itu-t activity in ict security dr. jianyong chen (vice-chairman, itu-t sg17)...

14

Upload: elijah-morse

Post on 27-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com
Page 2: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

ITU-T activity in ICT security

Dr. Jianyong Chen(Vice-Chairman, ITU-T SG17)

[email protected]@hotmail.com

Page 3: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

ITU-T activity and collaboration in ICT security

• ITU-T SG17 Security----leading study group on security– WP1 Network and information security

• Q. 1 Telecommunications systems security project• Q. 2 Security architecture and framework• Q. 3 Telecommunications information security management• Q. 4 Cybersecurity• Q. 5 Countering spam by technical means

– WP2 Application security• Q.6 Security aspects of ubiquitous telecommunication services• Q. 7 Secure application services• Q. 8 service oriented architecture security• Q. 9 Telebiometrics

– WP3 Identity management• Q.10 Identity management architecture and mechanism• Q. 11 Directory services, directory system, and public-key/attribute certificates• Q. 12 Abstract syntax notation one (ASN.1), objective identifiers (OIDs) and associated

registration– Other SGs

• SG13 Future network---Q.16 Security and identity management for NGN• SG 16---multimedia security

Page 4: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Major accomplishment

• Security Infrastructure– Public key infrastructure (PKI)

• X.500 series (X. 509 etc.) – Telebiometrics

• X.1081-1089 (framework, interworking protocol, biometric authentication protocol, biometric digital key and biometric data security, etc.)

– Identity management• X. 1250 Baseline capabilities for enhanced global identity

management trust and interoperability • X. 1251 A framework for user control of digital identity • X. 1252 Baseline identity management terms and definitions • Y. 2720 NGN identity management framework • Y. 2721 NGN identity management requirements and use cases

Page 5: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Major accomplishment

• Cybersecurity– X.1205Overview of cybersecurity – X.1206A vendor-neutral framework for automatic notification of

security related information and dissemination of updates – X.1207Guidelines for telecommunication service providers for

addressing the risk of spyware and potentially unwanted software • Countering spam

– X.1231Technical strategies on countering spam – X.1240Technologies involved in countering e-mail spam – X.1241Technical framework for countering e-mail spam – X.1242Short message service (SMS) spam filtering system based

on user-specified rules – X.1244Overall aspects of countering spam in IP-based

multimedia applications

Page 6: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Major accomplishment

• Security framework– X.805Security architecture for systems providing end-to-

end communications • Security management– X.1051Information technology - Security techniques -

Information security management guidelines for telecommunications organizations based on ISO/IEC 27002

– X.1055Risk management and risk profile guidelines for telecommunication organizations

– X.1056Security incident management guidelines for telecommunications organizations

Page 7: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Major accomplishment• IPTV security

– X.1191Functional requirements and architecture for IPTV security aspects • Mobile security

– X.1121 Framework of security technologies for mobile end-to-end data communications

– X.1122 Guideline for implementing secure mobile systems based on PKI – X.1123 Differentiated security service for secure mobile end-to-end data

communication – X.1124 Authentication architecture for mobile end-to-end data communication – X.1125 Correlative reacting system in mobile data communication

• Secure application security– X.1143 Security architecture for message security in mobile web services– X.1151 Guideline on secure password-based authentication protocol with key

exchange – X.1152 Secure end-to-end data communication techniques using trusted third

party services • Peer-to-peer security

– X.1161 Framework for secure peer-to-peer communications – X.1162 Security architecture and operations for peer-to-peer networks

• RFID/PII security– X.1171 Threats and requirements for protection of personally identifiable

information in applications using tag-based identification

Page 8: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction-Identity management

• Interoperability of identity management– X.giim, Generic IdM interoperability mechanisms – X.idm-ifa, Framework architecture for interoperable identity management systems– X.1250, Baseline capabilities for enhanced global identity management trust and

interoperability • Trust of identity management

– X.authi, Authentication integration in IDM – X.EVcert, Extended validation certificate– X.eaa, Information technology – Security techniques – Entity authentication assurance – X. OITF, Open identity trust framework

• Discovery of of identity management information – X.discovery, Discovery of identity management information

• protection of personally identifiable information – X.1275, Guidelines on protection of personally identifiable information in the application

of RFID technology – X.priva, Criteria for assessing the level of protection for personally identifiable

information in identity management

Page 9: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction--Cybersecurity• Cybersecurity Information Exchange (CYBEX)

– Facilitate standardized global exchange of vulnerability and incident information

– making security measurable– http://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybex.aspx

X.sisfreq Capabilities and their context scenarios for cybersecurity information sharing and exchange

X.cybex Cybersecurity information exchange framework

X.cve Common Vulnerabilities and Exposures

X.cvss Common vulnerability scoring system

X.gopw Guideline on preventing malicious code spreading in a data communication network

X.alerting Procedures for the registration of arcs under the Alerting object identifier arc

X.1205 Supplement 8

Draft Supplement to X.series Recommendation - ITU-T X.1205 – Supplement on best practices against botnet threats

Page 10: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction-- Cloud computing security

• Recommendations in developing– X.srfctse, Security requirement and framework of cloud

based telecommunication service environment – X.ccsec, Security guideline for cloud computing in

telecommunication area

• PKI and identity management in cloud computing• ITU-T Focus Group on Cloud Computing (FG-Cloud)

Page 11: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction-- Ubiquitous network and service security

• Recommendations in developing– X.usnsec-1, Security framework for ubiquitous

sensor network – X.usnsec-2, Ubiquitous sensor network (USN)

middleware security guidelines – X.usnsec-3, Secure routing mechanisms for

wireless sensor network

• M2M communication, Internet of things, etc.

Page 12: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction– IPTV

• Recommendations in developing– X.iptvsec-2, Functional requirements and mechanisms for secure

transcodable scheme of IPTV– X.iptvsec-3, Key management framework for secure IPTV services – X.iptvsec-4, Algorithm selection scheme for service and content

protection (SCP) descrambling – X.iptvsec-5, Service and content protection (SCP) interoperability

scheme– X.iptvsec-6, Framework for the downloadable service and content

protection (SCP) system in mobile IPTV environment– X.iptvsec-7 , Guidelines on criteria for selecting cyptographic

algorthms for the IPTV service and content protection (SCP)

Page 13: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Future direction – Secure application security

• Recommendations in developing– X.websec-4, Security framework for enhanced web

based telecommunication services – X.sap-3, Management framework for one time

password based authentication service– X.sap-4 , The general framework of combined

authentication on multiple identity service provider environment

– X.sap-5, A guideline on anonymous authentication for e-commerce service

– X.p2p-3, Security requirements and mechanisms of peer-to-peer-based telecommunication network

Page 14: ITU-T activity in ICT security Dr. Jianyong Chen (Vice-Chairman, ITU-T SG17) chen.jianyong@zte.com.cn cjyok2000@hotmail.com

Collaboration

• Webpage on ICT security standard roadmap– http://www.itu.int/ITU-T/studygroups/com17/ict/

index.html

• Webpage on ICT cybersecurity organizations– http://www.itu.int/ITU-T/studygroups/com17/

nfvo/index.html

• Joint coordination activity on various areas (e.g. JCA-IdM)