Internet Security and Resiliency: A Collaborative Effort
|
|
|
- Britton Tyler
- 10 years ago
- Views:
Transcription
1 Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April
2 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing security and resiliency of the Internet s unique identifiers 2
3 Internet s Threat Landscape Combine web, malware, botnets and spam (Cisco 2008 Annual Security Report) Botnets are becoming more sophisticated and more harmful Almost 10% of computers on the Internet are infected by botnets (Source: Emerging Cyber Threats Report 2008, Georgia Tech Information Security Center) From spam and DDOS, to financial fraud and espionage and could also be multi-tasking Techniques to hide (i.e. fast-flux) Growth in DDOS attack size reached 40 Gbps in 2008 (Source: Worldwide Infrastructure Security Report, October 2008, Arbor Networks) Involvement of criminal organizations in malicious activities 24-hour DDOS attack for $35 (Source: Global Threat Research Report: Russia, idefense) Motives could be commercial or political Continuous DDOS attacks against core DNS operations; DNS vulnerabilities (i.e. cache poisoning) 3
4 Most Significant Threats 4 Source: Worldwide Infrastructure Security Report, October 2008, Arbor Networks, Inc.
5 Risks to DNS Continued DDOS attacks against core DNS operations Root servers TLD operations DNS service providers Cache poisoning Kaminsky vulnerability Registry/Registrar failures Technical Business 5
6 Why DNS Security Matters Significance of DNS Essential to the effective operation of the Internet Managed as a distributed system with diffuse roles and responsibilities User, ISP, Registry/Registrar, root server operator, ICANN Range of threats and risks To user, to business, to the whole Internet 6
7 ICANN Roles and Responsibilities Mission: Coordinate, at the overall level, the global Internet s systems of unique identifiers, and ensure the stable and secure operation of such systems Core: Preserve and enhance the operational stability, reliability, security, and global interoperability of the Internet Contributor: Identifications of DNS abuse; challenges to Internet security Not involved in content control, spam, and areas related to cyber espionage and cyber war 7
8 What is ICANN Doing? Continued implementation of agreements With Registries/Registrars on Data Escrow, WHOIS, other provisions Enhancing and exercising the gtld registry continuity plan Working towards implementing DNSSEC at the root Participating in Anti-Phishing Working Groups and other forums to understand effective approaches to identify abuse Co-sponsored the first Global Symposium on DNS Security, Stability and Resiliency ( cctld capacity building initiative in planning and response to disruptions Partnered with cctld regional organizations to provide training/ exercise events to develop capacity 8
9 A Collaborative Effort ICANN s efforts in this area ensure its partnership with other organizations and stakeholders Root server operators; Registries and Registrars community IETF and IAB ISOC RIRs Regional TLD Associations Regional NICs and NOGs DNS Operations, Analysis and Response Center (OARC) Forum of Incident Response and Security Teams (FIRST) Anti-Phishing Working Group ICANN is engaging and will continue to collaborate with regional organizations and governments across the globe ICANN is also willing to pursue constructive collaboration with any relevant stakeholders to enable security, stability and resiliency activities 9
10 cctld Security and Resiliency Capacity Building Initiative
11 ACRP Progress To Date Kuala Lumpur, May 2008 Prototype with APTLD ~ 25 parbcipants Cairo, October 2008 ~ 40 parbcipants, 25 cctlds 4 regions APTLD, AfTLD, LACTLD, CENTR ICANN, ISC, and ISOC Mexico City, February 2009 ~ 25 parbcipants, 11 cctlds 4 regions APTLD, AfTLD, LACTLD, CENTR ICANN
12 Upcoming Events Mini ACRP & SROC, Arusha, Tanzania, April 09 During AfTLD meeting, sponsored by AfTLD ACRP Workshop, Nadi, Fiji, April 09 During PITA meeting ACRP Workshop, Amsterdam, May 09 Follows RIPE meeting, sponsored by CENTR
13 Information Sharing Bridge the experience gap between cctlds Engage the cctld community to collaborate with each other Combined ICANN/OARC effort to create a trusted TLD portal Provides access to templates, best practices, lessons learned, forums, etc Prototype Site:
14 A Recent Event: Conficker C Represents the third major revision of the Conficker malware family Previous revisions (A and B) focused on a limited number of domain names Conficker C seeks large number of domain names - 50,000 randomly generated names a day -116 zones of 110 top-level domains Collaboration among security, vendor and DNS communities to disseminate information about how the malicious code may seek to leverage the DNS system Conficker Working Group ( ICANN helped reach out to 110 TLD Registry Activation date: April 1 st 2009 Nothing major was expected to happen More than one million infected computers around the world ( page=2) Cooperation will continue to stop the spread of the worm and block control of the infected computers Resources:
15 Conclusions ICANN understands its role going forward must include plans and activities related to making the DNS a more secure, stable and resilient environment ICANN also recognizes the limits to its role and resources and its strategy in this area plans to rely heavily on partnerships and a wide ranging collaboration 15
