Cybersecurity Apec Workshop Hyyoum Final
Cybersecurity Apec Workshop Hyyoum Final
cybercrime
Asia-Pacific Regional Workshop on Fighting Cybercrime
Seoul, Republic of Korea, 21-23 September 2011
1/31
Contents - Overview
Part 1 – introduction
– Cybersecurity Threats and Challenges
– Glowing cybersecurity threats
– Key cybersecurity challenges
– Cybercrimes
– Technical measure to fight cybercrimes
Part 2 - ITU-T cybersecurity standardization activities
– Security activities in other ITU-T Study Groups
– ITU-T SG 17 cybersecurity activities and results
– CYBEX basics, model, and overview of CYBEX clusters
– Identity Management Collaboration
– Security aspect for ubiquitous telecommunication service
– Secure application service
– ITU SG 17’s Child Online Protection
– ITU-T SG 17’s response to Memorandum of Understanding (MoU) between
the ITU and the United Nations Office on Drugs and Crime (UNODC)
2/31
Part 1 -
Introduction
3/31
Growing Cybersecurity Threats
ICTs have become an integral part of information
society.
ICT networks are regarded as basic national
infrastructure.
ICTs are also exposing our societies to the threat of
cyber war/cyber attacks/cyber crimes.
Vulnerability of national infrastructures increases as
the use of ICTs take root.
Cyber attacks on ICTs are borderless and can be
launched from virtually across the frontiers
anywhere.
As global reliance on ICTs grows, so does
vulnerability to attacks on critical infrastructures
through cyberspace.
4/31
Cybercrimes
Computer crime, or cybercrime, refers to any crime that
involves a computer and a network.
According to the Budapest Convention on cybercrime,
the following are types of cybercrimes:
– Offences against the confidentiality, integrity and
availability of computer data and systems, such as
Illegal access, Illegal interception, Data interference,
System interference (DDoS), Misuse of devices;
– Computer-related offences such as Computer-related
forgery, Computer-related fraud;
– Content-related offences such as Offences related to
child pornography;
– Offences related to infringements of copyright and
related rights such as Offences related to
infringements of copyright and related rights;
– Ancillary liability and sanctions such as Attempt and
aiding or abetting , Corporate liability.
5/31
Technical standards to fight cybercrimes
Cyber attacks continue to be widespread; they cause a
complex range of problems to users, service providers,
operators and networks.
Spam has become a widespread problem causing potential
loss of revenue to Internet service providers,
telecommunication operators, mobile telecommunication
operators and business users around the globe.
• Due to wide deployment of ubiquitous sensor
networks application, security threats have received a lot
of attention to provide services in a secure and trust
manner.
Identity theft continues to increase in cyber space. It is a
form of fraud or cheating of another person's identity in
which someone pretends to be someone else by assuming
that person's identity, typically in order to access resources
or obtain credit and other benefits in that person's name.
Countering identity theft and fraud by technical means is
needed urgently.
Countering cyber attacks, spam, and identity theft by
technical means requires development of frameworks and
requirements for: detecting and protecting against them;
and mitigating and recovering from their effects through
exchanging cybersecurity information.
Therefore, technical standards could be used to prevent,
detect, and respond to the cybercrimes.
6/31
Part 2 -
ITU-T Cybersecurity standardization
activities
7/31
ITU-T Study Group 17 “Security”
http://www.itu.int/ITU-T/studygroups/com17/index.asp
WP 1 WP 2 WP 3
Identity
Network and Application management and
information security languages
security
Q10 IdM LSG
IdM
JCA-IdM
Security Res.130
Q1 project LSG Res.179
Security Res.181 Q6 Ubiquitous services Q11 Directory, PKI
security
Q2 Security architecture Res.174
Q7 Secure application Q12 ASN.1, OID
Q3 Information Security services
Management Res.58 Q13 Formal LSG
Q8 Service Oriented languages Languages
Q4 Cybersecurity Architecture security
Res.50 Res.76
Res.177 Q14 Testing languagesJCA-CIT
Q9 Telebiometrics
Q5 Countering spam Res.52
Q15 OSI
ITU-T
.
