SlideShare a Scribd company logo
1 of 17
Download to read offline
APNIC44 Briefing
Kenny Huang, Ph.D.
Executive Council Member, APNIC
Board, Mind Extension
huangksh@gmail.com
Sep 2017
黃勝雄博士
Asia Pacific Network Information Centre
Tuesday,	12	September
2Asia Pacific Network Information Centre
Technical	Operations
• SDN-based	security	mechanism	on	the	100G	TANet (Ying-Chief	Chang)
• Up	in	the	Sky	(Jonathan	Brewer)
• Simulating	the	network	dynamics	of	shared	satellite	channels	(Ulrich	
Speidel)
• Being	open	:	how	Facebook	got	its	edge	(Matt	Jansen,	Facebook)
• Vardah and	routing	aftermath	(Anurag	Bhatia,	HE)
• Rapid	detection	of	BGP	anomalies	(Bahaa AI-Musawi)
• In	defence of	NATs	(Geoff	Huston,	APNIC)
3Asia Pacific Network Information Centre
Cooperation	SIG
• Theme:	Trans-Border	Cooperation	on	Cyber	Security
• Cross-border	nature	of	Internet	requires	cooperation	to	be	a	critical	
component	of	cyber	security.	This	 session	aims	to	 bring	out	different	
perspectives	to	the	nature	of	Cooperation	between	states	on	
cybersecurity	as	an	 essential	part	 to	combat	cross-border	
cybercrime	and	to	reduce	the	risks	of	cyber	war.	Bilateral	
cybersecurity	agreements	between	nations	 can	help	build	that	
cooperation.	The	ultimate	 goal,	however	should	be	to	achieve	multi-
lateral	consensus	and	arrive	at	global	agreement	on	issues	of	cyber	
security
• Taiwan	⾏政院資安處周智⽲科⾧
• Current	Conditions	and	Challenges	of	The	Cybersecurity	in
Taiwan
4Asia Pacific Network Information Centre
Discussion	with	IPv6	CE	Vendors
• The	major	issue	is	the	lack	of	support	even	for	older	transition	
mechanism	(DS-Lite,	lw4o6),	and	even	newer	ones	(464XLAT,	MAP	
T/E),	by	the	majority	of	CE	vendors.	Some	of	them	provide	it	"on-
demand"	for	big	customers,	but	small	and	medium	ISPs	don't	have	
that	purchasing	capability,	creating	a	big	issue	for	deployment.
• This	BoF will	discuss	these	issues	with	a	few	(4-5)	representatives	of	
major	well-known	CE	vendors,	try	to	understand	the	reasons	behind	
the	lack	of	support,	and	try	to	agree	how	to	move	on.
5Asia Pacific Network Information Centre
Wednesday,	13	September
6Asia Pacific Network Information Centre
Network	Operations	– IPv6
• IPv6	in	the	Telco	Cloud	(Sunny	Yeung)
• IPv6將是網路未來主流,Telstra	公司分享未來僅使⽤ IPv6	網路(single-
stack)如何滿⾜網路服務需求
• Measuring	Ipv6	using	Ad-Based	Measurement	(Geoff	Huston)
• 使⽤Google	廣告量測連線主機 IPv6	/IPv4	統計
• Best	Current	Operational	Practice	for	Operations:	IPv6-Prefix	
assignment	for	End-Customers
• 如何以最佳實務分配終端⽤⼾ IPv6-Prefix
7Asia Pacific Network Information Centre
APNIC	Services
• Transition	to	a	single	RPKI	trust	anchor	(Tom	Harrison)
• Internet	Health	Indicator	(George	Kuo)
• Global	IRR	and	RPKI	problem	statement	(George	Michaelson)
• APNIC	Whois	upgrade	update	(Annalize Mulingbayan)
• Improving	whois contact	review	and	update	tool	(Wita Laksono)
• Geolocation	Information	update	(Vivek Nigam)
• Registering	delegations	and	sub-delegations:	APNIC	membership	
agreement	and	policy	reivew (Craig	Ng)
8Asia Pacific Network Information Centre
Technical	Operations	III
