SlideShare a Scribd company logo
ICANN Engagement Update
Champika Wijayatunga | bdNOG3 - Bangladesh | 18 May 2015
| 2
Internet Corporation for Assigned Names and Numbers
(ICANN)
Dedicated to keeping
Internet Secure, Stable
and Interoperable
1
2
3
Formed in 1998 as a
not-for-profit public-
benefit cooperation
Follows
multistakeholder
model
| 3
Functions that ICANN Coordinates
+ Domain Name System (DNS)
+ Internet Protocol (IP) Address and Autonomous
System Number (AS) Allocation
+ Protocol-Parameter Registry
+ Root Server Systems
+ Generic Top-Level Domain Names (gTLD) system
management
+ Country-code Top-Level Domain Name (ccTLD)
| 4
Business
Government & Governmental
Organizations
Civil Society
Domain Name
Business
Internet Users
Academic
Technical
ICANN’s Global Multistakeholder Community
•  Private-sector companies
•  Trade associations
•  National governments
•  Distinct economies recognized in
international fora
•  Multinational governmental and treaty
organizations
•  Public authorities (including UN agencies
with a direct interest in global Internet
Governance)
•  Academic leaders
•  Institutions of higher learning
•  Professors
•  Students
•  Internet engineers
•  Software developers
•  Programmers
•  Network operators
•  Non-governmental Organizations
•  Non-profits
•  Think Tanks
•  Charities
•  Registries
•  Registrars
•  Domain organizations
| 5
POLICY / ADVICE
The ICANN Community At Work
Security & Stability
Advisory Committee
Address Supporting
Organization
At-Large
Advisory Committee
Government
Advisory Committee
Country Codes Names
Supporting Organization
Generic Names
Supporting Organization
Root Server System
Advisory Committee
The Bottom-Up Multistakeholder Model
The collective efforts of the ICANN community culminate in a common shared goal:
A single, interoperable Internet supported by stable, secure and resilient unique identifier
systems
Busines
s
Government
&
Government
al
Organization
s
Civil Society Domain
Name
Business
Internet
Users
Academic Technical
| 6
DNS Hierarchy – Root Servers
+ ICANN is the L-Root Operator
+ L-Root nodes keep Internet traffic 
local and resolve queries faster 

+ Make it easier to isolate attacks

+ Reduce congestion on international 
bandwidth


+ Redundancy and load balancing with 
multiple instances
| 7
L-Root presence
| 8
.futbol
.brand
.みんな
.公益
.онлайн
.ceo
.paris
.menu
.cab
⌃
22  1300
gTLDs
generic Top-Level Domains
(gTLDs) will quickly expand
to over,1,300 currently over
500 rolled out
New gTLDs!
| 9
Africa
Europe
273 gTLDs
North America
Latin America/
Caribbean Islands
575+ New gTLDs Delegated
Asia/Australia/
Pacific Islands
56 gTLDs 6 gTLDs
93 gTLDs
159 gTLDs
As of 16 April 2015
| 10
Unique Identifiers and SSR Need
+ SSR – Security, Stability and Resiliency 

+ Misuse of and attacks against the DNS and global 
networks challenge overall unique identifier security
–  Affect the broad range of users, individuals, businesses, civil
society, governments etc.
+ Security in the context of the Internet's unique identifiers 
should be addressed through a healthy Internet 
ecosystem. 
–  an Internet that is sustainable or healthy, stable and resilient
| 11
Security, Stability, & Resiliency (SSR) A key pillar of ICANN
Threat
Awareness and
Response
Identifier SSR
Analytics
Trust-based
Collaboration
Capability
Building
The Internet – our “Network of Networks”
ICANN	
  
Gov	
  
Law	
  
Enforcem
ent	
  
Domain	
  
Operators	
  
Regional	
  
Internet	
  
Registries	
  
CERTs	
  
Network	
  
Operators	
  
| 12
Making the DNS Secure
+ A computer sends a question to a DNS server, like
“where is www.example.org?”
+ It receives an answer and assumes that it is
correct.
+ There are multiple ways that traffic on the Internet
can be intercepted and modified, so that the
answer given is false.
| 13
ICANN strongly supports DNSSEC
+ Cyber security is becoming a greater concern to 
enterprises, government, and end users. DNSSEC is a 
key tool and differentiator.
+ DNSSEC is the biggest security upgrade to Internet 
infrastructure in over 20 years. It is a platform for new 
security applications (for those that see the opportunity).
+ DNSSEC infrastructure deployment has been brisk but 
requires expertise. Getting ahead of the curve is a 
competitive advantage.
| 14
DNSSEC ccTLD Map
https://rick.eng.br/dnssecstat/
| 15
DNSSEC TLDs
https://rick.eng.br/dnssecstat/
| 16
How about Registrations?
Importance of WHOIS from a Security point of view

