SlideShare a Scribd company logo
1© 2014 Architelos and/or its affiliates. All rights reserved.
Reality Check: Domain Name
Abuse
Alexa Raad, CEO
Architelos
www.architelos.com
Feb 12, 2015
Singapore Feb 2015 GAC Meeting
2© 2014 Architelos and/or its affiliates. All rights reserved.
Agenda
•  Definition
•  Abuse Primer
•  Best Practices
•  Key Components
© 2014 Architelos and/or its affiliates. All rights reserved. 3
Abuse = Exploiting Internet Users
• Purposes that are deceptive, malicious
• Categories are not mutually exclusive
© 2014 Architelos and/or its affiliates. All rights reserved. 4
Relationship
© 2014 Architelos and/or its affiliates. All rights reserved. 5
About Spam…
•  Unsolicited email
•  The problem: domains advertised in spam
•  Spam is the distribution/delivery mechanism for phishing,
malware, fraud, identity theft, etc.
•  85% of all email sent in the world is spam*. Most of it is not
just harmless advertising, it’s part of illegal and/or illicit
activities.
* M3AAWG statistics; also http://www.senderbase.org/static/spam/
© 2014 Architelos and/or its affiliates. All rights reserved. 6
Example Spam Email - Jan 17, 2015
Hello,
Dear [redacted]
To get back into your account, you'll need to confirm your account . It's easy: Click the link
below to open a secure browser window. Confirm that you're the owner of the account and
then follow the instructions.
By Clicking Here
[hxxp://www.amazoon.company/seller/index/web/index.php?
cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f9e08eb
1299421ca1639745433caa407f9e08eb1299421ca1639745433caa407]
Or contact paypal Member Services Team. We're available 24 hours a day, 7 days a week. If
you have recently updated your billing information, please disregard this message as we are
processing the changes you have made
© 2014 Architelos and/or its affiliates. All rights reserved. 7
..for Phishing Attack
© 2014 Architelos and/or its affiliates. All rights reserved. 8
Factors that Allow Abuse to Succeed
Low price
Economic incentive
Lax registration policies
Lack of enforcement, or…
lax and/or inconsistent enforcement
9© 2014 Architelos and/or its affiliates. All rights reserved.
ABUSE PRIMER
© 2014 Architelos and/or its affiliates. All rights reserved. 10
1.  “Not all abuse is created equal” – Some are
more dangerous than others
ex: Spear phishing attack on Sony
© 2014 Architelos and/or its affiliates. All rights reserved. 11
2.  Abuse can morph over time
Time
Severity
© 2014 Architelos and/or its affiliates. All rights reserved. 12
3.  They all start with a domain name
registration
© 2014 Architelos and/or its affiliates. All rights reserved. 13
4.  Different TLDs have different profiles
• Different business models
• Open vs. eligibility criteria restrictions vs. .brand/closed
• Price
• Distribution model
= Different risks
© 2014 Architelos and/or its affiliates. All rights reserved. 14
5.  Existence/prevalence of abusive domains
in a TLD does not necessarily indicate
mismanagement by the Registry
What matters in effective and consistent mitigation to
reduce “time to harm”
Ignoring abuse over time, and letting it flourish, is
mismanagement.
© 2014 Architelos and/or its affiliates. All rights reserved. 15
6.  Abuse patterns for a TLD varies over time
Abuse patterns vary to find exposures in policies and operations.
Day to day pattern Month by month
© 2014 Architelos and/or its affiliates. All rights reserved. 16
7.  Virtually every TLD has at least some
abuse
By the end of 2014, new gTLDs had 1/4th the levels of
abuse found in established gTLDs
Almost every ccTLD and legacy gTLD has some abuse.
This is a consequence of usage, and it is inevitable.
© 2014 Architelos and/or its affiliates. All rights reserved. 17
8.  Effective abuse mitigation is also good for
business
Abuse à reputation of the TLD, which in turn affects:
•  Use (ex: applications can block the TLD altogether)
•  New registrations (adoption by legitimate registrants)
•  Renewals
© 2014 Architelos and/or its affiliates. All rights reserved. 18
9.  Effective mitigation is about reducing “time
to harm”
IP Address
Domain Name
Website
email
Internet Browser
Device(s)
Applications
“Mitigation”
Less Effective
Criminals
More Effective
“Damage
Assessment”
© 2014 Architelos and/or its affiliates. All rights reserved. 19
Best Practices
•  Align operational procedures and processes to support policy
