SECURITY IN THE INFORMATION SOCIETY
|
|
- Emil Payne
- 5 years ago
- Views:
Transcription
1 SECURITY IN THE INFORMATION SOCIETY
2 IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress held in Paris the previous year. An umbrella organization for societies working in information processing, IFIP's aim is two-fold: to support information processing within its member countries and to encourage technology transfer to developing nations. As its mission statement clearly states, IFIP's mission is to be the leading, truly international, apolitical organization which encourages and assists in the development, exploitation and application of information technology for the benefit of all people. IFIP is a non-profitmaking organization, run almost solely by 2500 volunteers. It operates through a number of technical committees, which organize events and publications. IFIP's events range from an international congress to local seminars, but the most important are: The IFIP World Computer Congress, held every second year; open conferences; working conferences. The flagship event is the IFIP World Computer Congress, at which both invited and contributed papers are presented. Contributed papers are rigorously refereed and the rejection rate is high. As with the Congress, participation in the open conferences is open to all and papers may be invited or submitted. Again, submitted papers are stringently refereed. The working conferences are structured differently. They are usually run by a working group and attendance is small and by invitation only. Their purpose is to create an atmosphere conducive to innovation and development. Refereeing is less rigorous and papers are subjected to extensive group discussion. Publications arising from IFIP events vary. The papers presented at the IFIP World Computer Congress and at open conferences are published as conference proceedings, while the results of the working conferences are often published as collections of selected and edited papers. Any national society whose primary activity is in information may apply to become a full member of IFIP, although full membership is restricted to one society per country. Full members are entitled to vote at the annual General Assembly, National societies preferring a less committed involvement may apply for associate or corresponding membership. Associate members enjoy the same benefits as full members, but without voting rights. Corresponding members are not represented in IFIP bodies. Affiliated membership is open to non-national societies, and individual and honorary membership schemes are also offered.
3 SECURITY IN THE INFORMATION SOCIETY Visions and Perspectives IFlP TCll l7 h International Conference on Information Security (SEC2002) May 7-9,2002, Cairo, Egypt Edited by M. Adeeb Ghonaimy Ain Shams University Egypt Mahmoud T. EI-Hadidi Cairo University Egypt Heba K. Asian Electronic Research Institute Egypt KLUWERACADEMIC PUBLISHERS BOSTON / DORDRECHT / LONDON
4
5 The original version of the book frontmatter was revised: The copyright line was incorrect. The Erratum to the book frontmatter is available at DOI: / _46
6 Contents Preface... xi IFIP/SEC2002 Conference Committees... xiii Part One Information Security Management 1. The Effective Implementation of Information Security in Organizations O.A. HOPPE, J. VAN NIEKERK, and R. VON SOLMS A Practical Approach to Information Security Awareness in the Organization C. VROOM, and R. VON SOLMS RBAC Policies in XML for X.509 Based Privilege Management D. W CHADWICK, and A. OTENKO A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration A. AHMAD, and T. RUIGHAVER Elaborating Quantitative Approaches for IT Security Evaluation D. GRITZALIS, M. KARYDA,.and L.GYMNOPOULOS Part Two Standards of Information Security 6. A Security Evaluation Criteria for Baseline Security Standards WJ. BROOKS, M. WARREN, and W HUTCHINSON Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects M.T. SIPONEN For a Secure Mobile IP and Mobile 1Pv6 Deployment M. LA URENT-MAKNAVICIUS Part Three Threats and Attacks to Information 9. Addressing Internet Security Vulnerabilities: A Benchmarking Study A. ALAYED, S.M. PURNELL and l.m. BARLOW The Threat From Within- An Analysis of Attacks on an Internal Network J. HAGGERTY, Q. SHL and M. MERABTI
