Achievements and future works of ITU-T Study Group 17 on Security
Presented at WTSA-16 by Mr Heung-Youl Youm, Vice-chairman, on behalf of Mr Arkadiy Kremer, Chairman of ITU-T Study Group 17
Achievements and future works of ITU-T Study Group 3 on Tariff and accounting principles including related telecommunication economic and policy issues
Presented at WTSA-16 by Mr Seiichi Tsugawa, Chairman of ITU-T Study Group 3
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
Achievements and future works of ITU-T Study Group 20 on IoT and its applications including smart cities and communities
Presented at WTSA-16 by Mr Nasser Saleh Al Marzouqi, Chairman of ITU-T Study Group 20
Achievements and future works of ITU-T Study Group 9 on Broadband Cable and TV
Presented at WTSA-16 by Mr Arthur Webster, Chairman of ITU-T Study Group 9
Achievements and future works of ITU-T Study Group 5 on Environment and Climate Change
Presented at WTSA-16 by Mr Ahmed Zeddam, Chairman of ITU-T Study Group 5
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
Achievements and future works of ITU-T Study Group 3 on Tariff and accounting principles including related telecommunication economic and policy issues
Presented at WTSA-16 by Mr Seiichi Tsugawa, Chairman of ITU-T Study Group 3
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
Achievements and future works of ITU-T Study Group 20 on IoT and its applications including smart cities and communities
Presented at WTSA-16 by Mr Nasser Saleh Al Marzouqi, Chairman of ITU-T Study Group 20
Achievements and future works of ITU-T Study Group 9 on Broadband Cable and TV
Presented at WTSA-16 by Mr Arthur Webster, Chairman of ITU-T Study Group 9
Achievements and future works of ITU-T Study Group 5 on Environment and Climate Change
Presented at WTSA-16 by Mr Ahmed Zeddam, Chairman of ITU-T Study Group 5
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
World Conference on International Telecommunications (#WCIT12) myth busting - presented by ITU to civil society stakeholders during the WCIT12 global briefing session held at ITU HQ on 9 October, 15:00-16:30.
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0Fabian Morais
As part of a team of four members, I carried out and assisted team mates in this research project that was given to us by DXC technology malaysia which was aim to investigate the impact of 5G on smart manufacturing and I.R 5.0. As part of this project the team completed the background research on 5G, What are the Challenges faced by Countries investing in 5G and How 5G can impact Smart Manufacturing.
According to the market experts, 5G broadband technology will come in the next year but most of the mobile app development companies have already started working on it and developers started imagining its possibilities. Wondering, how it will boost the future of mobile app development? Check out our newly published blog!!
Presentation for the IEEE IoT Open Standards Committee about the standards landscape at ITU-T Study Group 20 - Internet of Things, Smart Cities and Communities.
For the full video of this presentation, please visit:
https://www.edge-ai-vision.com/2020/11/federated-edge-computing-system-architectures-a-presentation-from-intel/
For more information about edge AI and computer vision, please visit:
https://www.edge-ai-vision.com
Vaidyanathan Krishnamoorthy, Edge Inference Solutions Architect at Intel, presents the “Federated Edge Computing System Architectures” tutorial at the September 2020 Embedded Vision Summit.
With ever-increasing amounts of video and other sensor data, and growing requirements for privacy and low latency, inferencing at the edge is increasingly attractive. But there are many ways to allocate and coordinate computing resources for edge inferencing. For example, to achieve scale and fault tolerance, design principles from cloud computing can be applied to create compute clusters at the edge that are managed by the cloud, an approach called “federated computing.”
In this talk, Krishnamoorthy explores a range of edge computing system architectures, with a focus on federated computing. He illustrates how these system architectures utilize Intel CPUs and accelerators to address real-world use cases in retail and industrial applications.
IEEE Education Society: Reshaping the Future of Technology Manuel Castro
Manuel Gericota (Instituto Politecnico Porto, Portugal) and Javier García-Zubía (University of Deusto, Bilbao, Spain), chair the meeting from the Spanish and Portuguese Chapter of the IEEE Education Society, linked to the webinar video at
https://www.youtube.com/watch?v=Uab7f-LCYuE
Although all topics are related to computing, different perspectives and application areas will guarantee that a great diversity of interesting points will be covered during the meeting. The presentation of Manuel Castro and Unai Hernández-Jayo will be centered around the Internet of Things (IoT) (Manuel in education and Unai in its application to autonomous cars), the one from Manuel Caeiro will be focused in wearables, electronic devices and systems incorporated in some part of our body or clothes, and the last one from Manuel Gericota will explain why Field Programmable Gate Arrays (FPGAs) are being (again) one of the current hot topics.
A brief introduction about the MOOC - Foundations to Open Education and OERs repositories, is presented.
Methods provides an in-depth, 360° look at key technology areas to educate, inspire and help you drive to new levels of innovation. In this issue, 5G is coming, and big changes are coming with it. We will examine how 5G infrastructure, antenna design and security advantages will shape the engineering landscape.
The Study Groups of ITU’s Telecommunication Standardization Sector (ITU-T) assemble experts from around the world to develop international standards known as ITU-T Recommendations which act as defining elements in the global infrastructure of information and communication technologies (ICTs). Standards are critical to the interoperability of ICTs and whether we exchange voice, video or data messages, standards enable global communications by ensuring that countries’ ICT networks and devices are speaking the same language.
