Advertisement
Guest User

Untitled

a guest
Jan 31st, 2015
308
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.74 KB | None | 0 0
  1.  
  2. Agenda: Cyber Security & Warfare
  3. Sponsors: Canada, United States, Germany, France
  4. Signatories: Italy, Greece
  5.  
  6. The Disarmament & International Security Committee,
  7. Recognizing the central role that modern technology plays in the international arena, and that for all its advantages, the increased connectivity and dependence on modern technology has left the world more at risk of fraud, abuse, sabotage, cyber espionage, and cyber attacks.
  8. Further recognizing the need to secure all users, computer systems and networks in cyberspace through education, training and preventative measures.
  9. Stressing that cyber security is a shared responsibility of the international community, and nesessary steps to protect the security of individuals, nations and institutions needs to be taken to secure all users of cyber space.
  10. Keeping in mind state soverignity, the committee urges all nation states to take preventative measures to secure cyber space from attacks and from being used as a method of warfare.
  11. Considers an act of cyber warfare as an act that causes significant damage to states infrastructure, economy or population comparable to that of conventional attacks.
  12. The Disarmament & International Security Committee,
  13. 1. Calls for improving cyber management on both a national and international scale to protect all levels of the government and the private sector from cyber attacks:
  14. a) recommend the establishment of national cyber defence.
  15. 2. Recommend that each state take preventative measures in securing computer systems and networks in cyberspace:
  16. a) reduce vulnerability, minimizing damage and recovery time from possible attacks;
  17. b) create monitoring and response systems;
  18. c) provide education, workshops and training to employees, users and developers.
  19. 3. Recommend states and institutions to regularly review their technology, security plans, users, firewalls and software:
  20. a) enhance information sharing;
  21. b) conduct cyber defence experiments and simulations;
  22. c) develop cyber defence practices and standards;
  23. d) encourage to locate the origin of cyber attacks.
  24. 4. Urges for states to refrain from attacks on hospitals or other life sustaining infrastructure such as water supplies, tampering with nuclear facilities in a manner that threatens civilians life:
  25. a) recognizes that in the case of serious cyber attacks states may, under Article 51, respond with equal measures to counteract the attack until respective attacks cease, the aim of this is to encourage states to return to previous relations.
  26. 5. Recommend that all member states refrain from cyber espionage in times of peace in order to maintain good international relations.
  27. 6. Suggest the establishment of an independent and impartial international body that:
  28. a) work to help prevent, detect, research and analyze attacks;
  29. b) develop a international code of conduct regarding cyberspace;
  30. c) recommend that the Security Council impose sanctions on nations breaching the code of conduct on cyber warfare;
  31. d) suggest that all signatories invest in and increase security of all root servers by the policy of the international center;
  32. e) suggest a cooperation with ICANN be merged into this new body;
  33. f) work on deterring cyber attacks from non-state actors;
  34. g) suggest, in the spirit of equal representation and democracy, nations states have a equal voice anf voting powers.
  35. 7. Strongly urges all states to closely cooperate on the issue of cyber attacks from non-state actors.
  36. 8. Parties shall independently bear costs of participation of experts in relevant activities relating to the implementation of this agreement:
  37. a) As for the cost of implementation of this agreement, the parties may agree upon other financing procedures in each particular case in accordance with the legislation.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement