APTLD & MYNIC JOINT SURVEY

Size: px
Start display at page:

Download "APTLD & MYNIC JOINT SURVEY"

Transcription

1 INTERNET SECURITY & CCTLDS SURVEY RESULTS 24 th June 2008, Tuesday ccnso meeting, Paris, France

2 Survey Objectives Survey Summary:- For APTLD members to examine the roles and responsibilities of cctlds in Internet security. This survey is on security-related issues when it comes to the registration and renewal of domain names, with a particular focus on fast flux & phishing. The objective of this survey is to facilitate an exchange of information share best practices Assess how cctlds can cooperate & work closely with their respective CERTs on preventing & tackling phishing incidents Assess how cctlds can improve on the security level for customers of domain names Assess what are the security issues currently faced by cctlds 2

3 Q1 No 31.8% Do you have restrictions on who can register a name? Yes 68.2% 3

4 Q2 No, 28.6% Do you or your Registrar or Reseller validate the details of registrants? Yes, 71.4%

5 Q3 Others 13.6% Every Twelve Hours or Less Every Four Hours or Less Every Hour or Less 13.6% 9.1% How often do you update your zone file? 27.3% Dynamically 36.4%

6 Q4 Registrants 52.4% Resellers 28.6% Registrars 52.4%

7 Q5 What does Internet Security mean to you? Protecting the Registry System 100% Protecting Registrants' Information 95.5% Protecting Domain Names 72.7%

8 Q6 Q6 No 9.1% Yes, 90.9%

9 Q7 By fax & letter 35.3% Registrant address & password 29.4% Username & password 82.4%

10 Q8 Yes, 29.4% No, 70.6%

11 Q9 11

12 Q % Request via telephone 54.5% Request via fax or letter Request Online & autogenerated to registrant address 72.7%

13 Q11 Via hard copy verification through fax, 15.4% Via verification 84.6%

14 Q12 Yes, 100%

15 Q13 No 28.6% Yes 71.4%

16 Q14 Via fax 86.7% Via 26.7% Via online form with username & password 33.3%

17 Q % The cctld checks directly with the company or business registry 70.6% Through supporting documents (relevant company or business registration certificates) provided via fax or mail by the registrant 23.5% No verification

18 Q16 IP addresses 71.4% Primary & Secondary Nameservers 85.7% TC's password 57.1% TC's mailing address, fax & telephone numbers and address 78.6% BC's password 50% BC mailing address, fax & telephone numbers and address AC's password 71.4% 78.6% AC mailing address, fax & telephone numbers and address Registrant mailing address, fax & telephone numbers 85.7% 92.9%

19 Q17 Q17 IP addresses Primary & Secondary Nameservers 91.7% 100% TC's password 66.7% TC's mailing address, fax & telephone numbers and address 91.7% BC's password BC's mailing address, fax & telephone numbers and address AC's password AC mailing address, fax & telephone numbers and address Registrant mailing address, fax & telephone numbers and address 41.7% 41.7% 33.3% 50% 41.7%

20 Q18 Supporting documents (relevant company or business registration certificates) provided by fax or mail by new Registrant 75% 91.7% Written authorization from existing Registrant

21 Q19 Registrant via AC 70.6% Reseller 23.5% Registrar 70.6% Registry 76.5%

22 Q20 Letter request via fax & postal mail 50% AC address and password 28.6% AC username and password 28.6% Registrar-Lock 21.4% EPP authinfo codes 42.9%

23 Q21 Yes, 10% No, 90%

24 Q22 A (address) 100% Name servers 33.3%

25 Q23 No 45% Yes 55%

26 Q24 We haven't had names used for phishing, 35.7% Domain names registered by phishers, 64.3%

27 Q25 Impersonation that leads to unauthorized transfer of domain name from rightful registrant to another party, 6.7% Unauthorized DNS configuration changes to Name servers, 6.7% We haven't had any form of Domain Hijacking 86.7%

28 Q26 Q26 Suspend/Delete the domain name 38.5% Notify CERT 15.4% Notify regulatory authority 46.2% Notify registrar 61.5% Notify registrant 53.8%

