Ga1 BG Sjsmun'24
Ga1 BG Sjsmun'24
Table of Contents
Letter from the Dias 3
Key Terms 7
History 9
Key Issues 19
Possible Solutions 24
Focusing Questions 25
Recommended Readings 26
Bibliography 26
2
GA1 SJS MUN 24’
We have tried our very best to provide comprehensive and thorough background
information for each of your allocations; but, in order to conduct an informative
session, it is imperative that you do your own research and read between the lines. We
hope that each and every one of you will provide unique knowledge of your country's
stance and legislative procedure to guarantee that the committee operates as
efficiently as possible. However, your knowledge on the issue should not be totally
dependent on this guide; we encourage all delegates to perform their own research for
an insightful debate to take place.
We would like to remind everyone attending this conference that you are all capable
of sparking change and making the world a better place. By engaging in thoughtful
analysis, fervent discussion, and forging partnerships, we can tackle urgent
worldwide concerns and clear the path towards a more promising future. Remember
that this conference is about more than just winning, and we have worked hard to
create an environment where each of you can fully express your inner potential to
ignite passionate and thought-provoking debates, forge lasting friendships, and
improve the world.
As your chairs, we truly hope that we can make every single one of you feel
comfortable and enjoy yourself while debating. We hope the forthcoming conference
goes well for you!
Sincerely,
Chelsea Vaz (Chair)
Neha Farhat (Co-Chair)
Marisa Paul (Co-Chair)
Dias of the GA-1
3
GA1 SJS MUN 24’
Overview
The General Assembly (GA) of the United Nations (UN) is one of the six principal
organs of the UN, established as part of the UN Charter, which was signed on June
26, 1945.
The Charter came into force on October 24, 1945, after it was ratified by a majority
of the signatory nations, marking the official establishment of the United Nations.
The General Assembly serves as a forum for all member states of the UN to come
together, discuss, and make decisions on a wide range of international issues,
including peace and security, development, human rights, and international law. Each
member state has equal representation in the General Assembly, with each country
having one vote. The inaugural session of the General Assembly took place on
January 10, 1946, at Central Hall in Westminster, London. Since then, the General
Assembly has convened annually in September at the UN Headquarters in New York
City, bringing together world leaders, diplomats, and representatives from member
states to address global challenges and promote international cooperation.
The First Committee of the United Nations General Assembly was established to deal
with disarmament and matters of international security. This committee is an essential
part of the UN's mandate to prevent wars and uphold international stability since it
was formed to promote global peace and security via discussions and coordination of
actions relating to arms control, non-proliferation, and disarmament. The numerous
duties of the General Assembly include deliberative, supervising, financial, and
elective activities, all of which are covered by the UN Charter.and terrorism.
Executive Board
1. Opening Session
The session begins with an opening statement from the Committee Chairperson,
introducing the agenda items and setting the tone for the discussions.
Delegates may also deliver opening statements on behalf of their respective countries,
outlining their priorities and perspectives on the agenda topics.
4
2. Roll Call
The Committee adopts the agenda for the session. Amendments to the agenda may be
proposed and discussed if necessary.
4. General Debate
5. Thematic Discussions
The Committee then moves into thematic discussions on specific agenda items. Each
agenda item is addressed separately, allowing for focused deliberations and
negotiations. Delegates engage in moderated discussions, presenting their views,
sharing proposals, and engaging in dialogue with other member states.
Delegates work collaboratively to draft resolutions addressing the agenda topics. This
involves negotiating the language of the resolutions, reconciling differences, and
seeking consensus among member states. Amendments to draft resolutions may be
proposed and debated during this phase.
7. Voting on Resolutions
Once draft resolutions have been finalized, they are put to a vote. Member states vote
on each resolution individually. Resolutions may be adopted by a simple majority,
two-thirds majority, or consensus, depending on the rules of procedure and the
significance of the resolution.
8. Closing Session
The session concludes with a closing statement from the Committee Chairperson,
summarizing the outcomes of the session and thanking delegates for their
participation. Delegates may also deliver closing remarks, reflecting on the session
and highlighting key takeaways.
