Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity
|
|
|
- Brittany Summers
- 10 years ago
- Views:
Transcription
1 2012 Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity KnujOn.com LLC Brief Version 2/18/2012
2 Promising Research KnujOn.com LLC is proud to release this briefing of our Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity. KnujOn reviewed nearly one million WHOIS records from domain names advertised with spam in 2011 and found that 22.8% of the rogue registrations could be blocked with fundamental validation. Another 67.5% could be filtered or held for additional screening with a robust analysis developed in response to our findings. This study focused exclusively on the Administrator Address in each WHOIS record. We are confident that this promising method could prevent slightly more than 90% of truly abusive registrations, potentially curtailing the 14 million distinct spam instances which supplied the test data. In the real world those instances are duplicated and repeated for Internet users globally creating the unwanted traffic and related criminality which plague us daily. In our research we separated the domains which were spoofed or hijacked to focus purely on ones which were created specifically as illicit shopping sites or for malware distribution. Abusive Registrations Are Preventable The problem for domain name Registrars has always been inability to predict user intent and the belief that any screening would increase domain cost and slow the registration process. We now know this is not the case and that statistical analysis with a vast repository of intelligence can be used to mitigate abusive registrations. To be clear, this is not a blacklist. Rather, this is a two-part process which uses existing policy-based rules to handle the smaller percentage of obvious violations and a comprehensive analytics engine to assign risk factors to the larger portion of potential abuses. While the ICANN Registrar Accreditation Agreement 1 requires accurate information 2 and validation 3, in practice this has been a challenge. Fortunately, it appears this can be done with relative ease. Registrars expend significant resources now dealing with spam and abuse after the fact when it is often too late KnujOn Abused Domain WHOIS Analysis for Registration Filtering V1.4- BRIEF
3 Addressing a Serious Issue The annual cost of spam to companies and individuals is in the tens of billions of dollars 4 as well as wasting the precious time of employees 5. Malware (viruses, Trojans, etc.) presents an everevolving threat to industry as well as personal Internet use 6 as it expands into mobile devices. The world of spam and Internet abuse is a complex place involving a variety of players and resources 7. However, the use of domain names by illicit parties is a critical and final piece of the cycle. The outer edges of Internet abuse (spam , malware distribution, server compromises, etc.) are fleeting and constantly changing in source. But even illicit businesses require a certain amount of stability. Domain names as transaction platforms provide a critical resource to people selling rogue pharmaceuticals, counterfeit products, or illicit services. Without access to domain names the underground Internet would be much harder to operate. Moving from the Elementary to the Complex As shown above, 23% of abusive domains could be blocked for basic policy reasons. These abusive registrations, not hijacked or spoofed spam domains, contained obvious errors which would have invalidated the domain WHOIS record. The set includes even typographical errors which make the administrator address unreachable. These represent attempts to obfuscate or make the domain operators unaccountable. A further 67% of abusive domains can be filtered by analytics. Within this range there are a number of subtle and discrete factors which allowed us to identify risky domain registrations. Assigning Risk The Internet Corporation of Assigned Names and Numbers (ICANN) and their contracted parties (Registries and Registrars) are sustained on the high volume trade in domain names. Consumers of domain names expect speed, convenience and value in their purchases. The competition to provide easy and rapid domain deployment among Registrars has also created opportunities to exploit the system. It is not generally in the interest of the Registrar or ICANN to deny a registration as it is impossible to discern user intent, but it is possible to assign risk based accumulated data. Validated 15 Factors Based on Knowledge Repository By compiling everything learned from the 2011 abuse data KnujOn was able to create a test engine which caught potentially abusive registrations. The series of comprehensive tests completed in microseconds and would be transparent to the registrant. The Abuse Range Sweet Spot There is a major difference between compromised domains and domains specifically registered for illicit traffic. To the victim of spam or malware all abused domains appear to be the same. Within this study KnujOn was able to predict, through our analysis, which domains were created for spamming and which were hijacked in one way or another. This has allowed us to disregard the noise and focus on core illicit activity KnujOn Abused Domain WHOIS Analysis for Registration Filtering V1.4- BRIEF
4 Examples of Missing Policy Enforcement Some domains should never have existed. One of the registrations caught with an impossible address was an illicit online pharmacy: md-pill.com. In further examining the WHOIS record we found the address and phone number for this purported pharmacy is actually contact information for newspaper Los Angeles Times. As can be seen below this is a No Prescription pharmacy which is illegal in most countries. The WHOIS record is outlined in red and the official contact information for the Los Angeles Times is outlined in black. The purpose is to illustrate how simple red flags in one entry can lead to the discovery of an entire false record. Such a registration should have been held for secondary screening. Many abusive registrations also have incomplete administrator addresses as in the example below: Allowing this type of registration to pass will only cost the Registrar later in terms of dealing with complaints and other issues. Invalid Privacy Services Draw Illicit Domain Registrants In this study we also reviewed which WHOIS privacy protection services were most heavily used by abusive registrants and why. Some services are technically in violation of the ICANN contract and therefore offer additional concealment for illicit Internet commerce. 3 KnujOn Abused Domain WHOIS Analysis for Registration Filtering V1.4- BRIEF