29 Q27 Members of the public 53.8% Government agents (e.g. regulatory authority) 38.5% Victims (end-users) 61.5% Affected companies (e.g. genuine banks or financial companies impersonated by the phishers) CERTs 53.8% 76.9% Registrar 23.1% Registrant 30.8%

30 Q28 Investment 16.7% Shopping 25% Banking 91.7%

31 Q29 Q29 50% Part of the URL e.g. abcbank.tld/w eb/bank.html Homograph of ASCII domain name e.g. "bank.tld" w here the letter "a" has been faked w ith Russian substitute 20% 40% On subdomain level of the TLD e.g. phishing.abcbank.tld Typo-error of the domain name e.g. "abcbakn.tld" instead of "abcbank.tld" 70% Variations of the domain name e.g. "abcdbank.tld" instead of "abcbank.tld" 40%

32 Q30 Q30 Q30 Directive from regulatory or government authority 76.9% 76.9% Court order Don't suspend/delete at all 7.7%

33 Q31 No, 11.8% Yes, 88.2%

34 Q32 Support legislation against spamming/phishing 50% Cooperate and work closely with CERTs 44.4% Deploy DNSSEC for domain names delegation 22.2% Adopt anti-phishing tools at network level 16.7% Educate registrants on protecting their passwords and address 44.4% Educate registrants on maintaining the accuracy of their contact information 55.6% Hide WHOIS display of BC address 27.8% Hide WHOIS display of AC address 33.3% Strengthen identity verification of Registrant 61.1%

35 Conclusion: Top 5 critical security issues in cctlds mind 2. Spam 5. Cybercrime DDOS attacks 4. Protection of Personal Data 4 3 APTLD & MYNIC JOINT SURVEY 3. Fast Flux & Double Flux

36 22 RESPONDENTS FROM 19 APTLD MEMBERS & ccnso for Phishing survey Presentation by MYNIC Berhad

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root

More information

Protecting High Value Domains

Protecting High Value Domains Protecting High Value Domains SSAC Public Meeting ICANN Cairo 2008 1 What is a high value domain? Working definition: high value domain (HVD) One or a set of names which define an organization's online

More information

SSAC Public Meeting Paris. 24 June 2008

SSAC Public Meeting Paris. 24 June 2008 SSAC Public Meeting Paris 1 in Phishing Attacks 2 What is? A phishing attack The attacker impersonates a registrar The phish emails are sent to The registrar's customers (bulk) A particular, targeted customer

More information

1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services

1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services MarkMonitor Services Our operating information for all MarkMonitor products and services is outlined below. References in this document to MarkMonitor means the Clarivate entity identified in the order

More information

DRAFT: gtld Registration Dataflow Matrix and Information

DRAFT: gtld Registration Dataflow Matrix and Information DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow

More information

Introduction. Prepared by: ICANN Org Published on: 12 January 2018

Introduction. Prepared by: ICANN Org Published on: 12 January 2018 Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January

More information

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication. IMPORTANT SECURITY CHANGES We are replacing the existing enhanced authentication. All users will be required to reenroll in enhanced authentication. When you are prompted to reenroll, you will be asked

More information

Explanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention

Explanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention Data Element Data Element Potentially Legitimate purposes for Collection/Retention 1.1.1. First and last name or full legal name of Registrant 1.1.2. First and last name or, in the event Registrant is

More information

Onboard with GoDaddy Questionnaire

Onboard with GoDaddy Questionnaire Onboard with GoDaddy Questionnaire Please answer the questions below for each of your TLDs, choosing from the response options noted to the right of the question and adding additional detail where reques

More information

Draft Applicant Guidebook, v3

Draft Applicant Guidebook, v3 Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains

More information

Internet Corporation for Assigned Names & Numbers - Internet Assigned Numbers Authority Update

Internet Corporation for Assigned Names & Numbers - Internet Assigned Numbers Authority Update Internet Corporation for Assigned Names & Numbers - Internet Assigned Numbers Authority Update PacNOG 3, Rarotonga Save Vocea Regional Liaison - Australasia/Pacific 17 June 2007 ICANN Mission To coordinate,

More information

Privacy Policy and WHOIS Data

Privacy Policy and WHOIS Data Privacy Policy and WHOIS Data Title Page 1. Purpose of Policy 3 2. Principles 3 3. Collection and Use of Personal Information 4 4. Disclosure of Personal Information 4 5. Application for Obtaining, Registering