16 ICANN s Security Team A group of senior staff focusing on security issues that relate to ICANN and the Internet's Identifier Systems Greg Rattray, Chief Internet Security Advisor John Crain, Chief Technical Officer Geoff Bickers, Director of Security Operations 16
17 Thanks! 17
DNS Security, Stability and Resiliency
DNS Security, Stability and Resiliency John Crain Chief Technical Officer April 21st 2009 Garmisch 1 Agenda The Global DNS SSR Symposium Problems and Opportunities Questions? 2 The Organization Sponsors:
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY June 2009 Table of Contents Executive Summary... 1 ICANN s Role... 2 ICANN Security, Stability and Resiliency Programs... 3 Plans to Enhance
How To Manage Icann
FY13 ICANN Security, Stability & Resiliency Framework 1 June 2012 Part B Security, Stability & Resiliency Part B - FY 13 Module 2 Components of FY13 Framework PART A Foundational Section (Ecosystem & ICANN
Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance
Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance Global Forum ICT & The Future of Internet Bucharest, Romania, 19-20 October 2009 Theresa Swinehart Vice-President
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
IANA Functions to cctlds Sofia, Bulgaria September 2008
IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide public
DNS Security Survey for National Computer Security Incident Response Teams December 2010
DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS
Internet Structure and Organization
Internet Structure and Organization Resources management and allocation [email protected] Introduction What s the Internet? Why organizations / bodies are needed? Define protocol specifications Agree
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit
Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015
Strengthening our Ecosystem through Stakeholder Collaboration Jia-Rong Low, Sr Director, Asia 20 August 2015 Agenda 1 2 3 About ICANN and the Domain Name System (DNS) DNS attacks and their impact DNS Security
Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)
Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business
Internet Bodies. [email protected]
Internet Bodies [email protected] Agenda Names, Acronyms in the Internet IETF organisation IESG, IAB, ISOC ICANN & IANA Standardisation process Standardisation compliance Internet Registries Requesting
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013!
The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013! Ecosystem! + A network of interactions among organisms, and between organisms and
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 2 AUGUST 2014
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE AUGUST 1 THE VERISIGN DOMAIN REPORT AS A GLOBAL LEADER IN DOMAIN NAMES AND INTERNET SECURITY, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
The Internet Ecosystem
The Internet Ecosystem 15 October 2010 Internet Society InternetSociety.org [email protected] Galerie Jean-Malbuisson, 15 CH-1204 Geneva Switzerland Tel: +41 22 807 1444 Fax: +41 22 807 1445 1775 Wiehle Ave.
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Adrian Kinderis - CEO AusRegistry International Agenda What options should
Acceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
Draft WGIG issue paper on Network and Information Security
Draft WGIG issue paper on Network and Information Security This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members,
Phishing Trends Report
Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: [email protected] 888.239.6932 www.internetidentity.com Internet Identity
The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions
The IANA Functions An Introduction to the Internet Assigned Numbers Authority (IANA) Functions Contents SECTION 1: INTRODUCTION 4 SECTION 2: POLICY, STAKEHOLDERS AND STEWARDSHIP IMPLEMENTATION 6 SECTION
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
DOMAIN NAME DAY. + Helsinki; 14 th February; 2014. + Nigel Hickson, ICANN
DOMAIN NAME DAY + Helsinki; 14 th February; 2014 + Nigel Hickson, ICANN 1 AGENDA + gtlds and all that + The European and global debate on Internet Governance 2 Internet Corporation for Assigned Names
The Future of the Internet
The Future of the Internet Paul Twomey President and CEO 9 May 2007 IGF Internet Governance Workshop Tokyo, Japan 1 What I want to share with you today Brief introduction to ICANN Personal view of future
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF [email protected] Agenda Coordinating Attack Response
Year End Results for FY10 Trimester Goals Color Key: T1 T2 T3
Preserve DNS Security and Stability Root Key Signing Key (KSK) - Implement production-level root signing of KSK processes Generic Signing Infrastructure - Implement generic signing infrastructure and sign
.IBM TLD Registration Policy
I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Policy, Business, Technical and Operational Considerations for the Management of a country code Top Level Domain (cctld)
Policy, Business, Technical and Operational Considerations for the Management of a country code Top Level Domain (cctld) APRIL 2008 DRAFT For further information, please contact the ITU-D ICT Applications
Security in the Network Infrastructure - DNS, DDoS,, etc.