International ICT standards avoid costly market battles over preferred technologies, and for companies from emerging markets, they create a level playing field which provides access to new markets. They are an essential aid to developing countries in building their infrastructure and encouraging economic development, and through economies of scale, they can reduce costs for all: manufacturers, operators and consumers.
From its inception in 1865, ITU-T has driven a contribution-led, consensus-based approach to standards development in which all countries and companies, no matter how large or small, are afforded equal rights to influence the development of ITU-T Recommendations. From its beginnings as a body standardizing international telegraph exchange, through its formative role in telecommunications, and in today’s converged ICT ecosystem, ITU-T has provided the world’s best facilities to the global standardization community and remains the world’s only truly global ICT standards body.
Based at ITU’s headquarters in Geneva, the Telecommunication Standardization Bureau (TSB) provides secretariat support to ITU-T Study Groups through sophisticated electronic working methods and state-of-the-art facilities in Geneva accommodating the six official languages of the Union – Arabic, Chinese, English, French, Russian and Spanish. Headed by an elected official with the title Director, it is the body responsible for providing cohesion to ITU-T’s standards development process.
For more information on ITU's standardization work, please visit: http://www.itu.int/en/ITU-T/Pages/default.aspx
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
Presentation by Fabio Martinelli, CNR, National Research Council of Italy, representing the NECS project (European Network for Cybersecurity) at Cloudscape Brazil 2017
#Primitive_Rateless_Codes have excellent properties, which make them promising solutions for #B5G and #6G. To find out more about #PR_codes watch this recording from my recent talk at #AusCTW.
The paper is available on
Arxiv https://arxiv.org/pdf/2107.05774.pdf
IEEEhttps://ieeexplore.ieee.org/document/9481932
By Dr. Mahyar Shirvanimoghaddam
The University of Sydney
https://www.sydney.edu.au/engineering/about/our-people/academic-staff/mahyar-shirvanimoghaddam.html
https://www.mahyarshm.com/
ZTE Communications is a quarterly peer‐reviewed technical magazine ISSN (1673‐5188). It focuses on the innovation of ICT technologies, and has been listed in major international databases. It is distributed to telecom reseachers and operators in more than 140 countries
ZTE Communications ZTE Communications is a quarterly peer‐reviewed technical magazine ISSN (1673‐5188). It focuses on the innovation of ICT technologies, and has been listed in major international databases. It is distributed to telecom reseachers and operators in more than 140 countries.
World Conference on International Telecommunications (#WCIT12) myth busting - presented by ITU to civil society stakeholders during the WCIT12 global briefing session held at ITU HQ on 9 October, 15:00-16:30.
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0Fabian Morais
As part of a team of four members, I carried out and assisted team mates in this research project that was given to us by DXC technology malaysia which was aim to investigate the impact of 5G on smart manufacturing and I.R 5.0. As part of this project the team completed the background research on 5G, What are the Challenges faced by Countries investing in 5G and How 5G can impact Smart Manufacturing.
According to the market experts, 5G broadband technology will come in the next year but most of the mobile app development companies have already started working on it and developers started imagining its possibilities. Wondering, how it will boost the future of mobile app development? Check out our newly published blog!!
Presentation for the IEEE IoT Open Standards Committee about the standards landscape at ITU-T Study Group 20 - Internet of Things, Smart Cities and Communities.
For the full video of this presentation, please visit:
https://www.edge-ai-vision.com/2020/11/federated-edge-computing-system-architectures-a-presentation-from-intel/
For more information about edge AI and computer vision, please visit:
https://www.edge-ai-vision.com
Vaidyanathan Krishnamoorthy, Edge Inference Solutions Architect at Intel, presents the “Federated Edge Computing System Architectures” tutorial at the September 2020 Embedded Vision Summit.
With ever-increasing amounts of video and other sensor data, and growing requirements for privacy and low latency, inferencing at the edge is increasingly attractive. But there are many ways to allocate and coordinate computing resources for edge inferencing. For example, to achieve scale and fault tolerance, design principles from cloud computing can be applied to create compute clusters at the edge that are managed by the cloud, an approach called “federated computing.”
In this talk, Krishnamoorthy explores a range of edge computing system architectures, with a focus on federated computing. He illustrates how these system architectures utilize Intel CPUs and accelerators to address real-world use cases in retail and industrial applications.
IEEE Education Society: Reshaping the Future of Technology Manuel Castro
Manuel Gericota (Instituto Politecnico Porto, Portugal) and Javier García-Zubía (University of Deusto, Bilbao, Spain), chair the meeting from the Spanish and Portuguese Chapter of the IEEE Education Society, linked to the webinar video at
https://www.youtube.com/watch?v=Uab7f-LCYuE
Although all topics are related to computing, different perspectives and application areas will guarantee that a great diversity of interesting points will be covered during the meeting. The presentation of Manuel Castro and Unai Hernández-Jayo will be centered around the Internet of Things (IoT) (Manuel in education and Unai in its application to autonomous cars), the one from Manuel Caeiro will be focused in wearables, electronic devices and systems incorporated in some part of our body or clothes, and the last one from Manuel Gericota will explain why Field Programmable Gate Arrays (FPGAs) are being (again) one of the current hot topics.
A brief introduction about the MOOC - Foundations to Open Education and OERs repositories, is presented.
Methods provides an in-depth, 360° look at key technology areas to educate, inspire and help you drive to new levels of innovation. In this issue, 5G is coming, and big changes are coming with it. We will examine how 5G infrastructure, antenna design and security advantages will shape the engineering landscape.