More information

Domain Name Hijacking A Preliminary Report. Security and Stability Advisory Committee Mar del Plata April 5, 2005

Domain Name Hijacking A Preliminary Report. Security and Stability Advisory Committee Mar del Plata April 5, 2005 Domain Name Hijacking A Preliminary Report Security and Stability Advisory Committee Mar del Plata April 5, 2005 1 Headlines Panix.com was hijacked on 15 Jan 2005 action returned it after 48 hours Gaining

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

ClientNet. Portal Admin Guide

ClientNet. Portal Admin Guide ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language

More information

August 2009 Report #22

August 2009 Report #22 August 2009 Report #22 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This report

More information

DOMAIN NAMES. Manage Domains

DOMAIN NAMES. Manage Domains DOMAIN NAMES Manage Domains The Manage Domains page displays a list of your registered domain names. All domain purchases are automatically renewed at the end of their registration period, unless you instruct

More information

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50 Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process

More information

Improving Domain Names Utilization

Improving Domain Names Utilization Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q &

More information

Intellectual Property Constituency (IPC)

Intellectual Property Constituency (IPC) Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions

More information

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA The GDPR requires that the collection and processing of personal data be for specified, explicit and legitimate purposes. (Article 5(1)(b).

More information

FRED open source registry system..cz.nic, z.s.p.o >Jaromír Talíř /

FRED open source registry system..cz.nic, z.s.p.o >Jaromír Talíř / FRED open source registry system.cz.nic, z.s.p.o >Jaromír Talíř >jaromir.talir@nic.cz 2008.4.8 /http://www.nic.cz http://fred.nic.cz 1 Agenda History and overview )Primary features )registration process

More information

Global Phishing Survey 2H2009

Global Phishing Survey 2H2009 Global Phishing Survey 2H2009 Greg Aaron Rod Rasmussen Released May 11, 2010 http://apwg.org/reports/apwg_globalphishingsurvey_2h2009.pdf Goals Study domain names and URLs to: Provide a consistent benchmark

More information

Contractual ICANN. An Overview for Newcomers 11 March 2012

Contractual ICANN. An Overview for Newcomers 11 March 2012 Contractual Compliance @ ICANN An Overview for Newcomers 11 March 2012 2 Agenda q What is contractual compliance? q How we ensure and enforce registry and registrar compliance q Why it matters? ICANN Organization

More information

Phishing Read Behind The Lines

Phishing Read Behind The Lines Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and

More information

Measures to Protect Domain Registration Services against Exploitation or Misuse. June 2009 Dave Piscitello ICANN SSAC

Measures to Protect Domain Registration Services against Exploitation or Misuse. June 2009 Dave Piscitello ICANN SSAC Measures to Protect Domain Registration Services against Exploitation or Misuse June 2009 Dave Piscitello ICANN SSAC What instigated this work? Attacks against domain registration accounts and registrars

More information

gtld Registrar Manual Part I : Quickstart

gtld Registrar Manual Part I : Quickstart gtld Registrar Manual Part I : Quickstart Version 1.0 Copyright Ó 2016 DNS Belgium vzw/asbl 1 Table of contents Table of contents... 2 1 Introduction... 3 1.1. Purpose... 3 1.2. Overview... 3 1.3 Document

More information

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations

More information

Afilias DNSSEC Practice Statement (DPS) Version

Afilias DNSSEC Practice Statement (DPS) Version Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.

More information

Incident Response WG Status

Incident Response WG Status Incident Response WG Status Joerg Schweiger WG Chair Cartagena, December 2010, ICANN ccnso Meeting Charter Purpose assist in implementing sustainable mechanisms

More information

Sponsor s Monthly Report for.coop TLD

Sponsor s Monthly Report for.coop TLD Sponsor s Monthly Report for.coop TLD Reporting period: May 2011 In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1

More information

Network Security Part 3 Domain Name System

Network Security Part 3 Domain Name System Network Security Part 3 Domain Name System Domain Name System The$domain$name$system$(DNS)$is$an$applica6on7layer$ protocol$$for$mapping$domain$names$to$ip$addresses$ DNS www.example.com 208.77.188.166

