No domain left behind:
|
|
- Silas Norris
- 6 years ago
- Views:
Transcription
1 No domain left behind: is Let s Encrypt democratizing encryption? Maarten Aertsen 1, Maciej Korczyński 2, Giovane C. M. Moura 3, Samaneh Tajalizadehkhoob 2, Jan van den Berg 2 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands 3 SIDN Labs The Netherlands IETF98 - IRTF - MAPRG Chicago, IL, April 28th, 217 1/18
2 Disclaimer None of the authors is in any way affiliated with Let s Encrypt In other words: we do not speak for them But if you like their work, you may consider supporting them 2/18
3 The Encryption Rush Ed Snowden NSA s revelations Massive, widespread surveillance Worst nightmares came true 3/18
4 The Encryption Rush Ed Snowden NSA s revelations Consequences: For many, it was a wake-up call (and panic) Market distrust in vendors Provided a great momentum for better security Massive, widespread surveillance Worst nightmares came true Reactions: IETF: RFC 7258, RFC 7624 ios/android: mobile phone encryption by default Cloud providers enabling encryption everywhere... 3/18
5 More than half of web traffic is encrypted nowadays Yet that leaves out a lot of people without HTTPS Firefox telemetry 1 Chrome telemetry based on Let s Encrypt stats page 2 4/18
6 Certificates are required for encryption on the web Barriers to ubiquitous web encryption (X.59 cert): Cost: purchase, deployment and renewal Complexity: request, deployment (at scale) Let s Encrypt 3 aims to make encrypted traffic ubiquitous Issue and re-issue costs: $. Complexity mitigated by automation 1. ACME protocol 4 2. and clients, e.g. Certbot draft-ietf-acme-acme-latest /18
7 No domain left behind Is Let s Encrypt democratizing encryption? Research question In its first year of certificate issuance, has Let s Encrypt been successful in democratizing encryption? Approach: measurements Analyze issuance in the first year of Let s Encrypt Show adoption trend from various perspectives Analyze coverage for the lower-cost end of the market 6/18
8 Methodology Period covered: Sept (1st year) Results based on FQDNs reduced to 2LD/3LD form Datasets a.b.c.d.com d.com Certificates Certificate transparency 6 Domain to IP mapping Farsight DNSDB 7 Organization mapping Registration info Methodology from previous work 8, using whois data & Maxmind GEOIP2.nl registry (SIDN) S. Tajalizadehkhoob et al., Apples, oranges and hosting providers: heterogeneity and security in the hosting market, IEEE NOMS 216 7/18
9 Let s Encrypt Adoption Rate Steady growth unique certified domains 14M 12M 1M 8M 6M 4M 2M FQDNs (absolute) domains (absolute) domains (relative) 1%.1%.1% Sep '15 Nov '15 Jan '16 Mar '16 May '16 Jul '16 Sep '16 1% % of DNSDB 8/18
10 Who s using Let s Encrypt? 98% of certificates are issued outside Alexa 1M... % of total usage of Let's Encrypt 1% 1% 1%.1%.1%.1% Alexa 1M Alexa 1k Alexa 1k Alexa 1k Sep '15 Nov '15 Jan '16 Mar '16 May '16 Jul '16 Sep '16 9/18
11 Who s using Let s Encrypt?... yet issuance is not restricted to lower end of the market meaning: big players also use in their subdomains % of domains using Let's Encrypt 2% 15% 1% 5% % Alexa 1M Alexa 1k Alexa 1k Alexa 1k DNSDB Sep '15 Nov '15 Jan '16 Mar '16 May '16 Jul '16 Sep '16 1/18
12 Growth is attributed to adoption by major players 3 hosting providers are responsible for 47% of the Let s Encrypt certified domains November K known domains 127M Let's Encrypt domains organisations 6K 11/18
13 Growth is attributed to adoption by major players 3 hosting providers are responsible for 47% of the Let s Encrypt certified domains November 215 September K known domains 127M 4.4M known domains 25M Let's Encrypt domains Let's Encrypt domains organisations 6K organisations 66K 11/18
14 Growth is attributed to adoption by major players 3 hosting providers are responsible for 47% of the Let s Encrypt certified domains November 215 September K known domains 127M Let's Encrypt domains organisations 6K Automation works!! 11/18
15 Issuance is dominantly for web hosting So far, no surprises % of Let's Encrypt domains 1% 8% 6% 4% 2% % Sep '16 Aug '16 Jul '16 Jun '16 May '16 Apr '16 Mar '16 Feb '16 Jan '16 Dec '15 Nov '15 Oct '15 Sep '15 unknown cdn isp hosting other parking edu ddos-protection gov 12/18
16 Over 9% of domains in hosting are on shared hosting Issuance is dominantly for the lower-cost end of the market Shared hosting = 1 domains/ip 9 Let s Encrypt reaches those with less incentive to encrypt % of LE domains in hosting 1% 8% 6% 4% 2% % Sep '16 Aug '16 Jul '16 Jun '16 May '16 Apr '16 Mar '16 Feb '16 Jan '16 Dec '15 Nov '15 Oct '15 Sep '15 shared hosting non-shared hosting 9 S. Tajalizadehkhoob et al., Apples, oranges and hosting providers: heterogeneity and security in the hosting market, IEEE NOMS /18
17 Let s Encrypt certificates are valid for 9 days The majority of certificates are correctly renewed after their first expiration Fraction of FQDN coverage days since initial issuance of certificate continuous gap 1 week 14/18
18 Let s Encrypt : domain age use Case study:.nl Determine the age of the domain when the cert was issued Domain Age (Years) domain age certificate # Sep '15 Nov '15 Jan '16 Mar '16 May '16 Jul '16 Sep '16 Median, Q25, Q75 and number of monthly new certificates for.nl domains Monthly New Certs (K) 15/18
19 Let s Encrypt : deployment https scans + cert processing (lower bound) 25K randomly chosen Let s Encrypt FQDN 2k 15k 1583 FQDN 1k 5k nodns http46error notls snierror tlsok-notle tlsok-le-expired tlsok-le-ok 16/18
20 Conclusions We show that Let s Encrypt has been a success Reduces costs & complexity Democratize encryption by covering low cost end of the market (shared hosting) but big players also use it Automation works: Let s Encrypt s allows for bulk issuing 3 hosting providers are responsible for 47% of the Let s Encrypt certified domains The majority of certificates are correctly renewed after their first expiration (9 days) And find that Let s Encrypt has indeed started to democratize encryption. 17/18
21 Future work Future work extend measurement period issued versus deployed active scans on shared hosting require prior knowledge of domains served (SNI) use by malicious actors Contact details Giovane C. M. Moura Download our paper at: 18/18
No domain left behind
No domain left behind is Let s Encrypt democratizing encryption? M Aertsen 1, M Korzyński 2, G Moura 3 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview
More informationRDAP Implementation. Francisco Arias & Gustavo Lozano 21 October 2015
RDAP Implementation Francisco Arias & Gustavo Lozano 21 October 2015 Agenda 1 2 3 History of Replacing WHOIS protocol gtld RDAP Profile RDAP Profile Details 4 5 Open Issues gtld RDAP Profile Conclusion
More informationIP addressing policies: what does this mean? Adam Gosling Senior Policy Specialist, APNIC APT PRF for the Pacific: August 2013
IP addressing policies: what does this mean? Adam Gosling Senior Policy Specialist, APNIC APT PRF for the Pacific: August 2013 Overview APNIC in the Internet ecosystem Policy development IPv4 IPv6 Public
More informationLet s Encrypt and DANE
Let s Encrypt and DANE CaribNOG 13 Barbados 18 Apr 2017 The Deploy360 Programme The Challenge: The IETF creates protocols based on open standards, but some are not widely known or deployed People seeking
More informationsoftware.sci.utah.edu (Select Visitors)
software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5
More informationFREQUENTLY ASKED QUESTIONS
DISTRICT 7030 WEBSITE FREQUENTLY ASKED QUESTIONS NB: THIS WILL BE REGULARLY UPDATED FOR YOUR INFORMATION. 1. This website works better with the following browsers: Internet Explorer (IE) and Google Chrome.
