DAY ONE
Introduction to Critical Network
Infrastructure, Kijoon Chae, Ewha Womans University, PDF![](../../adobeacrobat.gif)
Creating
Trust in Critical Network Infrastructures: Korean Case Study, Chaeho
Lim, KAIST, PDF![](../../adobeacrobat.gif)
Creating
Trust in Critical Network Infrastructures: Brazil Case Study, Robert
Shaw, ITU, PDF ![](../../adobeacrobat.gif)
Creating
Trust in Critical Network Infrastructures: Netherlands Case Study, Ivo
Essenberg, ITU, PDF
Creating
Trust in Critical Network Infrastructures: Canada Case Study, Michael
Harrop, PDF![](../../adobeacrobat.gif)
DAY TWO
National
Infrastructure Protection Issues, Bill Hancock, CISSP,
PDF
(3 MB), ZIPped (1 MB)
Malaysia's
Approach to Network Security, Bistamam Siru Abdul Rahman, Malaysian
Communications and Multimedia Commission, PDF![](../../adobeacrobat.gif)
A
Global Approach to Protecting the Global Critical Infrastructure, Stephen
D. Bryen, PDF![](../../adobeacrobat.gif)
Cyber
Terrorism and Private Sector Efforts for Information Infrastructure
Protection, Olivia Bosch, International
Institute for Strategic Studies, PDF![](../../adobeacrobat.gif)
Korea's
Approach to Network Security, Cha, Yang-Shin, Ministry of
Information and Communication, Korea, PDF![](../../adobeacrobat.gif)
Present
Status of Cyber-Terrorism and its Counter Measures in Korea, Yang,
Kunwon, Korea National Police Agency, PDF
(2 MB), ZIPped (1 MB)
DAY
THREE
Security
Study Activities in ITU-T, Hiroyuki Ohno, Study Group 17 Rapporteur,
ITU-T, PDF ![](../../adobeacrobat.gif)
Overview
of e-ASEAN Initiative, Pichet Durongkaveroj, Chairman, e-ASEAN Working
Group, PDF ![](../../adobeacrobat.gif)
|