More information

BLOCK 1. General Company Data

BLOCK 1. General Company Data Professional Solvency Form BLOCK 1. General Company Data 1. Name of your company: 2. Postal address: 3. Year established: 4. Main activity: 5. Indicate the mission and vision of your company: 6. Indicate

More information

APWG Global Phishing Survey 2H2010

APWG Global Phishing Survey 2H2010 APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers

More information

President s Report 2009

President s Report 2009 President s Report 2009 Paul Twomey, President and CEO Public Forum 2 March 2009 At Large Summit New gtld Program IDN cctld Fast Track 2010 Operating Plan and Budget Improving Institutional Confidence

More information

REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION

REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION [Note: ICANN will be proposing updated language regarding the term Whois to comply with SSAC recommendations. The updated language will not represent

More information

Onboarding guide for new gtlds operated by Afnic

Onboarding guide for new gtlds operated by Afnic ONBOARDING GUIDE FOR NEW GTLDS OPERATED BY AFNIC July 23 rd, 2013 1 Onboarding guide for new gtlds operated by Afnic.alsace,.aquitaine,.bzh,.corsica,.paris - Version 1 - July 23rd, 2013 ONBOARDING GUIDE

More information

Proposed Interim Model for GDPR Compliance-- Summary Description

Proposed Interim Model for GDPR Compliance-- Summary Description Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models

More information

Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008

Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008 Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report ccnso Meeting June 24, 2008 Agenda Introduction of HKIRC/HKDNR and.hk Domain Figure of Phishing and Spamvertising Common Patterns

More information

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of

More information

Whois Study Table Updated 18 February 2009

Whois Study Table Updated 18 February 2009 Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter

More information

DNSSEC Facts or fiction? CZ.NIC Pavel Tuma

DNSSEC Facts or fiction? CZ.NIC Pavel Tuma DNSSEC Facts or fiction? CZ.NIC Pavel Tuma pavel.tuma@nic.cz 4. 3. 2009 1 No DNSSEC, because... No business model? Useless until majority of domains is signed? Registrars not interested? End users not

More information

Stealing digital information

Stealing digital information Stealing digital information Financial and personal perspective SUMMER SCHOOL 2014 Stealing information on the Internet is on the rise It might have negative effects on many aspects of our everyday life

More information

This descriptive document is intended as the basis for creation of a functional specification for 2

This descriptive document is intended as the basis for creation of a functional specification for 2 Introduction & Overview This document provides a framework for the rapid implementation of a certification and access 1 model for non-public Whois data for legitimate and lawful purposes.this model specifically

More information

October 2009 Report #24

October 2009 Report #24 October 2009 Report #24 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This report

More information

Version 2.0 DOMAIN NAME POLICIES

Version 2.0 DOMAIN NAME POLICIES Version 2.0 DOMAIN NAME POLICIES Contents Contents... 2 1. Introduction and Purpose... 3 2. Definitions... 4 3. General Provisions... 6 3.1 Registration of XYZ Domain Names... 6 3.2 Requirements for Application...

More information

Abuse Management System (AMS) Mon-Loi Perez Associate Consultant Singapore Network Information Centre Pte. Ltd. (SGNIC)

Abuse Management System (AMS) Mon-Loi Perez Associate Consultant Singapore Network Information Centre Pte. Ltd. (SGNIC) Abuse Management System (AMS) Mon-Loi Perez Associate Consultant Singapore Network Information Centre Pte. Ltd. (SGNIC) 24 March 2014 Agenda About SGNIC Types of Abuse Measures (AMS) Statistics and Experiences

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Registry Internet Safety Group (RISG)

Registry Internet Safety Group (RISG) Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,

More information

All about.au. Chris Wright CTO AusRegistry International ICANN no. 35, Sydney, Australia 22 nd June 2009

All about.au. Chris Wright CTO AusRegistry International ICANN no. 35, Sydney, Australia 22 nd June 2009 All about.au Chris Wright CTO AusRegistry International ICANN no. 35, Sydney, Australia 22 nd June 2009 AusRegistry International Located in Melbourne, Australia Involved in Domain Name Industry since

More information

Is the WHOIS service a source for addresses for spammers?