More informationThis report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju
0 - Total Traffic Content View Query This report is based on sampled data. Jun 1, 2009 - Jun 25, 2010 Comparing to: Site 300 Unique Pageviews 300 150 150 0 0 Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec
More information3. EXCEL FORMULAS & TABLES
Winter 2019 CS130 - Excel Formulas & Tables 1 3. EXCEL FORMULAS & TABLES Winter 2019 Winter 2019 CS130 - Excel Formulas & Tables 2 Cell References Absolute reference - refer to cells by their fixed position.
More informationDocker and HPE Accelerate Digital Transformation to Enable Hybrid IT. Steven Follis Solutions Engineer Docker Inc.
Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT Steven Follis Solutions Engineer Docker Inc. Containers are the Fastest Growing Cloud Enabling Technology Title source: 451 Research
More informationExcel Functions & Tables
Excel Functions & Tables SPRING 2016 Spring 2016 CS130 - EXCEL FUNCTIONS & TABLES 1 Review of Functions Quick Mathematics Review As it turns out, some of the most important mathematics for this course
More informationApp Economy Market analysis for Economic Development
App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis
More informationCOURSE LISTING. Courses Listed. with SAP Hybris Marketing Cloud. 24 January 2018 (23:53 GMT) HY760 - SAP Hybris Marketing Cloud
with SAP Hybris Marketing Cloud Courses Listed HY760 - SAP Hybris Marketing Cloud C_HYMC_1702 - SAP Certified Technology Associate - SAP Hybris Marketing Cloud (1702) Implementation Page 1 of 12 All available
More informationAll King County Summary Report
September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 18,000 16,000 14,000 12,000 10,000 8,000 6,000 4,000 2,000 0 Active, Pending, & Months Supply of Inventory 15,438 14,537 6.6 6.7
More informationInstructor training course schedule v3 Confirmed courses due completion by 31 st July 2019
Confirmed courses due completion by 31 st July 2019 Courses: 2 Orientation 2 IoT Fundamentals 2 Networking Essentials 2 Cybersecurity Essentials 2 IT Essentials: PC Hardware and Software 2 CCNA Routing
More informationCompliance Enforcement Initiative
Compliance Enforcement Initiative Filing and Status Update November 2, 2011 Rebecca Michael Status of the Filings NERC filed several components of the Compliance Enforcement Initiative on September 30,
More informationOpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements. Design and Analysis of Communication Systems
OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements DACS Design and Analysis of Communication Systems Why measure DNS? (Almost) every networked service relies
More informationCOURSE LISTING. Courses Listed. Training for Database & Technology with Administration in Database Migration. 3 September 2018 (21:31 BST)
Training for Database & Technology with Administration in Database Migration Courses Listed Fortgeschrittene TADM70 - SAP System: Operating System and Database Migration Zertifizierung C_TADM70_74 - SAP
More informationTracking the Internet s BGP Table
Tracking the Internet s BGP Table Geoff Huston Telstra December 2000 Methodology! The BGP table monitor uses a router at the boundary of AS1221 which has a default-free ebgp routing table 1. Capture the
More informationFixed and wireless broadband mapping in Belgium
Belgian Institute for Postal Services and Telecommunications Fixed and wireless broadband mapping in Belgium Broadband mapping Conference in Warsaw, Poland, 11-12 April, 2016 BIPT Agenda Objectives Roadmap
More informationRouting the Internet in Geoff Huston APNIC March 2007
Routing the Internet in 2006 Geoff Huston APNIC March 2007 IPv4 in 2006 Total Advertised BGP Prefixes BGP Table Growth 210000 200000 190000 BGP FIB Entries 180000 2006 170000 2005 160000 150000 Jan Feb
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 5,000 4,500 4,000 3,500 4,091
More informationJuly RFC Editor Report. 69th IETF Meeting Chicago, Illinois. IETF 69 RFC Editor 1
July 2007 RFC Editor Report 69th IETF Meeting Chicago, Illinois IETF 69 RFC Editor 1 IETF 69 RFC Editor Office Hours at IETF 69 Monday - Wednesday 9:30-4:00 RFC Editor Tutorial Sunday @ 3:00 pm Slides