+ whois.icann.org
+ Registration Data Directory Service

- Database containing records of information
+ Verification of records

- Sponsoring Registrar

- Domain Name Servers

- Domain Status

- Creation/Expiry Dates

- Point of Contacts

- DNSSEC Data
| 17
IPv6 deployment, adoption and security
+ IPv4 address exhaustion 
+  IPv6 as solution 
+ IP addresses are key to allow devices to find each other
+  Mobile Internet
+  Internet of Things
+  Smart Nations
+ ICANN supports IPv6
+  Partner to promote awareness
+  Capacity building with community
| 18
SSR Capability Building
•  Training and Outreach
–  Security, operations, and DNS/DNSSEC
deployment training
•  for TLD registry operators
•  Network Operators / ISPs
•  Enterprises, Corporates etc.
–  Information gathering to identify Internet
Identifier Systems abuse/misuse and
Investigation Techniques
•  Law Enforcement Agencies
•  CERTs
•  Internet Investigators etc.
Capability
Building
DNS Training
•  Security
•  DNS
Operations
•  Abuse/Misuse
Knowledge
Transfer
•  Europol
•  Interpol
•  RIRs
| 19
Participation in ICANN
+ Open to entire Internet ecosystem
+ Receive updates via MyICANN
+ Join public comment forum on ICANN’s web site
+ Attend ICANN’s public meetings in person or
online
+ Join one of ICANN’s Supporting Organizations or
Advisory Committees
| 20
ICANN Fellowship Program – Join Us!
+ Program Goals 
+ Awareness: Engage
representatives from developing
nations 
+ Participation: Build capacity
within ICANN community
+ Contribution: Create a broader
base of knowledgeable
constituents
| 21
ICANN APAC Hub!
+ Regional Office in Singapore
+ Registry/Registrar services
+ Contractual Compliance
+ Security
+ Engagement
+ Legal, Finance, HR
| 22
Email: champika.wijayatunga@icann.org
ICANN Website: icann.org
Thank You and Questions
gplus.to/icann
weibo.com/ICANNorg
flickr.com/photos/icann
slideshare.net/icannpresentations
twitter.com/icann
facebook.com/icannorg
linkedin.com/company/icann
youtube.com/user/icannnews
Engage with ICANN

More Related Content

What's hot

ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
Deploy360 Programme (Internet Society)
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
 
ICANN Updates by Yu Chang Kuek
ICANN Updates by Yu Chang KuekICANN Updates by Yu Chang Kuek
ICANN Updates by Yu Chang Kuek
MyNOG
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
ICANN
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
APNIC
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
Eric Kavanagh
 
ICANN's New generic Top-Level Domain Program
ICANN's New generic Top-Level Domain ProgramICANN's New generic Top-Level Domain Program
ICANN's New generic Top-Level Domain Program
ICANN
 
The Domain Name Industry: Value Chain
The Domain Name Industry: Value ChainThe Domain Name Industry: Value Chain
The Domain Name Industry: Value Chain
ICANN
 
FCF June 2014 - 04 evolving our forum
  FCF June 2014 - 04   evolving our forum  FCF June 2014 - 04   evolving our forum
FCF June 2014 - 04 evolving our forum
#TheFraudTube
 
Network Storage Device
Network Storage DeviceNetwork Storage Device
Network Storage Device
Digiliant
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
Abraham Vergis
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Secunoid Systems Inc
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Andris Soroka
 
ISOC Update
ISOC UpdateISOC Update
ISOC Update
APNIC
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Codero
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
Deploy360 Programme (Internet Society)
 

What's hot (20)

ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
ICANN Updates by Yu Chang Kuek
ICANN Updates by Yu Chang KuekICANN Updates by Yu Chang Kuek
ICANN Updates by Yu Chang Kuek
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
Future of the Internet | Media Briefing from Bangkok, Thailand [19 August 2015]
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
ICANN's New generic Top-Level Domain Program
ICANN's New generic Top-Level Domain ProgramICANN's New generic Top-Level Domain Program
ICANN's New generic Top-Level Domain Program
 
The Domain Name Industry: Value Chain
The Domain Name Industry: Value ChainThe Domain Name Industry: Value Chain
The Domain Name Industry: Value Chain
 
FCF June 2014 - 04 evolving our forum
  FCF June 2014 - 04   evolving our forum  FCF June 2014 - 04   evolving our forum
FCF June 2014 - 04 evolving our forum
 
Network Storage Device
Network Storage DeviceNetwork Storage Device
Network Storage Device
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
ISOC Update
ISOC UpdateISOC Update
ISOC Update
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 

Viewers also liked

APNIC42 Announcement
APNIC42 AnnouncementAPNIC42 Announcement
Traffic Engineering for CDNs
Traffic Engineering for CDNs Traffic Engineering for CDNs
Traffic Engineering for CDNs
Bangladesh Network Operators Group
 
ISOC Engagement Activities
ISOC Engagement ActivitiesISOC Engagement Activities
ISOC Engagement Activities
Bangladesh Network Operators Group
 
bdNOG Conference Report
bdNOG Conference Report bdNOG Conference Report
bdNOG Conference Report
Bangladesh Network Operators Group
 
IPv6 Address & Deployment Planning
IPv6 Address & Deployment PlanningIPv6 Address & Deployment Planning
IPv6 Address & Deployment Planning
Bangladesh Network Operators Group
 
Securing Asterisk: A practical approach
Securing Asterisk: A practical approachSecuring Asterisk: A practical approach
Securing Asterisk: A practical approach
Bangladesh Network Operators Group
 
Converged & Efficient Licensing Framework
Converged & Efficient Licensing FrameworkConverged & Efficient Licensing Framework
Converged & Efficient Licensing Framework
Bangladesh Network Operators Group
 
Dot BD Domain and Shared Registry Model- A Policy Proposal
Dot BD Domain and Shared Registry Model- A Policy Proposal Dot BD Domain and Shared Registry Model- A Policy Proposal
Dot BD Domain and Shared Registry Model- A Policy Proposal
Bangladesh Network Operators Group
 
EDNS0 Client-Subnet for DNS Based CDNs
EDNS0 Client-Subnet for DNS Based CDNs EDNS0 Client-Subnet for DNS Based CDNs
EDNS0 Client-Subnet for DNS Based CDNs
Bangladesh Network Operators Group
 
Best Current Operational Practice (BCOP) - Updates from around the world
Best Current Operational Practice (BCOP) - Updates from around the worldBest Current Operational Practice (BCOP) - Updates from around the world
Best Current Operational Practice (BCOP) - Updates from around the world
Bangladesh Network Operators Group
 
bdCERT Activities Update
bdCERT Activities UpdatebdCERT Activities Update
bdCERT Activities Update
Bangladesh Network Operators Group
 
OpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live DemonstrationOpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live Demonstration
Bangladesh Network Operators Group
 
Inter-AS MPLS VPN Deployment
Inter-AS MPLS VPN DeploymentInter-AS MPLS VPN Deployment
Inter-AS MPLS VPN Deployment
Bangladesh Network Operators Group
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
Bangladesh Network Operators Group
 
Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS
Bangladesh Network Operators Group
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
Bangladesh Network Operators Group
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
Bangladesh Network Operators Group
 
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Bangladesh Network Operators Group
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
BDIX BOF
BDIX BOFBDIX BOF

Viewers also liked (20)

APNIC42 Announcement
APNIC42 AnnouncementAPNIC42 Announcement
APNIC42 Announcement
 
Traffic Engineering for CDNs
Traffic Engineering for CDNs Traffic Engineering for CDNs
Traffic Engineering for CDNs
 
ISOC Engagement Activities
ISOC Engagement ActivitiesISOC Engagement Activities
ISOC Engagement Activities
 
bdNOG Conference Report
bdNOG Conference Report bdNOG Conference Report
bdNOG Conference Report
 
IPv6 Address & Deployment Planning
IPv6 Address & Deployment PlanningIPv6 Address & Deployment Planning
IPv6 Address & Deployment Planning
 
