SlideShare a Scribd company logo
1 of 14
Download to read offline
Discovering and Participating at ICANN :!
ISSSR Update !
!
Champika Wijayatunga, ICANN!
IDNOG1 – Jakarta, Indonesia 24 June 2014 !
2
What does ICANN do?!
3
ICANN	
  is	
  a	
  global	
  organiza0on	
  that	
  coordinates	
  the	
  
Internet’s	
  unique	
  iden0fier	
  systems	
  for	
  worldwide	
  public	
  
benefit,	
  enabling	
  a	
  single	
  interoperable	
  Internet.	
  
4
+ Domain Name System (DNS)
+ Internet Protocol (IP) Address Allocation
+ Protocol-Parameter Registry
+ Root Server Systems
+ Generic Top-Level Domain Names (gTLD) system
management
+ Country-code Top-Level Domain Name (ccTLD)
DNS
+ Time Zone Database Management

Functions that ICANN Coordinates!
SSR	
  Framework	
  
	
  
•  Security	
  –	
  the	
  capacity	
  to	
  protect	
  and	
  prevent	
  
misuse	
  of	
  Internet	
  unique	
  iden;fiers.	
  
•  Stability	
  –	
  the	
  capacity	
  to	
  ensure	
  that	
  the	
  system	
  
operates	
  as	
  expected,	
  and	
  that	
  users	
  of	
  the	
  unique	
  
iden;fiers	
  have	
  confidence	
  that	
  the	
  system	
  operates	
  
as	
  expected.	
  	
  
•  Resiliency	
  –	
  the	
  capacity	
  of	
  the	
  unique	
  iden;fier	
  
system	
  to	
  effec;vely	
  withstand/tolerate/survive	
  
malicious	
  aCacks	
  and	
  other	
  disrup;ve	
  events	
  
without	
  disrup;on	
  or	
  cessa;on	
  of	
  service.	
  	
  
The	
  Challenge	
  
•  Misuse	
  of	
  and	
  aCacks	
  against	
  the	
  DNS	
  and	
  global	
  
networks	
  challenge	
  overall	
  unique	
  iden;fier	
  security	
  
–  Affect	
  the	
  broad	
  range	
  of	
  users,	
  individuals,	
  businesses,	
  
civil	
  society	
  and	
  governments	
  
•  Security	
  in	
  the	
  context	
  of	
  the	
  Internet's	
  unique	
  
iden;fiers	
  should	
  be	
  addressed	
  through	
  a	
  healthy	
  
Internet	
  ecosystem.	
  	
  
–  an	
  Internet	
  that	
  is	
  sustainable	
  or	
  healthy,	
  stable	
  and	
  
resilient	
  
6	
  
Coordina;on	
  &	
  Collabora;on	
  
•  Generic	
  Top	
  Level	
  Domain	
  Operators	
  (gTLDs)	
  
–  .com,	
  .net,	
  .org	
  etc.	
  
•  Country	
  Code	
  Top	
  Level	
  Domain	
  Operators	
  (ccTLDs)	
  
–  .bd,	
  .in,	
  .sg	
  etc.	
  
•  CERTs	
  
•  Regional	
  Internet	
  Registries	
  (RIRs)	
  
•  Governments	
  /	
  Law	
  Enforcement	
  
•  Interna;onal	
  Organisa;ons	
  
•  Research	
  Organisa;ons	
  /	
  Experts	
  
•  Etc.	
   7	
  
8
!
Functional Areas!
Threat	
  Awareness	
  
and	
  
	
  Preparedness	
  
Trust-­‐based	
  
Collabora;on	
  
Iden;fier	
  SSR	
  Analy;cs	
   Capability	
  Building	
  
Iden;fier	
  
Systems	
  SSR	
  
Iden;fier	
  Systems	
  Threat	
  Awareness	
  
•  Exchange	
  of	
  threat	
  intelligence	
  
rela;ng	
  to	
  security	
  events	
  of	
  
global	
  nature	
  involving	
  iden;fier	
  
systems	
  
•  Par;cipa;on	
  in	
  response	
  to	
  
threats	
  or	
  aCacks	
  against	
  
iden;fier	
  systems,	
  see	
  
	
  
hCps://www.icann.org/en/about/staff/security/
vulnerability-­‐disclosure-­‐05aug13-­‐en.pdf	
  
