APTLD & MYNIC JOINT SURVEY
|
|
- Gillian Linda Booker
- 5 years ago
- Views:
Transcription
1 INTERNET SECURITY & CCTLDS SURVEY RESULTS 24 th June 2008, Tuesday ccnso meeting, Paris, France
2 Survey Objectives Survey Summary:- For APTLD members to examine the roles and responsibilities of cctlds in Internet security. This survey is on security-related issues when it comes to the registration and renewal of domain names, with a particular focus on fast flux & phishing. The objective of this survey is to facilitate an exchange of information share best practices Assess how cctlds can cooperate & work closely with their respective CERTs on preventing & tackling phishing incidents Assess how cctlds can improve on the security level for customers of domain names Assess what are the security issues currently faced by cctlds 2
3 Q1 No 31.8% Do you have restrictions on who can register a name? Yes 68.2% 3
4 Q2 No, 28.6% Do you or your Registrar or Reseller validate the details of registrants? Yes, 71.4%
5 Q3 Others 13.6% Every Twelve Hours or Less Every Four Hours or Less Every Hour or Less 13.6% 9.1% How often do you update your zone file? 27.3% Dynamically 36.4%
6 Q4 Registrants 52.4% Resellers 28.6% Registrars 52.4%
7 Q5 What does Internet Security mean to you? Protecting the Registry System 100% Protecting Registrants' Information 95.5% Protecting Domain Names 72.7%
8 Q6 Q6 No 9.1% Yes, 90.9%
9 Q7 By fax & letter 35.3% Registrant address & password 29.4% Username & password 82.4%
10 Q8 Yes, 29.4% No, 70.6%
11 Q9 11
12 Q % Request via telephone 54.5% Request via fax or letter Request Online & autogenerated to registrant address 72.7%
13 Q11 Via hard copy verification through fax, 15.4% Via verification 84.6%
14 Q12 Yes, 100%
15 Q13 No 28.6% Yes 71.4%
16 Q14 Via fax 86.7% Via 26.7% Via online form with username & password 33.3%
17 Q % The cctld checks directly with the company or business registry 70.6% Through supporting documents (relevant company or business registration certificates) provided via fax or mail by the registrant 23.5% No verification
18 Q16 IP addresses 71.4% Primary & Secondary Nameservers 85.7% TC's password 57.1% TC's mailing address, fax & telephone numbers and address 78.6% BC's password 50% BC mailing address, fax & telephone numbers and address AC's password 71.4% 78.6% AC mailing address, fax & telephone numbers and address Registrant mailing address, fax & telephone numbers 85.7% 92.9%
19 Q17 Q17 IP addresses Primary & Secondary Nameservers 91.7% 100% TC's password 66.7% TC's mailing address, fax & telephone numbers and address 91.7% BC's password BC's mailing address, fax & telephone numbers and address AC's password AC mailing address, fax & telephone numbers and address Registrant mailing address, fax & telephone numbers and address 41.7% 41.7% 33.3% 50% 41.7%
20 Q18 Supporting documents (relevant company or business registration certificates) provided by fax or mail by new Registrant 75% 91.7% Written authorization from existing Registrant
21 Q19 Registrant via AC 70.6% Reseller 23.5% Registrar 70.6% Registry 76.5%
22 Q20 Letter request via fax & postal mail 50% AC address and password 28.6% AC username and password 28.6% Registrar-Lock 21.4% EPP authinfo codes 42.9%
23 Q21 Yes, 10% No, 90%
24 Q22 A (address) 100% Name servers 33.3%
25 Q23 No 45% Yes 55%
26 Q24 We haven't had names used for phishing, 35.7% Domain names registered by phishers, 64.3%
27 Q25 Impersonation that leads to unauthorized transfer of domain name from rightful registrant to another party, 6.7% Unauthorized DNS configuration changes to Name servers, 6.7% We haven't had any form of Domain Hijacking 86.7%
28 Q26 Q26 Suspend/Delete the domain name 38.5% Notify CERT 15.4% Notify regulatory authority 46.2% Notify registrar 61.5% Notify registrant 53.8%
29 Q27 Members of the public 53.8% Government agents (e.g. regulatory authority) 38.5% Victims (end-users) 61.5% Affected companies (e.g. genuine banks or financial companies impersonated by the phishers) CERTs 53.8% 76.9% Registrar 23.1% Registrant 30.8%
30 Q28 Investment 16.7% Shopping 25% Banking 91.7%
31 Q29 Q29 50% Part of the URL e.g. abcbank.tld/w eb/bank.html Homograph of ASCII domain name e.g. "bank.tld" w here the letter "a" has been faked w ith Russian substitute 20% 40% On subdomain level of the TLD e.g. phishing.abcbank.tld Typo-error of the domain name e.g. "abcbakn.tld" instead of "abcbank.tld" 70% Variations of the domain name e.g. "abcdbank.tld" instead of "abcbank.tld" 40%
32 Q30 Q30 Q30 Directive from regulatory or government authority 76.9% 76.9% Court order Don't suspend/delete at all 7.7%
33 Q31 No, 11.8% Yes, 88.2%