Securing Asterisk: A practical approach
Securing Asterisk: A practical approachSecuring Asterisk: A practical approach
Securing Asterisk: A practical approach
 
Converged & Efficient Licensing Framework
Converged & Efficient Licensing FrameworkConverged & Efficient Licensing Framework
Converged & Efficient Licensing Framework
 
Dot BD Domain and Shared Registry Model- A Policy Proposal
Dot BD Domain and Shared Registry Model- A Policy Proposal Dot BD Domain and Shared Registry Model- A Policy Proposal
Dot BD Domain and Shared Registry Model- A Policy Proposal
 
EDNS0 Client-Subnet for DNS Based CDNs
EDNS0 Client-Subnet for DNS Based CDNs EDNS0 Client-Subnet for DNS Based CDNs
EDNS0 Client-Subnet for DNS Based CDNs
 
Best Current Operational Practice (BCOP) - Updates from around the world
Best Current Operational Practice (BCOP) - Updates from around the worldBest Current Operational Practice (BCOP) - Updates from around the world
Best Current Operational Practice (BCOP) - Updates from around the world
 
bdCERT Activities Update
bdCERT Activities UpdatebdCERT Activities Update
bdCERT Activities Update
 
OpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live DemonstrationOpenStack Cloud Administration Through Live Demonstration
OpenStack Cloud Administration Through Live Demonstration
 
Inter-AS MPLS VPN Deployment
Inter-AS MPLS VPN DeploymentInter-AS MPLS VPN Deployment
Inter-AS MPLS VPN Deployment
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
BDIX BOF
BDIX BOFBDIX BOF
BDIX BOF
 

Similar to ICANN Engagement Update

Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
MyNOG
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
Indonesia Network Operators Group
 
Icann presentation (general)
Icann presentation (general)Icann presentation (general)
Icann presentation (general)
NIIEPA
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
APNIC
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
3. icann policy slidesv1
3. icann policy slidesv13. icann policy slidesv1
3. icann policy slidesv1
DNS Entrepreneurship Center
 
ICANN APAC Update
ICANN APAC UpdateICANN APAC Update
ICANN APAC Update
APNIC
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
ARIN
 
Nixi presentation-
Nixi presentation-Nixi presentation-
Nixi presentation-
Shaily Gaur
 
NIXI-Presentation-
NIXI-Presentation-NIXI-Presentation-
NIXI-Presentation-
Shaily Gaur
 
IPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government AgenciesIPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government Agencies
APNIC
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
PhilSmith151163
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco Canada
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
APNIC
 
i4Trust - Overview
i4Trust - Overviewi4Trust - Overview
i4Trust - Overview
FIWARE
 
i4Trust - Overview
i4Trust - Overviewi4Trust - Overview
i4Trust - Overview
FIWARE
 
ION Costa Rica Opening Slides
ION Costa Rica Opening SlidesION Costa Rica Opening Slides
ION Costa Rica Opening Slides
Deploy360 Programme (Internet Society)
 
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
 
ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013
OneWebDay, Inc.
 

Similar to ICANN Engagement Update (20)

Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
 
Icann presentation (general)
Icann presentation (general)Icann presentation (general)
Icann presentation (general)
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
3. icann policy slidesv1
3. icann policy slidesv13. icann policy slidesv1
3. icann policy slidesv1
 
ICANN APAC Update
ICANN APAC UpdateICANN APAC Update
ICANN APAC Update
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Nixi presentation-
Nixi presentation-Nixi presentation-
Nixi presentation-
 
NIXI-Presentation-
NIXI-Presentation-NIXI-Presentation-
NIXI-Presentation-
 
IPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government AgenciesIPv6 Adoption by ASEAN Government Agencies
IPv6 Adoption by ASEAN Government Agencies
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 
i4Trust - Overview
i4Trust - Overviewi4Trust - Overview
i4Trust - Overview
 
i4Trust - Overview
i4Trust - Overviewi4Trust - Overview
i4Trust - Overview
 
ION Costa Rica Opening Slides
ION Costa Rica Opening SlidesION Costa Rica Opening Slides
ION Costa Rica Opening Slides
 