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationA First Look at QUIC in the Wild
A First Look at QUIC in the Wild Jan Rüth 1, Ingmar Poese 2, Christoph Dietzel 3, Oliver Hohlfeld 1 1 : RWTH Aachen University 2 : Benocs GmbH 3 : TU Berlin / DE-CIX http://comsys.rwth-aachen.de/ London
More informationAdoption, Human Perception, and Performance of HTTP/2 Server Push
Adoption, Human Perception, and Performance of HTTP/2 Server Push https://comsys.rwth-aachen.de London / IETF 101 maprg, 23.2018 Why focus on HTTP/2 (H2) Server Push? H2 major changes over H1 Binary, single
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
November, 2016 MTD MARKET UPDATE Data Current Through: November, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary 4,000 3,500 3,000 2,500 2,000 1,500 1,000 500 0 Active, Pending, & Months
More informationCMR India Monthly Mobile Handset Market Report. June 2017
CMR India Monthly Mobile Handset Market Report June 2017 Cyber Media Research Ltd. www.cmrindia.com Submitted by: Copyright 1 Copyright 2017 Cyber 2017 Cyber Media Media Research Research Ltd. Reproduction
More informationSophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central
Sophos Central for partners and customers: overview and new features Jonathan Shaw Senior Product Manager, Sophos Central What is Sophos Central? Partner Dashboard Admin Self Service Allows Partners to
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationIPv6 Deployment: Business Case and Development Opportunities. University College of the Caribbean Internet Day. 12 July 2012 Tim Christensen, ARIN
IPv6 Deployment: Business Case and Development Opportunities University College of the Caribbean Internet Day 12 July 2012 Tim Christensen, ARIN Internet Governance Definition of Internet governance*:
More informationInter-Domain Routing Trends
Inter-Domain Routing Trends Geoff Huston gih@apnic.net APNIC March 2007 Agenda 1. Some data about the network and BGP over 2006 2. Some observations about the distribution patterns of BGP updates 3. Pointers
More informationSpiegel Research 3.0 The Mobile App Story
Spiegel Research 3.0 The Mobile App Story The effects of adopting and using a brand s mobile application on purchase behaviors SU JUNG KIM THE PROJECT Smartphone penetration in the U.S. has reached 68
More informationCOURSE LISTING. Courses Listed. Training for Cloud with SAP Ariba in Integration. 20 August 2018 (03:01 BST) Grundlagen.
Training for Cloud with SAP Ariba in Integration Courses Listed Grundlagen AR720 - SAP Ariba Procurement: Administration AR820 - SAP Ariba Integration: SAP Ariba Integration Points Fortgeschrittene AR720E
More informationGlobal Phishing Survey 2H2009
Global Phishing Survey 2H2009 Greg Aaron Rod Rasmussen Released May 11, 2010 http://apwg.org/reports/apwg_globalphishingsurvey_2h2009.pdf Goals Study domain names and URLs to: Provide a consistent benchmark
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : July 20, 2017 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE marc.grote@it-consulting-grote.de ACTIVE MICROSOFT CERTIFICATIONS:
More informationjamf Nation - London Roadshow
jamf Nation - London Roadshow Sachin Parmar Workplace Technology Manager 17 May 2018 About Just Eat Our vision Creating the world s greatest food community 3 About Me About Me Sachin Parmar 8+ years professionally
More informationStakeholder consultation process and online consultation platform
Stakeholder consultation process and online consultation platform Grant agreement no.: 633107 Deliverable No. D6.2 Stakeholder consultation process and online consultation platform Status: Final Dissemination
More informationDashboard. 16 Jun Jun 2009 Comparing to: 16 Jun Jun % Bounce Rate. 62,921 Visits. 407,003 Page Views
JAWA CZ Owners Club Dashboard 16 Jun 2008-16 Jun 2009 Comparing to: 16 Jun 2007-15 Jun 2008 Previous: Visits Visits 400 400 200 200 16 June 2008 19 July 2008 21 August 2008 23 September 26 October 200
More informationAsks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.
# Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days
More informatione-sens Nordic & Baltic Area Meeting Stockholm April 23rd 2013
e-sens Nordic & Baltic Area Meeting Stockholm April 23rd 2013 Objectives of the afternoon parallel tracks sessions 2 Meeting objectives High level: Identification of shared interests with emphasis on those
More informationNew Concept for Article 36 Networking and Management of the List
New Concept for Article 36 Networking and Management of the List Kerstin Gross-Helmert, AFSCO 28 th Meeting of the Focal Point Network EFSA, MTG SEAT 00/M08-09 THE PRESENTATION Why a new concept? What
More informationInvincea Endpoint Protection Test
Invincea Endpoint Protection Test A test commissioned by Invincea and performed by AV-TEST GmbH. Date of the report: May 2 nd, 2016 Executive Summary In April 2016, AV-TEST performed a review of the Invincea
More informationCouncil, 8 February 2017 Information Technology Report Executive summary and recommendations
Council, 8 February 2017 Information Technology Report Executive summary and recommendations Introduction This report provides the Council with an update into the work of the Information Technology Directorate
More informationSCI - software.sci.utah.edu (Select Visitors)
SCI - software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2004 Report Range: 01/01/2004 00:00:00-12/31/2004 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors
More informationBANGLADESH UNIVERSITY OF PROFESSIONALS ACADEMIC CALENDAR FOR MPhil AND PHD PROGRAM 2014 (4 TH BATCH) PART I (COURSE WORK)
BANGLADESH UNIVERSITY OF PROFESSIONALS ACADEMIC CALENDAR FOR MPhil AND PHD PROGRAM 2014 (4 TH BATCH) DAY Soci-Economic and Political History of Bangladesh PART I (COURSE WORK) 1 ST SEMESTER 2 ND SEMESTER
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
October, 2016 MTD MARKET UPDATE Data Current Through: October, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 4,500 4,000 3,500 4,197 4,128
More informationMETERS AND MORE: Beyond the Meter
METERS AND MORE: Beyond the Meter Carlo MASSERONI Secretary of the Working Group for Communication at Meters and More AISBL STMicroelectronics, Italy Agenda Meters and More association Technology overview
More informationhttps://spoofer.caida.org/
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ DDoS PI meeting, March 9 2017 www.caida.o
More informationHPE Security Data Security. HPE SecureData. Product Lifecycle Status. End of Support Dates. Date: April 20, 2017 Version:
HPE Security Data Security HPE SecureData Product Lifecycle Status End of Support Dates Date: April 20, 2017 Version: 1704-1 Table of Contents Table of Contents... 2 Introduction... 3 HPE SecureData Appliance...
More informationMonthly SEO Report. Example Client 16 November 2012 Scott Lawson. Date. Prepared by
Date Monthly SEO Report Prepared by Example Client 16 November 212 Scott Lawson Contents Thanks for using TrackPal s automated SEO and Analytics reporting template. Below is a brief explanation of the
More informationCIMA Certificate BA Interactive Timetable
CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction
More informationCouncil, 26 March Information Technology Report. Executive summary and recommendations. Introduction
Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last
More informationVESA Display Standards Updates
VESA Display Standards Updates Jim Choate VESA Compliance Program Manager May 3, 2018 Agenda VESA Overview DisplayPort Market Adoption DisplayPort 1.4a Updates VESA Certified DisplayHDR New VESA Technology
More informationARIN Update. Summer 2011 ESCC/Internet2 Joint Techs Mark Kosters Chief Technology Officer
ARIN Update Summer 2011 ESCC/Internet2 Joint Techs Mark Kosters Chief Technology Officer Agenda A Brief Overview of ARIN IPv4 and IPv6 Stats Call to Action Technology Initiatives 2 of 23 About ARIN Regional
More informationDashboard. Jan 13, Jan 8, 2012 Comparing to: Site. 12,742 Visits % Bounce Rate. 00:05:26 Avg. Time on Site.
