QUESTION 9-1/2 � Report on national cyberspace security infrastructure
TABLE OF CONTENTS
Foreword
1 Introduction
2 Network security and protection
2.1 Concept
2.2 Technologies
2.3 Routers
2.4 Firewalls
2.5 Antivirus protection
2.5.1 Scanners
2.5.2 Generic techniques
2.6 Intrusion detection systems
2.6.1 Categories of detection systems
2.6.2 Detection techniques
2.7 Virtual private networks (VPNs) and public key infrastructure (PKI)
2.8 Cryptography
2.9 Wireless local area networks (WLANs)
2.10 Review
3 Intrusions; automated attacks
3.1 Viruses
3.1.1 Multipartite and polymorphic viruses
3.1.2 Malware � the virus threat of tomorrow
3.2 Evasion and insertion techniques
3.2.1 Evasion techniques
3.2.2 Insertion techniques
3.3 Denial of service
3.3.1 Denial of service
3.3.2 Distributed denial of service
4 Network protection principles
4.1 Organization
4.2 Finding the origin of a security incident
4.3 Integrated cyberspace security solutions
5 Legal aspects (cybercrime)
5.1 Guidelines established by the United Nations and by the Organisation for Economic Co-operation and Development (OECD)
5.2 Council of Europe
5.3 European Union
5.4 National Strategy to Secure Cyberspace (USA)
5.5 Security measures taken by software writers
6 ISO Standards
7 World Summit on the Information Society
7.1 Declaration of Principles
7.2 Action Plan
8 Activities under way within ITU
8.1 WTSA-04 Resolutions (security)
8.2 ITU-T study groups
8.2.1 2001-2004 study period
8.2.2 2005-2008 period
8.3 Broadband and information security (ITU report)
8.4 ITU-T Manual on security in telecommunications and information technology
8.4.1 2003 edition
8.4.2 2004 edition
8.5 ITU-T cybersecurity symposium (October 2004)
8.6 Telebiometry
8.6.1 Introduction
8.6.2 Work at the global level
8.6.3 ITU-T activities
8.6.4 Case study: United States
8.7 Security Compendium
9 Data transmission monitoring and acquisition centre, including IP (DTMAC)
9.1 Introduction
9.2 Description and architecture of a DTMAC
10 Case studies
10.1 ITU
10.2 Network security around the world
10.3 Combating spam
10.3.1 Its history and definition
10.3.2 A social and technical phenomenon
10.3.3 Key requirements in the fight against spam
10.3.4 Technical anti-spam solutions
10.3.5 OECD's work on spam
10.3.6 ITU workshop on spam
10.3.7 Global symposium for regulators (ITU)
10.4 Phishing
10.5 Convergence of information systems, goods and persons: IP network video surveillance