34 Q32 Support legislation against spamming/phishing 50% Cooperate and work closely with CERTs 44.4% Deploy DNSSEC for domain names delegation 22.2% Adopt anti-phishing tools at network level 16.7% Educate registrants on protecting their passwords and address 44.4% Educate registrants on maintaining the accuracy of their contact information 55.6% Hide WHOIS display of BC address 27.8% Hide WHOIS display of AC address 33.3% Strengthen identity verification of Registrant 61.1%
35 Conclusion: Top 5 critical security issues in cctlds mind 2. Spam 5. Cybercrime DDOS attacks 4. Protection of Personal Data 4 3 APTLD & MYNIC JOINT SURVEY 3. Fast Flux & Double Flux
36 22 RESPONDENTS FROM 19 APTLD MEMBERS & ccnso for Phishing survey Presentation by MYNIC Berhad
DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific
DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root
More informationProtecting High Value Domains
Protecting High Value Domains SSAC Public Meeting ICANN Cairo 2008 1 What is a high value domain? Working definition: high value domain (HVD) One or a set of names which define an organization's online
More informationSSAC Public Meeting Paris. 24 June 2008
SSAC Public Meeting Paris 1 in Phishing Attacks 2 What is? A phishing attack The attacker impersonates a registrar The phish emails are sent to The registrar's customers (bulk) A particular, targeted customer
More information1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services
MarkMonitor Services Our operating information for all MarkMonitor products and services is outlined below. References in this document to MarkMonitor means the Clarivate entity identified in the order
More informationDRAFT: gtld Registration Dataflow Matrix and Information
DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow
More informationIntroduction. Prepared by: ICANN Org Published on: 12 January 2018
Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January
More informationIMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.
IMPORTANT SECURITY CHANGES We are replacing the existing enhanced authentication. All users will be required to reenroll in enhanced authentication. When you are prompted to reenroll, you will be asked
More informationExplanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention
Data Element Data Element Potentially Legitimate purposes for Collection/Retention 1.1.1. First and last name or full legal name of Registrant 1.1.2. First and last name or, in the event Registrant is
More informationOnboard with GoDaddy Questionnaire
Onboard with GoDaddy Questionnaire Please answer the questions below for each of your TLDs, choosing from the response options noted to the right of the question and adding additional detail where reques
More informationDraft Applicant Guidebook, v3
Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationInternet Corporation for Assigned Names & Numbers - Internet Assigned Numbers Authority Update
Internet Corporation for Assigned Names & Numbers - Internet Assigned Numbers Authority Update PacNOG 3, Rarotonga Save Vocea Regional Liaison - Australasia/Pacific 17 June 2007 ICANN Mission To coordinate,
More informationPrivacy Policy and WHOIS Data
Privacy Policy and WHOIS Data Title Page 1. Purpose of Policy 3 2. Principles 3 3. Collection and Use of Personal Information 4 4. Disclosure of Personal Information 4 5. Application for Obtaining, Registering
More informationDomain Name Hijacking A Preliminary Report. Security and Stability Advisory Committee Mar del Plata April 5, 2005
Domain Name Hijacking A Preliminary Report Security and Stability Advisory Committee Mar del Plata April 5, 2005 1 Headlines Panix.com was hijacked on 15 Jan 2005 action returned it after 48 hours Gaining
More informationFAQ. Usually appear to be sent from official address
FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address
More informationClientNet. Portal Admin Guide
ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language
More informationAugust 2009 Report #22
August 2009 Report #22 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This report
More informationDOMAIN NAMES. Manage Domains
DOMAIN NAMES Manage Domains The Manage Domains page displays a list of your registered domain names. All domain purchases are automatically renewed at the end of their registration period, unless you instruct
More informationContractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50
Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process
More informationImproving Domain Names Utilization
Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q &
More informationIntellectual Property Constituency (IPC)
Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions
More informationPURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA
PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA The GDPR requires that the collection and processing of personal data be for specified, explicit and legitimate purposes. (Article 5(1)(b).