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
 
ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013
 

More from Bangladesh Network Operators Group

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
Bangladesh Network Operators Group
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
Bangladesh Network Operators Group
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
Bangladesh Network Operators Group
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
Bangladesh Network Operators Group
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
Bangladesh Network Operators Group
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
Bangladesh Network Operators Group
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
Bangladesh Network Operators Group
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
Bangladesh Network Operators Group
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
Bangladesh Network Operators Group
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Bangladesh Network Operators Group
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
Bangladesh Network Operators Group
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
Bangladesh Network Operators Group
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
Bangladesh Network Operators Group
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
Bangladesh Network Operators Group
 

More from Bangladesh Network Operators Group (20)

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 

Recently uploaded

How Salesforce Development in the UK is Driving Digital Transformation
How Salesforce Development in the UK is Driving Digital TransformationHow Salesforce Development in the UK is Driving Digital Transformation
How Salesforce Development in the UK is Driving Digital Transformation
Sweet Potato Tec
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
APNIC
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptxDraya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
ashishkumarrana9
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
Thierry TROUIN ☁
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
shamrisumri
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
Preston University
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
cenocb
 
Digital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade communityDigital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade community
Piotr Siuda
 
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
shamrisumri
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
mahigarg2024#G05
 
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECTUse of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Edward Blurock
 
optimized green synthesis characterization and evaluation
optimized green synthesis characterization and evaluationoptimized green synthesis characterization and evaluation
optimized green synthesis characterization and evaluation
ManojKumarr75
 
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
elbertablack
 
Top 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docxTop 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docx
analyticsinsightmaga
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
exchangeid32
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
Edward Blurock
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
Lumiverse Solutions Pvt Ltd
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
exgf28
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
DEWANSTUDIO.COM
 

Recently uploaded (20)

How Salesforce Development in the UK is Driving Digital Transformation
How Salesforce Development in the UK is Driving Digital TransformationHow Salesforce Development in the UK is Driving Digital Transformation
How Salesforce Development in the UK is Driving Digital Transformation
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptxDraya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
 
Digital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade communityDigital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade community
 
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
 
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECTUse of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
 
optimized green synthesis characterization and evaluation
optimized green synthesis characterization and evaluationoptimized green synthesis characterization and evaluation
optimized green synthesis characterization and evaluation
 
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
 
Top 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docxTop 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docx
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
 

