 & OID Projects need to continue given their important contributions.
  • 9. Increased Participation above 150 participants SG17 has successfully evolved to: cover new security issues address new security challenges with security experts in core Questions. SG17 achieved significantly build-up of participation and energy in: Identity Management Cybersecurity Cloud Computing Security SG17 has built strong relations with other key bodies working on security and conducted numerous collaborative efforts SG17 has promoted and disseminated ITU-T security work
  • 10. International Telecommunication Union 10 ITU-T Study Group 17 Security Acknowledgements Delegates with their many contributions Editors in drafting texts for Recommendations Rapporteurs in leading work efforts Liaison officers in coordinating efforts with other bodies Project leaders and JCA leaders Management team including Working Party chairmen TSB support – Counsellors, Assistants and other staff Great thanks are due to the many people who have contributed to the enormous success of SG17 during this study period: Best wishes to all for the next study period.
  • 12. International Telecommunication Union 12 ITU-T Study Group 17 Security Supplemental Slides Terms of reference Management team Structure Leadership for other groups (JCAs and FGs) Highlights of achievements / Projects Highlights of WP1, WP2, WP3, WP4, WP5/17, projects Statistics Workshops (with SG17 leadership / participation).
  • 13. International Telecommunication Union 13 ITU-T Study Group 17 Security Terms of Reference Current: Responsible for building confidence and security in the use of information and communication technologies (ICT). This includes studies relating to cybersecurity, security management, countering spam and identity management. It also includes security architecture and framework, protection of personally identifiable information, and security of applications and services for the Internet of things, smart grid, smartphone, Internet Protocol television (IPTV), web services, social network, cloud computing, mobile financial system and telebiometrics. Study Group 17 is also responsible for the application of open system communications, including directory and object identifiers, and for technical languages, the method for their usage and other issues related to the software aspects of telecommunication systems, and for conformance testing to improve the quality of Recommendations. Future perspective: include security aspects of software-defined networking (SDN), NFV security, and big data analytics.
  • 14. International Telecommunication Union 14 ITU-T Study Group 17 Security Management Team (I) Chairman Arkadiy Kremer Russian Federation Vice-Chairmen Khalid BELHOUL United Arab Emirates Mohamed M.K. ELHAJ Mario German FROMOW RANGEL Sudan Mexico Antonio GUIMARAES Brazil Zhaoji LIN China (P.R.) Patrick MWESIGWA Uganda Koji NAKAO Japan Sacid SARIKAYA Turkey Heung Youl YOUM Korea (Republic of)
  • 15. International Telecommunication Union 15 ITU-T Study Group 17 Security Management Team (II) WP Chairmen WP 1/17 Koji NAKAO Japan WP 2/17 Sacid SARIKAYA Turkey WP 3/17 Heung Youl YOUM Korea (Rep. of) WP 4/17 Antonio GUIMARAES Brazil WP 5/17 Zhaoji LIN China (P.R.) TSB Martin EUCHNER Advisor Sarah SCOTT Assistant
  • 16. International Telecommunication Union 16 ITU-T Study Group 17 Security Study Group Structure (1/2) WP 1/17, Fundamental security Telecommunication/ICT security coordination, security architectures/frameworks, SDN security, network security, telecommunications information security management. WP 2/17, Network and information security Cybersecurity, countering spam. WP 3/17, Identity management and cloud computing security Cloud computing security, SOA security, identity management and architectures.
  • 17. International Telecommunication Union 17 ITU-T Study Group 17 Security Study Group Structure (2/2) WP 4/17, Application security IPTV security, ubiquitous sensor network security, home network security, peer-to-peer security, IoT security, ITS security, smart-grid security, SDN security, application security services, telebiometrics security, e-health security. WP 5/17, Formal languages Directory, PKI/PMI, ASN.1, OID, SDL-2010, ODP, URN, MSC, TTCN-3, maintenance of OSI Recommendations. Joint coordination activities JCA-IdM, JCA-COP SG17 Regional Group in Africa.
  • 18. International Telecommunication Union 18 ITU-T Study Group 17 Security Leadership for SG 17-related other groups (I) JCA-IdM – Co-Chairmen: Mr Abbie BARBIR, Aetna, Mr Hiroshi TAKECHI, NEC – Represented: SGs 2, 3, 5, 9, 12, 13, 15, 16, 17, American Bar Association, ENISA, ETSI, ISO/IEC JTC 1/SC 27/WG5, ISO/IEC JTC 1/SC17, ENISA, ETSI/ISG, GLEIF, GSMA, OASIS/IdCloud TC, OASIS Trust Elevation TC, OASIS IBOPS, OpenID Foundation, FIDO Alliance, OASIS TC IBOPS, Kantara Initiative, American Bar Association, GLEIF, STORK 2.0 project, and UPU,… – 10 meetings, 44 documents processed.