More informationFRED open source registry system..cz.nic, z.s.p.o >Jaromír Talíř /
FRED open source registry system.cz.nic, z.s.p.o >Jaromír Talíř >jaromir.talir@nic.cz 2008.4.8 /http://www.nic.cz http://fred.nic.cz 1 Agenda History and overview )Primary features )registration process
More informationGlobal Phishing Survey 2H2009
Global Phishing Survey 2H2009 Greg Aaron Rod Rasmussen Released May 11, 2010 http://apwg.org/reports/apwg_globalphishingsurvey_2h2009.pdf Goals Study domain names and URLs to: Provide a consistent benchmark
More informationContractual ICANN. An Overview for Newcomers 11 March 2012
Contractual Compliance @ ICANN An Overview for Newcomers 11 March 2012 2 Agenda q What is contractual compliance? q How we ensure and enforce registry and registrar compliance q Why it matters? ICANN Organization
More informationPhishing Read Behind The Lines
Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and
More informationMeasures to Protect Domain Registration Services against Exploitation or Misuse. June 2009 Dave Piscitello ICANN SSAC
Measures to Protect Domain Registration Services against Exploitation or Misuse June 2009 Dave Piscitello ICANN SSAC What instigated this work? Attacks against domain registration accounts and registrars
More informationgtld Registrar Manual Part I : Quickstart
gtld Registrar Manual Part I : Quickstart Version 1.0 Copyright Ó 2016 DNS Belgium vzw/asbl 1 Table of contents Table of contents... 2 1 Introduction... 3 1.1. Purpose... 3 1.2. Overview... 3 1.3 Document
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationAfilias DNSSEC Practice Statement (DPS) Version
Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.
More informationIncident Response WG Status
Incident Response WG Status Joerg Schweiger WG Chair Cartagena, December 2010, ICANN ccnso Meeting Charter Purpose assist in implementing sustainable mechanisms
More informationSponsor s Monthly Report for.coop TLD
Sponsor s Monthly Report for.coop TLD Reporting period: May 2011 In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1
More informationNetwork Security Part 3 Domain Name System
Network Security Part 3 Domain Name System Domain Name System The$domain$name$system$(DNS)$is$an$applica6on7layer$ protocol$$for$mapping$domain$names$to$ip$addresses$ DNS www.example.com 208.77.188.166
More informationBLOCK 1. General Company Data
Professional Solvency Form BLOCK 1. General Company Data 1. Name of your company: 2. Postal address: 3. Year established: 4. Main activity: 5. Indicate the mission and vision of your company: 6. Indicate
More informationAPWG Global Phishing Survey 2H2010
APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers
More informationPresident s Report 2009
President s Report 2009 Paul Twomey, President and CEO Public Forum 2 March 2009 At Large Summit New gtld Program IDN cctld Fast Track 2010 Operating Plan and Budget Improving Institutional Confidence
More informationREGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION
REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION [Note: ICANN will be proposing updated language regarding the term Whois to comply with SSAC recommendations. The updated language will not represent
More informationOnboarding guide for new gtlds operated by Afnic
ONBOARDING GUIDE FOR NEW GTLDS OPERATED BY AFNIC July 23 rd, 2013 1 Onboarding guide for new gtlds operated by Afnic.alsace,.aquitaine,.bzh,.corsica,.paris - Version 1 - July 23rd, 2013 ONBOARDING GUIDE
More informationProposed Interim Model for GDPR Compliance-- Summary Description
Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models
More informationReport on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008
Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report ccnso Meeting June 24, 2008 Agenda Introduction of HKIRC/HKDNR and.hk Domain Figure of Phishing and Spamvertising Common Patterns
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationWhois Study Table Updated 18 February 2009
Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter
More informationDNSSEC Facts or fiction? CZ.NIC Pavel Tuma
DNSSEC Facts or fiction? CZ.NIC Pavel Tuma pavel.tuma@nic.cz 4. 3. 2009 1 No DNSSEC, because... No business model? Useless until majority of domains is signed? Registrars not interested? End users not
More informationStealing digital information
Stealing digital information Financial and personal perspective SUMMER SCHOOL 2014 Stealing information on the Internet is on the rise It might have negative effects on many aspects of our everyday life
More informationThis descriptive document is intended as the basis for creation of a functional specification for 2
Introduction & Overview This document provides a framework for the rapid implementation of a certification and access 1 model for non-public Whois data for legitimate and lawful purposes.this model specifically
More informationOctober 2009 Report #24
October 2009 Report #24 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This report
More informationVersion 2.0 DOMAIN NAME POLICIES
Version 2.0 DOMAIN NAME POLICIES Contents Contents... 2 1. Introduction and Purpose... 3 2. Definitions... 4 3. General Provisions... 6 3.1 Registration of XYZ Domain Names... 6 3.2 Requirements for Application...