5
9. Adjournment
The session officially adjourns, marking the end of the Committee’s proceedings until
the next scheduled session.
Numerous security experts, politicians, and others have publicized the danger of
cyberterrorists hacking into government and private computer systems and crippling
the military, financial, and service sectors of advanced economies. Promoting
cybersecurity awareness and education at both the national and international levels is
essential for fostering a culture of responsible behavior in cyberspace. This includes
efforts to raise public awareness about the risks and consequences of cyber threats,
encourage the adoption of best practices for securing digital infrastructure, and
empower individuals to be responsible digital citizens.
Such plans would employ the technological, managerial, organizational, legal, and
human competencies in national security strategies for defense. The formation of
partnerships between private and public stakeholders to prevent, investigate, and
respond to threats to critical information infrastructures should be encouraged.
Communications networks should be in place and regularly tested to assure their
effective operation during a crisis situation. Countries should develop adequate
6
domestic laws and policies to allow the investigation and prosecution of cyber crime.
Appropriate international cooperation should take place in accord with properly
crafted domestic laws ensuring that critical information infrastructures are secure.
Key Terms
1. Phishing
2. Data Breach
The consequences of a data breach can be significant and far-reaching. They can lead
to financial loss, repetitional damage, legal and regulatory consequences (such as
fines or lawsuits), and the loss of customer trust.
4. Zero-day Exploit
Zero-day exploits are particularly dangerous because they can be used by attackers to
launch attacks before the developers even know about the vulnerability, let alone
have time to create and distribute a patch or update to fix it. This means that systems
are vulnerable to exploitation from the moment the vulnerability is discovered by
attackers until a patch is developed and applied.
8
GA1 SJS MUN 24’
History
Cybersecurity is becoming increasingly significant due to the increased reliance on
computer systems, the Internet and wireless network standards such as Bluetooth and
Wi-Fi, and due to the growth of smart devices and the various devices that constitute
the ‘Internet of things’.
Cyberattacks were challenging to execute for about 20 years after the first digital
computer was built in 1943. Small groups of people had access to the enormous
electronic machines, which weren't networked and only a few people knew how to
operate them, making the threat essentially nonexistent.
It's interesting to note that computer pioneer John von Neumann first raised the
possibility of computer programs reproducing themselves in 1949, which is when the
theory underpinning computer viruses was first made public.
Computer information gathering was not the original purpose of hacking. It may be
more accurate to say that early telephone use is where computer hacking originated.
This became clear in the 1950s when phone phreaking became popular. Phone
phreaking became popular in the late 1950s. The phrase refers to various techniques
used by "phreaks," or those with a particular interest in how phones function, to
tamper with the protocols that permitted telecom experts to operate on the network
remotely to place free calls and avoid paying long-distance charges. Even though the
practice gradually disappeared in the 1980s, phone providers were powerless to halt
the phreaks.
There are rumors that Apple's co-founders Steve Jobs and Steve Wozniak had a keen
interest in the fan community for mobile devices. Similar ideas would subsequently
be used in digital technology to create the Apple computers.
Even by the middle of the 1960s, most computers were massive mainframes kept in
9
temperature-controlled, safe environments. Access remained restricted, even for
programmers, due to the high expense of these bulky devices.
Most of the development of the phrase "hacking" occurred during this decade. It
wasn’t caused by using computers, but rather by certain individuals breaking into
high-tech train sets owned by the MIT Tech Model Railroad Club. They desired
alterations to their functionality. This decade, the idea was transferred to computers.
However, accessing these early systems through hacking didn't seem to be a "big
business." The goal of these early hacking incidents was just to get access to systems.
However, there were no opportunities for political or economic gain. Early hacking
was primarily about making a mess to see if it was possible.
New, quicker, and more effective hacking techniques have emerged throughout time.
1967 saw one of the most significant occurrences in information security history. At
that time, IBM invited some students to check out a freshly created computer in their
offices. The students were given training on this computer system. They got entry to
numerous system components. As a result, IBM gained knowledge about the system's
weaknesses.
Back to the discussion, the development of cybersecurity plans took a big stride
forward with this. In this decade's second half, and significantly in the years that
followed, the use of computers increased. They were also created in smaller sizes.
