Home / Blogs

WCIT's Security Issues

Paul Budde

Another contentious issue at the World Conference on International Telecommunications (WCIT) in Dubai is 'security'. There has been a dramatic increase in nervousness regarding a whole range of security issues, especially in relation to the internet. They include: SPAM, denial-of-service-attacks, identity theft, cybercrime, cyberwarfare, and privacy issues on social media.

From the list above it is clear that some of these issues are related to content, while some can be classified as national security and others as criminal offences. In other words, there is no clear-cut issue on what constitutes security. Furthermore, because it has so many aspects it is also very difficult to group the issues under one easy technology banner.

So it would be impossible for WCIT to take 'security' on board as something that can be handled under the International Telecommunications Regulations (ITRs).

What the ITU — the International Telecommunications Union, which is hosting WICT — can do is to make sure that the quality of the underlying telecommunications infrastructure is sufficiently robust for those in charge of the various security issues to build their own security services for their individual purposes. Obviously, with 193 country member states involved in the ITU a wide variety of definitions of 'security' is applied. What is perfectly legal in one country is illegal in another, as recent events in several of the Arab States has made very clear.

So the only effective way WCIT and the ITU can proceed on the issue of security is to provide the best quality of service for the telecoms infrastructure; and 'robustness' is therefore a much better term — it fits much better with the work of these technology organisations than the more loaded word 'security'.

By Paul Budde, Managing Director of Paul Budde Communication. Paul is also a contributor of the Paul Budde Communication blog located here.

Related topics: Cyberattack, Cybercrime, Internet Governance, Malware, Policy & Regulation, Security, Spam

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:


To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Industry Updates – Sponsored Posts

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

i2Coalition to Host First Ever Smarter Internet Forum

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud

Sponsored Topics


DNS Security

Sponsored by


Sponsored by


Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services