More informationAbuse Management System (AMS) Mon-Loi Perez Associate Consultant Singapore Network Information Centre Pte. Ltd. (SGNIC)
Abuse Management System (AMS) Mon-Loi Perez Associate Consultant Singapore Network Information Centre Pte. Ltd. (SGNIC) 24 March 2014 Agenda About SGNIC Types of Abuse Measures (AMS) Statistics and Experiences
More informationWebomania Solutions Pvt. Ltd. 2017
The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.
More informationRegistry Internet Safety Group (RISG)
Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,
More informationAll about.au. Chris Wright CTO AusRegistry International ICANN no. 35, Sydney, Australia 22 nd June 2009
All about.au Chris Wright CTO AusRegistry International ICANN no. 35, Sydney, Australia 22 nd June 2009 AusRegistry International Located in Melbourne, Australia Involved in Domain Name Industry since
More informationIs the WHOIS service a source for addresses for spammers?
Is the WHOIS service a source for email addresses for spammers? SSAC Meeting 25 June 2007 rmohan@afilias.info - Ram Mohan dave.piscitello@icann.org - Dave Piscitello Objectives Study the correlation between
More informationSummary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,
January 31, 2014 Jo Lim Chief Operations and Policy Officer Dear Jo, Thanks for the opportunity to make a submission to the auda Whois Issues Paper 2013. The views expressed in this submission are held
More informationRegistration Guidelines. for.be
Registration Guidelines for.be Part III: Registrar site 18 October 2018 1 TABLE OF CONTENTS Part III: WEB interface TABLE OF CONTENTS...2 MY REGISTRATIONS...4 LOG IN...4 GENERAL FORMAT...5 PROFILE MANAGEMENT
More informationDNS and cctld Management. Save Vocea and Champika Wijayatunga Apia Samoa July 2015
DNS and cctld Management Save Vocea and Champika Wijayatunga Apia Samoa 14-15 July 2015 Agenda 1 2 3 Intro to ICANN DNS Concepts Root Server Operation 4 5 6 Managing Zones cctld Management Security, Stability
More informationThe Internet Big Bang: Implications for Financial Services Brand Owners
The Internet Big Bang: Implications for Financial Services Brand Owners Tony Onorato, Alexis Hunter September 12, 2013 Who We Are & What We Do Tony Onorato and Alexis Hunter are long-time commercial litigators
More informationACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0
ACCEPTABLE USE AND TAKEDOWN POLICY Version 1.0 ("Acceptable Use Policy") What is in the Acceptable Use Policy? As the owner of a domain name, you are required to act responsibly in your use of that domain
More informationBest Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake
Best Practices in Public Information Management in Sri Lanka Presented by Nimal Athukorala D.C. Dissanayake Content Objectives Method of Information Management Case Study- GIC Call Center GIC Web Portal
More informationSponsor s Monthly Report for.coop TLD
Sponsor s Monthly Report for.coop TLD Reporting period: November In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1
More informationRadix Acceptable Use and Anti-Abuse Policy
Radix Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries ( Radix ) arecommitted to the stable and secure operation of its top-level domains ( TLDs ). Abusive use
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More informationAfrican Domain Name System Market Study 2016
African Domain Name System Market Study 2016 54 African countries, including 6 Indian and Atlantic Ocean Islands Identify strengths and weaknesses in the industry ecosystem within the region Develop recommendations
More information2016 APNIC Survey Results Asia Pacific Network Information Centre
2016 APNIC Survey Results Asia Pacific Network Information Centre Conducted and prepared by Survey Matters. Agenda Survey Process and Methodology 3 Participation and Service Satisfaction 6 Respondents
More information.rio Registration Policies 2016 Dec 16
.rio Registration Policies 2016 Dec 16 Empresa Municipal de Informática SA [IPLANRIO], the registry for.rio domains, requires all registrants to abide by the policies detailed below or any successor policy
More informationAnti-Phishing Working Group
Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies
More informationTABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Release version May- 03
ICANN Pre- Delegation Testing System A User s Guide Release version 1.5 2013- May- 03 TABLE OF CONTENTS 1 Introduction... 2 2 Activate your account and log in... 3 3 Application overview and status...