5 Illicit Domain Registrations vs. Abusive Administrator Domains Our research results show that abusive registrants frequently have their home base at one Registrar and purchase domains to be exploited at a second Registrar. We have exposed the attack vectors of various malicious actors. The data also indicates why some Registrars have more abusive registrations. What Else We Found The results of this study were intriguing, revealing the complex relationships between abusive registrants and spammed domains. As in previous KnujOn studies on spam, we find the activity is clustered. In our study there were 956,702 unique abused domain names with 237,557 unique administrator addresses in their registrations. These addresses were at 71,484 unique administrator address domains, but more than 55% of the abuse originated from just 50 administrator domains. Within 500 of the worst administrator domains we see 73% of the abuse. This percentage of abuse only rises to 77% at the 1000 worst administrator domain mark. So, as we approach the larger population of abusive registrations the volume of abuse drops considerably. If we change the data view to specific unique abusive administrator addresses we can isolate about 50% of the abusive registration activity to just 1144 specific domain administrators. Over seven million abuse instances examined in the study, one half of the total, can be attributed to these specific administrators. Full Version of Research KnujOn s 30-page report on Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity contains detailed analysis, case studies, and fascinating findings. This is a proprietary work being used to develop a solution and is not part of a general public release. When complete, a fully developed a subscription-based API will be made available. If you are interested in this work please contact us: [email protected]. About Knujon KnujOn is a unique Internet security and policy analysis project which works with ordinary Internet users, small businesses, governments, nonprofit organizations, and the global community of Internet policy developers to combat abuse, illicit activity, and in general enhance the overall Internet user experience. KnujOn has developed custom mathematical modeling techniques which expose not only where abuses are originating but why and what can be done. KnujOn has moved beyond blacklists to develop a multidimensional abuse response paradigm. Our process is concerned with dire policy failures and loopholes in the Internet architecture which have been exploited by malicious parties for their own benefit at the expense of consumers at large. Any questions or concerns can be directed to [email protected]. More information at 4 KnujOn Abused Domain WHOIS Analysis for Registration Filtering V1.4- BRIEF
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
.IBM TLD Registration Policy
I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,
Acceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES
PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
.tirol Anti-Abuse Policy
Translation from German.tirol Anti-Abuse Policy This policy is based on Austrian legislation. In case of doubt the German version of this policy is in force. Page 1 Contents 1. Management Summary... 3
Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement
* 1) The RAA should not explicitly condone or encourage the use of 1. Use of Proxy or Privacy Registrations Proxy Registrations or Privacy Services, as it appears in paragraphs a. In the event ICANN establishes
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014. Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014 Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1 Background 1..bio (also designated as the ".BIO domain") is a generic Top-Level
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
What security and compliance challenges exist with the move to Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
2010 Data Breach Investigations Report
2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials
Code of Conduct Exemption Request Form
Code of Conduct Exemption Request Form Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE:
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY June 2009 Table of Contents Executive Summary... 1 ICANN s Role... 2 ICANN Security, Stability and Resiliency Programs... 3 Plans to Enhance
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Best Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
.SKI DOMAIN NAME POLICY. May 21, 2015. Starting Dot Ltd. .SKI DOMAIN NAME POLICY
.SKI DOMAIN NAME POLICY May 21, 2015 Starting Dot Ltd..SKI DOMAIN NAME POLICY 1 .SKI DOMAIN NAME POLICY BACKGROUND 1..SKI (the "TLD") is a generic top-level domain generally available for registration
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
IDS or IPS? Pocket E-Guide
Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly
.Brand TLD Designation Application
.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE: Application
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
CYBERCRIME AND THE HEALTHCARE INDUSTRY
CYBERCRIME AND THE HEALTHCARE INDUSTRY Executive Summary Healthcare professionals are in a tight spot. As administrative technologies like Electronic Health Records (EHRs) and patient and provider portals
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Before The United States House of Representatives Committee On The Judiciary. Subcommittee on Intellectual Property, Competition and the Internet
Before The United States House of Representatives Committee On The Judiciary Subcommittee on Intellectual Property, Competition and the Internet Hearing on Promoting Investment and Protecting Commerce
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
