Skip to main content

Best Practices in Cybersecurity from Intergovernmental Discussions and a Private Sector Proposal

  • Chapter
  • First Online:
Cybersecurity Best Practices

Abstract

This paper comments on the best practice norms presented in the 2015 Report of the UN Intergovernmental Group of Experts in the Field of Information and Telecommunications in the Context of International Security (UN document A/70/174) (https://daccess-ods.un.org/access.nsf/GetFile?Open&DS=A/70/174&Lang=E&Type=DOC).

In Sect. 20.1, we comment on the best practices outlined in the proposed norms. In Sect. 20.2, we make additional recommendations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 74.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.itu.int/en/wcit-12/Pages/default.aspx

  2. http://www.itu.int/en/Pages/default.aspx

  3. For more information, see: http://www.hill-a.ch/wcit

  4. A number of states refused to sign the ITRs in 2012. The reasons given, in particular that article 6 might justify violations of freedom of speech, are not valid from a legal point of view, see the cited scholarly works. For greater clarity, states acceding to the ITRs could make a formal declaration along the lines of the proposal at: http://www.hill-a.ch/ITR%20accession.doc

  5. During the negotiations of the ITRs, the point was made that it might be impossible for a state to ensure certain aspects of cybersecurity, so the use of the term “shall” did not achieve consensus. On the other hand, it point was made that the term “should” is too weak. As a compromise, it was agreed to use the term “shall endeavor”, which means that states must make efforts to implement the provision. See the discussion on pp. 95-96 of Hill, Richard (2013), The New International Telecommunications Regulations and the Internet: A Commentary and Legislative History, Schulthess/Springer.

    Google Scholar 

  6. See https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/#sm.00017arazqit2faipqq2lyngzmxx4https://www.wired.com/2017/05/microsoft-right-need-digital-geneva-convention/

  7. The proposals were available at the following web sites in November 2017, but may no longer be available there: https://mscorpmedia.azureedge.net/mscorpmedia/2017/05/Digital-Geneva-Convention.pdfhttps://mscorpmedia.azureedge.net/mscorpmedia/2017/05/Attribution-Organization.pdfhttps://mscorpmedia.azureedge.net/mscorpmedia/2017/05/Tech-Accord.pdf

  8. This proposal is not part of Microsoft’s proposal. It is a proposal by the author of this paper.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Hill .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hill, R. (2018). Best Practices in Cybersecurity from Intergovernmental Discussions and a Private Sector Proposal. In: Bartsch, M., Frey, S. (eds) Cybersecurity Best Practices. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-21655-9_20

Download citation

Publish with us

Policies and ethics