Dashboard 3 3 15 15 Jan 17 Feb 18 Mar 22 Apr 23 May 25 Jun 26 Jul 28 Aug 29 Sep 3 Nov 1 Dec 3 Ja Site Usage 12,742 4.3% Bounce Rate 39,496 Pageviews :5:26 Avg. Time on Site 3.1 Pages/Visit 61.73% % New
More informationFreedom of Information Act 2000 reference number RFI
P. Norris By email to: xxxxxxxxxxxxxxxxxxxxxx@xxxxxxxxxxxxxx.xxm 02 November 2011 Dear P. Norris Freedom of Information Act 2000 reference number RFI20111218 Thank you for your request under the Freedom
More informationCIDR. The Life Belt of the Internet 2005/03/11. (C) Herbert Haas
CIDR The Life Belt of the Internet (C) Herbert Haas 2005/03/11 Early IP Addressings Before 1981 only class A addresses were used Original Internet addresses comprised 32 bits (8 bit net-id = 256 networks)
More informationAPWG Global Phishing Survey 2H2010
APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers
More informationNorth American Portability Management, LLC Transition Oversight Manager. TOEP Webcast November 7, 2017
North American Portability Management, LLC Transition Oversight Manager TOEP Webcast November 7, 2017 Welcome to today s webcast Submit Questions for Q&A Webcast Issues Click the Q&A widget at the bottom
More informationTown of Georgetown Comprehensive Plan
Town of Georgetown Comprehensive Plan Town Council Kick-Off Meeting w/planning Commission August 24, 2016 Meeting Agenda Introductions Scope of Services Schedule Public Outreach Community Survey SWOT Analysis
More informationLibrary. Summary Report
Library Summary Report 217-218 Prepared by: Library Staff December 218 Table of Contents Introduction..1 New Books.2 Print Circulation.3 Interlibrary Loan 4 Information Literacy 5 Reference Statistics.6
More informationQUALYS SECURITY CONFERENCE Qualys CertView. Managing Digital Certificates. Jimmy Graham Senior Director, Product Management, Qualys, Inc.
18 QUALYS SECURITY CONFERENCE 2018 Qualys CertView Managing Digital Certificates Jimmy Graham Senior Director, Product Management, Qualys, Inc. Agenda Introduction Evolving browser markers Introducing
More informationBroadband Rate Design for Public Benefit
Broadband Rate Design for Public Benefit The transition from service-based rates to loop rates on Chelan PUD s Broadband Network Dec.19, 2016 No action required today Today s Presentation Loop Rates Final
More informationCybersecurity is a Team Sport
Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month
More informationGRID MODERNIZATION INITIATIVE PEER REVIEW
GRID MODERNIZATION INITIATIVE PEER REVIEW GMLC 1.3.5 DER Siting and Optimization tool for JOHN GROSH & GONÇALO CARDOSO April 18-20, 2017 Sheraton Pentagon City Arlington, VA Planning and Design Tools 4/4/17
More informationCOURSE LISTING. Courses Listed. Training for Database & Technology with Modeling in SAP HANA. 20 November 2017 (12:10 GMT) Beginner.