7 viii VI Contents 11. Security Vulnerabilities in Event-Driven Systems S. XENITELLIS Denial of Service: Another Example 1.1. fan A Detection Scheme for the SK Virus D. SALAH, HK. ASLAN, and M. T. EL-HADIDl Part Four Education and Curriculum for Information Security 14. An Information Security Curriculum in Finland T. VIRTANEN, and R. ADDAMS-MORING Part Five Social and Ethical Aspects of Information Security 15. Information Security Culture: The Socio-Cultural Dimension in Information Security Management T. SCHLIENGER, and S. TEUFEL Information Security Culture A. MARTINS, and 1. ELOFF Part Six Information Security Services 17. Keystroke Analysis as a Method of Advanced User Authentication and Response P.S. DOWLAND, S.M. FURNELL, andm. PAPADAKI Zero Knowledge Broadcasting Identification Scheme M.S. EL-SOUDANL H.S. EL-REFAEY, and HM. MOURAD A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services LI-SHA HE, N. ZHANG, LI-RONG HE Mandatory Security Policies for CORBA Security Model C.M. WESTPHALL, 1. DA S. FRAGA, C.B. WESTPHALL, and S. C.S. BIANCHI Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for CORBA Security C.M. WESTPHALL, 1. DA S. FRAGA, M.S. WANGHAM, R.R. OBELHEIRO, and L. C. LUNG Secure Database Connectivity on the WWW M. COETZEE, and 1. ELOFF Towards Semantic Integrity in Rational Database R.A. BOTHA Formal Design of Packet Filtering Systems G. OSMAN, M. G. DARWISH, and M ZAKI Elliptic Curve Cryptosystems on Smart Cards E. MOHAMMED, A. EMARAH, and KH. EL-SHENNA WY
8 Security in the Information Society: Visions and Perspectives ix Vll Part Seven Multilateral Security 26. Establishing Bilateral Anonymous Communication in Open Networks T DEMUTH Part Eight Applications of Information Security 27. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business C. MAGNUSSON, and L. YNGSTROM Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration T TRYFONAS, and E. KIOUNTOUZIS An Efficient Hybrid Sealed Bid Auction Protocol R. ABDEL-MONEIM, S EL-KASSAS, and H. HOSNY Self-Determination in Mobile Internet: PiMI Prototype Results S FISCHER-HUBNER, M. NILSSON, and H. LINDSKOG Secure Component Distribution Using Web Com S.N. FOLEY, TB. QUILLINAN, and J.P. MORRISON E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals R. UDA, M ITO, K. AWAYA, H. SHIGENO, and Y. MATSUSHITA An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions D. CRITCHLOW, and N. ZHANG Part Nine Infrastructure for Information Security 34. Secure Selective Exclusion in Ad Hoc Wireless Network R.o. DI PIETRO, L. V. MANCINI, and S JAJODIA Part Ten Advanced Topics in Security 35. Optical Network Models for Quantum Cryptography ST FARAJ, F. AL-NAIMA, and S.Y. AMEEN Part Eleven Legislation for Information Security 36. A Unified Regulatory Framework on a European Information Society: Suggested Building Levels P.S. ANASTASIADES Revisiting Legal and Regulatory Requirements for Secure E-Voting L. MITROU, D. GRITZALIS, and S. KATSlKAS
9
10 Preface Human civilization is currently undergoing a transformation into what is called the "Information Society". This transformation is propelled by recent advances in technology and new achievements in software development and its applications. The thoughtful integration of technology and software applications changed the way we perform our daily activities. E-Business, E Government, E-Learning, E-Contracting, E-Voting are just few of the ever growing list of new terms that are shaping up the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats, becomes a vital and crucial undertaking. One goal of IFIP/SEC2002 Conference is to address the various security issues confronting our new Information Society. These include : Management, Standards, Threats and Attacks, Education and Curriculum, Social and Ethical Aspects, Services, Multilateral Security, Applications, Infrastructure, Advanced Topics, Legislation, Modeling and Analysis, and