• Beyond	Mirai :	The	new	age	of	MDDoS attack	(Avishay	Zawoznik)
• 介紹 DDoS	攻擊並以範例展⽰攻擊NOC/SOC情境
• Blockchain	:	The	future	of	the	Internet	(Muhammad	Moinur Rahman)
• 區塊鏈介紹
• Global	IPv6	Deployment	Survey	(Jordi	Palet)
• 介紹全球 IPv6	發展現況調查
9Asia Pacific Network Information Centre
DNS	Key	Signing	Key	Rollover	(Geoff	Huston,	Edward	Lewis)
• In	October	2017,	ICANN	is	planning	to	roll,	or	change,	the	“top”	pair	of	
cryptographic	keys	used	in	the	DNSSEC	protocol,	commonly	known	as	the	Root	
Zone	KSK	(Key	Signing	Key).	This	will	be	the	first	time	the	KSK	has	been	changed	
since	it	was	initially	generated	in	2010.
• Changing	the	key	involves	generating	a	new	cryptographic	key	pair	and	
distributing	the	new	public	component	to	all	DNSSEC-validating	resolvers	globally.	
This	will	be	a	significant	change	as	every	Internet	query	using	DNSSEC	depends	on	
the	root	zone	KSK	to	validate	the	destination.
• Network	operators	using	DNSSEC-validating	resolvers	must	update	their	systems	
with	the	new	KSK	to	help	ensure	trouble-free	Internet	access	for	users.	This	
session	will	explore	the	KSK	rollover	in	detail	and	provide	guidance	to	network	
operators	about	the	changes	they	will	need	to	make	to	their	systems.
10Asia Pacific Network Information Centre
11
Source	:	JPRS
Asia Pacific Network Information Centre
Policy	SIG
• prop-116-v004: - Prohibit	to	transfer	IPv4	addresses	in	the	final	/8	
block
• prop-118-v001: - No	need	policy	in	APNIC	region
• prop-119-v001: - Temporary	transfers
• prop-120-v001: - Final	/8	pool	exhaustion	plan
• prop-121-v001: - Updating	“Initial	IPv6	allocation”	policy
• prop-122-v001: - Updating	“Subsequent	IPv6	allocation”	policy
12Asia Pacific Network Information Centre
Selected	Policy	Proposals	Review
• Prop-119-v001	Temporary	transfers
• 允許網路位址持有者可將IP位址暫時提供給其他機構使⽤,資源使⽤期
間其他機構擔任代管者保管此位址資源。⼀但不在需要此IP位址,持有
者可回收IP位址資源
• 反對意⾒:無此需求
• ⽀持意⾒:位址無法移轉,造成網路資源浪費
• Prop-118:	No	need	policy	in	APNIC	region
• IPv4移轉之接收者無需展⽰未來IPv4位址需求,簡化IPv4移轉政策流程,	減
少APNIC⾏政成本
• ⽀持意⾒:	簡化移轉成本,活化IPv4位址資源再利⽤。歐洲RIPE不需要位
址接收者展⽰未來IPv4擴充需求
• 反對意⾒:	 如果不變動現有位址政策,阻礙IPv4流通再利⽤。
• 其他問題:是否此IP區塊可在其他ISP重新廣播
13Asia Pacific Network Information Centre
• Address	Supporting	Organization	Review
• Introduce	ASO	review	report	and	recommendation
• 包含 Policy	Council	
• IPv6	Readiness	Measurement
• 各項 IPv6	量測⽅法與量測技術、量測結果
• 亞洲⼤學講座教授曾憲雄主持
14Asia Pacific Network Information Centre
Thursday,	14	September
15Asia Pacific Network Information Centre
AMM
• Secretariat	Report
• Treasurer	Report
• EC	Report
• Policy	SIG	Report
• NIR	SIG	Report
• NRO	EC	Report
• Cooperation	SIG	Report
• IPv6	Readiness	Measurement	Report
16Asia Pacific Network Information Centre
Why	Participate	?
• APNIC	:	the	1st institutionalized	Internet	Governance	entity	in	AP
• Bottom	up	policy	development		process	
• Best	practice	of	Internet	governance	model
• Making	Internet	policy	for	Asia	Pacific	region
• Sharping	the	future	of	the	Internet
• Networking	with	Internet	pioneers,	innovators
• Fathers	of	Internet,	Internet	hall	of	fame,	Internet	guru	..etc
• New	comers	friendly	culture
•Taiwan!! Of	course
17Asia Pacific Network Information Centre