Due to their affordability, businesses started purchasing them to store data.
It didn't seem feasible or desirable at the time to lock the computers in a room. Too
many workers were needed by the employees. At this time, passwords were widely
used to access - and secure - computers.
The 1970s saw the actual start (and need) of cybersecurity. It was an important
decade in the evolution of cyber security. The Advanced Research Projects Agency
Network (ARPANET) was the initial endeavor in this. Before the internet was
created, this connectivity network was constructed.
I'm the creeper; catch me if you can! was printed using a program developed by Bob
Thomas, an ARPANET developer, using PCs connected to the network. For the first
10
time, this program switched from one machine to another by itself. Although the
experiment was harmless, we may presume that this was the first computer worm
recorded in the history of cyber security.
Getting rid of an unlawful program is effectively the first task that the newly born
cybersecurity offered. Ray Tomlinson, an ARPANET researcher who designed the
first networked mail messaging system, created a program called Reaper that used
every tool at its disposal to find and eliminate the Creeper worm.
The terms "Trojan Horse" and "computer virus" both made their debut in the same
year. Throughout the Cold War, the threat of cyber espionage increased. This decade
is when you can say the history of computer crime took flight.
Cybersecurity first emerged in the year 1987. Although various people claim to have
created the first antivirus program prior to that, 1987 marked the beginning of
commercial antivirus programs with the release of Anti4us and Flushot Plus.
The internet saw growth and development of mammoth proportions during the whole
decade. Along with it, the cybersecurity sector expanded. Here are a few significant
developments in this decade in the history of computer security:
Concerns regarding polymorphic viruses started. The first code that mutates as it
spreads through computing systems while simultaneously maintaining the
original algorithm was created in 1990. The polymorphic virus was difficult to
detect.
11
keep people secure when using the internet. SSL was introduced in 1995. It
helps to secure internet transactions, web browsing, and online data. Netscape
developed the protocol for it. it. Later, it would act as the basis for the HyperText
Transfer Protocol Secure (HTTPS) that we are using today.
The internet's growth during this time was amazing. The majority of homes and
businesses now had computers. There were numerous benefits, but, unfortunately,
cybercriminals also got new opportunities. A brand-new infection type that didn't
require file downloads appeared at the beginning of this decade in the history of
computer security.
Just going to a website with a virus on it was enough. This type of covert infection
posed a serious threat. Additionally, instant messaging systems were compromised.
The number of credit card hacks also increased in the 2000s. There have been
massive credit card data leaks. There were additional Yahoo assaults during this time.
In 2013 and 2014, these were found. In one incident, hackers gained access to the
Yahoo accounts of over 3 billion users.
The Biggest Moments in Cyber Security History for the Last 10 Years
2011: Sony’s PlayStation Network and Sony Pictures Suffers Multiple
Attacks
Hackers broke into Sony's PlayStation network in 2011 and stole the personal
information of millions of PlayStation users, taking the network offline for several
weeks. Anger over Sony suing an American hacker who tried to reverse-engineer the
PlayStation 3 to enable customers to play unofficial third-party games was the driving
force behind this attack.
The 2011 PlayStation Network outage (also known as the PSN Hack) was caused by
an "external intrusion" on Sony's PlayStation Network and Qriocity services, which
compromised the personal information of about 77 million accounts and rendered the
service unavailable to users of PS 3 and PlayStation Portable consoles.
Sony was forced to shut down the PlayStation Network on April 20 because of the
attack, which took place between April 17 and April 19, 2011. Clearly, it was one of
the biggest events in the history of cybercrime and issues.
With 77 million PSN accounts registered at the time of the outage, it was not just one
of the biggest data breaches but also the longest PS Network downtime in history. It
outperformed the TJX breach from 2007, which had a 45 million customer impact.
Concern was expressed by government representatives from numerous nations on the
12
theft and Sony's one-week delay in issuing a warning to its users.
The Union Savings Bank, situated in Danbury, Connecticut, saw an odd pattern of
fraud on about a dozen of the debit cards it had issued at the beginning of March
2012. It also noticed that many of the cards had recently been used at a cafe at a
neighboring private school.