Tools. Another goal of IFIP/SEC2002 is to emphasize the organic bond that ties new and old civilizations. It was in Egypt that one of the greatest human civilizations had once prevailed 5000 years ago. A great wealth of information about this civilization was recorded in hieroglyphics on the walls of temples, tombs, and many other artifacts. It then took almost 1400 years before it was possible to decipher hieroglyphics on the hands of the French scholar Jean-Francois Champollion in 1824, and untap this wealth of information. We hope that IFIP/SEC2002 contributes to the betterment of mankind by harmonizing the various cultures, and exchanging new ideas, that help us usher into the Information Society with hope and optimism. A.GHONAIMY TPC Chairman M. EL-HADIDI Secretary General H.ASLAN Co-Editor
11 IFIP/SEC2002 Security in the Information Society Visions and Perspectives Cairo University o.t' Iil \ 4A.o is organised by IFIP IFIP Department of Electronics & Electrical Communications Technical Committee 11 Under the auspices of Dr. Moufid Shehab Minister of Higher Education and Scientific Research Egypt Honorary Conference Chair Dr. Nageeb Goher President of Cairo University Conference Chair Dr. Aly Abdel-Rahman Dean of Faculty of Engineering Cairo University
12 IFIP/SEC2002 Conference Committees Technical Program Committee Chairman: Adeeb GHONAIMY (Ain Shams University, Egypt) Vice-Chairman: Gamal DARWISH (Cairo University, Egypt) Vice Chairman: Jan ELOFF (Rand Afrikaans University, South Africa) Hossam AFIFI (Institut National des Telecommunications, France) Heba ASLAN (Electronics Research Institute, Egypt) William 1. CAELLI (Queensland University of Technology, Australia) Yves DESW ARTE (LAAS-CNRS, France) Taber EL-GAMAL (SECURIFY, USA) Yousri EL-GAMAL (Arab Academy for Science and Technology, Egypt) Mahmoud EL-HADIDI (Cairo University, Egypt) Sherif EL-KASSAS (American University in Cairo, Egypt) Magdi EL-SOUDANI (Cairo University, Egypt) Aly A. FAHMY (Cairo University, Egypt) Dimitris GRITZALIS (Athens U. of Economics and Business, Greece) Sushil JAJODIA (George Mason University, USA) Sokratis KATSIKAS (University of Aegean, Greece) Kinji MORI (Tokyo Institute of Technology, Japan) Reinhard POSCH (IAIK-Graz University of Technology, Austria) Sihan QING (China) Kai RANNENBERG (Microsoft Research Cambridge, United Kingdom) Tarek SAADA WI (City University of New York, USA) Pierangela SAMARATI (Universita' di Milano, Italy) Mostafa SHERIF (AT&T, USA) Rossouw von SOLMS (Port Elizabeth Technikon, South Africa) S. H. von SOLMS (Rand Afrikaans University, South Africa) Leon A.M. STROUS (De Nederlandsche Bank, The Netherlands) Ahmed TANTAWY (IBM, Egypt) Louise YNGSTROM (Stockholm University, Sweden) Amr YOUSSEF (Cairo University, Egypt)
13 Xli xiv Organizing Committee Chairman: Mahmoud EL-HADIDI (Cairo University, Egypt) Shadia AGGOUR (Cairo University, Egypt) - accommodations Heba ASLAN (Electronics Research Institute, Egypt) - publications Gamal DARWISH (Cairo University, Egypt) Yousri EL-GAMAL (Cairo University, Egypt) - tutorials SherifEL-KASSAS (Cairo University, Egypt) - sponsors Hisham EL-SHISHINY (IBM, Egypt) - plenary sessions Magdi EL-SOUDANI (Cairo University, Egypt) - treasurer AIy A. FAHMY (Cairo University, Egypt) - publicity Adeeb GHONAIMY (Ain Shams University, Egypt) Ahmed HAMDY (Cairo University, Egypt) - technical support Heba-AIlab MOURAD (Cairo University, Egypt) - social events Ahmed SHAMS (Cairo University, Egypt) - web publishing Referees Hussein ABDEL-W AHAB (Old Dominican University, USA) Heba ASLAN (Electronics Research Institute, Egypt) Bart De DECKER (K.U. Leuven, Belgium) Yves DESW ARTE (LAAS-CNRS, France) Taber EL-GAMAL (SECURlFY, USA) Yousri EL-GAMAL (Arab Academy for Science and Technology, Egypt) SherifEL-KASSAS (American University in Cairo, Egypt) Magdi EL-SOUDANI (Cairo University, Egypt) Adeeb GHONAIMY (AiD Shams University, Egypt) Dimitris GRITZALIS (Athens U. of Econornics and Business, Greece) Sokratis KATSlKAS (University of Aegean, Greece) Kwok-Yan LAM (PrivyLink Pte, Singapore) Juha E. MIETTINEN (Sonera Corporation, Finland) Kinji MORI (Tokyo Institute of Technology, Japan) Hartmut POHL (Fachhochschule Bonn-Rhein-Sieg, Gennany) Kai RANNENBERG (Microsoft Research Cambridge, United Kingdom) Tarek SAADAWI (City University of New York, USA) Pierangela SAMARA TI (Universita' di Milano, Italy) Mostafa SHERIF (AT&T, USA) Rossouw von SOLMS (Port Elizabeth Technikon, South Africa) Leon A.M. STROUS (De Nederlandsche Bank, The Netherlands) JozefVYSKOC (VaF, r.s.o., Slovak Republic) Louise YNGSTROM (Stockholm University, Sweden) Amr YOUSSEF (Cairo University, Egypt)
INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY
INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World
More informationINFORMATION TECHNOLOGY Selected Tutorials
INFORMATION TECHNOLOGY Selected Tutorials IFIP The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress
More informationCOMMUNICATION SYSTEMS The State of the Art
COMMUNICATION SYSTEMS The State of the Art IFIP The International Federation for Information Processing lfip was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress
More informationOptical Network Design and Modelling
Optical Network Design and Modelling Come and visit the IT & Applied Computing Resource Centre: www.it-ch.com IFIP - The International Federation for Information Processing IFIP was founded in 1960 under
More informationINTEGRITY, INTERNAL CONTROL AND SECURITY IN INFORMATION SYSTEMS
INTEGRITY, INTERNAL CONTROL AND SECURITY IN INFORMATION SYSTEMS IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First
More informationINFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES
INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World
More informationIntegrity and Internal Control in Information Systems
Integrity and Internal Control in Information Systems IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer
More informationNETWORK CONTROL AND ENGINEERING FOR QoS, SECURITY AND MOBILITY IV
NETWORK CONTROL AND ENGINEERING FOR QoS, SECURITY AND MOBILITY IV IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First
More informationIFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems Kai Rannenberg, S.H. (Basie) von Solms, and Leon Strous Abstract. IFIP Technical Committee 11 (TC-11) on Security
More informationARCHITECTURE AND DESIGN OF DISTRIBUTED EMBEDDED SYSTEMS
ARCHITECTURE AND DESIGN OF DISTRIBUTED EMBEDDED SYSTEMS IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer
More informationE-readiness rankings 2007
E-readiness rankings 2007 Countries digital development elopment in global context The Economist Intelligence Unit Prepared for The State of Telecom at Columbia University it 19 October 2007 A 1 About
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationIPv6 From Developing Country Perspective
International Telecommunication Union IPv6 From Developing Country Perspective Baher Esmat Chair Egypt IPv6 Task Force Outline o Egypt Information Society o Growth in Internet and mobile services o CIT
More informationSafety of Nuclear Installations
Objective To continuously improve the safety of nuclear installations during site evaluation, design, construction and operation through the availability of safety standards and their application. To support
More informationMoving Professionals Forward. World Leader In Competence Based Certification
Moving Professionals Forward World Leader In Competence Based Certification Professionalism in a changing world The world is changing and project management is changing with it. IPMA is adapting: to the
More informationThe IECEE CB Scheme facilitates Global trade of Information Technology products.
The IECEE CB Scheme facilitates Global trade of Information Technology products. WTO - Symposium on the 15th Anniversary of the Information Technology Agreement 14-15 May 2012 Pierre de RUVO Executive
More informationGeneral Overview & Annex 1: Global Smart Grid Inventory
General Overview & Annex 1: Global Smart Grid Inventory 2 nd EU-US Workshop on Smart Grid Assessment Methodologies Washington DC, 7 th November 2011 Michele de Nigris, RSE, ISGAN Chair Russ Conklin, U.S.