Is the WHOIS service a source for  addresses for spammers? Is the WHOIS service a source for email addresses for spammers? SSAC Meeting 25 June 2007 rmohan@afilias.info - Ram Mohan dave.piscitello@icann.org - Dave Piscitello Objectives Study the correlation between

More information

Summary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,

Summary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo, January 31, 2014 Jo Lim Chief Operations and Policy Officer Dear Jo, Thanks for the opportunity to make a submission to the auda Whois Issues Paper 2013. The views expressed in this submission are held

More information

Registration Guidelines. for.be

Registration Guidelines. for.be Registration Guidelines for.be Part III: Registrar site 18 October 2018 1 TABLE OF CONTENTS Part III: WEB interface TABLE OF CONTENTS...2 MY REGISTRATIONS...4 LOG IN...4 GENERAL FORMAT...5 PROFILE MANAGEMENT

More information

DNS and cctld Management. Save Vocea and Champika Wijayatunga Apia Samoa July 2015

DNS and cctld Management. Save Vocea and Champika Wijayatunga Apia Samoa July 2015 DNS and cctld Management Save Vocea and Champika Wijayatunga Apia Samoa 14-15 July 2015 Agenda 1 2 3 Intro to ICANN DNS Concepts Root Server Operation 4 5 6 Managing Zones cctld Management Security, Stability

More information

The Internet Big Bang: Implications for Financial Services Brand Owners

The Internet Big Bang: Implications for Financial Services Brand Owners The Internet Big Bang: Implications for Financial Services Brand Owners Tony Onorato, Alexis Hunter September 12, 2013 Who We Are & What We Do Tony Onorato and Alexis Hunter are long-time commercial litigators

More information

ACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0

ACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0 ACCEPTABLE USE AND TAKEDOWN POLICY Version 1.0 ("Acceptable Use Policy") What is in the Acceptable Use Policy? As the owner of a domain name, you are required to act responsibly in your use of that domain

More information

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake Best Practices in Public Information Management in Sri Lanka Presented by Nimal Athukorala D.C. Dissanayake Content Objectives Method of Information Management Case Study- GIC Call Center GIC Web Portal

More information

Sponsor s Monthly Report for.coop TLD

Sponsor s Monthly Report for.coop TLD Sponsor s Monthly Report for.coop TLD Reporting period: November In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1

More information

Radix Acceptable Use and Anti-Abuse Policy

Radix Acceptable Use and Anti-Abuse Policy Radix Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries ( Radix ) arecommitted to the stable and secure operation of its top-level domains ( TLDs ). Abusive use

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

African Domain Name System Market Study 2016

African Domain Name System Market Study 2016 African Domain Name System Market Study 2016 54 African countries, including 6 Indian and Atlantic Ocean Islands Identify strengths and weaknesses in the industry ecosystem within the region Develop recommendations

More information

2016 APNIC Survey Results Asia Pacific Network Information Centre

2016 APNIC Survey Results Asia Pacific Network Information Centre 2016 APNIC Survey Results Asia Pacific Network Information Centre Conducted and prepared by Survey Matters. Agenda Survey Process and Methodology 3 Participation and Service Satisfaction 6 Respondents

More information

.rio Registration Policies 2016 Dec 16

.rio Registration Policies 2016 Dec 16 .rio Registration Policies 2016 Dec 16 Empresa Municipal de Informática SA [IPLANRIO], the registry for.rio domains, requires all registrants to abide by the policies detailed below or any successor policy

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies

More information

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Release version May- 03

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Release version May- 03 ICANN Pre- Delegation Testing System A User s Guide Release version 1.5 2013- May- 03 TABLE OF CONTENTS 1 Introduction... 2 2 Activate your account and log in... 3 3 Application overview and status...