Training for Database & Technology with Modeling in SAP HANA Courses Listed Beginner HA100 - SAP HANA Introduction Advanced HA300 - SAP HANA Certification Exam C_HANAIMP_13 - SAP Certified Application
More informationU.S. Digital Video Benchmark Adobe Digital Index Q2 2014
U.S. Digital Video Benchmark Adobe Digital Index Q2 2014 Table of contents Online video consumption 3 Key insights 5 Online video start growth 6 Device share of video starts 7 Ad start per video start
More informationICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND
ICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND BYTES PEOPLE SOLUTIONS Bytes Business Park 241 3rd Road Halfway Gardens Midrand Tel: +27 (11) 205-7000 Fax: +27 (11) 205-7110 Email: gauteng.sales@bytes.co.za
More informationFaster, Better, and Cheaper? Building the SD-WAN Business Case
Faster, Better, and Cheaper? Building the SD-WAN Business Case John Burke CIO & Principal Research Analyst Nemertes Research john@nemertes.com @burkejohne #FutureWAN Agenda ±About Nemertes ±The Current
More informationAdvancing the Art of Internet Edge Outage Detection
Advancing the Art of Internet Edge Outage Detection ACM Internet Measurement Conference 2018 Philipp Richter MIT / Akamai Ramakrishna Padmanabhan University of Maryland Neil Spring University of Maryland
More informationInfectious Diseases Media Kit. The Journal of. Advertising & Sales Contacts. Useful Information. jid.oxfordjournals.org
2013 Media Kit Advertising & Sales Contacts Naomi Reeves Advertising Sales Manager t: +44 (0) 1865 355396 e: naomi.reeves@oup.com For reprints, supplements or tailored products: e: corporate.services@oup.com
More informationRecommendations for DNS Privacy Service Operators
Recommendations for DNS Privacy Service Operators Presenter: Sara Dickinson sara@sinodun.com Co-authors: Roland van Rijswijk-Deij, Allison Mankin, Benno Overeinder 1 Brief history of DNS Privacy Date 2
More informationContents:
Contents: Conventional/REO/Short Sale Single Family Sold Sold Properties by Cities - Properties Sold Supply Inventory Median Price Comparison by Year www.swflrealtors.com Page #. Single Family & Condo
More informationINTRODUCING CISCO SECURITY FOR AWS
SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Who am I? I work for Cisco Systems, in the Security Business Group Founder, Observable Networks:
More information2018 IT Academy Program. December 2017
2018 IT Academy Program December 2017 2016 VMware Inc. All rights reserved. Agenda Program Improvements for 2018 Why the change? New learning path and course details Timeline Summary of changes What s
More informationAutomatic Renewal Using DIY Technology to Create an Improved Patron Experience
Using DIY Technology to Create an Improved Patron Experience Samantha Jekot-Graham, Patron Experience Lead Phil Feilmeyer, System Integration What is automatic renewal? A service that automatically renews
More informationTransition Implementation Status Reporting. 31 March 2016
Transition Implementation Status Reporting 31 March 2016 Content 1. Overall Timeline 2. Status Update 3. Projects Plans 2 Overall Timeline Implementation Timeline Proposals Delivered in Mar. 2016 Nov Dec
More informationCOURSE LISTING. Courses Listed. Training for Cloud with SAP Cloud Platform in Development. 23 November 2017 (08:12 GMT) Beginner.
Training for Cloud with SAP Cloud Platform in Development Courses Listed Beginner CLD100 - Cloud for SAP Intermediate CP100 - SAP Cloud Platform Certification Exam C_CP_11 - SAP Certified Development Associate
More informationThe Insider s Guide To Transfers. John Sweeting - Senior Director, Registration Services Cathy Clements Transfer Services Manager
The Insider s Guide To Transfers John Sweeting - Senior Director, Registration Services Cathy Clements Transfer Services Manager Overview Transfer Basics M&A Transfer Procedure & Tips Specified Recipient
More informationProblem Statement and Considerations for ROA Mergence. 96 SIDR meeting
Problem Statement and Considerations for ROA Mergence draft-yan-sidr-roa-mergence-00 @IETF 96 SIDR meeting fuyu@cnnic.cn Background RFC 6482 1/19 ROA mergence What is the ROA mergence? is a common case
More informationKENIC Report 2007/8. 33 rd ICANN Meeting, 4 th November 2008, Intercontinental Hotel, Cairo. Ali Hussein
