zmaier
TNPer
Name: Anti-Cyber Terrorism Act
Category: International Safety
Strength: Significant
DEFINES cyber terrorism as attack on a country's technological systems, by a group or individual who is a separate entity from their government, using computers and/or information technology to cause damage or steal infrastructure or private information within that nation(s),
OFFICIALLY BANS all forms of cyber-terrorism,
CLARIFIES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare as a military action,
Category: International Safety
Strength: Significant
DEFINES cyber terrorism as attack on a country's technological systems, by a group or individual who is a separate entity from their government, using computers and/or information technology to cause damage or steal infrastructure or private information within that nation(s),
OFFICIALLY BANS all forms of cyber-terrorism,
CLARIFIES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare as a military action,
- ESTABLISHES the creation of a committee called, International Cyber Protection Agency (from now on called ICPA)
- The purpose of this committee is to prevent nations from being attacked by international cyber terrorist as well as helping them recover from a cyber-attack,
- MANDATING that the ICPA create a database which would act as an list of:
- Known active cyber terrorist
- Create standards for what a nations cyber security should be at the minimum
- Recent attacks on nations by cyber terrorists
- Forms of cyber terrorism
- Cyber terrorism prevention methods
- Ways to reverse damage caused by cyber terrorism
- MANDATES that all WA nations create their own cyber security plans which would fit the standards of the set by IPCA
- STATES that all WA nations are required to submit the required information to the IPCA
- ENCOURAGES nations to share information on how to prevent and repair damage caused by cyber terrorism.
DEFINES cyber terrorism as attack on a countries technological systems, by a group or individual, using computers and/or information technology to cause damage or steal infrastructure or private information within that nation(s),
OFFICIALLY MANDATES the banning of all forms of cyber-terrorism by a group or individual,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare,
OFFICIALLY MANDATES the banning of all forms of cyber-terrorism by a group or individual,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare,
- MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
- The purpose of this committee would be to help nations from being attacked by cyber terrorist as well as helping them recover from a cyber-attack,
- This committee would create a database which would act as an list of:
- Active cyber terrorist
- Recent attacks on nations by cyber terrorists
- Forms of cyber terrorism
- Cyber terrorism prevention methods
- Ways to reverse damage caused by cyber terrorism
- This committee would not act as an international law enforcing party
- Would create a rating system which would provide each WA nation a cyber-security protection score depending on:
- Difficulty of system penetration
- Skill of Cyber Security staff
- Level of database encryption
- CLAIRIFIES that this database would be encrypted using:
- Hash encryption methods
- Symmetric and Asymmetric algorithm methods
- Built in hardware encryption
- MANDATES that all WA nations with a Cyber Security Score above 50 do the following:
- Inventory authorized and unauthorized software and devices
- Secure configurations for all hardware and software
- Preform continuous vulnerability assessment and remediation
- Set up:
- Malware defenses
- Application software security
- Wireless access control
- Encrypted data recovery systems
- Security skills assessment of cyber security personnel and appropriate training to fill gaps
- Secure configurations for network devices
- Limitation and control of networks and administrative rights
- Create an encrypted logging system for all networks and computers
- STATES that nations are required to submit to this database:
- All known cyber-terrorist groups which are not being dealt with by their own government,
- This excludes private cyber protection companies which are being hired by a nations government
- All cyber-attacks which are thought to be by an non-governmentally owned group or individual,
- All known cyber-terrorist groups which are not being dealt with by their own government,
- ASKS that all nations which submit groups to this database allow WA employed information scientists as well as programmers to observe the methods used by the terrorists in their attack,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual, using computers and/or information technology to cause damage to infrastructure within that nation,
OFFICIALY MANDATES the banning of all forms of cyber-terrorism by a group or individual
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare,
a. This resolution also does not affect any nation's right to use cyber warfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to help nations from being attacked by cyber terrorist as well as helping them recover from a cyber attack,
b. This committee would create a database which would act as an list of:
i. Active cyber terrorist