More Related Content

What's hot

Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 
Edward Banayoti Sawiris
Edward Banayoti Sawiris Edward Banayoti Sawiris
Edward Banayoti Sawiris MichaElsimo2
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsAllan Cytryn
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World Internet Society
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civilBruce Forrester
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Mark Raduenzel
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkAPNIC
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?David Sweigert
 

What's hot (13)

Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Edward Banayoti Sawiris
Edward Banayoti Sawiris Edward Banayoti Sawiris
Edward Banayoti Sawiris
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civil
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current Work
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?Is 2014 the year for Cyber Militias ?
Is 2014 the year for Cyber Militias ?
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 

Similar to APNIC44 Briefing

How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...TeabeAmet
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...IJECEIAES
 
Global Network Advancement Group - Next Generation Network-Integrated Systems
Global Network Advancement Group - Next Generation Network-Integrated SystemsGlobal Network Advancement Group - Next Generation Network-Integrated Systems
Global Network Advancement Group - Next Generation Network-Integrated SystemsLarry Smarr
 
Global Network Advancement Group Next Generation Network-Integrated Sys...
      Global Network Advancement GroupNext Generation Network-Integrated Sys...      Global Network Advancement GroupNext Generation Network-Integrated Sys...
Global Network Advancement Group Next Generation Network-Integrated Sys...Larry Smarr
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docxblondellchancy
 
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanDOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanNeil McDonnell
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things IJECEIAES
 
Use of hog descriptors in phishing detection
Use of hog descriptors in phishing detectionUse of hog descriptors in phishing detection
Use of hog descriptors in phishing detectionSelman Bozkır
 
Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...nexgentechnology
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...IJNSA Journal
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...CSCJournals
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 

Similar to APNIC44 Briefing (20)

How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
Global Network Advancement Group - Next Generation Network-Integrated Systems
Global Network Advancement Group - Next Generation Network-Integrated SystemsGlobal Network Advancement Group - Next Generation Network-Integrated Systems
Global Network Advancement Group - Next Generation Network-Integrated Systems
 
Global Network Advancement Group Next Generation Network-Integrated Sys...
      Global Network Advancement GroupNext Generation Network-Integrated Sys...      Global Network Advancement GroupNext Generation Network-Integrated Sys...
Global Network Advancement Group Next Generation Network-Integrated Sys...
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
 
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanDOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Use of hog descriptors in phishing detection
Use of hog descriptors in phishing detectionUse of hog descriptors in phishing detection
Use of hog descriptors in phishing detection
 
Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 

More from Kenny Huang Ph.D.

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in TaiwanKenny Huang Ph.D.
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例Kenny Huang Ph.D.
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AIKenny Huang Ph.D.
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案Kenny Huang Ph.D.
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討Kenny Huang Ph.D.
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差Kenny Huang Ph.D.
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningKenny Huang Ph.D.
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析Kenny Huang Ph.D.
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models ReviewKenny Huang Ph.D.
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Kenny Huang Ph.D.
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and OpportunitiesKenny Huang Ph.D.
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment AnalysisKenny Huang Ph.D.
 

More from Kenny Huang Ph.D. (20)

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
 
Spectrum Policy
Spectrum PolicySpectrum Policy
Spectrum Policy
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Smart Energy
Smart EnergySmart Energy
Smart Energy
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment Analysis
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 

Recently uploaded (20)

Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 

APNIC44 Briefing