The Study Groups of ITU’s Telecommunication Standardization Sector (ITU-T) assemble experts from around the world to develop international standards known as ITU-T Recommendations which act as defining elements in the global infrastructure of information and communication technologies (ICTs). Standards are critical to the interoperability of ICTs and whether we exchange voice, video or data messages, standards enable global communications by ensuring that countries’ ICT networks and devices are speaking the same language.
International ICT standards avoid costly market battles over preferred technologies, and for companies from emerging markets, they create a level playing field which provides access to new markets. They are an essential aid to developing countries in building their infrastructure and encouraging economic development, and through economies of scale, they can reduce costs for all: manufacturers, operators and consumers.
From its inception in 1865, ITU-T has driven a contribution-led, consensus-based approach to standards development in which all countries and companies, no matter how large or small, are afforded equal rights to influence the development of ITU-T Recommendations. From its beginnings as a body standardizing international telegraph exchange, through its formative role in telecommunications, and in today’s converged ICT ecosystem, ITU-T has provided the world’s best facilities to the global standardization community and remains the world’s only truly global ICT standards body.
Based at ITU’s headquarters in Geneva, the Telecommunication Standardization Bureau (TSB) provides secretariat support to ITU-T Study Groups through sophisticated electronic working methods and state-of-the-art facilities in Geneva accommodating the six official languages of the Union – Arabic, Chinese, English, French, Russian and Spanish. Headed by an elected official with the title Director, it is the body responsible for providing cohesion to ITU-T’s standards development process.
For more information on ITU's standardization work, please visit: http://www.itu.int/en/ITU-T/Pages/default.aspx
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
Presentation by Fabio Martinelli, CNR, National Research Council of Italy, representing the NECS project (European Network for Cybersecurity) at Cloudscape Brazil 2017
#Primitive_Rateless_Codes have excellent properties, which make them promising solutions for #B5G and #6G. To find out more about #PR_codes watch this recording from my recent talk at #AusCTW.
The paper is available on
Arxiv https://arxiv.org/pdf/2107.05774.pdf
IEEEhttps://ieeexplore.ieee.org/document/9481932
By Dr. Mahyar Shirvanimoghaddam
The University of Sydney
https://www.sydney.edu.au/engineering/about/our-people/academic-staff/mahyar-shirvanimoghaddam.html
https://www.mahyarshm.com/
ZTE Communications is a quarterly peer‐reviewed technical magazine ISSN (1673‐5188). It focuses on the innovation of ICT technologies, and has been listed in major international databases. It is distributed to telecom reseachers and operators in more than 140 countries
ZTE Communications ZTE Communications is a quarterly peer‐reviewed technical magazine ISSN (1673‐5188). It focuses on the innovation of ICT technologies, and has been listed in major international databases. It is distributed to telecom reseachers and operators in more than 140 countries.
How Digital Solutions will drive progress twoards the Sustainable Development Goals. A slide deck previewing report findings from a GESI / ITU collaboration.
Technologies for future mobile transport networksITU
This presentation presents several technologies for future mobile transport networks using the seamless convergence of fiber and wireless access networks. We first present a flexible and efficient mobile fronthaul system for ultra-dense small cells using a convergence of fiber and millimeter-wave systems. We then present a simple and low cost optical system for simultaneous transmission of multiple heterogeneous wireless signals, such as multi-RATs, operators, mobile signals and fronthaul/backhaul signals, using subcarrier multiplexing intermediate frequency over fiber system and efficient data mapping and de-mapping algorithms. Finally, we present an efficient solution to provide high-speed communications to high-speed trains using a seamless convergence of wavelength-division multiplexing radio-over-fiber and linearly located linear cell systems.
Author : Pham Tien Dat, NICT Japan
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
Demonstration of features and abilities of ICN to deliver on IMT-2020 goals
Author : Phil Brown, Fujitsu Laboratories of America, Inc.
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
High Quality 360 Video Rendering and Streaming
By Louay Bassbouss, senior project manager R&D, Future Applications and Media (FAME) of the Fraunhofer Institute for Open Communications Systems (FOKUS)
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
Emerging 8K services and their applications towards 2020ITU
Emerging 8K services and their applications towards 2020
By Shuichi Aoki, Science and Technology Research Laboratories, NHK
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
EBU's report on DVB and VR
By David Wood, Consultant in Technology and Innovation to the European Broadcasting Union (EBU)
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
Immersive Telepresence - case study : Kirari
By Yoshihide Tonomura, Nippon Telegraph and Telephone (NTT) Corporation
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
Homoeopathic materia medica group study - Carbon group slide show presentatio...Dr.hansraj salve
Simplest and easiest way to learn and remember materia medica drugs is group study of homoeopathic materia medica this is a demo for our students and practitioner for there reference if you like share with your friends. for complete understanding watch slide show presentation now!!!
Consideration of fixed mobile convergence in 5GITU
This presentation will introduce IMT-2020 fixed mobile convergence (FMC) scenarios and requirements, such as service continuity among different access networks in a 5G environment. Based on the requirements, a FMC solution, Unified Network Integrating Cloud (UNIC), will also be introduced, including the high level architecture and some key technologies, such as unified access control for both fixed and mobile, edge computing for user plane, converged subscriber database, Telecom Integrated Cloud (TIC), etc.