ii. Recent attacks on nations by cyber terrorists
iii. Forms of cyber terrorism
iv. Cyber terrorism prevention methods
v. Ways to reverse damage caused by cyber terrorism
c. This committee would not act as a international law enforcing party
2. STATES that nations are required to submit to this database:
a. All known cyber-terrorist groups which are not being dealt with by their own government,
i. This excludes private cyber protection compainies which are being heired by a nations goverment
b. All cyber-attacks which are thought to be by an non-governmentally owned group or individual,
3.ASKS that all nations which submit groups to this database allow WA employed information scientists as well as programmers to observe the methods used by the terrorists in their attack,
OFFICIALY MANDATES the banning of all forms of cyber-terrorism by a group or individual
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyber warfare,
a. This resolution also does not affect any nation's right to use cyber warfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to help nations from being attacked by cyber terrorist as well as helping them recover from a cyber attack,
b. This committee would create a database which would act as an list of:
i. Active cyber terrorist
ii. Recent attacks on nations by cyber terrorists
iii. Forms of cyber terrorism
iv. Cyber terrorism prevention methods
v. Ways to reverse damage caused by cyber terrorism
c. This committee would not act as a international law enforcing party
2. STATES that nations are required to submit to this database:
a. All known cyber-terrorist groups which are not being dealt with by their own government,
i. This excludes private cyber protection compainies which are being heired by a nations goverment
b. All cyber-attacks which are thought to be by an non-governmentally owned group or individual,
3.ASKS that all nations which submit groups to this database allow WA employed information scientists as well as programmers to observe the methods used by the terrorists in their attack,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,using computers and/or information technology to cause damage to infistructure within that nation,
OFFICIALY MANDATES the banning of all forms of cyber-terrorism by a group or individual
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. This resolution also does not affect any nation's right to use cyberwarfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.ASKS that all nations which submit groups to this database allow WA employed informaition scientists as well as programers to assist the nation in finding these terrorist,
4.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system,
OFFICIALY MANDATES the banning of all forms of cyber-terrorism by a group or individual
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. This resolution also does not affect any nation's right to use cyberwarfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.ASKS that all nations which submit groups to this database allow WA employed informaition scientists as well as programers to assist the nation in finding these terrorist,
4.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system,
RECOGNIZES the repealed GA resolution #100 and the flaws of that resolution pointed out in GA resolution #278,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,using computers and/or information technology to cause damage to infistructure within that nation,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. This resolution also does not affect any nation's right to use cyberwarfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.ASKS that all nations which submit groups to this database allow WA employed informaition scientists as well as programers to assist the nation in finding these terrorist,
4.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,using computers and/or information technology to cause damage to infistructure within that nation,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. This resolution also does not affect any nation's right to use cyberwarfare
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.ASKS that all nations which submit groups to this database allow WA employed informaition scientists as well as programers to assist the nation in finding these terrorist,
4.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system,
RECOGNIZES the repealed GA resolution #100 and the flaws of that resolution pointed out in GA resolution #278,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,using computers and/or information technology to cause damage to infistructure within that nation,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. The term "nations" in the resolution includes both WA nations and non-WA nations
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system
a. If these criminals manage to avoid capture and flee to another nation, that nation would be asked to capture imprison the terrorist(s) ,if that nation is willing to, and deport them to the origional nation
b. If this terrorist group manages to cross its boarders the orrigional nation will not be allowed to continue to follow the criminal unless allowed to by the neighboring nation.