	
  
Threat	
  
Awareness	
  and	
  
Response	
  
Threat	
  
Intelligence	
  
• Trust	
  networks	
  
Coordinated	
  
Response	
  
• Vulnerability	
  
Disclosure	
  
• Facilita;on	
  
•  Ac;ve	
  engagement	
  with	
  global	
  
actors	
  who	
  monitor	
  DNS	
  health	
  or	
  
iden;fy	
  imminent	
  threats	
  
•  DNS	
  vulnerability	
  iden;fica;on,	
  
repor;ng,	
  and	
  resolu;on	
  
•  Examples	
  
–  Conficker	
  
–  ACacks	
  against	
  ccTLDs,	
  registrars	
  
–  Root	
  system	
  DDoS	
  (Anonymous)	
  	
  
Threat	
  awareness	
  
and	
  response	
  
Iden;fier	
  SSR	
  Analy;cs	
  
•  Projects	
  in	
  infancy	
  	
  
•  Develop	
  metrics	
  and	
  analy;cs	
  for	
  
iden;fier	
  systems,	
  e.g.,	
  	
  
–  Root	
  system	
  measurements,	
  analysis	
  
–  Analysis	
  of	
  DNS	
  or	
  registra;on	
  abuse	
  or	
  
misuse	
  	
  
–  Crea;ve	
  uses	
  of	
  DNS	
  data	
  
Iden;fier	
  SSR	
  
Analy;cs	
  
Metrics	
  
• 	
  “CVEs”	
  
• Root	
  
System	
  
analy;cs	
  
• Incidents	
  
Trust-­‐based	
  Collabora;on	
  
•  Global	
  Cybersecurity	
  coopera;on	
  
–  Coordinate	
  engagement	
  through	
  ICANN	
  	
  
Global	
  Stakeholder	
  Engagement	
  
–  Coordinate	
  cybersecurity	
  message	
  with	
  
Global	
  Stakeholder	
  Engagement	
  
•  Global	
  Security	
  &	
  Opera;ons	
  
–  Daily	
  interac;on	
  on	
  DNS	
  abuse/misuse	
  
maCers	
  with	
  first	
  responders,	
  law	
  
enforcement,	
  operators	
  
–  Coopera;on	
  with	
  DNS	
  research	
  ac;vi;es	
  	
  	
  	
  
•  Examples	
  
–  Engage	
  with	
  registrars	
  and	
  repor;ng	
  par;es	
  
to	
  mi;gate	
  DNS	
  abuse/misuse	
  
–  Lend	
  subject	
  maCer	
  exper;se	
  during	
  
incident	
  response	
  
Trust-­‐based	
  
Collabora;on	
  
Global	
  SecOps	
  
•  An;Phishing	
  
•  An;spam	
  
•  An;crime	
  
•  Opera;ons	
  
Research	
  
Global	
  CyberSec	
  
•  CCI	
  
•  OECD	
  
Capability	
  Building	
  
•  DNS	
  training	
  
–  Security,	
  opera;ons,	
  and	
  DNSSEC	
  
deployment	
  training	
  for	
  TLD	
  registry	
  
operators	
  
–  Informa;on	
  gathering	
  to	
  iden;fy	
  DNS	
  
abuse/misuse	
  	
  
–  Delivered	
  by	
  contracted	
  par;es,	
  ICANN	
  
staff	
  (digital	
  delivery	
  under	
  study)	
  
•  Knowledge	
  Transfer	
  
–  Exchange	
  of	
  informa;on	
  gathering	
  or	
  
inves;ga;ng	
  techniques	
  
Capability	
  
Building	
  
DNS	
  Training	
  
•  Security	
  
•  OAM	
  
•  Abuse/
Misuse	
  
Knowledge	
  
Transfer	
  
•  Europol	
  
•  Interpol	
  
•  RIRs	
  
14
Growing the Asia Pacific Network!
•  ICANN APAC Hub
•  apachub@icann.org
•  SSR issues: 
•  champika.wijayatunga@icann.org

Thank You!