Study Group 17
ITU-D, ITU-
R, xyz…
9/31
Definition of Cybersecurity
(ref. Recommendation ITU-T X.1205, Overview of cybersecurity)
10/31
Major accomplishments (1)
X.1200 – X.1229 allocated to Cybersecurity
Cybersecurity
• X.1205 Overview of cybersecurity
New • X Suppl. 8 to ITU-T X.1205 – Supplement on best practices against
botnet threats
New • X Suppl.9 to ITU-T X.1205 - Supplement on guidelines for reducing
malware in ICT networks
New • X Supple.10 to ITU-T X.1205-Usability of network traceback
• X.1206 A vendor-neutral framework for automatic notification of
security related information and dissemination of updates
• X.1207 Guidelines for telecommunication service providers for
addressing the risk of spyware and potentially unwanted software
• X.1209 Capabilities and their context scenarios for cybersecurity
information sharing and exchange
• X.dexf digital forensics exchange format
11/31
Major accomplishments (2)
X.1500-series Recommendations allocated to
Cybersecurity information exchange (CYBEX)
Cybersecurity information exchange
New
– X.1500 Overview of cybersecurity information exchange (CYBEX)
Vulnerability/state exchange
New
– X.1520 Common vulnerabilities and exposures (CVE)
New – X.1521 Common vulnerability scoring system (CVSS)
– X.1524 (X.cwe) Common weakness enumeration (CWE) Determined
13/31
CYBEX Basics
(CYBEX = Cybersecurity information exchange)
The new cybersecurity paradigm
– know your weaknesses
• minimize the vulnerabilities
– know your attacks
• share the heuristics within trust communities
CYBEX – techniques for the new paradigm
– Weakness, vulnerability and state
– Event, incident, and heuristics
– Information exchange policy
– Identification, discovery, and query
– Identity assurance
– Exchange protocols
– Evidence of incidents
X.1500 completes a broadly supported 2-year effort
Consists of a non-prescriptive, extensible,
complementary “collection of tools” that can be used
as needed
14/31
The CYBEX Initiative:
basic model for information exchange
Structuring Establishment of tr
information for ust and policy agre
ement between ex
exchange purpose
changing entities
CYBEX
Focus on
Cybersecurity Cybersecurity
Organization Identifying & requesting & Organization
discovering cyber responding with
security information cybersecurity
Cybersecurity and organizations information Cybersecurity
Information Information
ACQUISITION USE
(out of scope) (out of scope)
15/31
CYBEX Facilitates a Global Cybersecurity Model
Measures
for
protection Encryption/
Measures for VPNs esp. for
signalling
threat Real-time data
availability
detection
Resilient
Stored event infrastructure
Provide data
basis for Provide availability
Forensics &
additional Provide heuristics data for
actions basis for analysis analysis Routing &
actions Identity resource
Management constraints
Measures Reputation Blacklists
for threat sanctions &
whitelists
Deny
resources
response Patch
development Provide Network/
Vulnerability awareness of application
notices vulnerabilities state &
and remedies integrity
CYBEX
Information Exchange
Techniques
16/31
Global standardization activity
Activity for cybersecurity information exchange (CYBEX)
framework
– initiated from September, 2009 at ITU-T SG 17 Question 4,
Cybersecurity
– Recommendation ITU-T X.1500, Overview of cyber security
information exchange (approved)
A Global initiative(CYBEX) to
– Identify a set of platform specifications to facilitate the
trusted exchange of information among responsible
parties worldwide supporting cybersecurity for
Infrastructure protection, Incident analysis and response,
and Law enforcement and judicial forensics
– Enhance the availability, interoperability, and usefulness
of these platforms
17/31
Concept of Cybersecurity Information Exchange
Incident report
CAPEC
CVE
IODEFCPE
BEEP
CIRT A CIRT B
Status report
IODEF: Incident Object Description and Exchange Format, CPE: Common Platform Enumeration
CVE : Common Vulnerabilities and Exposures , CAPEC : Common Attack Pattern Enumeration and Classification
18/31
CYBEX Technique Clusters: Structured Information
Weakness, Vulnerability/State Exchange Event/Incident/Heuristics
Exchange
Knowledge Base
Vulnerabilities
Platforms Weaknesses and Event Malware
Exposures Expressions Patterns
State
Incident
Security Malicious
Configuration Assessment and
State Behavior
Checklists Results Attack
Measurement
Patterns
Terms and
conditions
19/31
CYBEX Technique Clusters: Utilities
Request
Discovery
Common and
enabling
Namespaces distribution
mechanisms
mechanisms
20/31
Toward Network Security Planes:
Security Automation Schemas Everywhere
SCAP
Security
Automation
Tools
21/31
Major accomplishments (3)
X.1230 – X.1249 allocated to Countering spam
Countering spam
– X.1231 Technical strategies on countering spam
– X.1240 Technologies involved in countering e-mail
spam
– X.1241 Technical framework for countering e-mail
spam
– X.1242 Short message service (SMS) spam filtering
system based on user-specified rules
– X.1243 Interactive gateway system for countering spam
New – X.1244 Overall aspects of countering spam in IP-based
multimedia applications
New – X.1245 Framework for countering spam in IP-based
multimedia applications
New – Draft X Suppl. 11 To X.1245 Real time-blocking list