More informationENUM in LITHUANIA or how we started ENUM registry because I wanted my NAPTRs published
ENUM in LITHUANIA or how we started ENUM registry because I wanted my NAPTRs published ENUM-WG RIPE 61 @ Rome Ričardas Pocius CTO - JSC Mano numeris ricardas.pocius@numeris.lt About the company We are
More informationAdvisory Concerning Inter-Registrar Transfer Policy. 23 August 2007
Advisory Concerning Inter-Registrar Transfer Policy 23 August 2007 The purpose of this advisory is to assist ICANN-accredited registrars and domain-name registrants in understanding how the Inter-Registrar
More informationImpacts of the GDPR in Afnic - Registrar relations: FAQ
Impacts of the GDPR in Afnic - Registrar relations: FAQ Background The adoption of Regulation (Eu) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural
More informationWHOIS High-Level Technical Brief
WHOIS High-Level Technical Brief Background When the predecessor to the Internet (the ARPANet) was first being developed, it was quickly determined that there needed to be a contact list of the researchers
More informationOne World. One Internet.
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 DRAFT PLAN One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide
More informationDomain Name Hijacking. Security and Stability Advisory Committee Luxembourg 12 July 2005
Domain Name Hijacking Security and Stability Advisory Committee Luxembourg 12 July 2005 1 Speakers Steve Crocker, Chair Bruce Tonkin, CTO MelbourneIT Rodney Joffe, Chairman & CTO, UltraDNS Ram Mohan, CTO
More informationICANN Naming Services portal User s Guide
ICANN Naming Services portal User s Guide ICANN Product Team 25 September 2017 ICANN ICANN Naming Services portal User s Guide September 2017 1 TABLE OF CONTENTS REVISION HISTORY 4 CONTACT US 4 1 INTRODUCTION:
More informationGNSO Issues Report on Fast Flux Hosting
GNSO STATUS OF THIS DOCUMENT This is the requested by the GNSO Council. SUMMARY This report is submitted to the GNSO Council in response to a request received from the Council pursuant to a Motion proposed
More informationDNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager
DNSSEC in Sweden: Five Years of Practical Experience Anne-Marie Eklund Löwinder Quality and Security Manager Amel@iis.se http://www.iis.se What s the problem Up until recently, DNSSEC looked like a solution
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationDraft Applicant Guidebook, v4
Draft Applicant Guidebook, v4 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationStrategic Plan Consulta1on
Strategic Plan Consulta1on Rod Beckstrom President and CEO October 2009 Overview of today s session How has this current dra9 been created? A new framework for strategic planning: mission, four areas of
More informationAnti-Phishing Working Group
Anti-Phishing Working Group www.antiphishing.org Fall 2008 Phishing Update ICANN ccnso Cairo, Egypt, November 5, 2008 Rod Rasmussen Co-Chair Internet Policy Committee of the APWG President & CTO, Internet
More informationFast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009
Fast Flux Hosting Final Report GNSO Council Meeting 13 August 2009 1 January 2008: SAC 025 Fast Flux Hosting and DNS Characterizes Fast Flux (FF) as an evasion technique that enables cybercriminals to
More informationDotSport Registration Policy
DotSport Registration Policy Title: Registration Policy Version Control: Validated on 15-04-2018 Date of Implementation: 15-04-2018 1. Summary 4 2. Definitions 5 3. Acceptance of this Registration Policy
More information3. What is the name of the organisation that runs your business registry?
