The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
Editing
Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures
Back to page
Edit
Edit source
View history
Talk (0)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Citation == [[United Nations General Assembly]], '''Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures''' (Resolution 64/211) (Mar. 17, 2010) ([http://daccess-ods.un.org/access.nsf/Get?Open&DS=A/RES/64/211&Lang=E full-text]). == Overview == This Resolution invites Member States to use, if and when they deem appropriate, the annexed voluntary self-assessment tool for national efforts to protect [[critical information infrastructure]]s in order to assist in assessing their efforts in this regard to strengthen their [[cybersecurity]], to highlight areas for further action, with the goal of increasing the global culture of [[cybersecurity]]; encourages Member States and relevant regional and international organizations that have developed strategies to deal with [[cybersecurity]] and the protection of [[critical information infrastructure]]s to share their [[best practices]] and measures that could assist other Member States in their efforts to facilitate the achievement of [[cybersecurity]] by providing such [[information]] to the Secretary-General for [[compilation]] and [[dissemination]] to Member States. [[Category:Publication]] [[Category:United Nations]] [[Category:Cybersecurity]] [[Category:International]] [[Category:2010]]
Summary:
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Follow on IG
TikTok
Join Fan Lab