Securing Information and Communication Networks
Best Practices for Developing a Culture of Cybersecurity. Final Report [Question 3/2]

This report is composed of a number of best practice reports on different aspects of cybersecurity. An analysis of an ITU’s cybersecurity awareness survey demonstrates that while a number of countries have to improve cybersecurity awareness, some do not, and those that do often do not target key segments of society. Strong attention is often paid to child online protection as a priority. Information related to the ITU’s Global Cybersecurity Index (GCI) conducted is also provided.
- Click to access:
-
Click to download PDF - 6.68MBPDF
-
Click to Read online and shareREAD
Executive Summary
This report covers numerous aspects relating to the terms and references of Question 3/2: “Securing information and communication networks: Best practices for developing a culture of cybersecurity” over a three-year study period, ending in April of 2017. We begin with an analysis of a cybersecurity awareness survey that was conducted by the ITU Telecommunication Development Bureau (BDT). The survey demonstrates that while a number of countries have to improve cybersecurity awareness, some do not, and those that do often do not target key segments of society. Strong attention is often paid to child online protection as a priority. The report gives a view toward spam, its causes, and means to address spam. While the amount of bandwidth consumed by email is generally low, the impact on degrading the value of communication remains a concern. The report then provides a sampling of outreach activities that governments have taken to improve their overall societal posture toward cybersecurity.
- Click to access:
-
Click to download PDF - 174.18KBPDF
-
Click to Read online and shareREAD