More Related Content

What's hot

Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)SDNRG ITB
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
 
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
1 - SDNRG ITB, 10 minutes intro by Affan BasalamahSDNRG ITB
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoTAPNIC
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMOpen Networking Summit
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionJason TC HOU (侯宗成)
 
Data networking at UCL - Networkshop44
Data networking at UCL - Networkshop44Data networking at UCL - Networkshop44
Data networking at UCL - Networkshop44Jisc
 
FlowN vs FlowVisor: Scalable Network Virtualization in SDN
FlowN vs FlowVisor: Scalable Network Virtualization in SDNFlowN vs FlowVisor: Scalable Network Virtualization in SDN
FlowN vs FlowVisor: Scalable Network Virtualization in SDNHao Jiang
 
SDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewSDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewChristian Esteve Rothenberg
 
4th SDN Interest Group Seminar-Session 2-2(130313)
4th SDN Interest Group Seminar-Session 2-2(130313)4th SDN Interest Group Seminar-Session 2-2(130313)
4th SDN Interest Group Seminar-Session 2-2(130313)NAIM Networks, Inc.
 
Why I should Model my Network
Why I should Model my NetworkWhy I should Model my Network
Why I should Model my NetworkAPNIC
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
 
Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?Diego Kreutz
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora,  NodeJS and IoT CloudAsset Monitoring with Beacons, Lora,  NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora, NodeJS and IoT CloudRobert van Mölken
 

What's hot (20)

Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah 1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
1 - SDNRG ITB, 10 minutes intro by Affan Basalamah
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoT
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Data networking at UCL - Networkshop44
Data networking at UCL - Networkshop44Data networking at UCL - Networkshop44
Data networking at UCL - Networkshop44
 
FlowN vs FlowVisor: Scalable Network Virtualization in SDN
FlowN vs FlowVisor: Scalable Network Virtualization in SDNFlowN vs FlowVisor: Scalable Network Virtualization in SDN
FlowN vs FlowVisor: Scalable Network Virtualization in SDN
 
SDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewSDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive Overview
 
4th SDN Interest Group Seminar-Session 2-2(130313)
4th SDN Interest Group Seminar-Session 2-2(130313)4th SDN Interest Group Seminar-Session 2-2(130313)
4th SDN Interest Group Seminar-Session 2-2(130313)
 
Why I should Model my Network
Why I should Model my NetworkWhy I should Model my Network
Why I should Model my Network
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
 
Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Microservice Powered Orchestration
Microservice Powered OrchestrationMicroservice Powered Orchestration
Microservice Powered Orchestration
 
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora,  NodeJS and IoT CloudAsset Monitoring with Beacons, Lora,  NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
 
Avi Network SDN meetup
Avi Network  SDN meetupAvi Network  SDN meetup
Avi Network SDN meetup
 

Viewers also liked

07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi
07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi
07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto PribadiIndonesia Network Operators Group
 
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya 01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya Indonesia Network Operators Group
 
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun SingIndonesia Network Operators Group
 
The Regional Internet Registry System and Internet Number Resources
The Regional Internet Registry System  and Internet Number ResourcesThe Regional Internet Registry System  and Internet Number Resources
The Regional Internet Registry System and Internet Number ResourcesRIPE NCC
 
IXP Best Common Practices trilogy - for the Infrastructure
IXP Best Common Practices trilogy -  for the InfrastructureIXP Best Common Practices trilogy -  for the Infrastructure
IXP Best Common Practices trilogy - for the InfrastructureFrance IX Services
 
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy SutrisnoIndonesia Network Operators Group
 
Next Generation Campus Network - ID-NOG 2014
Next Generation Campus Network - ID-NOG 2014Next Generation Campus Network - ID-NOG 2014
Next Generation Campus Network - ID-NOG 2014Affan Basalamah
 
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens RiyadiIndonesia Network Operators Group
 
Java並行処理プログラミング 第16章ver2
Java並行処理プログラミング 第16章ver2Java並行処理プログラミング 第16章ver2
Java並行処理プログラミング 第16章ver2Takinami Kei
 
Ptcl call setup between different exchanges
Ptcl call setup between different exchangesPtcl call setup between different exchanges
Ptcl call setup between different exchangesPTCL
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...Indonesia Network Operators Group
 

Viewers also liked (17)

07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi
07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi
07 (IDNOG01) Local Exchange Point and APIX Update by Harijanto Pribadi
 