Consistency (same bad behavior should consistently result in same enforcement)
Measure, learn over time, and adjust
•  Understand what's happening in the domain space
Continuous monitoring (and not periodic technical analysis)
Use multiple data sources to get the complete picture
•  Analyze and prioritize
Mitigate most egregious domain abuses
Look for correlation and relationships to idenitfy problem spots
Ex: abusive domain names à problem registrars
•  Focus on reducing time to “Time to Harm”
How long the abusive domain is active and therefore able to cause harm. Most damage is
done within first two hours in a phishing attack
© 2014 Architelos and/or its affiliates. All rights reserved. 20
Putting Best Practices to Work
•  Well designed procedures, processes and workflows
•  Abuse data detection
•  Analysis & prioritization
•  Notification & communication
•  Enforcement
(Ex: suspension, takedown, deletion etc.)
•  Documentation (record keeping)
•  Measurement
Effectiveness? Accuracy?
•  Complaint & redress
© 2014 Architelos and/or its affiliates. All rights reserved. 21
Processes
(e.g. regular and exception work flows)
Procedures
(ex: Whois validation, Abuse verification,
Escalation, Registrar notification, Suspension
or takedown, Documentation)
Policies
(Abuse Policy, Registration
Policy, Acceptable Use, etc)
Principles
(Security/Safety,
Privacy, Transparency,
Accountability, Fairness,
Redress, Consistency)
Procedures are a set of
operational actions which
support one or more
policies.
•  Consistently applied
•  Contradictory
•  Nullify other procedures
•  Nullify other policies
Each procedure may have multiple processes to help
achieve the objective. Ex: Escalation procedure may
have various processes (i.e. IF X exists, then do…Y, If
X does not exist then proceed to Z). Processes are
defined in terms of workflows.
A Complete
Abuse Mitigation
System
© 2014 Architelos and/or its affiliates. All rights reserved. 22
Abuse data detection
•  Choose reputable data which report on one or more abuse types
At a minimum, look for data feeds and sources that cover spam, phishing,
malware, botnets
Some data sources are specialists in an abuse type
No one vendor will catch all the abuse
•  Data should have:
Validation mechanisms in place so as to eliminate or minimize false
positives
Mechanisms to remove resolved abuse from their lists
•  Multiple Data Sources: Reporting the same abuses independently
adds confidence
•  Some invoke actions from third-parties, such as law enforcement
© 2014 Architelos and/or its affiliates. All rights reserved. 23
For it to work, at a minimum you need to assume:
•  Spam=Phishing=Malware=Botnet
•  No correlation or commonality between abuse types
•  Abuse patterns stay the same over time
•  Abuse follows a Normal Distribution curve
Or simply put, depending on when you sample you can get widely different
results
Monitoring versus Sampling
© 2014 Architelos and/or its affiliates. All rights reserved. 24
Analysis and Prioritization
•  Different abuse types have different urgency:
•  Some may need to be taken down immediately
•  Some have different notification paths
•  Verifying Abuse
•  Verification is Data vendor work ideally, Registries and Registrars
are not specialists and it’s not cost effective for most entities to
have in-house specialists
•  False positives undermine confidence, but in good quality data
providers, they are extremely rare.
•  Some forms of abuse legally have to be verified or handled with
third parties, such as child pornography
© 2014 Architelos and/or its affiliates. All rights reserved. 25
DATA
Information
(=Data + Data +Data)
Knowledge
(=info+ info + info)
How they Fit
Wisdom
Registrar data
Malware
Mitigation, Enforcement
Reputation
Correlation & Relationships
Context
Analysis
Prioritization
Detection
© 2014 Architelos and/or its affiliates. All rights reserved. 26
Is the Cost Prohibitive?
•  It's good for business
•  Responsible new gTLD registries planned for this,
because:
• Had to describe anti-abuse plans and costs in their applications.
• Included in Registry contract
•  Options are: “Do-it-Yourself” or outsource
• For a medium-sized registry: usually one person part-time
• Outsourced Abuse Desk consulting
• Basic commercial detection services are available for ~ US$250 -
$400/month*
* Domain Assured and NameSentry
© 2014 Architelos and/or its affiliates. All rights reserved. 27
Thank you!
Questions?