The Breach was limited to a small number of people, and it was made clear to the
card holders that they wouldn't be responsible for any fraudulent card use. The first
company to act against Global Payments was Visa, which did so by removing the
latter from its list of authorized service providers.
2013:
The People's Action Party Community Foundation website was the first target of the
cyberattacks launched on October 28, 2013, and then the Ang Mo Kio Town Council
website was targeted. After that, site administrators shut the site and filed a police
report.
Hacktivists target Israeli government and even private websites during OpIsrael
(#OpIsrael), an annual coordinated cyberattack, using DDoS attacks and other
methods. On the night before Holocaust Remembrance Day in 2013, Anonymous
hackers started the first campaign. Since then, the campaign has been held yearly.
C) Adobe: The 21st century saw 17 big data breaches, and one of them was
targeted towards the American multinational computer software company Adobe Inc.
In October 2013, hackers were able to retrieve login information and almost 3 million
credit card numbers of Adobe users. The total number of affected users was 38
million.
2013 and 2014: Target and Home Depot Credit Card Data Stolen
56 million customers of Home Depot had their credit card information stolen between
April and September 2014 in one of the greatest data breaches since the origin of
cyber security thanks to specially crafted malware.
The hack happened at a time when government and commercial targets were
frequently targeted by hackers. Globally, there were over 1,500 data breaches in
2014, about 50% more than in 2013.
Home Depot's theft was comparable to a security lapse at rival retailer Target in 2013
that resulted in the exposure of the personal information of an additional 70 million
consumers as well as the credit card information of 40 million Target shoppers.
A hacker group leaked confidential data from Sony Pictures Entertainment (SPE) on
November 24, 2014. The hacker group identified itself as Guardians of Peace.
Information about executive salaries at SPE, employee details, emails between them,
plans of future Sony films, and scripts for certain films were part of the data leak.
The hacker group also used a variant of Shamoon wiper, a malware, to erase Sony’s
computer infrastructure. Based on evaluating the network sources, software, and
techniques used in the hack, the US Intelligence concluded that the attack was
sponsored by the government of North Korea.
14
2015:
It's not the entire Snapchat database, according to Wired Magazine's Kevin Poulsen.
"Only a small percentage of Snapchat users are impacted." Although it was an
enormous number.
All but the final two digits of Snapchat phone numbers were posted by hackers to a
website named snapchatDB. They invited people who desired the whole numbers to
contact the website for the uncensored database.
It happened in July 2015, when a hacking group identifying itself as The Impact
Team stole more than 60 gigabytes of company data that included user details.
The case received wide media coverage as it was alleged that Russia did this to
support Donald Trump during the 2016 U.S. election. It is a topic that is usually
covered in the brief history of cybercrime in politics.
One of the EU's greatest accomplishments in recent years was the adoption of the
General Data Protection Regulation act in 2016. It is the replacement for the 1995
Data Protection Directive, which was passed when the internet was just getting
started.
2017:
● Shadow Brokers Leaks NSA Hacking Tools: Another leak for NSA happened
in 2017, when a hacker group going by the pseudonym TSB or The Shadow
Brokers leaked hacking tools used by the National Security Agency.
● NotPetya: Also known as the 2017 Ukraine ransomware attacks, Petya and
NotPetya are a line of encrypting malware. NotPetya was used in June 2017 for
a global cyberattack, especially Ukraine.
Uber now claims that it was legally required to notify authorities about the attack as
well as the drivers whose license numbers were stolen. Instead, to hide the incident
16
and the data, the corporation hired hackers. While refusing to reveal the identity of
the attackers, Uber stated that it believes the information was never used.
2018:
● Marriott Cyber Attack Goes Unnoticed for Years: In late 2018, Marriott
announced that one of its reservation systems had been compromised. The data
breach went undetected for 4 years, starting in 2014 and impacted 500 million
hotel guests.
● California Consumer Privacy Act (CCPA) Signed Into Law: Owing to the
evolution of cyber threats, cyberattacks have become more complex and
sophisticated. To cope with the same, The California Consumer Privacy Act was
signed into law on June 28th, 2018, and it went into effect on January 1st, 2020.