Security in the Network Infrastructure - DNS, DDoS,, etc. GTER, São Paulo December 8, 2006 Steve Crocker, [email protected] Russ Mundy, [email protected] Proactive Security Build security into the infrastructure
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014 THE VERISIGN DOMAIN REPORT AS THE GLOBAL LEADER IN DOMAIN NAMES, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH A VARIETY OF
Law Enforcement and Internet Governance: An Ounce of Prevention Is Worth a Pound of Cure
Law Enforcement and Internet Governance: An Ounce of Prevention Is Worth a Pound of Cure Supervisory Special Agent Robert Flaim Federal Bureau of Investigation (FBI) Operational Technology Division Global
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
14. Privacy Policies. 14.1. Introduction
14. Privacy Policies 14.1. Introduction 14.2. Policy Accent Media Ltd, incorporated in England, is the Registry Operator for the Top Level Domain TLD.tickets ( the Registry ). As a company registered in
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. [email protected] and [email protected]. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs
DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin [email protected] and [email protected] 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2
Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
Policy Overview and Definitions
Overview The following policies, which govern the top level domain (TLD or Registry) indicated on Schedule A, are based on policies and best practices drawn from ICANN, WIPO, and other relevant sources,
New gtld Program Reviews and Assessments. Draft Work Plan
New gtld Program Reviews and Assessments Draft Work Plan 27 January 2015 Table of Contents 1 Introduction 3 1.1 ICANN 4 1.2 About the New gtld Program 5 1.3 About this Work Plan 9 2 Program Implementation
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
110207099 1099 01] RIN 0660 XA23:
Fiona M. Alexander Associate Administrator Office of International Affairs National Telecommunications and Information Administration 1401 Constitution Avenue, NW., Room 4701 Washington, DC 20230 By electronic
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
.tirol Anti-Abuse Policy
Translation from German.tirol Anti-Abuse Policy This policy is based on Austrian legislation. In case of doubt the German version of this policy is in force. Page 1 Contents 1. Management Summary... 3
DomainWire. Edition 11 Q1 2015. Council of European National Top level Domain Registries - www.centr.org
DomainWire Edition 11 Q1 2015 Global TLD Stat Report DomainWire Stat Report is CENTR s quarterly publication covering status and trends in global top-level domains with a focus on European cctlds (country
Draft WGIG Issue Paper on the Administration of Internet Names and IP Addresses
Draft WGIG Issue Paper on the Administration of Internet Names and IP Addresses This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
Highlights ccnso Members Meeting London 22-26 June 2014
Meeting Highlights Highlights ccnso Members Meeting London 22-26 June 2014 Membership ccnso On 25 June the (Romanian) National Institute for R&D in Informatics, the manager for.ro (Romania), became member
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
Security Incidents And Trends In Croatia. Domagoj Klasić [email protected]
Security Incidents And Trends In Croatia Domagoj Klasić [email protected] Croatian National CERT About us Founded in 2008. in accordance with the Information Security Act We are a department of the Croatian
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014. Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014 Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1 Background 1..bio (also designated as the ".BIO domain") is a generic Top-Level
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Policies and Practices on Network Security of MIIT
2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie
Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a multilayered Internet strategy that includes the monitoring of network
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
Consultation Paper on the Review on Administration of Internet Domain Names in Hong Kong
Consultation Paper on the Review on Administration of Internet Domain Names in Hong Kong Government Chief Information Officer Commerce, Industry and Technology Bureau The Government of the Hong Kong Special
The Internet Introductory material.
The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its history and growth, and standardization and naming.
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003 [email protected]
A Survey of cctld DNS Vulnerabilities ITU cctld Workshop March 3, 2003 [email protected] RATIONALE Health-check on DNS infrastructure > Now becoming a critical national resource Attacks on DNS servers