More informationGUIDING PRINCIPLES I. BACKGROUND. 1 P a g e
GUIDING PRINCIPLES I. BACKGROUND At the Summit of the Americas held in Port-of-Spain, Trinidad and Tobago, in April 2009, the leaders of the Western Hemisphere noted that energy challenges are among the
More informationResolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]
United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main
More informationINDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN
INDEX MESSAGE FROM THE CHAIRM AN 2 ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM 5 Body of Knowledge 6 UNESCO ICT INDICATORS 8 1 MASSAGE FROM THE CHAIRMAN Welcome to the Arab Knowledge and Management
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationFrequently Asked Questions
December 2001 Introduction International Standard ISO/IEC 17799:2000 Information Security Management, Code of Practice for Information Security Management Frequently Asked Questions The National Institute
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationThe Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015
The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 Utilities Telecom Council Global Focus on Utility Information and Communications Technology (ICT) Formed more than
More informationThe Canadian Experience
ICT4D Bridging the Digital Divide: The Canadian Experience Global Forum Malmö, Sweden Nov. 4, 2004 Len St-Aubin Minister Counsellor, Canadian Embassy Berlin International Trade Canada len.staubin@international.gc.ca
More informationA SECURITY EV ALUA TION CRITERIA FOR BASELINE SECURITY STANDARDS
6 A SECURITY EV ALUA TION CRITERIA FOR BASELINE SECURITY STANDARDS W.J.Brooksl M Warren l and W Hutchinson 2 1 Dept of Computing & Mathematics, Deakin University, Geelong, Victoria, Australia. 2School
More information10 March Informal Expert Group for the ITU World Telecommunication Policy Forum
10 March 2009 Informal Expert Group for the ITU World Telecommunication Policy Forum The Internet Society has been actively engaged in the preparation of the next World Telecommunication Policy Forum (WTPF)
More informationEUROPEAN COUNCIL OF CIVIL ENGINEERS
EUROPEAN COUNCIL OF CIVIL ENGINEERS WHO ARE WE? European Council of Civil Engineers (ECCE) was created in 1985 out of the common concern of the professional bodies for Civil Engineers in Europe that the
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationDisaster risk reduction in a changing climate
Disaster risk reduction in a changing climate Paola Albrito Head, United Nations Office for Disaster Risk Reduction Europe 7 th Annual Meeting of the European Forum for Disaster Risk Reduction, 3 October
More informationIntroduction. January 1, 2015
Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high
More informationMazen Mohammed Ibrahim Batterjee Chairman of the Board of Directors - Batterjee Holding Company
Mazen Mohammed Ibrahim Batterjee Chairman of the Board of Directors - Batterjee Holding Company : 00966 12 6084545 : 00966 12 6094032 : 00966 555 604 914 : secretary.mazen@batterjee.com / mazen@batterjee.com
More informationReport on ISO/IEC/JTC1/SC27 Activities in Digital Identities
International Telecommunication Union ITU-T Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities Dick Brackney ISO/SC27 Liaison Officer to ITU-T SG17 Standards Program Manager, U.S. Dept of Defense
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]
United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.