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,using computers and/or information technology to cause damage to infistructure within that nation,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation's right to use cyberwarfare,
a. The term "nations" in the resolution includes both WA nations and non-WA nations
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
b. This committee would create a database which would act as an list of all non-governmental cyber terrorist groups or individuals
c. This committee would not act as a international law enforcing party, this committee will be treated as a private dective service employed by the goverment to track these terrorists
2. STATES that nations are required to submit to this batabase:
a. All known cyber-terrorist groups which are not being delt with by their own goverment
b. All cyber attacks which are thought to be by an non-govermentaly owned group or indiviual,
3.CLARIFIES that after the finding of these cyber terrorist(s), all information will be submitted to the governments judicial system
a. If these criminals manage to avoid capture and flee to another nation, that nation would be asked to capture imprison the terrorist(s) ,if that nation is willing to, and deport them to the origional nation
b. If this terrorist group manages to cross its boarders the orrigional nation will not be allowed to continue to follow the criminal unless allowed to by the neighboring nation.
RECOGNIZES the repealed GA resolution #100 and the flaws of that resolution pointed out in GA resolution #278,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,
using computers and/or information technology to cause distress,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation in the WA at all,
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. This committee would be built up of volunteer technological experts who would submit a from which would show their history with technological sciences,
b. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
c. This committee would create a submission form which would act as an database of all non-governmental cyber terrorist groups or individuals
2. ENFORCES that all nations to submit all non-governmental cyber terrorist groups or individuals to this form,
3. STATES that after the submission of nation which submitted would be asked to give a group of WA personal to inspect the cyber-attack and attempt to pin point these person(s) behind this attack
4.CLARIFIES that after the finding of these cyber terrorist the person(s) will be submitted to the governments judicial system and will be charged using that nations legislator,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,
using computers and/or information technology to cause distress,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation in the WA at all,
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. This committee would be built up of volunteer technological experts who would submit a from which would show their history with technological sciences,
b. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
c. This committee would create a submission form which would act as an database of all non-governmental cyber terrorist groups or individuals
2. ENFORCES that all nations to submit all non-governmental cyber terrorist groups or individuals to this form,
3. STATES that after the submission of nation which submitted would be asked to give a group of WA personal to inspect the cyber-attack and attempt to pin point these person(s) behind this attack
4.CLARIFIES that after the finding of these cyber terrorist the person(s) will be submitted to the governments judicial system and will be charged using that nations legislator,
RECOGNIZES the repealed GA resolution #100 and the flaws of that resolution pointed out in GA resolution #278,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,
using technological devises to cause distress,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation in the WA at all,
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. This committee would be built up of volunteer technological experts who would submit a from which would show their history with technological sciences,
b. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
c. This committee would create a submission form which would act as an database of all non-governmental cyber terrorist groups or individuals
2. ENFORCES that all nations to submit all non-governmental cyber terrorist groups or individuals to this form,
3. STATES that after the submission of nation which submitted would be asked to give a group of WA personal to inspect the cyber-attack and attempt to pin point these person(s) behind this attack
4.CLARIFIES that after the finding of these cyber terrorist the person(s) will be submitted to the governments judicial system and will be charged using that nations legislator,
DEFINES cyber terrorism as an political, ideological, or personally motivated attack on an population or government, by a group or individual,
using technological devises to cause distress,
CLARIFIES that this group or individual is an separate entity from their government,
STATES that in no way do the clauses of this resolution affect any nation in the WA at all,
1. MANDATES the creation of a committee called, International Cyber Terrorism Protection Committee (from now on called ICTPC)
a. This committee would be built up of volunteer technological experts who would submit a from which would show their history with technological sciences,
b. The purpose of this committee would be to counter-act these cyber-attacks and decommission the cyber-terrorist causing them
c. This committee would create a submission form which would act as an database of all non-governmental cyber terrorist groups or individuals
2. ENFORCES that all nations to submit all non-governmental cyber terrorist groups or individuals to this form,
3. STATES that after the submission of nation which submitted would be asked to give a group of WA personal to inspect the cyber-attack and attempt to pin point these person(s) behind this attack
4.CLARIFIES that after the finding of these cyber terrorist the person(s) will be submitted to the governments judicial system and will be charged using that nations legislator,