More Related Content

What's hot

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
Dan Michaluk
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
Dan Michaluk
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
Dan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
Dan Michaluk
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
Dan Michaluk
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
Dan Michaluk
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
Mark Stokes
 

What's hot (17)

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
File000168
File000168File000168
File000168
 
Ht t17
Ht t17Ht t17
Ht t17
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
File000166
File000166File000166
File000166
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
File000164
File000164File000164
File000164
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 

Viewers also liked

Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Eduardo Castro
 
Archstones property solutions
Archstones property solutionsArchstones property solutions
Archstones property solutions
Archstones property solutions
 
Evento baby lesly michelle
Evento baby lesly michelleEvento baby lesly michelle
Evento baby lesly michelle
Dogy Frey
 
Trabajos para mamá
Trabajos para mamáTrabajos para mamá
Trabajos para mamá
Betty
 
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhattSanti sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Archstones property solutions
 
SERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPATSERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPAT
sertifikatSMK3
 
Announcements 12.20.15
Announcements 12.20.15Announcements 12.20.15
Announcements 12.20.15
Roger Scantlin
 
Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010andrewhewertson
 
Cali poem!new2
Cali poem!new2Cali poem!new2
Cali poem!new2
asalvon
 
The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3
Rod West
 
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Niels Pflaeging
 
Volvo and Geely
Volvo and GeelyVolvo and Geely
Volvo and Geely
Sanjaya Sanjaya
 

Viewers also liked (14)

Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
 
Archstones property solutions
Archstones property solutionsArchstones property solutions
Archstones property solutions
 
Ccaption help
Ccaption helpCcaption help
Ccaption help
 
Fonttable help
Fonttable helpFonttable help
Fonttable help
 
Evento baby lesly michelle
Evento baby lesly michelleEvento baby lesly michelle
Evento baby lesly michelle
 
Trabajos para mamá
Trabajos para mamáTrabajos para mamá
Trabajos para mamá
 
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhattSanti sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
 
SERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPATSERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPAT
 
Announcements 12.20.15
Announcements 12.20.15Announcements 12.20.15
Announcements 12.20.15
 
Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010
 
Cali poem!new2
Cali poem!new2Cali poem!new2
Cali poem!new2
 
The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3
 
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
 
Volvo and Geely
Volvo and GeelyVolvo and Geely
Volvo and Geely
 

Similar to Architelos gac domain abuse best practices feb 12

Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Lancope, Inc.
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Shawn Tuma
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
Emma Mirrington
 
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
Emma Mirrington
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Armstrong Teasdale
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
AlienVault
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
FraudBusters
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
Scott Swanson , CFE, CFCI
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
kCura_Relativity
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist, LLC
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due Diligence
ethiXbase
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 

Similar to Architelos gac domain abuse best practices feb 12 (20)

Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
 
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due Diligence
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 

More from DNS Entrepreneurship Center

Inta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentationInta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentation
DNS Entrepreneurship Center
 
Final udrp webinar slidesv4
Final udrp webinar slidesv4Final udrp webinar slidesv4
Final udrp webinar slidesv4
DNS Entrepreneurship Center
 
Dot tba financial plans
Dot tba financial plansDot tba financial plans
Dot tba financial plans
DNS Entrepreneurship Center
 
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
DNS Entrepreneurship Center
 
Centr presentation v4
Centr presentation v4Centr presentation v4
Centr presentation v4
DNS Entrepreneurship Center
 
