Contributions |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 50 ]
|
Report of the Rapporteur's Group meeting on Question 22/1 (Geneva, 6-7 April 2009)
|
Rapporteur for Question 22/1
|
Q22/1
|
2009-04-29 |
|
[ 49 ]
|
Comments on the Draft Report on Question 22/1: Best practices for cybersecurity
|
Syrian Arab Republic
|
Q22/1
|
2009-03-31 |
|
[ 48 ]
|
Contribution by Bangladesh
|
Bangladesh
|
Q22/1
|
2009-03-18 |
|
[ 47 ]
|
Mise en place d'un cadre réglementaire pour la cybersécurité au Burkina Faso
|
Burkina Faso
|
Q22/1
|
2009-03-18 |
|
[ 46 ]
|
Etude de cas: Cameroun - Projet de loi sur la cybercriminalité
|
Cameroun
|
Q22/1
|
2009-03-18 |
|
[ 45 ]
|
Contribution de Madagascar
|
Madagascar
|
Q22/1
|
2009-03-18 |
|
[ 44 ]
|
Annex B of the Draft Report on Question 22/1: Overview of identity management in the context of cybersecurity
|
Rapporteur for Question 22/1
|
Q22/1
|
2009-03-18 |
|
[ 43 ]
|
Annex A of the Draft Report on Question 22/1: Countering spam and associated threats
|
Rapporteur for Question 22/1
|
Q22/1
|
2009-03-18 |
|
[ 42 ]
|
Liaison Statement from ITU-T Study Group 17: Activities of ITU-T Q.9/17 on telebiometrics
|
Telecommunication Standardization Bureau (TSB)
|
Q22/1
|
2009-03-06 |
|
[ 41 ]
|
Liaison Statement from ITU-T Study Group 17: Solicitation of interest in ITU-T SG 17 initiative on business use of telecommunications/ICT security standards
|
Telecommunication Standardization Bureau (TSB)
|
Q22/1
|
2009-03-06 |
|
[ 40 ]
|
Liaison Statement from ITU-T Study Group 17: Contact persons for works related to security
|
Telecommunication Standardization Bureau (TSB)
|
Q22/1
|
2009-03-05 |
|
[ 39 ]
|
Liaison Statement from ITU-T Study Group 17: Progress in safety and security issues on telecommunications related to e-health
|
Telecommunication Standardization Bureau (TSB)
|
Q22/1
|
2009-03-05 |
|
[ 38 ]
|
Liaison Statement from ITU-T Study Group 17: Technical framework of countering IP multimedia spam
|
Telecommunication Standardization Bureau (BDT)
|
Q22/1
|
2009-03-05 |
|
[ 37 ]
|
Liaison Statement from ITU-T Study Group 17: Response to LS on Best practices for cyber security report
|
Telecommunication Standardization Bureau (TSB)
|
Q22/1
|
2009-03-03 |
|
[ 36 ]
|
Proposed changes to the Draft Report on Question 22/1, Introduction
|
Rapporteur for Question 22/1
|
Q22/1
|
2009-03-03 |
|
[ 35 ]
|
Etude de cas France: la cybercriminalité dans le Plan France Numérique 2012, (Plan de développement de l'économie numérique)
|
Thales (France)
|
Q22/1
|
2009-01-29 |
|
[ 34 ]
(Rev.1) |
Projet d'ordre du jour du Groupe du Rapporteur sur la Question 22/1 (Genève, 6-7 avril 2009)
|
Rapporteur for Question 22/1
|
Q22/1
|
2008-11-28 |
|
[ 33 ]
+Ann.1 |
Report of the Rapporteur's Group meeting on Question 22/1 (Geneva, 21-22 April 2008)
|
Rapporteur for Question 22/1
|
Q22/1
|
2008-04-24 |
|
[ 32 ]
(Rev.1) |
Draft Report on Question 22/1: Best practices for cybersecurity
|
Rapporteur's Group on Question 22/1
|
Q22/1
|
2008-04-22 |
|
[ 31 ]
|
Proposed changes by the United States of America to the draft Report on Question 22/1: Best practices for cybersecurity
|
United States of America
|
Q22/1
|
2008-04-17 |
|
[ 30 ]
|
Update on BDT cybersecurity activities since the September 2007 meeting of Study Group 1 Question 22/1
|
Telecommunication Development Bureau (BDT)
|
Q22/1
|
2008-04-16 |
|
[ 29 ]
+Ann.1 |
Liaison Statement from ITU-T Study Group 3 to ITU-D Study Group 1
|
ITU-T Study Group 3
|
Q22/1
|
2008-04-10 |
|
[ 28 ]
|
Contribution de la République Démocratique du Congo
|
Rép. Dém. du Congo
|
Q22/1
|
2008-04-10 |
|
[ 27 ]
|
Liaison statement from ITU-T Study Group 13 to ITU-D Quesion 22/1
|
ITU-T Study Group 13
|
Q22/1
|
2008-02-06 |
|
[ 26 ]
|