It includes a range of consumer privacy rights and business obligations with
respect to the collection and sale of personal information.
Singapore is one of the worst cyberattack-hit countries in the world. Its healthcare
sector is especially the most vulnerable to cybercriminals. In 2019 alone, there were
35 instances of third-party data breaches. This number increased to 89 in 2020.
17
2020
This year was a challenging year for cybersecurity professionals as it was the year
that introduced COVID-19 to the world. Even in the chaos, cybercriminals continued
their illicit activities. These were some of the most important data breaches of 2020:
● [April] More than 267 million Facebook profiles went up for sale on the dark web.
● [April] More than 500k Zoom accounts were posted on the dark web for sale.
2021
2021 continued to see many cyberattacks. Ten of the most prominent ones were:
18
GA1 SJS MUN 24’
Key Issues
1. Cyber Attacks
2. Data Privacy
Protecting personal and sensitive data from unauthorized access and misuse is a
significant challenge. With the increasing digitization of personal information and
online transactions, ensuring data privacy has become a pressing issue for
individuals, businesses, and governments.
The use of cyber capabilities for offensive purposes in the context of warfare raises
complex legal, ethical, and strategic questions. Nations are grappling with the
development of norms, rules, and deterrence mechanisms to mitigate the risks of
cyber conflict and escalation.
4. Emerging Technologies
Cybercrime, including financial fraud, identity theft, and online scams, poses
significant risks to individuals, businesses, and governments. Combating cybercrime
requires international cooperation, law enforcement coordination, and efforts to
strengthen cybersecurity awareness and education.
19
investments in cybersecurity education, training programs, and workforce
development initiatives.
The Department of Homeland Security and its components play a lead role in
strengthening cybersecurity resilience across the nation and sectors, investigating
malicious cyber activity, and advancing cybersecurity alongside our democratic
values and principles.At the policy level, the USA has developed various
cybersecurity strategies and frameworks to guide its efforts in securing cyberspace.
For instance, the National Cyber Strategy outlines the government's approach to
defending against cyber threats, protecting American innovation and prosperity, and
preserving peace and security through strength in cyberspace. Additionally, the
Cybersecurity and Infrastructure Security Agency (CISA) serves as the nation's risk
advisor, working with government and private sector partners to manage
cybersecurity risks to critical infrastructure.
20
3. China
4. United Kingdom
The National Cyber Strategy 2022 describes the UK's overarching cyber policy. The
strategy takes a 'whole-of-society' approach, arguing that the government must work
in partnership with private sector organisations and cybersecurity professionals to
improve cybersecurity. The NCSC Cyber Assessment Framework (CAF) provides a
systematic and comprehensive approach to assessing the extent to which cyber risks
to essential functions are being managed by the organization responsible. The UK
also places emphasis on international cooperation and collaboration on cybersecurity
issues. It participates in forums such as the Five Eyes intelligence alliance, NATO,
and the European Union Agency for Cybersecurity (ENISA) to share information,
coordinate responses to cyber threats, and promote best practices in cybersecurity.
Furthermore, the UK works closely with allies and partners around the world to
address common cyber challenges and strengthen global cybersecurity governance.
5. South Korea
South Korea seeks to ensure its national interests and security considerations are
reflected in international standards and agreements related to cybersecurity and to
promote discussions between governments and private stakeholders. One of the key
pillars of South Korea’s cybersecurity efforts is the establishment of the Korea
Internet & Security Agency (KISA), which serves as the central authority for
cybersecurity in the country. KISA is responsible for coordinating cybersecurity
policies, conducting threat assessments, and providing technical support and guidance
to both public and private sector entities. South Korea also prioritizes international
cooperation on cybersecurity issues, participating in forums such as the ASEAN
Regional Forum (ARF) and the Global Forum on Cyber Expertise (GFCE). By
engaging with the international community, South Korea aims to exchange best
practices, share threat intelligence, and coordinate responses to global cyber threats.