(RBL)-based framework for countering VoIP spam
22/31
Major accomplishments (4)
Security aspects of ubiquitous telecommunication services
Multicast security
– X.1101, Security requirements and framework for multicast communication
Mobile security
– X.1121, Framework of security technologies for mobile end-to-end data communications
– X.1122, Guideline for implementing secure mobile systems based on PKI
– X.1123, Differentiated security service for secure mobile end-to-end data communication
– X.1124, Authentication architecture for mobile end-to-end data communication
– X.1125, Correlative reacting system in mobile data communication
Networked ID security
– X.1171, Threats and requirements for protection of personally identifiable information in
applications using tag-based identification
IPTV security
– X.1191, Functional requirements and architecture for IPTV security aspects
New
– X.1192, Functional requirements and mechanisms for secure transcodable scheme of IPTV
Consent – X.1193, Key management framework for secure IPTV services
– X.1195, Service and content protection (SCP) interoperability scheme
New
Ubiquitous sensor network security
New – X.1311, Information technology – Security framework for ubiquitous sensor network
– X.1312, Ubiquitous sensor network (USN) middleware security guidelines
23/31
Major accomplishments (5)
Secure application services
Web security
– X.1141, Security Assertion Markup Language (SAML 2.0)
– X.1142, eXtensible Access Control Markup Language
(XACML 2.0)
– X.1143, Security architecture for message security in
mobile web services
Security protocols
– X.1151, Guideline on secure password-based
authentication protocol with key exchange
– X.1152, Secure end-to-end data communication
techniques using trusted third party services
New – X.1153, A management framework of an one time
password-based authentication service
Peer-to-peer security
– X.1161, Framework for secure peer-to-peer
communications
– X.1162, Security architecture and operations for peer-
to-peer networks
24/31
Major accomplishments (6)
X.1250 – X.1279 allocated to Identity Management
Identity Management
– X.1250 Baseline capabilities for enhanced global identity management
and interoperability
– X Suppl. 7 to ITU-T X.1250 series – Supplement on overview of
identity management in the context of cybersecurity
– X.1251 A framework for user control of digital identity
New – X.1252 Baseline identity management terms and definitions
– X.1253 Security guidelines for identity management systems
– X.1261 Extended validation certificate framework (EVcert)
New – X.1275 Guidelines on protection of personally identifiable information
in the application of RFID technology
– Draft X.1261 Extended validation certificate framework (EVcert)
Misc.:
New – X.674 Procedures for the registration of arcs under the Alerting object
identifier arc
– X.1303 Common alerting protocol (CAP 1.1)
25/31
Coordination and Collaboration
on Identity Management
26/31
MoU between the ITU and the UNODC
Announced (19 May 2011) MoU between UNODC (United
Nations Office on Drugs and Crime) and ITU!
A fundamental role of ITU is to build confidence and security in the use of
information and communication technologies (ICTs).
The UNODC is a global leader in the fight against illicit drugs and
international crime.
A Memorandum of Understanding signed between ITU and the United Nations
Office on Drugs and Crime (UNODC) will allow the two organizations to
collaborate in assisting ITU and UN Member States mitigate the risks posed
by cybercrime.
The objective is to establish a general framework for collaboration between
the Parties, on a non-exclusive basis, and in accordance with the commonly-
agreed goals in the areas of cybersecurity and cybercrime.
Areas of cooperation
– Legal measures
– Capacity building and technical assistance
– Intergovernmental and expert meetings
– Comprehensive study on cybercrime
– Organizational Structures, etc
27/31
Child Online Protection (COP)
New study topic within SG 17
TSAG has acknowledged (Feb 2011) that SG 17 can study and
coordinate Child Online Protection.
SG 17’s foreseen activities on COP are a logical next step in
continuing the ITU COP initiative in the area of technical measures.
SG 17 could be active on technical and procedural security
measures concerning COP, where SG 17 members and Member
States are expected to develop technical procedural criteria for
telecom operators and/or service providers and related technical
measures to combat new and emerging threats to children.
– The objectives would be to identify best practices on technical measures for child
online protection and to develop interoperable standards and related
Recommendations (i.e., identity management, authentication) to protect children
online.
A Correspondence Group identifies the role of SG 17 on COP
– To identify technical issues (e.g., identity management and authentication)
28/31
Security activities in other
ITU-T Study Groups
ITU-T SG 2 Operation aspects & TMN
– Q3 International Emergency Preference Scheme , ETS/TDR
– Q5 Network and service operations and maintenance procedures , E.408
– Q11 TMN security, TMN PKI
29/31
THANK YOU
http://www.itu.int/ITU-T/studygroups/com17/index.asp
30/31