2013 july gac webinar for tom
2013 july gac webinar for tom2013 july gac webinar for tom
2013 july gac webinar for tom
DNS Entrepreneurship Center
 
Radix marketing final
Radix marketing finalRadix marketing final
Radix marketing final
DNS Entrepreneurship Center
 
Promotion & sales guide 071114 club
Promotion & sales guide 071114 clubPromotion & sales guide 071114 club
Promotion & sales guide 071114 club
DNS Entrepreneurship Center
 
Mktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunriseMktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunrise
DNS Entrepreneurship Center
 
Marketing plan 2015 public me
Marketing plan 2015 public  meMarketing plan 2015 public  me
Marketing plan 2015 public me
DNS Entrepreneurship Center
 
4psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp014psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp01
DNS Entrepreneurship Center
 
13. managed dns for registrars product overview and opportunity outline - f...
13. managed dns for registrars   product overview and opportunity outline - f...13. managed dns for registrars   product overview and opportunity outline - f...
13. managed dns for registrars product overview and opportunity outline - f...
DNS Entrepreneurship Center
 
11. open srs sales_material
11. open srs sales_material11. open srs sales_material
11. open srs sales_material
DNS Entrepreneurship Center
 
10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation
DNS Entrepreneurship Center
 
9. tmch presentation
9. tmch presentation9. tmch presentation
9. tmch presentation
DNS Entrepreneurship Center
 
5. icann registrar accreditation
5. icann registrar accreditation5. icann registrar accreditation
5. icann registrar accreditation
DNS Entrepreneurship Center
 
11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment
DNS Entrepreneurship Center
 
9. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-39. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-3
DNS Entrepreneurship Center
 
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
DNS Entrepreneurship Center
 
6. timeline infographic 01
6. timeline infographic 016. timeline infographic 01
6. timeline infographic 01
DNS Entrepreneurship Center
 

More from DNS Entrepreneurship Center (20)

Inta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentationInta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentation
 
Final udrp webinar slidesv4
Final udrp webinar slidesv4Final udrp webinar slidesv4
Final udrp webinar slidesv4
 
Dot tba financial plans
Dot tba financial plansDot tba financial plans
Dot tba financial plans
 
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
 
Centr presentation v4
Centr presentation v4Centr presentation v4
Centr presentation v4
 
2013 july gac webinar for tom
2013 july gac webinar for tom2013 july gac webinar for tom
2013 july gac webinar for tom
 
Radix marketing final
Radix marketing finalRadix marketing final
Radix marketing final
 
Promotion & sales guide 071114 club
Promotion & sales guide 071114 clubPromotion & sales guide 071114 club
Promotion & sales guide 071114 club
 
Mktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunriseMktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunrise
 
Marketing plan 2015 public me
Marketing plan 2015 public  meMarketing plan 2015 public  me
Marketing plan 2015 public me
 
4psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp014psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp01
 
13. managed dns for registrars product overview and opportunity outline - f...
13. managed dns for registrars   product overview and opportunity outline - f...13. managed dns for registrars   product overview and opportunity outline - f...
13. managed dns for registrars product overview and opportunity outline - f...
 
11. open srs sales_material
11. open srs sales_material11. open srs sales_material
11. open srs sales_material
 
10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation
 
9. tmch presentation
9. tmch presentation9. tmch presentation
9. tmch presentation
 
5. icann registrar accreditation
5. icann registrar accreditation5. icann registrar accreditation
5. icann registrar accreditation
 
11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment
 
9. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-39. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-3
 
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
 
6. timeline infographic 01
6. timeline infographic 016. timeline infographic 01
6. timeline infographic 01
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