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya 01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
01 (IDNOG02) ASN distribution and interconnection in Indonesia by Sanjaya
 
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
 
The Regional Internet Registry System and Internet Number Resources
The Regional Internet Registry System  and Internet Number ResourcesThe Regional Internet Registry System  and Internet Number Resources
The Regional Internet Registry System and Internet Number Resources
 
IXP Best Common Practices trilogy - for the Infrastructure
IXP Best Common Practices trilogy -  for the InfrastructureIXP Best Common Practices trilogy -  for the Infrastructure
IXP Best Common Practices trilogy - for the Infrastructure
 
01 (IDNOG01) Keynote 1 by Barry Greene
01 (IDNOG01) Keynote 1 by Barry Greene01 (IDNOG01) Keynote 1 by Barry Greene
01 (IDNOG01) Keynote 1 by Barry Greene
 
08 (IDNOG01) ARP Guard in IXP by Eric Choy
08 (IDNOG01) ARP Guard in IXP by Eric Choy08 (IDNOG01) ARP Guard in IXP by Eric Choy
08 (IDNOG01) ARP Guard in IXP by Eric Choy
 
06 (IDNOG02) IPv4 Address Transfer by Wita Laksono
06 (IDNOG02) IPv4 Address Transfer by Wita Laksono06 (IDNOG02) IPv4 Address Transfer by Wita Laksono
06 (IDNOG02) IPv4 Address Transfer by Wita Laksono
 
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno
03 (IDNOG02) Sub Sea Cable System a brief introduction by Willy Sutrisno
 
09 (IDNOG01) Introduction about APNIC by Wita Laksono
09 (IDNOG01) Introduction about APNIC by Wita Laksono09 (IDNOG01) Introduction about APNIC by Wita Laksono
09 (IDNOG01) Introduction about APNIC by Wita Laksono
 
Next Generation Campus Network - ID-NOG 2014
Next Generation Campus Network - ID-NOG 2014Next Generation Campus Network - ID-NOG 2014
Next Generation Campus Network - ID-NOG 2014
 
16 (IDNOG01) EDNS0 / How CDNS works by Matt Jansen
16 (IDNOG01) EDNS0 / How CDNS works by Matt Jansen16 (IDNOG01) EDNS0 / How CDNS works by Matt Jansen
16 (IDNOG01) EDNS0 / How CDNS works by Matt Jansen
 
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi
12 (IDNOG01) Jejak IP dalam kasus Pedofil Surabaya by Valens Riyadi
 
Java並行処理プログラミング 第16章ver2
Java並行処理プログラミング 第16章ver2Java並行処理プログラミング 第16章ver2
Java並行処理プログラミング 第16章ver2
 
Ptcl call setup between different exchanges
Ptcl call setup between different exchangesPtcl call setup between different exchanges
Ptcl call setup between different exchanges
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...
23 - IDNOG03 - Affan Basalamah (ITB) Achmad Basuki (UNIBRAW) - Overview of In...
 

Similar to Discovering and Participating in ICANN's Unique Identifier SSR Efforts

Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaMyNOG
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the InternetAPNIC
 
Internet Identifier SSR
Internet Identifier SSRInternet Identifier SSR
Internet Identifier SSRAPNIC
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisJason Trost
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is RealNICSA
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersAPNIC
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
ICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency OutreachICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency OutreachICANN
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 

Similar to Discovering and Participating in ICANN's Unique Identifier SSR Efforts (20)

Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
 
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the Internet
 
Internet Identifier SSR
Internet Identifier SSRInternet Identifier SSR
Internet Identifier SSR
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
ICANN Engagement Update
ICANN Engagement UpdateICANN Engagement Update
ICANN Engagement Update
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is Real
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
ICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency OutreachICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency Outreach
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from Indonesia Network Operators Group

LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkIndonesia Network Operators Group
 
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...Indonesia Network Operators Group
 
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...Indonesia Network Operators Group
 
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive!
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive! 09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive!
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive! Indonesia Network Operators Group
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...Indonesia Network Operators Group
 
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven InnovationIndonesia Network Operators Group
 
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...Indonesia Network Operators Group
 
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...Indonesia Network Operators Group
 
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNICIndonesia Network Operators Group
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLANIndonesia Network Operators Group
 