More informationMexico s Telecommunications Constitutional Reform, the Shared Network and the Public - Private Collaboration. MBB Forum Shanghai, China
Mexico s Telecommunications Constitutional Reform, the Shared Network and the Public - Private Collaboration MBB Forum 2014 - Shanghai, China INDEX I. Introduction II. Current Situation III. Constitutional
More informationHuawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei
Huawei European Research University Partnerships Michael Hill-King European Research Institute, Huawei Next 20 30 Years: The World Will Become Intelligent All things Sensing All things Connected All things
More informationEU funded research is keeping up trust in digital society
EU funded research is keeping up trust in digital society Rafael Tesoro Trust and Security Unit DG Communica5ons Networks, Content and Technology European Commission Cybersecurity Strategy of the EU: An
More informationEuropean Cybersecurity cppp and ECSO. org.eu
European Cybersecurity cppp and ECSO www.ecs org.eu ABOUT THE EUROPEAN CYBERSECURITY PPP A EUROPEAN PPP ON CYBERSECURITY The European Commission has signed on July 2016 a PPP with the private sector for
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationThe IECEx Ticket to Global Markets
The IECEx Ticket to Global Markets Extract from the tutorial at PCIC Europe 2008 Rudolf Pommé KEMA Quality NL Karel Neleman BARTEC NL With special thanks to co-authors: Mario Colpa BACAB CH Frédérique
More informationDevices for LV overvoltage protection : Called Surge Protective Device (SPD) for Low Voltage. Different from high voltage : «surge arrester»
Dispositivos para Proteção contra Surtos em Baixa Tensão Alain Rousseau Presidente do SC 37A / WG 3 da IEC Devices for LV Overvoltage Protection. SC37A /WG3 Convener Alain Rousseau NORMA INTERNACIONAL
More informationThe Critical Importance of CIIP to Cybersecurity
The Critical Importance of CIIP to Cybersecurity Without CIIP there is no Cybersecurity Peter Burnett GFCE-Meridian Coordinator The Global Forum on Cyber Expertise Focus: cyber capacity building (awareness
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationThe President s Spectrum Policy Initiative
The President s Spectrum Policy Initiative THE PRESIDENT S SPECTRUM POLICY INITIATIVE SPECTRUM MANAGEMENT FOR THE 21 ST CENTURY SPECTRUM MANAGEMENT REFORM Presentation To The National Academies Committee
More informationAIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1)
AIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1) AIIC Associazione Italiana esperti Infrastrutture Critiche Non-governmental and non-profit scientific association legally registered
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationDevelopments related to the work of the International Transport Forum. Dr Raimonds Aronietis Transport Analyst
Developments related to the work of the International Transport Forum Dr Raimonds Aronietis Transport Analyst 2 Quality charter implementation The «Quality Charter for International Road Haulage Operations
More informationCONFIRMED RETURN TO GROWTH FOR THE CONSTRUCTION INDUSTRY: INTERMAT 2018 INTRODUCES ITS NEW SPECIAL EVENTS TO MEET THE CHALLENGES OF THE FUTURE
Press Release of 04/05/2017, Paris CONFIRMED RETURN TO GROWTH FOR THE CONSTRUCTION INDUSTRY: INTERMAT 2018 INTRODUCES ITS NEW SPECIAL EVENTS TO MEET THE CHALLENGES OF THE FUTURE All of the indicators seem
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]
United Nations A/RES/56/195 General Assembly Distr.: General 21 January 2002 Fifty-sixth session Agenda item 98 (b) Resolution adopted by the General Assembly [on the report of the Second Committee (A/56/561/Add.2)]
More informationITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania
Cybersecurity @ ITU The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania Rosheen Awotar-Mauree Programme Officer, ITU Office for Europe 2 International Telecommunication Union
More informationSmart infrastructure for a smart sustainable city
CSIC Emerging Connections Workshop, Cambridge, 23 June 2017 Smart infrastructure for a smart sustainable city Dr Navil Shetty Fellow and Technical Chair for Asset Management Atkins Context Smart Infrastructure
More informationStudent Union Social Programming Board Constitution
Student Union Social Programming Board Constitution Preamble The Social Programming Board (SPB) is an Executive Entity of the Student Union at Washington University in Saint Louis, charged with providing
More informationISTQB in a Nutshell. ISTQB Marketing Working Group. February 2012 v10
ISTQB in a Nutshell ISTQB Marketing Working Group February 2012 v10 Contents 1 2 3 4 5 Introduction to ISTQB ISTQB : Worldwide Footprint Syllabi and Exams Benefits Contacts 2 What is ISTQB? ISTQB : International
More informationCONCURRENT SESSIONS Wednesday 8:30 10:30 KEMPINSKI HOTEL CORVINUS Erzsébet tér 7-8, Budapest V.