ICANN Engagement Update

  • 1. ICANN Engagement Update Champika Wijayatunga | bdNOG3 - Bangladesh | 18 May 2015
  • 2. | 2 Internet Corporation for Assigned Names and Numbers (ICANN) Dedicated to keeping Internet Secure, Stable and Interoperable 1 2 3 Formed in 1998 as a not-for-profit public- benefit cooperation Follows multistakeholder model
  • 3. | 3 Functions that ICANN Coordinates + Domain Name System (DNS) + Internet Protocol (IP) Address and Autonomous System Number (AS) Allocation + Protocol-Parameter Registry + Root Server Systems + Generic Top-Level Domain Names (gTLD) system management + Country-code Top-Level Domain Name (ccTLD)
  • 4. | 4 Business Government & Governmental Organizations Civil Society Domain Name Business Internet Users Academic Technical ICANN’s Global Multistakeholder Community •  Private-sector companies •  Trade associations •  National governments •  Distinct economies recognized in international fora •  Multinational governmental and treaty organizations •  Public authorities (including UN agencies with a direct interest in global Internet Governance) •  Academic leaders •  Institutions of higher learning •  Professors •  Students •  Internet engineers •  Software developers •  Programmers •  Network operators •  Non-governmental Organizations •  Non-profits •  Think Tanks •  Charities •  Registries •  Registrars •  Domain organizations
  • 5. | 5 POLICY / ADVICE The ICANN Community At Work Security & Stability Advisory Committee Address Supporting Organization At-Large Advisory Committee Government Advisory Committee Country Codes Names Supporting Organization Generic Names Supporting Organization Root Server System Advisory Committee The Bottom-Up Multistakeholder Model The collective efforts of the ICANN community culminate in a common shared goal: A single, interoperable Internet supported by stable, secure and resilient unique identifier systems Busines s Government & Government al Organization s Civil Society Domain Name Business Internet Users Academic Technical
  • 6. | 6 DNS Hierarchy – Root Servers + ICANN is the L-Root Operator + L-Root nodes keep Internet traffic local and resolve queries faster + Make it easier to isolate attacks + Reduce congestion on international bandwidth
 + Redundancy and load balancing with multiple instances
  • 8. | 8 .futbol .brand .みんな .公益 .онлайн .ceo .paris .menu .cab ⌃ 22  1300 gTLDs generic Top-Level Domains (gTLDs) will quickly expand to over,1,300 currently over 500 rolled out New gTLDs!
  • 9. | 9 Africa Europe 273 gTLDs North America Latin America/ Caribbean Islands 575+ New gTLDs Delegated Asia/Australia/ Pacific Islands 56 gTLDs 6 gTLDs 93 gTLDs 159 gTLDs As of 16 April 2015
  • 10. | 10 Unique Identifiers and SSR Need + SSR – Security, Stability and Resiliency + Misuse of and attacks against the DNS and global networks challenge overall unique identifier security –  Affect the broad range of users, individuals, businesses, civil society, governments etc. + Security in the context of the Internet's unique identifiers should be addressed through a healthy Internet ecosystem. –  an Internet that is sustainable or healthy, stable and resilient
  • 11. | 11 Security, Stability, & Resiliency (SSR) A key pillar of ICANN Threat Awareness and Response Identifier SSR Analytics Trust-based Collaboration Capability Building The Internet – our “Network of Networks” ICANN   Gov   Law   Enforcem ent   Domain   Operators   Regional   Internet   Registries   CERTs   Network   Operators  
  • 12. | 12 Making the DNS Secure + A computer sends a question to a DNS server, like “where is www.example.org?” + It receives an answer and assumes that it is correct. + There are multiple ways that traffic on the Internet can be intercepted and modified, so that the answer given is false.
  • 13. | 13 ICANN strongly supports DNSSEC + Cyber security is becoming a greater concern to enterprises, government, and end users. DNSSEC is a key tool and differentiator. + DNSSEC is the biggest security upgrade to Internet infrastructure in over 20 years. It is a platform for new security applications (for those that see the opportunity). + DNSSEC infrastructure deployment has been brisk but requires expertise. Getting ahead of the curve is a competitive advantage.
  • 14. | 14 DNSSEC ccTLD Map https://rick.eng.br/dnssecstat/
  • 16. | 16 How about Registrations? Importance of WHOIS from a Security point of view + whois.icann.org + Registration Data Directory Service - Database containing records of information + Verification of records - Sponsoring Registrar - Domain Name Servers - Domain Status - Creation/Expiry Dates - Point of Contacts - DNSSEC Data
  • 17. | 17 IPv6 deployment, adoption and security + IPv4 address exhaustion +  IPv6 as solution + IP addresses are key to allow devices to find each other +  Mobile Internet +  Internet of Things +  Smart Nations + ICANN supports IPv6 +  Partner to promote awareness +  Capacity building with community
  • 18. | 18 SSR Capability Building •  Training and Outreach –  Security, operations, and DNS/DNSSEC deployment training •  for TLD registry operators •  Network Operators / ISPs •  Enterprises, Corporates etc. –  Information gathering to identify Internet Identifier Systems abuse/misuse and Investigation Techniques •  Law Enforcement Agencies •  CERTs •  Internet Investigators etc. Capability Building DNS Training •  Security •  DNS Operations •  Abuse/Misuse Knowledge Transfer •  Europol •  Interpol •  RIRs
  • 19. | 19 Participation in ICANN + Open to entire Internet ecosystem + Receive updates via MyICANN + Join public comment forum on ICANN’s web site + Attend ICANN’s public meetings in person or online + Join one of ICANN’s Supporting Organizations or Advisory Committees
  • 20. | 20 ICANN Fellowship Program – Join Us! + Program Goals + Awareness: Engage representatives from developing nations + Participation: Build capacity within ICANN community + Contribution: Create a broader base of knowledgeable constituents
  • 21. | 21 ICANN APAC Hub! + Regional Office in Singapore + Registry/Registrar services + Contractual Compliance + Security + Engagement + Legal, Finance, HR
  • 22. | 22 Email: champika.wijayatunga@icann.org ICANN Website: icann.org Thank You and Questions gplus.to/icann weibo.com/ICANNorg flickr.com/photos/icann slideshare.net/icannpresentations twitter.com/icann facebook.com/icannorg linkedin.com/company/icann youtube.com/user/icannnews Engage with ICANN