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOGIndonesia Network Operators Group
 
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...Indonesia Network Operators Group
 
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...Indonesia Network Operators Group
 
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The FutureIndonesia Network Operators Group
 

More from Indonesia Network Operators Group (20)

LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
 
LT03 IDNOG04 - Dewangga - IPv6 Implementation for End Users
LT03 IDNOG04 - Dewangga - IPv6 Implementation for End UsersLT03 IDNOG04 - Dewangga - IPv6 Implementation for End Users
LT03 IDNOG04 - Dewangga - IPv6 Implementation for End Users
 
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
 
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
 
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive!
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive! 09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive!
09 - IDNOG04 - Low Kok Seng (Sigfox) - Make Mass IOT Come Alive!
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
 
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation
07 - IDNOG04 - Leontinus Alpha Edison (Tokopedia) - Data Driven Innovation
 
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
 
05 - IDNOG04 - Bambang Gunawan (Juniper) - Segment Routing
05 - IDNOG04 - Bambang Gunawan (Juniper) - Segment Routing05 - IDNOG04 - Bambang Gunawan (Juniper) - Segment Routing
05 - IDNOG04 - Bambang Gunawan (Juniper) - Segment Routing
 
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
 
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...
03 - IDNOG04 - Hideyuki Sasaki (BBIX) - Introducing Internet Culture To The O...
 
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
 
10 - IDNOG03 - Parlin Marius (IDNOG) Opening Speech
10 - IDNOG03 - Parlin Marius (IDNOG) Opening Speech10 - IDNOG03 - Parlin Marius (IDNOG) Opening Speech
10 - IDNOG03 - Parlin Marius (IDNOG) Opening Speech
 
99 - IDNOG03 - Valens Riyadi (IDNOG) Closing Speech
99 - IDNOG03 - Valens Riyadi (IDNOG) Closing Speech99 - IDNOG03 - Valens Riyadi (IDNOG) Closing Speech
99 - IDNOG03 - Valens Riyadi (IDNOG) Closing Speech
 
12 - IDNOG03 - Hammam Riza (BPPT) Welcoming Speech
12 - IDNOG03 - Hammam Riza  (BPPT) Welcoming Speech12 - IDNOG03 - Hammam Riza  (BPPT) Welcoming Speech
12 - IDNOG03 - Hammam Riza (BPPT) Welcoming Speech
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG
14 - IDNOG03 - George Michaelson (APNIC) - IPV6-in-2016-IDNOG
 
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
 
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...
22 - IDNOG03 - Christopher Lim (Mellanox) - Efficient Virtual Network for Ser...
 
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future
30 - IDNOG03 - Setiaji (Pemda DKI) - Jakarta Smart City Journey & The Future
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Discovering and Participating in ICANN's Unique Identifier SSR Efforts