June 22, 2011 (Wednesday) 55th EOQ Congress CONCURRENT SESSIONS Wednesday 8:30 10:30 KEMPINSKI HOTEL CORVINUS Erzsébet tér 7-8, Budapest V. SALON BANDINI/MARZINO Wednesday 11:00 12.30 16.1. ACCREDITATION
More informationRomania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security
Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)]
United Nations A/RES/60/195 General Assembly Distr.: General 2 March 2006 Sixtieth session Agenda item 52 (c) Resolution adopted by the General Assembly [on the report of the Second Committee (A/60/488/Add.3)]
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationInput on Proposals and Positions for 2016 World Telecommunication Standardization
This document is scheduled to be published in the Federal Register on 05/17/2016 and available online at http://federalregister.gov/a/2016-11609, and on FDsys.gov Billing Code 3510-60-P DEPARTMENT OF COMMERCE
More informationThe African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt
The African Internet Governance Forum AfIGF 2017 4 6 December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt Draft Outcome Document: Recommendations Background of AfIGF The African Internet Governance
More informationTelecommunication Regulatory Reform and the WTO Process
Telecommunication Regulatory Reform and the WTO Process Dr Tim Kelly, ITU Session 1: Course on Telecom Policy, Regulation and Management, University of Witwatersrand, 6-7 May, 1999 * The views expressed
More informationThe Arab ICT Organization
The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the
More informationLessons learnt from building the International Virtual Observatory Alliance. Françoise Genova
Lessons learnt from building the International Virtual Observatory Alliance Françoise Genova The IVOA Formed in June 2002 with a mission to "facilitate the international coordination and collaboration
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]
United Nations A/RES/65/141 General Assembly Distr.: General 2 February 2011 Sixty-fifth session Agenda item 17 Resolution adopted by the General Assembly [on the report of the Second Committee (A/65/433)]
More informationMapping of the CVD models in Europe
Mapping of the CVD models in Europe TASK FORCE ON SW VULNERABILITY DISCLOSURE IN EUROPE Brussels, 29/11/2017 Gianluca Varisco Disclaimer This preliminary mapping has been put together by: reaching out
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationReport Annual ITU Regional Forum on Development for CIS Countries The Policy and Strategy for ICT Development in the CIS Region and Regulatory Aspects
Orozobek Kaiykov Head, ITU Area Office for CIS Report Annual ITU Regional Forum on Development for CIS Countries The Policy and Strategy for ICT Development in the CIS Region and Regulatory Aspects Chisinau,
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationFOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013
Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION
More informationAFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP
AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP GASeP: The Roadmap to foster Aviation Security in Africa and the Middle East Sharm El Sheikh, Egypt, 22-24 August 2017 REGIONAL MINISTERIAL CONFERENCE ON
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationAAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018
AAPA Smart Ports Cyber Management for Ports Panel Small Port Cyber Security Workshops March 6, 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Port Infrastructure Development More
More informationGiesecke+Devrient. Company Presentation
Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical
More informationFAQ: The IECEE CB Scheme
2 nd Edition: April 2013 Intertek Italia Via Principe di Udine, 114-33030 Campoformido (UD) info.etls-italy@intertek.com www.intertek.it Contents What do the initials IECEE CB stand for?... 2 Who are the
More information5 th IRF Latin America Regional Congress
Host 5 th IRF Latin America Regional Congress Bogotá, Colombia December 13-15, 2017 Program About the IRF OUR MISSION: Building Partnerships We assist countries in progressing towards better, safer and
More informationCONFERENCE OF EUROPEAN STATISTICIANS ACTIVITIES ON CLIMATE CHANGE-RELATED STATISTICS
Statistical Commission Forty-seventh session 8-11 March 2016 Item 3(k) of the provisional agenda Climate change statistics Background document Available in English only CONFERENCE OF EUROPEAN STATISTICIANS
More informationThe Fu ture of Australian & New Zealand Security Standard AS/NZS 4444?