Author : Yachen Wang, China Mobile
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
This presentation and demo show the hardware which consist of 5G UE’s, 5G radios, a fronthaul network and C-RAN with high density switches and servers, a transport network of 3 DWDM switches and a DC network of servers and high density switches. The basic software arrangement will be shown with emphasis on the structure of the orchestration and SDN controllers and the choice of virtualization components and logical networking. An eMBB slice will be brought up which will entail programming of the radios, the fronthaul, backhaul, a node B and the core. Its behavior will be noted through the test UE’s. An URRLC slice will be brought up and its nodeB and core will be demonstrated through its test UE’s showing extremely low latency. An MMTC slice will be brought up and a large number of test IOT devices will be demonstrated via the test UE’s. The eMBB slice will be augmented by programming a slice selection function that will create a ICN slice and an application (TBD) will be shown running over that ICN core (but with the eMBB slice). Spectrum will be reassigned from slice to slice and the changes noted as an optimizer recomputes the proper allocation of resources and executes it. Traffic will be increased and the changes in the backhaul over transport and core function placements will be noted. An additional demonstration will show creation of multiple 4G air interfaces using the same infrastructure network but with 4G radios and 4G UE’s using OAI software and ETTUS SDRs. A Skype session will be created between the two 4G slices. We will also try to show some of the EPC functions being moved while the UE sessions are not impacted.
Author : Peter Ashwood-Smith, Huawei Technologies
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
MPEG Immersive Media
By Thomas, Director, Technical Standards at Qualcomm
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
ITU Security in Telecommunications & Information TechnologyITU
The ITU-T Security Manual offers a comprehensive overview of ITU-T’s work to build confidence and security in the use of information and communication technologies (ICTs).
The manual documents ITU-T’s efforts to respond to global cybersecurity challenges with international standards, complementary guidance documents and outreach to build capacity in the application of advanced ICT security mechanisms.
Introductory chapters highlight high-priority areas of ITU-T security work and basic requirements for the protection of ICT applications, services and information. Central to this introduction is an examination of standards’ role in meeting the security requirements borne of prevalent threats and vulnerabilities.
The manual outlines foundational security architectures as a basis for the discussion of more specific security considerations, following an iterative structure addressing key aspects of ICT security:
Generic security architectures for open systems and end-to-end communications, as well as examples of application-specific architectures, which establish frameworks for the consistent application of multiple facets of security.
Information security management, risk management and asset management, including management activities relevant to securing network infrastructure and the data used to monitor and control the telecommunications network.
The Directory and its role in supporting authentication and other security services. Particular attention is paid to the cryptographic concepts that rely on Directory services, providing an introduction to public key infrastructures, digital signatures and privilege-management infrastructures.
Identity management – a topic of growing importance to connected things, objects and devices – and the related topic of telebiometrics, the use of biometric characteristics for personal identification and authentication in telecommunications environments.
Approaches to network security, including the security requirements for next-generation networks and mobile communications networks in transition from a single technologies (e.g. CDMA or GSM) to mobility across heterogeneous platforms using the Internet Protocol (IP). This section also tackles security provisions for home networks, cable television and ubiquitous sensor networks.
Cybersecurity and incident response, looking at how best to develop an effective response to cyber attacks, including the need to understand the source and nature of attacks when sharing associated information with monitoring agencies.
Application-specific security needs, emphasizing the security features defined in ITU-T standards for Voice over IP, Internet Protocol Television, Web services, and identification tags such as RFID tags.
Technical measures to counter common network threats such as spam, malicious code and spyware, including the importance of ti
Mobile Ad hoc Networks (MANETs) are wireless networks consisted of mobile free nodes that can move anywhere at any time without the need to any fixed infrastructure or any centralized administration. In this category of networks existing nodes must rely on each other to play the role of routers or switches instead of using central ones. The self-organized nature of such environments made MANETs vulnerable against many security threats. As a result, providing security requirements in MANETs is one of the most interesting challenges in such a network. In this group of networks, the use of cryptographic solutions is one of the most interesting security issues. The importance of this scientific area in MANETs is more drastic by considering that mentioned schemes must be lightweight enough to be appropriate for resource constrained platforms in such environment. This paper has tried to represent the position of cryptographic issues in MANETs. Moreover, security issues in mobile Ad hoc networks beside of different classes of public key cryptosystems have been introduced.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
Do we need a wakeup call to keep driver-less cars protected? ITU
Do we need a wakeup call to keep driver-less cars protected? This presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
Global Virtual Mobile Network for Car manufacturersITU
This presentation discussed Global Virtual Mobile Network for Car manufacturers. The presentation was given at was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
Coordination of Threat Analysis in ICT EcosystemsITU
This presentation discussed Coordination of Threat Analysis in ICT Ecosystems. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
This presentation discussed Learning from the past: Systematization for Attacks and Countermeasures on Mobile Networks. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
Trustworthy networking and technical considerations for 5GITU
This presentation discussed Trustworthy networking and technical considerations for 5G. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
This presentation discussed the role of Bicycles and E-Bikes in the future development of Intelligent Transport Systems. It was given at was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses connected cars & 5G and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses 5G for Connected and Automated Driving and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
This presentation discusses securing the future of Automotive and was presented at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018.
Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
The Connected Vehicle - Challenges and Opportunities. ITU
This presentation discusses challenges and opportunities of the connected vehicle. The presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018)
held in Geneva, Switzerland on 8 March 2018. More information on the symposium can be found here: https://www.itu.int/en/fnc/2018/Pages/default.aspx
Machine learning for decentralized and flying radio devicesITU
This presentation discusses matters of machine learning for decentralized and flying radio devices. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Join our upcoming forums and workshops here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/Pages/default.aspx
https://www.slideshare.net/ITU/ai-and-machine-learning
This presentation discusses matters of AI and machine learning. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Join our upcoming forums and workshops here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/Pages/default.aspx
This presentation discusses matters of machine learning for 5G and beyond, towards a reliable and efficient reconstruction of radio maps. This presentation was given during the ITU-T workshop on Machine Learning for 5G and beyond, held at ITU HQ in Geneva, Switzerland on 29 Jan 18. More information on the workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
This presentation consist of models and explanations of deep learning, artificial intelligence and today's systems and communications. This was presented at the ITU-T Workshop on Machine Learning for 5G held at the ITU HQ in Geneva, Switzerland on 29 January 2018. More information on this workshop can be found here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180129/Pages/default.aspx
Driven by the rapid progress in Artificial Intelligence (AI) research, intelligent machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely solely on human experience, creativity, and ingenuity. As a result, we will in the near future see large parts of our lives influenced by AI.
AI innovation will also be central to the achievement of the United Nations' Sustainable Development Goals (SDGs) and will help solving humanity's grand challenges by capitalizing on the unprecedented quantities of data now being generated on sentiment behavior, human health, commerce, communications, migration and more.
With large parts of our lives being influenced by AI, it is critical that government, industry, academia and civil society work together to evaluate the opportunities presented by AI, ensuring that AI benefits all of humanity. Responding to this critical issue, ITU and the XPRIZE Foundation organized AI for Good Global Summit in Geneva, 7-9 June, 2017 in partnership with a number of UN sister agencies. The Summit aimed to accelerate and advance the development and democratization of AI solutions that can address specific global challenges related to poverty, hunger, health, education, the environment, and others.
The Summit provided a neutral platform for government officials, UN agencies, NGO's, industry leaders, and AI experts to discuss the ethical, technical, societal and policy issues related to AI, offer reccommendations and guidance, and promote international dialogue and cooperation in support of AI innovation.
Please visit the AI for Good Global Summit page for more resources: https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx
If you would like to speak, partner or sponsor the 2018 edition of the summit, please contact: ai@itu.int
Join ITU today and apply for an International Mobile Subscriber Identity (IMSI) ranges signified by the shared Mobile Country Code ‘901’, which has no ties to any single country. ‘Global SIMs’ are important for enabling cross-border global M2M & IoT connectivity, helping manufacturers to build once and sell anywhere.
For more information contact: membership@itu.int
Report on the progress made by least developed countries towards universal + affordable Internet with recommendations to achieve Sustainable Development Goal 9C https://www.itu.int/en/ITU-D/LDCs/Pages/ICTs-for-SDGs-in-LDCs-Report.aspx
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
These indicators have been developed to provide cities with a consistent and standardised method to collect
data and measure performance and progress to:
achieving the Sustainable Development Goals (SDGs)
becoming a smarter city
becoming a more sustainable city
The indicators will enable cities to measure their progress over time, compare their performance to other
cities and through analysis and sharing allow for the dissemination of best practices and set standards for
progress in meeting the Sustainable Development Goals (SDGs) at the city level.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
Enhancing innovation and participation in smart sustainable citiesITU
The United for Smart Sustainable Cities (U4SSC) initiative was launched by the International Telecommunication
Union (ITU) and United Nations Economic Commission for Europe (UNECE) in May 2016. The first phase of this initiative, which was conducted via three Working Groups, was completed in April 2017. This flipbook brings together the work done in Working Group 3 (WG3) for Enhancing Innovation and Participation in Smart Sustainable Cities. WG3 is formed of a group of global experts and practitioners to facilitate knowledge sharing and partnership building on smart cities, with the aim of formulating strategic guidelines and case studies for enhancing innovation and participation in smart sustainable cities. More specifically, WG3 addresses various topics on smart governance, smart economy and smart people with the aim of achieving strong and symbiotic governance, economics and society.
For more information visit: https://www.itu.int/en/ITU-T/ssc/united/Pages/default.aspx
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
ITU-T Study Group 17 Introduction
1. Security
ITU-T
STUDY GROUP 17
Arkadiy Kremer
Chairman, SG17
Summary of Results
Study Period 2013-2016
Heung-Youl Youm
Vice Chairman, SG17
on behalf of
2. Study Group 17
Security
1
Conclusions
3
Acknowledgements
4
Future
perspective
of SG17
2
Contents
Additional
Slides
Terms of reference
Management team
Structure
Leadership for other groups (JCAs and FGs)
Highlights of achievements / Projects
Highlights of WP1, WP2, WP3, WP4, WP5/17, projects
Statistics
Workshops (with SG17 leadership / participation)
3. Study Group 17- Security
Building confidence and security in the use of ICTs
Cloud computing
security
Cybersecurity
ITS security
Countering spam
IoT security
SDN security
Mobile (phone)
security
Smart-grid security
Identity management
Information Security
Management
Application security
Big Data analytics
security
PKI, PMI, Directory
Telebiometrics
Languages
(ASN.1, SDL, MSC, TTCN-3 …)
5. ICT security (I)
Security
Global Experts
Attractiveness of
participation
Separation of security
responsibilities within
ITU-T
Collaboration
Centre of excellence SG13
SG20
SG17
6. ICT security (II)
Cybersecurity
SG17 as centre of
security competence
Development of
security approaches
Strengthening the
trust framework
Implementation
of ITU-T Recs
Information Society
SG17
ITU-D
7. ICT security, PII, PKI
Internet of things (IoT)
SG17 as lead study
group for security
Smart grids
Protection of
Personally Identifiable
Information (PII)
Protection of
Children Online
Public key
infrastructure (PKI)
SG17
8. Questions – LSG – JCAs – Projects
SG17 proposed 12 Questions for the next study period and they shall all continue.