  • 1. Discovering and Participating at ICANN :! ISSSR Update ! ! Champika Wijayatunga, ICANN! IDNOG1 – Jakarta, Indonesia 24 June 2014 !
  • 3. 3 ICANN  is  a  global  organiza0on  that  coordinates  the   Internet’s  unique  iden0fier  systems  for  worldwide  public   benefit,  enabling  a  single  interoperable  Internet.  
  • 4. 4 + Domain Name System (DNS) + Internet Protocol (IP) Address Allocation + Protocol-Parameter Registry + Root Server Systems + Generic Top-Level Domain Names (gTLD) system management + Country-code Top-Level Domain Name (ccTLD) DNS + Time Zone Database Management Functions that ICANN Coordinates!
  • 5. SSR  Framework     •  Security  –  the  capacity  to  protect  and  prevent   misuse  of  Internet  unique  iden;fiers.   •  Stability  –  the  capacity  to  ensure  that  the  system   operates  as  expected,  and  that  users  of  the  unique   iden;fiers  have  confidence  that  the  system  operates   as  expected.     •  Resiliency  –  the  capacity  of  the  unique  iden;fier   system  to  effec;vely  withstand/tolerate/survive   malicious  aCacks  and  other  disrup;ve  events   without  disrup;on  or  cessa;on  of  service.    
  • 6. The  Challenge   •  Misuse  of  and  aCacks  against  the  DNS  and  global   networks  challenge  overall  unique  iden;fier  security   –  Affect  the  broad  range  of  users,  individuals,  businesses,   civil  society  and  governments   •  Security  in  the  context  of  the  Internet's  unique   iden;fiers  should  be  addressed  through  a  healthy   Internet  ecosystem.     –  an  Internet  that  is  sustainable  or  healthy,  stable  and   resilient   6  
  • 7. Coordina;on  &  Collabora;on   •  Generic  Top  Level  Domain  Operators  (gTLDs)   –  .com,  .net,  .org  etc.   •  Country  Code  Top  Level  Domain  Operators  (ccTLDs)   –  .bd,  .in,  .sg  etc.   •  CERTs   •  Regional  Internet  Registries  (RIRs)   •  Governments  /  Law  Enforcement   •  Interna;onal  Organisa;ons   •  Research  Organisa;ons  /  Experts   •  Etc.   7  
  • 8. 8 ! Functional Areas! Threat  Awareness   and    Preparedness   Trust-­‐based   Collabora;on   Iden;fier  SSR  Analy;cs   Capability  Building   Iden;fier   Systems  SSR  
  • 9. Iden;fier  Systems  Threat  Awareness   •  Exchange  of  threat  intelligence   rela;ng  to  security  events  of   global  nature  involving  iden;fier   systems   •  Par;cipa;on  in  response  to   threats  or  aCacks  against   iden;fier  systems,  see     hCps://www.icann.org/en/about/staff/security/ vulnerability-­‐disclosure-­‐05aug13-­‐en.pdf     Threat   Awareness  and   Response   Threat   Intelligence   • Trust  networks   Coordinated   Response   • Vulnerability   Disclosure   • Facilita;on  
  • 10. •  Ac;ve  engagement  with  global   actors  who  monitor  DNS  health  or   iden;fy  imminent  threats   •  DNS  vulnerability  iden;fica;on,   repor;ng,  and  resolu;on   •  Examples   –  Conficker   –  ACacks  against  ccTLDs,  registrars   –  Root  system  DDoS  (Anonymous)     Threat  awareness   and  response  
  • 11. Iden;fier  SSR  Analy;cs   •  Projects  in  infancy     •  Develop  metrics  and  analy;cs  for   iden;fier  systems,  e.g.,     –  Root  system  measurements,  analysis   –  Analysis  of  DNS  or  registra;on  abuse  or   misuse     –  Crea;ve  uses  of  DNS  data   Iden;fier  SSR   Analy;cs   Metrics   •   “CVEs”   • Root   System   analy;cs   • Incidents  
  • 12. Trust-­‐based  Collabora;on   •  Global  Cybersecurity  coopera;on   –  Coordinate  engagement  through  ICANN     Global  Stakeholder  Engagement   –  Coordinate  cybersecurity  message  with   Global  Stakeholder  Engagement   •  Global  Security  &  Opera;ons   –  Daily  interac;on  on  DNS  abuse/misuse   maCers  with  first  responders,  law   enforcement,  operators   –  Coopera;on  with  DNS  research  ac;vi;es         •  Examples   –  Engage  with  registrars  and  repor;ng  par;es   to  mi;gate  DNS  abuse/misuse   –  Lend  subject  maCer  exper;se  during   incident  response   Trust-­‐based   Collabora;on   Global  SecOps   •  An;Phishing   •  An;spam   •  An;crime   •  Opera;ons   Research   Global  CyberSec   •  CCI   •  OECD  
  • 13. Capability  Building   •  DNS  training   –  Security,  opera;ons,  and  DNSSEC   deployment  training  for  TLD  registry   operators   –  Informa;on  gathering  to  iden;fy  DNS   abuse/misuse     –  Delivered  by  contracted  par;es,  ICANN   staff  (digital  delivery  under  study)   •  Knowledge  Transfer   –  Exchange  of  informa;on  gathering  or   inves;ga;ng  techniques   Capability   Building   DNS  Training   •  Security   •  OAM   •  Abuse/ Misuse   Knowledge   Transfer   •  Europol   •  Interpol   •  RIRs  
  • 14. 14 Growing the Asia Pacific Network! •  ICANN APAC Hub •  apachub@icann.org •  SSR issues: •  champika.wijayatunga@icann.org Thank You!