MUN Resolution - Cyber Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Forum:​ General Assembly 1

Topic:​ The question of the rise of cyber-warfare


Main submitter: ​United States of America
Co-submitter: ​The Republic of Cuba, The State of Israel, Socialist Republic of Vietnam, Malaysia, The
People's Republic of China, Commonwealth of Australia

Alarmed by the risks and consequences in the event of a cyber attack upon nations and the lack of
effective countermeasures,

Stressing the importance of respecting privacy and human rights in the use of communication and
information technologies,

Highlighting the need and importance of enhanced cooperation/ coordination among states in combating
the criminal misuse of information technologies,

Concerned​ ​with loose cyber security regulations,

Recognizing ​United Nations previous resolution addressing the regulation of cyber warfare RES/73/266
submitted by the United States, and RES/73/27 submitted by Russia

Recommends all nations to strengthen their academic base about the importance of cyber attack as well as
the protection of their private information

1. Requests nations to define critical infrastructure and services that have the risk of being attacked
through the internet, with the possibility of causing adverse effects toward social-economic of a nation,
such as but not limited to:
a. Cellular services,
b. Gas, water, and power services,
c. Public health services,
d. Financial services (banking, clearing),
e. Transportation system,
f. Security services (police, military),
g. Telecommunication,
h. Agricultural, food production and distribution,
i. Heating (fuel oil, district heating);

2. ​Calls for ​the participation of all nations to seize and act proportionally, with national and international
laws, regarding to cyberspace in their countries through ways such as but not limited to:
a. Encouraging report of vulnerabilities, exploits, etc. and share necessary related information to
work toward a remedy as fast as possible,
b. Insisting businesses/agency with large Information, Communication, and Technology (ICT)
infrastructure to constantly update security protocols and have a specialized personnel for cyber
security,
c. Responding with appropriate help and assistance toward businesses that is vulnerable to
malicious cyber attacks;
3. ​Recommends all nations to ratify the establishment of a proactive cyber security defense network to
protect critical infrastructures and services defined in clause 1, where the network shall be multi-layered
and governed by each countries’ Cyber Defense Ministry and in the circumstances that a country does not
have said Ministry, said countries shall be subsidized accordingly under clause 10, subclass c;

4. ​Further recommends ​the use of Artificial Intelligence (AI) in cybersecurity for early detection and
prevention of attacks such as but not limited to:
a. Spam filter applications,
b. Fraud detection,
c. Botnet detection,
d. DDOS attacks;

5. ​Request ​all nations to propose severe punishments toward countries, groups or individuals that violate
the cyber security laws and have the intention of causing harm, where decision will depend on the
severity of the crime, cyber criminal with internationally wanted warrant shall be extradited to the
International Court of Justice (ICJ) and these punishments include acts such as but not limited to:
a. Embargoes,
b. Jail time,
c. Violators shall be placed in a global watch list for a certain amount of time depending on the
severity of the consequences,
d. All actions of the countries, groups or individuals that commit the laws must be supervised by a
group of UN in a certain amount of time depending on the severity of the consequences;

6. ​Suggests c​ ountries to allocate budget, with the recommendation of 0.1 to 2% GDP, in the development
of countermeasures toward cyber attacks or upgrade of infrastructure to prevent vulnerabilities and
counter weaknesses​;

​ urther request the UN to institute a council focusing on counter cyberterrorism and attacks through
7. F
terms that shall be debated upon once members submitted their proposal creating an international
agreement:
a. Secure international economic transactions as well as military actions toward peace keeping
missions,
b. Monitor development of softwares and programs minimizing the possibility of vulnerabilities, or
malicious activities,
c. Refer to the international agreement;

8. ​Emphasizes nations not to develop unmanned armed vehicles for military uses due to the risk of
firewall breakthrough leading to the use of those weapons to launch preemptive attacks without warning,
violating UN regulations on the use of autonomous weapons;

9. ​Encourages to actively promotes an open, free and secure cyberspace globally through means such as
but not limited to:

a. Every nation appointing a Cyber Ambassador,


b. Publishing an international engagement strategy on cyber security,
c. Championing an open, free and secure Internet to enable all countries to generate growth and
opportunity online,
d. Partnering internationally to shut down safe havens and prevent malicious cyber activity
e. Building cyber capacity globally, including through public-private partnerships,
f. Establishing a 2 days dialogues periodically (depends on nations’ agreements) among countries to
discuss and work with partners to achieve priority goals on international cyber issues, including
international law, norms of responsible state behaviours and confidence building measures;

10. ​Further requests the international collaboration regarding the protection of cyberspace, including but
not limited to:
a. International aid provided for damage control toward nations that are the targets of cyber attacks,
b. Abiding by international regulations regarding cyber security in order to restrict uncontrolled
usage,
c. Financial aids shall be provided toward (LEDC) by (MEDC) in exchange for services and export,
to be negotiated;

11. ​Encourages ​nations to work with organisations (NGOs) or local authority to develop educational
programmes to raise citizen and businesses awareness through means such as but not limited to:
a. Academic programmes upon internet safety:
i. School curriculum,
ii. Extra curricular classes/activities,
iii. Media (TV, Internet, Papers),
b. Workshops demonstrating scenarios such as but not limited to ensuring a responsible action:
i. Information leakage,
ii. Detection of loopholes/backdoors,
iii. Organized, large scale attempt of a cyberattack,
iv. Possible security compromise;

You might also like