21
6. Netherlands
The Dutch government has introduced the Network and Information Systems
Security (NIS) Directive, which mandates cybersecurity requirements for operators of
essential services and digital service providers. Moreover, the Netherlands prioritizes
public-private partnerships in cybersecurity, recognizing the importance of
collaboration between government and industry stakeholders. Initiatives such as the
Joint Cyber Security Centre (JCSC) facilitate information sharing, incident response
coordination, and cybersecurity collaboration between government agencies and
private sector organizations. The Netherlands actively engages in cybersecurity
cooperation and diplomacy, participating in forums such as the European Union
Agency for Cybersecurity (ENISA), the NATO Cooperative Cyber Defence Centre of
Excellence (CCDCOE), and the Global Forum on Cyber Expertise (GFCE).
22
GA1 SJS MUN 24’
Over the years, various initiatives have been launched to address the issue of
cybersecurity at national, regional, and international levels. Some notable past
initiatives
include:
2. International Cooperation
23
5. 2018: The Paris Call for Trust and Security in Cyberspace is launched, bringing
together governments, industry, and civil society to promote international
cooperation, protect citizens and infrastructure from cyber threats, and uphold
digital rights.
6. 2019: The Cybersecurity Tech Accord expands, with over 140 global companies
pledging to protect customers from cyber attacks and ensure the security,
stability, and resilience of cyberspace.
Possible Solutions
The ITU Global Cybersecurity Agenda identifies five strategic pillars: legal,
technical, organizational, capacity-building, and cooperation.
1. Legal Pillar
2. Technical Pillar
Covers existing technical institutions, cybersecurity standards and protocols, and the
measures needed to deal with cybersecurity threats. An example of a technical
institution is a Computer Emergency Response Team (CERT), which is defined as
"an organization or team that provides, to a well-defined constituency, services and
support for both preventing and responding to computer security incidents". CERTs
vary in capabilities depending on the range and combination of reactive, proactive
and/or security quality management services offered.. For example, these services can
include promptly responding to an incident so that the attack can be quickly
contained and investigated, and to facilitate rapid recovery to a pre-incident state.
3. Organizational Pillar
4. Capacity-Building Pillar
24
professional training, and national education programmes and curricula. For example,
in the Dominican Republic, The National Commission for Information Society and
Knowledge (CNSIC) has an officially recognized national awareness program that
promotes norms, values and social behaviors that contribute to integrity, creativity
and innovation in navigating cyberspace"
5. Cooperation Pillar
Focusing Questions
1. What are the measures GA1 has in place to protect against cyber threats and
attacks?
3. What are the technologies used for threat detection and incident response?
5. Provide examples of recent cybersecurity incidents GA1 has faced and how
they were handled?
6. What strategies does your organization employ to prevent and detect phishing
attacks?
25
9. What are your plans for future cybersecurity enhancements or initiatives?
Recommended Readings
1. What is Cybersecurity?
https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/
https://www.international.gc.ca/world-monde/issues_development-
enjeux_developpement/peace_security-paix_securite/cyber_policy-
politique_cyberspace.aspx?lang=eng
https://www.un.org/en/model-united-nations/mun-guide-general-assembly
https://www.ausmun.com/background-guides
Bibliography
1. Wiki
https://www.usip.org/sites/default/files/sr119.pdf
2. Research
https://media.defense.gov/2017/May/11/2001745613/-1/-1/0
CPP_0001_YANNAKOGE ORGOS_CYBER_TTRIBUTION_CHALLENGE.PDF
https://www.international.gc.ca/world-monde/issues_development
enjeux_developpement/peace_security-paix_securite/cyber_policy-
politique_cyberspace.aspx?lang=eng
https://www.darkreading.com/cybersecurity-operations/china-rolls-out-strategy-to
prevent-hacking-from-foreign-entities
https://researchbriefings.files.parliament.uk/documents/CBP-9821/CBP-9821.pdf
https://commonslibrary.parliament.uk/research-briefings/cbp-9821/
26
https://www.nknews.org/2024/02/south-korea-unveils-new-cyber-strategy-to-counter-
north-korean-threats
https://business.gov.nl/running-your-business/business-management/cyber-security/
cyber-security-management-and-strategy/
https://www.upguard.com/blog/reduce-cybersecurity-risk
https://www.knowledgehut.com/blog/security/history-of-cyber-security
27