SG17 should be the lead
study group responsible for:
Languages
and
description
techniques
JCA-IdM and JCA-COP
as well as ASN.1 & OID Projects
need to continue given their
important contributions.
9. Increased
Participation
above 150
participants
SG17 has successfully evolved to:
cover new security issues
address new security challenges
with security experts in core Questions.
SG17 achieved significantly build-up
of participation and energy in:
Identity Management
Cybersecurity
Cloud Computing Security
SG17 has built strong relations with
other key bodies working on
security and conducted numerous
collaborative efforts
SG17 has promoted and
disseminated ITU-T security work
10. International
Telecommunication
Union
10
ITU-T Study Group 17
Security
Acknowledgements
Delegates with their many contributions
Editors in drafting texts for Recommendations
Rapporteurs in leading work efforts
Liaison officers in coordinating efforts with other bodies
Project leaders and JCA leaders
Management team including Working Party chairmen
TSB support – Counsellors, Assistants and other staff
Great thanks are due to the many people
who have contributed to the enormous
success of SG17 during this study period:
Best wishes to all for the next study period.
12. International
Telecommunication
Union
12
ITU-T Study Group 17
Security
Supplemental Slides
Terms of reference
Management team
Structure
Leadership for other groups (JCAs and FGs)
Highlights of achievements / Projects
Highlights of WP1, WP2, WP3, WP4, WP5/17,
projects
Statistics
Workshops (with SG17 leadership / participation).
13. International
Telecommunication
Union
13
ITU-T Study Group 17
Security
Terms of Reference
Current: Responsible for building confidence and security in the use
of information and communication technologies (ICT). This includes
studies relating to cybersecurity, security management,
countering spam and identity management.
It also includes security architecture and framework, protection of
personally identifiable information, and security of applications and
services for the Internet of things, smart grid, smartphone, Internet
Protocol television (IPTV), web services, social network, cloud
computing, mobile financial system and telebiometrics.
Study Group 17 is also responsible for the application of open
system communications, including directory and object identifiers,
and for technical languages, the method for their usage and other
issues related to the software aspects of telecommunication
systems, and for conformance testing to improve the quality of
Recommendations.
Future perspective: include security aspects of software-defined
networking (SDN), NFV security, and big data analytics.
14. International
Telecommunication
Union
14
ITU-T Study Group 17
Security
Management Team (I)
Chairman Arkadiy Kremer Russian Federation
Vice-Chairmen Khalid BELHOUL United Arab Emirates
Mohamed M.K. ELHAJ
Mario German
FROMOW RANGEL
Sudan
Mexico
Antonio GUIMARAES Brazil
Zhaoji LIN China (P.R.)
Patrick MWESIGWA Uganda
Koji NAKAO Japan
Sacid SARIKAYA Turkey
Heung Youl YOUM Korea (Republic of)
15. International
Telecommunication
Union
15
ITU-T Study Group 17
Security
Management Team (II)
WP Chairmen
WP 1/17 Koji NAKAO Japan
WP 2/17 Sacid SARIKAYA Turkey
WP 3/17 Heung Youl YOUM Korea (Rep. of)
WP 4/17 Antonio GUIMARAES Brazil
WP 5/17 Zhaoji LIN China (P.R.)
TSB Martin EUCHNER Advisor
Sarah SCOTT Assistant
16. International
Telecommunication
Union
16
ITU-T Study Group 17
Security
Study Group Structure (1/2)
WP 1/17, Fundamental security
Telecommunication/ICT security coordination, security
architectures/frameworks, SDN security, network security,
telecommunications information security management.
WP 2/17, Network and information security
Cybersecurity, countering spam.
WP 3/17, Identity management and cloud computing
security
Cloud computing security, SOA security,
identity management and architectures.
17. International
Telecommunication
Union
17
ITU-T Study Group 17
Security
Study Group Structure (2/2)
WP 4/17, Application security
IPTV security, ubiquitous sensor network security, home
network security, peer-to-peer security, IoT security, ITS
security, smart-grid security, SDN security, application
security services, telebiometrics security, e-health security.
WP 5/17, Formal languages
Directory, PKI/PMI, ASN.1, OID, SDL-2010, ODP, URN, MSC,
TTCN-3, maintenance of OSI Recommendations.
Joint coordination activities
JCA-IdM, JCA-COP
SG17 Regional Group in Africa.
18. International
Telecommunication
Union
18
ITU-T Study Group 17
Security
Leadership for SG 17-related other
groups (I)
JCA-IdM
– Co-Chairmen: Mr Abbie BARBIR, Aetna,
Mr Hiroshi TAKECHI, NEC
– Represented: SGs 2, 3, 5, 9, 12, 13, 15, 16, 17, American
Bar Association, ENISA, ETSI, ISO/IEC JTC 1/SC 27/WG5,
ISO/IEC JTC 1/SC17, ENISA, ETSI/ISG, GLEIF, GSMA,
OASIS/IdCloud TC, OASIS Trust Elevation TC, OASIS
IBOPS, OpenID Foundation, FIDO Alliance, OASIS TC
IBOPS, Kantara Initiative, American Bar Association, GLEIF,
STORK 2.0 project, and UPU,…
– 10 meetings, 44 documents processed.