More information

ENUM in LITHUANIA or how we started ENUM registry because I wanted my NAPTRs published

ENUM in LITHUANIA or how we started ENUM registry because I wanted my NAPTRs published ENUM in LITHUANIA or how we started ENUM registry because I wanted my NAPTRs published ENUM-WG RIPE 61 @ Rome Ričardas Pocius CTO - JSC Mano numeris ricardas.pocius@numeris.lt About the company We are

More information

Advisory Concerning Inter-Registrar Transfer Policy. 23 August 2007

Advisory Concerning Inter-Registrar Transfer Policy. 23 August 2007 Advisory Concerning Inter-Registrar Transfer Policy 23 August 2007 The purpose of this advisory is to assist ICANN-accredited registrars and domain-name registrants in understanding how the Inter-Registrar

More information

Impacts of the GDPR in Afnic - Registrar relations: FAQ

Impacts of the GDPR in Afnic - Registrar relations: FAQ Impacts of the GDPR in Afnic - Registrar relations: FAQ Background The adoption of Regulation (Eu) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural

More information

WHOIS High-Level Technical Brief

WHOIS High-Level Technical Brief WHOIS High-Level Technical Brief Background When the predecessor to the Internet (the ARPANet) was first being developed, it was quickly determined that there needed to be a contact list of the researchers

More information

One World. One Internet.

One World. One Internet. ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 DRAFT PLAN One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide

More information

Domain Name Hijacking. Security and Stability Advisory Committee Luxembourg 12 July 2005

Domain Name Hijacking. Security and Stability Advisory Committee Luxembourg 12 July 2005 Domain Name Hijacking Security and Stability Advisory Committee Luxembourg 12 July 2005 1 Speakers Steve Crocker, Chair Bruce Tonkin, CTO MelbourneIT Rodney Joffe, Chairman & CTO, UltraDNS Ram Mohan, CTO

More information

ICANN Naming Services portal User s Guide

ICANN Naming Services portal User s Guide ICANN Naming Services portal User s Guide ICANN Product Team 25 September 2017 ICANN ICANN Naming Services portal User s Guide September 2017 1 TABLE OF CONTENTS REVISION HISTORY 4 CONTACT US 4 1 INTRODUCTION:

More information

GNSO Issues Report on Fast Flux Hosting

GNSO Issues Report on Fast Flux Hosting GNSO STATUS OF THIS DOCUMENT This is the requested by the GNSO Council. SUMMARY This report is submitted to the GNSO Council in response to a request received from the Council pursuant to a Motion proposed

More information

DNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager

DNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager DNSSEC in Sweden: Five Years of Practical Experience Anne-Marie Eklund Löwinder Quality and Security Manager Amel@iis.se http://www.iis.se What s the problem Up until recently, DNSSEC looked like a solution

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

Draft Applicant Guidebook, v4

Draft Applicant Guidebook, v4 Draft Applicant Guidebook, v4 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains

More information

Strategic Plan Consulta1on

Strategic Plan Consulta1on Strategic Plan Consulta1on Rod Beckstrom President and CEO October 2009 Overview of today s session How has this current dra9 been created? A new framework for strategic planning: mission, four areas of

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Anti-Phishing Working Group www.antiphishing.org Fall 2008 Phishing Update ICANN ccnso Cairo, Egypt, November 5, 2008 Rod Rasmussen Co-Chair Internet Policy Committee of the APWG President & CTO, Internet

More information

Fast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009

Fast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009 Fast Flux Hosting Final Report GNSO Council Meeting 13 August 2009 1 January 2008: SAC 025 Fast Flux Hosting and DNS Characterizes Fast Flux (FF) as an evasion technique that enables cybercriminals to

More information

DotSport Registration Policy

DotSport Registration Policy DotSport Registration Policy Title: Registration Policy Version Control: Validated on 15-04-2018 Date of Implementation: 15-04-2018 1. Summary 4 2. Definitions 5 3. Acceptance of this Registration Policy

More information

3. What is the name of the organisation that runs your business registry?

3. What is the name of the organisation that runs your business registry? Sida 1 av 20 International Business Registers Survey 2016 Questions in this survey should be answered for the period January 1 to December 31, 2016, unless otherwise specified. The survey is accompanied

More information

cctld Best Practices & Considerations John Crain Internet Corporation for Assigned Names and Numbers

cctld Best Practices & Considerations John Crain Internet Corporation for Assigned Names and Numbers cctld Best Practices & Considerations John Crain Internet Corporation for Assigned Names and Numbers cctld as a public trust cctlds are designated to operators who will operate them in the best interests