  • 19. International Telecommunication Union 19 ITU-T Study Group 17 Security Leadership for SG 17-related other groups (II) JCA-COP – Chairman: Mr Philip RUSHTON, United Kingdom – Established April 2012 – Represented: ISO/IEC JTC 1/SC 27/WG5, IETF/ISOC, ITU-D Q3/2, DeafKidzInternational, ECPAT, EFC, FCACP, FOSI, GSMA, ICMEC, I-KiZ, and Iran (Islamic Republic of); outreach to COP stakeholders – 8 meetings, 3 outgoing liaisons.
  • 20. International Telecommunication Union 20 ITU-T Study Group 17 Security Highlights of achievements (I) SG17 successfully transitioned into a core competency center on security averaging 155 participants. SG17 examined 592 contributions and 3017 TDs and developed 49 new, revised 69 Recommendations, and developed 13 Supplements. 10 Recommendations currently under AAP or TAP. Up to 81 draft new/revised Recommendations currently under development for approval in the next study period. 3 Lead Study Group responsibilities, 2 JCAs, and 2 Projects were very active. Increased collaboration with SDOs (e.g., joint texts).
  • 21. International Telecommunication Union 21 ITU-T Study Group 17 Security Highlights of achievements (II) Lead study group for Security – Close coordination and collaboration with other SGs and SDOs on security; particular focus has been placed upon partnerships and avoiding potential conflicts in the work. – Joint work with several SCs in ISO/IEC JTC 1. – Produced 6th edition of the “Security Manual” that promotes ITU-T’s security work. – Produced Technical Report on successful use of security standards – Security Standards Roadmap and Security Compendium kept up-to-date.
  • 22. International Telecommunication Union 22 ITU-T Study Group 17 Security Highlights of achievements (III) Lead study group for Telecommunication Security – Security collaboration arrangements between SG17 and SG13 on cloud computing security, and between SG17 and SG20 on IoT security. – Four workshops held on security. – Maintained an on-line listing of SG17 relationships with TCs of ISO and IEC and SCs of ISO/IEC JTC 1 (identifies nature of relation of joint work, common/twin text, cooperation mode, etc) (In response to WTSA-12 Resolution 7).
  • 23. International Telecommunication Union 23 ITU-T Study Group 17 Security Highlights of achievements (IV) Lead study group for Identity Management – Continued collaboration with OASIS on IdM. – A WIKI with IdM Roadmap is available from the SG17 web page - provides a compilation of existing and ongoing IdM standards globally & reflects coordination with other bodies. – Continuation of Joint Coordination Activity of Identity Management (JCA-IdM). Lead study group for Languages and Description Techniques – Collaboration with ETSI on TTCN-3, JTC 1/SC 7 on ODP, and JTC 1/SC 6 on ASN.1, OIDs and registration. – Supported SDL-Forum and SAM Workshop on languages.
  • 24. International Telecommunication Union 24 ITU-T Study Group 17 Security Fundamental Security (WP 1/17) Highlights (I) Telecommunication/ICT security coordination – Management support of other SG17 security Questions – Security coordination – Security project (see separate slide) Security architecture and framework – Network security architecture, IPv6 security, … – 4 new Recs, 1 new Supplement; 3 under development. Telecommunications information security management – In support of WTSA-12 Resolution 58 – ISM framework, risk/asset/incident management, PII code of practice, … – 1 revised Rec, 1 new Supplement; 1 in TAP – 4 under development.
  • 25. International Telecommunication Union 25 ITU-T Study Group 17 Security Network and Information Security (WP 2/17) Highlights (II) Cybersecurity – In support of WTSA-12 Resolution 50. – Finalized cybersecurity information exchange (CYBEX), X.1500 series. – Intense work program; many collaborations with principal forums of the cybersecurity community. – 9 new Recs, 8 Amendments, 2 new Supplements (1 revised); 2 in TAP – 3 under development. Countering spam by technical means – In support WTSA-12 Resolution 52 – Countering spam in voice spam, mobile messaging spam, … – 2 new Recs, 2 Supplements; – 4 under development.
  • 26. International Telecommunication Union 26 ITU-T Study Group 17 Security Identity Management and cloud computing security (WP 3/17) Highlights Identity management architecture and mechanisms – Discovery of IdM, IAM taxonomy, telebiometric authentication, entity authentication assurance, trust elevation, sharing network authentication with service authentication, … – 4 new Recs, 3 under development. Cloud computing security – Cloud computing security framework, software as a service security, CaaS/IaaS/NaaS security, Big Data as a Service, operational security for cloud computing, Code of practice for information security controls based on ISO/IEC 27002 for cloud services, … – 5 new Recs, 1 revised Rec, 5 under development.
  • 27. International Telecommunication Union 27 ITU-T Study Group 17 Security Application Security (WP 4/17) Highlights Security aspects of ubiquitous telecommunication services – IoT security, ITS security, SDN security, smart-grid security, mobile security, mobile phone security, IPTV security and content protection, ubiquitous network security framework, … – 2 new Recs; 3 new Supplements, 3 in TAP – 6 under development Secure applications services – Application security mechanisms, XACML, multi-factor authentication, anonymous authentication, authentication in IDSP environments, non-repudiation, peer-to-peer security, fraud detection, … – 8 new Recs, 2 new Supplements – 6 under development Telebiometrics – Telebiometrics, e-Health & telemedicines security protocols – 3 new Recs, 1 in TAP, 8 under development.