The Fu ture of Australian & New Zealand Security Standard AS/NZS 4444? Dr Matthew Warren and Dr Bill Hutchinson School of Computing & Mathematics, Deakin University, Geelong, Victoria, Australia. Schoo/
More informationCongrès National Smart City 2018
Congrès National Smart City 2018 Smart Canton Genève Quels enjeux de gouvernance? Gianfranco Moi Deputy Director General 4/12/2018 - Page 1 State of Geneva territory 4/12/2018 - Page 2 Smart City Index
More informationFlash Eurobarometer 468. Report. The end of roaming charges one year later
The end of roaming charges one year later Survey requested by the European Commission, Directorate-General for Communications Networks, Content & Technology and co-ordinated by the Directorate-General
More informationSEAMLESS AIR ALLIANCE CONNECTED SKIES
SEAMLESS AIR ALLIANCE CONNECTED SKIES Seamless Air Alliance 2018 2018 SAFE HARBOR The following is intended to outline general information and direction only. It is intended for information purposes only,
More informationPARTNER EVENT IN SINGAPORE
PARTNER EVENT IN SINGAPORE MARCH 11-15, 2019 THE RITZ-CARLTON HOTEL, MARINA BAY, 7 RAFFLES AVENUE, SINGAPORE Announcing Our Upcoming Event! PECB is delighted to be hosting the upcoming exclusive Partner
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationWhere we are.. Where we are going!
The OWASP Foundation! http://www.owasp.org! Where we are.. Where we are going!! International Board of Directors! OWASP Foundation" " ~ Quick Update ~" Mission! Make application security visible so that
More informationDigital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.
Digital Opportunity Index Michael Minges Telecommunications Management Group, Inc. Digital Opportunity Index (DOI) Why How Preliminary results Conclusions WSIS Plan of Action E. Follow-up and evaluation
More informationProf HA Kruger. Last updated: 19 January Publications and Technical reports
Prof HA Kruger Last updated: 19 January 2009 Publications and Technical reports 1) Kruger, H.A. & Coetsee, L.D. 1996. A model to optimize internal audit service quality, South African Journal of Economic
More informationINTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Annual Meeting Minutes October 15, 2005 Miami, Florida USA
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Annual Meeting Minutes October 15, 2005 Miami, Florida USA Opening: The annual meeting of the International Information Systems
More informationCollaborative Regulation in the APP Economy
ITU Regional Economic and Financial Forum of Telecommunications/ICT for Africa Victoria Falls, ZIMBABWE, 30 31 January 2017 Collaborative Regulation in the APP Economy Carmen Prado Wagner Regulatory and
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593
COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a
More informationThe 2018 (14th) International Conference on Data Science (ICDATA)
CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationMultilateral Arrangements in Safety, Licensing & Regulations Capacity Building for Nuclear Safety and Security
Multilateral Arrangements in Safety, Licensing & Regulations Capacity Building for Nuclear Safety and Security Russell Gibbs Senior Safety Officer, Safety and Security Coordination Section Department of
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationEngaging space tools for development on Earth contribution of space technology and applications to the post-2015 Development Agenda
A/AC.105/2014/CRP.9 16 June 2014 English only Committee on the Peaceful Uses of Outer Space Fifty-seventh session Vienna, 11-20 June 2014 Item 13 of the provisional agenda * Use of space technology in
More informationSecuring an IT. Governance, Risk. Management, and Audit
Securing an IT Organization through Governance, Risk Management, and Audit Ken Sigler Dr. James L. Rainey, III CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint cf the
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationIEEE-SA Fellowship Program at 802 Survey Results. Glenn Parsons/Jodi Haasz 9 July 2017
IEEE-SA Fellowship Program at 802 Survey Results Glenn Parsons/Jodi Haasz 9 July 2017 Fellowship Program Survey Methodology and Response Rate ¾ IEEE-SA Fellowship Program Participant Survey All participants
More informationSouth-South Cooperation:
Special Unit for South-South Cooperation South-South Cooperation: Meeting Development Challenges with Southern Solutions South-South cooperation helps developing countries learn how best to apply successful
More information2017 Company Profile
2017 Company Profile LITS Lead Technology Services 10/2/2017 INTRODUCTION Leading Innovative Technology Solutions (LITS) Lead Innovative Technology Services is an affirmative and black economic empowerment
More informationHelp Keep the Internet Strong and Open
www.internetsociety.org Help Keep the Internet Strong and Open Help Keep the Internet Strong and Open The Internet is a global platform for innovation, creativity, and economic opportunity. It provides
More information