More information

Root Management Update

Root Management Update Root Management Update San Francisco, USA March 2011 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers IANA NOI Notice of Inquiry IANA Contract expires later in 2011

More information

ICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49

ICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49 ICANN Contractual Compliance IPC Mee(ng Tuesday, 25 March 2014 1 Agenda! Compliance General Update! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore and Turkey" Ø Completed 2013

More information

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam

More information

Attachment 3..Brand TLD Designation Application

Attachment 3..Brand TLD Designation Application Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program

More information

FRED open source registry solution. Jaromir Talir

FRED open source registry solution. Jaromir Talir FRED open source registry solution Jaromir Talir jaromir.talir@nic.cz Agenda CZ.NIC story FRED overview Deployments Data model Interfaces Features CZ.NIC story - year 2005 CZ.NIC had 4 employees Number

More information

gtld Applicant Guidebook (v ) Module 5

gtld Applicant Guidebook (v ) Module 5 gtld Applicant Guidebook (v. 2012-06-04) Module 5 4 June 2012 This module describes the final steps required of an applicant for completion of the process, including execution of a registry agreement with

More information

AutoDNS Manual Version 9.0 September InterNetX GmbH

AutoDNS Manual Version 9.0 September InterNetX GmbH USER MANUAL AutoDNS Manual Version 9.0 September 2016 1998-2016 InterNetX GmbH Text, content, design and the arrangement of this manual are subject to the protection of copyright laws. You may only use

More information

December 2009 Report #26

December 2009 Report #26 December 2009 Report #26 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This

More information

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson olafur@cloudflare.com How long does it take to? Post a new selfie on Facebook and all your friends to be notified few seconds

More information

ICANN STRATEGIC PLAN JULY 2011 JUNE 2014

ICANN STRATEGIC PLAN JULY 2011 JUNE 2014 ICANN STRATEGIC PLAN JULY 2011 JUNE 2014 ICANN One World. One Internet. ICANN is a global organization that coordinates the Internet unique identifier systems for worldwide public benefit, enabling a single,

More information

It Internationalized ti Domain Names W3C Track: An International Web

It Internationalized ti Domain Names W3C Track: An International Web It Internationalized ti Domain Names W3C Track: An International Web Tina Dam ICANN Director, IDN Program tina.dam@icann.org 17th International World Wide Web Conference, WWW2008 Beijing International

More information

MARNET Macedonian Academic & Research Network

MARNET Macedonian Academic & Research Network MARNET Macedonian Academic & Research Network.mk cctld registrar Prof. Dr. Borislav Popovski, Mr. Goran Muratovski, Ms. Marija Manevska http://dns.marnet.net.mk 1 About MARNet MARNet is organizational

More information

gtld Registrar Manual Part III : Registrar Web

gtld Registrar Manual Part III : Registrar Web gtld Registrar Manual Part III : Registrar Web Copyright Ó 2016 DNS Belgium vzw/asbl 1 Table of contents Table of contents... 2 1 Introduction... 3 1.1. Purpose... 3 2 User management... 3 2.1 Login...

More information

Matters Related to WHOIS

Matters Related to WHOIS Matters Related to WHOIS DNSO Intellectual Property Constituency - March 3, 2000 Introduction WHOIS is Vital for Effective E-Commerce E-Commerce figures are steadily moving up and off the charts. A study

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR) & WHOIS at ICANN Savenaca Vocea APNIC 46, Noumea 11 September 2018 About the General Data Protection Regulation (GDPR) The European Union s (EU s) GDPR aims to

More information

Luminous: Bringing Big(ger) Data to the Fight

Luminous: Bringing Big(ger) Data to the Fight Luminous: Bringing Big(ger) Data to the Fight Norm Ritchie Drew Bagley ICANN Helsinki June, 2016 Secure Domain Foundation Non-profit Founded in 2014 Proactive mitigation of malicious domains used for cybercrime

More information

Infoblox Dossier User Guide

Infoblox Dossier User Guide Infoblox Dossier User Guide 2017 Infoblox Inc. All rights reserved. ActiveTrust Platform Dossier and TIDE - June 2017 Page 1 of 16 1. Overview of Dossier... 3 2. Prerequisites... 3 3. Access to the Dossier

More information