Hosters vs. Malware: Best Practices

1,441 views

Published on

Presentation to the RIPE Anti-Abuse Working Group at RIPE63 in Vienna, November 2011. Covers adopting best practices to handle malware and other forms of network abuse for hosting providers and network operators

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,441
On SlideShare
0
From Embeds
0
Number of Embeds
435
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hosters vs. Malware: Best Practices

  1. 1. Hosters vs. Malware: Best Practices BLACKNIGHT Domain Registrar – Hosting Provider
  2. 2. BLACKNIGHT Michele Neylon Founder / CEO Blacknight Contact: http://mneylon.tel @mneylon / @blacknight http://www.blacknight.com http://michele.me/blog
  3. 3. BLACKNIGHT Overview  Why does it matter?  Some Guidelines / Best Practices
  4. 4. BLACKNIGHT
  5. 5. BLACKNIGHT Security Issues / Abuse are not going away Apathy is NOT an option Self-regulation vs Regulation + govt intervention Image / brand / reputation => You value them, don’t you?
  6. 6. BLACKNIGHT
  7. 7. BLACKNIGHT Self-regulation => control remains with industry => retain control of destiny Govt. Regulation => industry input possibly ignored => lose control of destiny
  8. 8. BLACKNIGHT
  9. 9. BLACKNIGHT Abuse desk best practices => not rocket science No need to think – someone’s already developed some StopBadware (http://stopbadware.org/best- practices/web-hosting-providers)
  10. 10. StopBadWare Action Flow1. Acknowledge report2. Evaluate report3. Pass on the report4. Mitigate5. Resolve6. Notify reporter7. Track8. Review
  11. 11. BLACKNIGHT
  12. 12. BLACKNIGHT
  13. 13. BLACKNIGHT
  14. 14. BLACKNIGHT Questions? Complaints? Photo credits: IStockPhoto http://www.flickr.com/photos/forbairt/

×