Sida 1 av 20 International Business Registers Survey 2016 Questions in this survey should be answered for the period January 1 to December 31, 2016, unless otherwise specified. The survey is accompanied
More informationcctld Best Practices & Considerations John Crain Internet Corporation for Assigned Names and Numbers
cctld Best Practices & Considerations John Crain Internet Corporation for Assigned Names and Numbers cctld as a public trust cctlds are designated to operators who will operate them in the best interests
More informationRoot Management Update
Root Management Update San Francisco, USA March 2011 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers IANA NOI Notice of Inquiry IANA Contract expires later in 2011
More informationICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49
ICANN Contractual Compliance IPC Mee(ng Tuesday, 25 March 2014 1 Agenda! Compliance General Update! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore and Turkey" Ø Completed 2013
More informationCOUNTERING COUNTERING SPAM IN A DIGITAL WORLD
IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam
More informationAttachment 3..Brand TLD Designation Application
Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program
More informationFRED open source registry solution. Jaromir Talir
FRED open source registry solution Jaromir Talir jaromir.talir@nic.cz Agenda CZ.NIC story FRED overview Deployments Data model Interfaces Features CZ.NIC story - year 2005 CZ.NIC had 4 employees Number
More informationgtld Applicant Guidebook (v ) Module 5
gtld Applicant Guidebook (v. 2012-06-04) Module 5 4 June 2012 This module describes the final steps required of an applicant for completion of the process, including execution of a registry agreement with
More informationAutoDNS Manual Version 9.0 September InterNetX GmbH
USER MANUAL AutoDNS Manual Version 9.0 September 2016 1998-2016 InterNetX GmbH Text, content, design and the arrangement of this manual are subject to the protection of copyright laws. You may only use
More informationDecember 2009 Report #26
December 2009 Report #26 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This
More informationKeeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson
Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson olafur@cloudflare.com How long does it take to? Post a new selfie on Facebook and all your friends to be notified few seconds
More informationICANN STRATEGIC PLAN JULY 2011 JUNE 2014
ICANN STRATEGIC PLAN JULY 2011 JUNE 2014 ICANN One World. One Internet. ICANN is a global organization that coordinates the Internet unique identifier systems for worldwide public benefit, enabling a single,
More informationIt Internationalized ti Domain Names W3C Track: An International Web
It Internationalized ti Domain Names W3C Track: An International Web Tina Dam ICANN Director, IDN Program tina.dam@icann.org 17th International World Wide Web Conference, WWW2008 Beijing International
More informationMARNET Macedonian Academic & Research Network
MARNET Macedonian Academic & Research Network.mk cctld registrar Prof. Dr. Borislav Popovski, Mr. Goran Muratovski, Ms. Marija Manevska http://dns.marnet.net.mk 1 About MARNet MARNet is organizational
More informationgtld Registrar Manual Part III : Registrar Web
gtld Registrar Manual Part III : Registrar Web Copyright Ó 2016 DNS Belgium vzw/asbl 1 Table of contents Table of contents... 2 1 Introduction... 3 1.1. Purpose... 3 2 User management... 3 2.1 Login...
More informationMatters Related to WHOIS
Matters Related to WHOIS DNSO Intellectual Property Constituency - March 3, 2000 Introduction WHOIS is Vital for Effective E-Commerce E-Commerce figures are steadily moving up and off the charts. A study
More informationGeneral Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) & WHOIS at ICANN Savenaca Vocea APNIC 46, Noumea 11 September 2018 About the General Data Protection Regulation (GDPR) The European Union s (EU s) GDPR aims to
More informationLuminous: Bringing Big(ger) Data to the Fight
Luminous: Bringing Big(ger) Data to the Fight Norm Ritchie Drew Bagley ICANN Helsinki June, 2016 Secure Domain Foundation Non-profit Founded in 2014 Proactive mitigation of malicious domains used for cybercrime
More informationInfoblox Dossier User Guide
Infoblox Dossier User Guide 2017 Infoblox Inc. All rights reserved. ActiveTrust Platform Dossier and TIDE - June 2017 Page 1 of 16 1. Overview of Dossier... 3 2. Prerequisites... 3 3. Access to the Dossier
More information