Summary Report of the 2nd meeting of Council WG on Res. 149 (Geneva, 21-22 January 2008)
|
Council Working Group on Resolution 149
|
Q22/1
|
2008-01-30 |
|
[ 25 ]
+Ann.1-4 |
Liaison statement from ITU-T Working Party 2/17 to ITU-D Study Group 1 Question 22/1 on definitions of cybersecurity and general information about the concept of identity management
|
ITU-T Working Party 2/17
|
Q22/1
|
2008-01-09 |
|
[ 24 ]
+Ann.1-2 |
Liaison Statement from ITU-T Study Group 17 to ITU-D Study Group 1
|
ITU-T Study Group 17
|
Q22/1
|
2007-12-19 |
|
[ 23 ]
|
Liaison Statement from ITU-T Study Group 17 to ITU-D Question 22/1
|
ITU-T Study Group 17
|
Q22/1
|
2007-12-18 |
|
[ 22 ]
|
Liaison Statement from ITU-D Question 22/1 to ITU-T Study Groups 13,17 and 19
|
Rapporteur for Question 22/1
|
Q22/1
|
2007-12-18 |
|
[ 21 ]
|
Liaison Statement from ITU-T SG 17 to ITU-D Q.22/1
|
ITU-T Study Group 17
|
Q22/1
|
2007-12-18 |
|
[ 20 ]
|
Orde du jour de la réunion du Groupe de Rapporteur sur la Question 22/1 (Genève, 21-22 avril 2008)
|
Rapporteur for Question 22/1
|
Q22/1
|
2007-11-23 |
|
[ 19 ]
+Ann.1-2 |
Report of the meeting of the Rapporteur's Group on Question 22/1, Geneva (30 April - 1st May 2007)
|
Rapporteur for Question 22/1
|
Q22/1
|
2007-05-18 |
|
[ 18 ]
|
CISCO comments on the Draft Report on recommended best practices for achieving cybersecurity - Annex A
|
Cisco Systems, Inc.
|
Q22/1
|
2007-05-15 |
|
[ 17 ]
|
Microsoft comments on the discussion of the "Draft Report on recommended best practices for achieving cybersecurity"that was presented for discussion at the 30 April 2007 meeting
|
Microsoft Corporation
|
Q22/1
|
2007-05-04 |
|
[ 16 ]
|
Reply to Liaison Statement on Q. 4/17 report on telecommunication security activities
|
United States of America
|
Q22/1
|
2007-05-01 |
|
[ 15 ]
|
Liaison statement
|
ITU-T Study Group 13
|
Q22/1
|
2007-04-30 |
|
[ 14 ]
|
A Generic National Framework for Critical Information Infrastructure Protection
|
Telecommunication Development Bureau
|
Q22/1
|
2007-04-03 |
|
[ 13 ]
|
ITU workshop on a USA proposed framework for national action: Cyber security and critical infrastructure
|
United States
|
Q22/1
|
2007-03-30 |
|
[ 12 ]
|
Draft Report on recommended best practices for achieving cybersecurity
|
Rapporteur for Question 22/1
|
Q22/1
|
2007-03-30 |
|
[ 11 ]
|
Les rudiments de la cybersécurité: se protéger contre l'escroquerie, le Spam et l'usurpation d'identité
|
CISCO Systems
|
Q22/1
|
2007-03-27 |
|
[ 10 ]
|
Best computer security practices
|
Rwanda
|
Q22/1
|
2007-03-12 |
|
[ 9 ]
|
Sécurisation des réseaux Wi-Fi
|
Thales (France)
|
Q22/1
|
2007-03-09 |
|
[ 8 ]
|
Sécurisation des RFID / Wi-Fi de l'aéroport de Heathrow (United Kingdom)
|
Thales (France)
|
Q22/1
|
2007-03-09 |
|
[ 7 ]
|
Network and information security
|
Lithuania (Republic of)
|
Q22/1
|
2007-02-21 |
|
[ 6 ]
|
La sécurisation des RFID
|
Thales (France)
|
Q22/1
|
2007-02-06 |
|
[ 5 ]
|
La sécurisation des Réseaux Privés Virtuels (VPN)
|
Thales (France)
|
Q22/1
|
2007-02-06 |
|
[ 4 ]
|
Liaison statement from ITU-T Study Group 17 to ITU-D Question 22/1 on countering IP multimedia spam
|
ITU-T Study Group 17
|
Q22/1
|
2007-02-02 |
|
[ 3 ]
|
Liaison statement from ITU-T Study Group 17 to ITU-D Question 22/1 on characterizations of spam
|
ITU-T Study Group 17
|
Q22/1
|
2007-02-02 |
|
[ 2 ]
|
Liaison statement from ITU-T Study Group 17 to ITU-D Question 22/1 on report from Lead Study Group on telecommunication security
|
ITU-T Study Group 17
|
Q22/1
|
2007-02-02 |
|
[ 1 ]
(Rev.1) |
Draft agenda of the Rapporteur's Group meeting on Question 22/1, 21-22 May 2007, Geneva, at 09:30 hours
|
Rapporteur for Question 22/1
|
Q22/1
|
2007-01-23 |
Resultats:50 documents
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):