Architelos gac domain abuse best practices feb 12

  • 1. 1© 2014 Architelos and/or its affiliates. All rights reserved. Reality Check: Domain Name Abuse Alexa Raad, CEO Architelos www.architelos.com Feb 12, 2015 Singapore Feb 2015 GAC Meeting
  • 2. 2© 2014 Architelos and/or its affiliates. All rights reserved. Agenda •  Definition •  Abuse Primer •  Best Practices •  Key Components
  • 3. © 2014 Architelos and/or its affiliates. All rights reserved. 3 Abuse = Exploiting Internet Users • Purposes that are deceptive, malicious • Categories are not mutually exclusive
  • 4. © 2014 Architelos and/or its affiliates. All rights reserved. 4 Relationship
  • 5. © 2014 Architelos and/or its affiliates. All rights reserved. 5 About Spam… •  Unsolicited email •  The problem: domains advertised in spam •  Spam is the distribution/delivery mechanism for phishing, malware, fraud, identity theft, etc. •  85% of all email sent in the world is spam*. Most of it is not just harmless advertising, it’s part of illegal and/or illicit activities. * M3AAWG statistics; also http://www.senderbase.org/static/spam/
  • 6. © 2014 Architelos and/or its affiliates. All rights reserved. 6 Example Spam Email - Jan 17, 2015 Hello, Dear [redacted] To get back into your account, you'll need to confirm your account . It's easy: Click the link below to open a secure browser window. Confirm that you're the owner of the account and then follow the instructions. By Clicking Here [hxxp://www.amazoon.company/seller/index/web/index.php? cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f9e08eb 1299421ca1639745433caa407f9e08eb1299421ca1639745433caa407] Or contact paypal Member Services Team. We're available 24 hours a day, 7 days a week. If you have recently updated your billing information, please disregard this message as we are processing the changes you have made
  • 7. © 2014 Architelos and/or its affiliates. All rights reserved. 7 ..for Phishing Attack
  • 8. © 2014 Architelos and/or its affiliates. All rights reserved. 8 Factors that Allow Abuse to Succeed Low price Economic incentive Lax registration policies Lack of enforcement, or… lax and/or inconsistent enforcement
  • 9. 9© 2014 Architelos and/or its affiliates. All rights reserved. ABUSE PRIMER
  • 10. © 2014 Architelos and/or its affiliates. All rights reserved. 10 1.  “Not all abuse is created equal” – Some are more dangerous than others ex: Spear phishing attack on Sony
  • 11. © 2014 Architelos and/or its affiliates. All rights reserved. 11 2.  Abuse can morph over time Time Severity
  • 12. © 2014 Architelos and/or its affiliates. All rights reserved. 12 3.  They all start with a domain name registration
  • 13. © 2014 Architelos and/or its affiliates. All rights reserved. 13 4.  Different TLDs have different profiles • Different business models • Open vs. eligibility criteria restrictions vs. .brand/closed • Price • Distribution model = Different risks
  • 14. © 2014 Architelos and/or its affiliates. All rights reserved. 14 5.  Existence/prevalence of abusive domains in a TLD does not necessarily indicate mismanagement by the Registry What matters in effective and consistent mitigation to reduce “time to harm” Ignoring abuse over time, and letting it flourish, is mismanagement.
  • 15. © 2014 Architelos and/or its affiliates. All rights reserved. 15 6.  Abuse patterns for a TLD varies over time Abuse patterns vary to find exposures in policies and operations. Day to day pattern Month by month
  • 16. © 2014 Architelos and/or its affiliates. All rights reserved. 16 7.  Virtually every TLD has at least some abuse By the end of 2014, new gTLDs had 1/4th the levels of abuse found in established gTLDs Almost every ccTLD and legacy gTLD has some abuse. This is a consequence of usage, and it is inevitable.
  • 17. © 2014 Architelos and/or its affiliates. All rights reserved. 17 8.  Effective abuse mitigation is also good for business Abuse à reputation of the TLD, which in turn affects: •  Use (ex: applications can block the TLD altogether) •  New registrations (adoption by legitimate registrants) •  Renewals
  • 18. © 2014 Architelos and/or its affiliates. All rights reserved. 18 9.  Effective mitigation is about reducing “time to harm” IP Address Domain Name Website email Internet Browser Device(s) Applications “Mitigation” Less Effective Criminals More Effective “Damage Assessment”