19. International
Telecommunication
Union
19
ITU-T Study Group 17
Security
Leadership for SG 17-related other
groups (II)
JCA-COP
– Chairman: Mr Philip RUSHTON, United Kingdom
– Established April 2012
– Represented: ISO/IEC JTC 1/SC 27/WG5, IETF/ISOC,
ITU-D Q3/2, DeafKidzInternational, ECPAT, EFC, FCACP,
FOSI, GSMA, ICMEC, I-KiZ, and Iran (Islamic Republic of);
outreach to COP stakeholders
– 8 meetings, 3 outgoing liaisons.
20. International
Telecommunication
Union
20
ITU-T Study Group 17
Security
Highlights of achievements (I)
SG17 successfully transitioned into a core competency
center on security averaging 155 participants.
SG17 examined 592 contributions and 3017 TDs and
developed 49 new, revised 69 Recommendations, and
developed 13 Supplements.
10 Recommendations currently under AAP or TAP.
Up to 81 draft new/revised Recommendations
currently under development for approval in the next
study period.
3 Lead Study Group responsibilities, 2 JCAs,
and 2 Projects were very active.
Increased collaboration with SDOs (e.g., joint texts).
21. International
Telecommunication
Union
21
ITU-T Study Group 17
Security
Highlights of achievements (II)
Lead study group for Security
– Close coordination and collaboration with other SGs
and SDOs on security; particular focus has been
placed upon partnerships and avoiding potential
conflicts in the work.
– Joint work with several SCs in ISO/IEC JTC 1.
– Produced 6th edition of the “Security Manual” that
promotes ITU-T’s security work.
– Produced Technical Report on successful use of
security standards
– Security Standards Roadmap and Security
Compendium kept up-to-date.
22. International
Telecommunication
Union
22
ITU-T Study Group 17
Security
Highlights of achievements (III)
Lead study group for Telecommunication Security
– Security collaboration arrangements between SG17
and SG13 on cloud computing security,
and between SG17 and SG20 on IoT security.
– Four workshops held on security.
– Maintained an on-line listing of SG17 relationships
with TCs of ISO and IEC and SCs of ISO/IEC JTC 1
(identifies nature of relation of joint work,
common/twin text, cooperation mode, etc)
(In response to WTSA-12 Resolution 7).
23. International
Telecommunication
Union
23
ITU-T Study Group 17
Security
Highlights of achievements (IV)
Lead study group for Identity Management
– Continued collaboration with OASIS on IdM.
– A WIKI with IdM Roadmap is available from the SG17
web page - provides a compilation of existing and
ongoing IdM standards globally & reflects coordination
with other bodies.
– Continuation of Joint Coordination Activity of Identity
Management (JCA-IdM).
Lead study group for Languages and Description
Techniques
– Collaboration with ETSI on TTCN-3, JTC 1/SC 7 on
ODP, and JTC 1/SC 6 on ASN.1, OIDs and registration.
– Supported SDL-Forum and SAM Workshop on
languages.
24. International
Telecommunication
Union
24
ITU-T Study Group 17
Security
Fundamental Security
(WP 1/17) Highlights (I)
Telecommunication/ICT security coordination
– Management support of other SG17 security Questions
– Security coordination
– Security project (see separate slide)
Security architecture and framework
– Network security architecture, IPv6 security, …
– 4 new Recs, 1 new Supplement; 3 under development.
Telecommunications information security
management
– In support of WTSA-12 Resolution 58
– ISM framework, risk/asset/incident management, PII code of
practice, …
– 1 revised Rec, 1 new Supplement; 1 in TAP
– 4 under development.
25. International
Telecommunication
Union
25
ITU-T Study Group 17
Security
Network and Information Security (WP 2/17)
Highlights (II)
Cybersecurity
– In support of WTSA-12 Resolution 50.
– Finalized cybersecurity information exchange (CYBEX),
X.1500 series.
– Intense work program; many collaborations with principal
forums of the cybersecurity community.
– 9 new Recs, 8 Amendments,
2 new Supplements (1 revised); 2 in TAP
– 3 under development.
Countering spam by technical means
– In support WTSA-12 Resolution 52
– Countering spam in voice spam, mobile messaging spam, …
– 2 new Recs, 2 Supplements;
– 4 under development.
26. International
Telecommunication
Union
26
ITU-T Study Group 17
Security
Identity Management and
cloud computing security
(WP 3/17) Highlights
Identity management architecture and
mechanisms
– Discovery of IdM, IAM taxonomy, telebiometric authentication,
entity authentication assurance, trust elevation, sharing
network authentication with service authentication, …
– 4 new Recs, 3 under development.
Cloud computing security
– Cloud computing security framework, software as a service
security, CaaS/IaaS/NaaS security, Big Data as a Service,
operational security for cloud computing, Code of practice for
information security controls based on ISO/IEC 27002 for
cloud services, …
– 5 new Recs, 1 revised Rec, 5 under development.