  • 28. International Telecommunication Union 28 ITU-T Study Group 17 Security Formal languages (WP 5/17) Highlights (I) Generic technologies to support secure applications – X.500-series on Directory including X.509 on PKI, computerized directory assistance, Abstract Syntax Notation One (ASN.1), Object Identifiers (OIDs) and associated registration authorities, ODP, certified e-mail. – ASN.1 and OID project (see separate slide) – 4 new Recs, 23 revised Recs, 14 technical corrigenda to X.500 series; 1 TR; 8 under development. Formal languages for telecommunication software and testing – SDL-2010, UML, MSC, URN, Testing and Test Control Notation (TTCN-3), … – 6 new Recs, 30 revised Recs; 4 revised Implementer Guides, 1 revised Supplement, 3 in AAP, 19 under development.
  • 29. International Telecommunication Union 29 ITU-T Study Group 17 Security Telecommunication/ICT security coordination Project (Major focus is on coordination and outreach) Security coordination – Within SG17, with ITU-T SGs, with ITU-D and externally. – Kept TSAG, ISO/IEC/ITU-T SAG-S informed on security efforts. – Made presentations to workshops/seminars and to GSC. – Maintained reference information on the LSG on security webpage. Compendium of Security Recommendations – Includes catalogs of approved security-related Recommendations and security definitions extracted from approved Recommendations. Security Standards Roadmap – Includes searchable database of approved ICT security standards from ITU-T and others (e.g., ATIS, ENISA, ETSI, IEEE, ISO/IEC JTC 1, IETF, OASIS, 3GPP, 3GPP2). ITU-T Security manual – 6th edition produced.
  • 30. International Telecommunication Union 30 ITU-T Study Group 17 Security ASN.1 and OID Project The SG17 ASN.1 & OID project continues to assist: – Existing users of ASN.1 and object identifiers (OID), within and outside of ITU-T (e.g., ITU-T SG 16, ISO/IEC JTC 1/SC 27, ISO TC 215, 3GPP, etc.). – Countries (e.g., Algeria, Andorra, Argentina, Bolivia, Bosnia and Herzegovina, Brazil, Honduras, Lithuania, Malaysia, Mongolia, Nicaragua, Oman, Philippines, Rwanda, and Sri Lank), and in particular developing countries, in setting a national registration authority for OIDs. This project provided speakers and tutorial material, and coordinates the provision of tool support to users and the contents of related websites. In cooperation with the TSB, a database is being maintained that contains a machine-processable copy of the current version of all ASN.1 modules that are included in ITU-T Recommendations. Database: http://www.itu.int/ITU-T/asn1/database (>840 modules) OID Repository: http://www.oid-info.com (>966 000 OIDs).
  • 31. International Telecommunication Union 31 ITU-T Study Group 17 Security Statistics (I) 44 Rapporteur group meetings held (stand-alone, e-meetings, or collaborative with ISO/IEC JTC 1/SC 6, 27) 592 contributions received (excluding Rapporteur meetings) 8 SG meetings held 8 WP 1, 2, 3, 4, 5/17 meetings held in conjunction with SG17 meetings Min/Max/Average SG participants: 131/170/152.
  • 32. International Telecommunication Union 32 ITU-T Study Group 17 Security Statistics (II) 117 New/Revised Recommendations approved, plus 10 Recommendations determined or consented. 81 draft new/revised Recommendations currently under development for approval in the next study period. 12 Questions assigned by WTSA-12. 2 Questions revised during study period. 12 Questions proposed for next period.
  • 33. International Telecommunication Union 33 ITU-T Study Group 17 Security Workshops (I) SG17 organized four workshops: ITU-UPU mini workshop Geneva, Switzerland, 21 January 2014. ICT Security Standardization Challenges for Developing Countries Geneva, Switzerland, 15 – 16 September 2014. Global Cybersecurity Challenges: Collaborating for effective enhancement of cybersecurity in developing countries Geneva, Switzerland, 8 September 2015 afternoon. ITU-ATU Workshop on Cybersecurity Strategy in African Countries Khartoum, Sudan from 24 to 26 July 2016.
  • 34. International Telecommunication Union 34 ITU-T Study Group 17 Security Workshops (II) SG17 (through its lead study group function on Languages) supported the following workshops: 16th International System Design Languages Forum Model-driven dependability engineering Montreal, Canada, June 26-28, 2013. 8th System Analysis and Modeling (SAM-2014) workshop Valencia, Spain, 29 – 30 September 2014, in collaboration with ACM and IEEE. 17th SDL Forum Berlin, Germany, 12 – 14 October 2015. 9th System Analysis and Modeling (SAM-2016) workshop Saint Malo, France, 3-4 October 2016, in collaboration with ACM and IEEE.