  • 19. © 2014 Architelos and/or its affiliates. All rights reserved. 19 Best Practices •  Align operational procedures and processes to support policy Consistency (same bad behavior should consistently result in same enforcement) Measure, learn over time, and adjust •  Understand what's happening in the domain space Continuous monitoring (and not periodic technical analysis) Use multiple data sources to get the complete picture •  Analyze and prioritize Mitigate most egregious domain abuses Look for correlation and relationships to idenitfy problem spots Ex: abusive domain names à problem registrars •  Focus on reducing time to “Time to Harm” How long the abusive domain is active and therefore able to cause harm. Most damage is done within first two hours in a phishing attack
  • 20. © 2014 Architelos and/or its affiliates. All rights reserved. 20 Putting Best Practices to Work •  Well designed procedures, processes and workflows •  Abuse data detection •  Analysis & prioritization •  Notification & communication •  Enforcement (Ex: suspension, takedown, deletion etc.) •  Documentation (record keeping) •  Measurement Effectiveness? Accuracy? •  Complaint & redress
  • 21. © 2014 Architelos and/or its affiliates. All rights reserved. 21 Processes (e.g. regular and exception work flows) Procedures (ex: Whois validation, Abuse verification, Escalation, Registrar notification, Suspension or takedown, Documentation) Policies (Abuse Policy, Registration Policy, Acceptable Use, etc) Principles (Security/Safety, Privacy, Transparency, Accountability, Fairness, Redress, Consistency) Procedures are a set of operational actions which support one or more policies. •  Consistently applied •  Contradictory •  Nullify other procedures •  Nullify other policies Each procedure may have multiple processes to help achieve the objective. Ex: Escalation procedure may have various processes (i.e. IF X exists, then do…Y, If X does not exist then proceed to Z). Processes are defined in terms of workflows. A Complete Abuse Mitigation System
  • 22. © 2014 Architelos and/or its affiliates. All rights reserved. 22 Abuse data detection •  Choose reputable data which report on one or more abuse types At a minimum, look for data feeds and sources that cover spam, phishing, malware, botnets Some data sources are specialists in an abuse type No one vendor will catch all the abuse •  Data should have: Validation mechanisms in place so as to eliminate or minimize false positives Mechanisms to remove resolved abuse from their lists •  Multiple Data Sources: Reporting the same abuses independently adds confidence •  Some invoke actions from third-parties, such as law enforcement
  • 23. © 2014 Architelos and/or its affiliates. All rights reserved. 23 For it to work, at a minimum you need to assume: •  Spam=Phishing=Malware=Botnet •  No correlation or commonality between abuse types •  Abuse patterns stay the same over time •  Abuse follows a Normal Distribution curve Or simply put, depending on when you sample you can get widely different results Monitoring versus Sampling
  • 24. © 2014 Architelos and/or its affiliates. All rights reserved. 24 Analysis and Prioritization •  Different abuse types have different urgency: •  Some may need to be taken down immediately •  Some have different notification paths •  Verifying Abuse •  Verification is Data vendor work ideally, Registries and Registrars are not specialists and it’s not cost effective for most entities to have in-house specialists •  False positives undermine confidence, but in good quality data providers, they are extremely rare. •  Some forms of abuse legally have to be verified or handled with third parties, such as child pornography
  • 25. © 2014 Architelos and/or its affiliates. All rights reserved. 25 DATA Information (=Data + Data +Data) Knowledge (=info+ info + info) How they Fit Wisdom Registrar data Malware Mitigation, Enforcement Reputation Correlation & Relationships Context Analysis Prioritization Detection
  • 26. © 2014 Architelos and/or its affiliates. All rights reserved. 26 Is the Cost Prohibitive? •  It's good for business •  Responsible new gTLD registries planned for this, because: • Had to describe anti-abuse plans and costs in their applications. • Included in Registry contract •  Options are: “Do-it-Yourself” or outsource • For a medium-sized registry: usually one person part-time • Outsourced Abuse Desk consulting • Basic commercial detection services are available for ~ US$250 - $400/month* * Domain Assured and NameSentry
  • 27. © 2014 Architelos and/or its affiliates. All rights reserved. 27 Thank you! Questions?