Skip to main content

ICT Standards and Overview of Cybersecurity

Did you know that there is a worldwide organization or agency working across relevant sectors towards the betterment of information and communication technologies?

The three sectors that it works with are:

  • Development Sector
  • Standardization Sector
  • Radiocommunication Sector

The organization is the International Telecommunication Union (ITU) and what they have to say is something that we should all be aware about.

Our particular area of study at this point is the Standards or the Standardization Sector with their publication of the Standardization X.1205 approved last 2008-04-18 and currently in force or in effect - https://www.itu.int/rec/T-REC-X.1205-200804-I

Please follow the link above and download the official Overview of Cybersecurity.

Let us be clear about something today because people may be confused with the statement used throughout the document and may lead to believe otherwise. The documents official released by organization such as the ITU, including the Institute of Electrical and Electronics Engineers (IEEE) often use the word Recommendation but it does not mean that it really is just a recommendation. In an approved and in-force document, it is the approved and established Standard.

Be Engaged

If you have any concerns of the accuracy of the material, you should direct that concern to ITU as they are very much open to listen to concern.

Like always, after you have thoroughly understood the study item above, and would like to have further discussion about. Do sound off at the comment section below.

Comments

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Attack Example - Phishing - SMS Based - Smishing

What exactly is Phishing? It smells fishy, sounds like fishing, and it is exactly fishing. Knowing how social Filipinos are, almost everyone doesn't like being late in knowing who's an item in the office or who likes who, or what successful neighbors are doing to be successful. And so, we non-chalantly fish for information about it. That is exactly the core function of Phishing. It is to gather Personally Identifiable Information (PII) or information which can be used to identify individuals.