KENIC Report 2007/8 33 rd ICANN Meeting, 4 th November 2008, Intercontinental Hotel, Cairo Ali Hussein Outline KENIC Background 2007/8 Highlights Highlights: h Governance Area Highlights: Technical Area
More informationSUPPORTED ENVIRONMENTS FOR VDX / ZPORTAL
Supported Environments for VDX / ZPORTAL Page 1 of 9 SUPPORTED ENVIRONMENTS FOR VDX / ZPORTAL Andy Cole Supported Environments for VDX / ZPORTAL Page 2 of 9 Supported Environments for VDX / ZPORTAL DOCUMENT
More informationCOURSE LISTING. Courses Listed. Training for Database & Technology with Development in SAP Cloud Platform. 1 December 2017 (22:41 GMT) Beginner
Training for Database & Technology with Development in SAP Cloud Platform Courses Listed Beginner CLD100 - Cloud for SAP Intermediate CP100 - SAP Cloud Platform Certification Exam C_CP_11 - SAP Certified
More informationContinual Improvement of Data Centre Energy Performance
Continual Improvement of Data Centre Energy Performance Solutions for maintaining ISO 50001 certification Mike Gilmore, e-ready Building Limited Mike Gilmore Standards Activities Member - JTC1 SC25 WG3
More informationdraft-moura-dnsop-authoritativerecommendations-03
draft-moura-dnsop-authoritativerecommendations-03 Giovane C. M. Moura 1,2, Wes Hardaker 3, John Heidemann 3, Marco Davids 1 DNSOP IETF 104 Prague, CZ 2019-03-26 1 SIDN Labs, 2 TU Delft, 3 USC/ISI 1 Draft
More informationService Excellence by Design. Tom Floodeen Vice President & General Manager Customer Support Division Mentor Graphics Corporation
Service Excellence by Design Tom Floodeen Vice President & General Manager Customer Support Division Mentor Graphics Corporation A Culture of Service A A business absolutely devoted to service will have
More informationThe Power of Prediction: Cloud Bandwidth and Cost Reduction
The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 03, 2017 Microsoft Certification ID : 2069071 JESSE WIMBERLEY 5421 33RD CT SE LACEY, Washington 98503 US jesse.wimberley@gmail.com ACTIVE MICROSOFT CERTIFICATIONS: Microsoft
More informationUrban Land Institute A Bend in the Road
Urban Land Institute A Bend in the Road Brian Beaulieu CEO 216 Forecast Results 2 Duration Accuracy US GDP 15 99.1% US Ind. Prod. 1 99.9% Eur Ind. Prod. 15 99.2% Canada Ind Prod 15 99.6% China Ind Prod
More informationSection 1.2: What is a Function? y = 4x
Section 1.2: What is a Function? y = 4x y is the dependent variable because it depends on what x is. x is the independent variable because any value can be chosen to replace x. Domain: a set of values
More informationGrade 4 Mathematics Pacing Guide
Jul 2014 ~ August 2014 ~ Sep 2014 1 2 3 4 5 6 7 8 9 10 11 12 14 15 16 17 Routines 19 Routines 20 Routines BOY 22 BOY 23 24 11 12 14 29 15 30 31 Notes: Found Online @ wwweverydaymathonlinecom 1 More Calendars
More informationClinical Infectious Diseases
2013 Media Kit Advertising & Sales Contacts Naomi Reeves Advertising Sales Manager t: +44 (0) 1865 355396 e: naomi.reeves@oup.com For reprints, supplements or tailored products: e: corporate.services@oup.com
More informationIANA Update ICANN Meetings, Marrakech Kim Davies Internet Assigned Numbers Authority
IANA Update ICANN Meetings, Marrakech 2006 Kim Davies Internet Assigned Numbers Authority Themes Introduction Performance Update 24x7 Call Centre Support Root Zone Automation Improving Procedures Other
More informationWEB 2.0 & EAST ASIAN LIBRARIANS JIANG, SHUYONG
WEB 2.0 & EAST ASIAN LIBRARIANS JIANG, SHUYONG ALA-AAMES June 27, 2010 Washington D.C. East Asian Librarian Survey on Using Web 2.0 Tools It is to know how and what web 2.0 tools are used in promoting
More informationSMARTPHONE LAUNCH CAMPAIGN. Australia 2017
SMARTPHONE LAUNCH CAMPAIGN Australia 2017 Timing is everything Changing landscape Details matter Timing is everything Changing landscape Details matter New device arrivals follow 3 key stages: pre-announcement,
More informationJune 2012 First Data PCI RAPID COMPLY SM Solution
June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationWithdrawal of Text Processing (Business Professional)
Withdrawal of Text Processing (Business Professional) OCR constantly reviews the uptake and performance of all its qualifications. As a regulated awarding body, we have a responsibility to remove qualifications
More information