27. International
Telecommunication
Union
27
ITU-T Study Group 17
Security
Application Security
(WP 4/17) Highlights
Security aspects of ubiquitous
telecommunication services
– IoT security, ITS security, SDN security, smart-grid security,
mobile security, mobile phone security, IPTV security and
content protection, ubiquitous network security framework, …
– 2 new Recs; 3 new Supplements, 3 in TAP
– 6 under development
Secure applications services
– Application security mechanisms, XACML, multi-factor
authentication, anonymous authentication, authentication in
IDSP environments, non-repudiation, peer-to-peer security,
fraud detection, …
– 8 new Recs, 2 new Supplements
– 6 under development
Telebiometrics
– Telebiometrics, e-Health & telemedicines security protocols
– 3 new Recs, 1 in TAP, 8 under development.
28. International
Telecommunication
Union
28
ITU-T Study Group 17
Security
Formal languages
(WP 5/17) Highlights (I)
Generic technologies to support secure
applications
– X.500-series on Directory including X.509 on PKI,
computerized directory assistance, Abstract Syntax Notation
One (ASN.1), Object Identifiers (OIDs) and associated
registration authorities, ODP, certified e-mail.
– ASN.1 and OID project (see separate slide)
– 4 new Recs, 23 revised Recs, 14 technical corrigenda to
X.500 series; 1 TR; 8 under development.
Formal languages for telecommunication
software and testing
– SDL-2010, UML, MSC, URN, Testing and Test Control Notation
(TTCN-3), …
– 6 new Recs, 30 revised Recs; 4 revised Implementer Guides,
1 revised Supplement, 3 in AAP, 19 under development.
29. International
Telecommunication
Union
29
ITU-T Study Group 17
Security
Telecommunication/ICT security
coordination Project
(Major focus is on coordination and outreach)
Security coordination
– Within SG17, with ITU-T SGs, with ITU-D and externally.
– Kept TSAG, ISO/IEC/ITU-T SAG-S informed on security efforts.
– Made presentations to workshops/seminars and to GSC.
– Maintained reference information on the LSG on security webpage.
Compendium of Security Recommendations
– Includes catalogs of approved security-related Recommendations
and security definitions extracted from approved Recommendations.
Security Standards Roadmap
– Includes searchable database of approved ICT security standards
from ITU-T and others (e.g., ATIS, ENISA, ETSI, IEEE,
ISO/IEC JTC 1, IETF, OASIS, 3GPP, 3GPP2).
ITU-T Security manual
– 6th edition produced.
30. International
Telecommunication
Union
30
ITU-T Study Group 17
Security
ASN.1 and OID Project
The SG17 ASN.1 & OID project continues to assist:
– Existing users of ASN.1 and object identifiers (OID), within and outside of
ITU-T (e.g., ITU-T SG 16, ISO/IEC JTC 1/SC 27, ISO TC 215, 3GPP, etc.).
– Countries (e.g., Algeria, Andorra, Argentina, Bolivia, Bosnia and
Herzegovina, Brazil, Honduras, Lithuania, Malaysia, Mongolia, Nicaragua,
Oman, Philippines, Rwanda, and Sri Lank), and in particular developing
countries, in setting a national registration authority for OIDs.
This project provided speakers and tutorial material, and
coordinates the provision of tool support to users and the
contents of related websites.
In cooperation with the TSB, a database is being maintained
that contains a machine-processable copy of the current
version of all ASN.1 modules that are included in ITU-T
Recommendations.
Database: http://www.itu.int/ITU-T/asn1/database (>840 modules)
OID Repository: http://www.oid-info.com (>966 000 OIDs).
31. International
Telecommunication
Union
31
ITU-T Study Group 17
Security
Statistics (I)
44 Rapporteur group meetings held
(stand-alone, e-meetings, or collaborative with ISO/IEC JTC
1/SC 6, 27)
592 contributions received
(excluding Rapporteur meetings)
8 SG meetings held
8 WP 1, 2, 3, 4, 5/17 meetings held in
conjunction with SG17 meetings
Min/Max/Average SG participants:
131/170/152.
32. International
Telecommunication
Union
32
ITU-T Study Group 17
Security
Statistics (II)
117 New/Revised Recommendations
approved, plus 10 Recommendations
determined or consented.
81 draft new/revised Recommendations
currently under development for approval
in the next study period.
12 Questions assigned by WTSA-12.
2 Questions revised during study period.
12 Questions proposed for next period.
33. International
Telecommunication
Union
33
ITU-T Study Group 17
Security
Workshops (I)
SG17 organized four workshops:
ITU-UPU mini workshop
Geneva, Switzerland, 21 January 2014.
ICT Security Standardization Challenges for
Developing Countries
Geneva, Switzerland, 15 – 16 September 2014.
Global Cybersecurity Challenges: Collaborating for
effective enhancement of cybersecurity in developing
countries
Geneva, Switzerland, 8 September 2015 afternoon.
ITU-ATU Workshop on Cybersecurity Strategy in
African Countries
Khartoum, Sudan from 24 to 26 July 2016.
34. International
Telecommunication
Union
34
ITU-T Study Group 17
Security
Workshops (II)
SG17 (through its lead study group function
on Languages) supported the following
workshops:
16th International System Design Languages Forum
Model-driven dependability engineering
Montreal, Canada, June 26-28, 2013.
8th System Analysis and Modeling (SAM-2014) workshop
Valencia, Spain, 29 – 30 September 2014, in collaboration with ACM
and IEEE.
17th SDL Forum
Berlin, Germany, 12 – 14 October 2015.
9th System Analysis and Modeling (SAM-2016) workshop
Saint Malo, France, 3-4 October 2016, in collaboration with ACM
and IEEE.