SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Text 
DNS Risk Framework 
Update 
#ICANN51 
14 October 2014 
John Crain & Jacks Khawaja 
Chief SSR Officer; Enterprise Risk Director
Agenda 
Text 
• History 
• Moving Forward 
#ICANN51
Text 
History 
#ICANN51
Defined Resiliency Model 
Text 
ASSETS
Text
23 Risks Defined 
Text
Text 
Moving Forward 
#ICANN51
Numbers 
Text 
• Examining Risk 
o Typically, step 1 = identify assets 
o Impractical to identify all individual elements of DNS 
• Our Approach 
Categorize assets by sphere of influence 
#ICANN51
WTexth ere can ICANN: 
Implement 
Directly Influence 
Indirectly Influence 
?
Text 
Assets directly controlled by ICANN 
• Assets that ICANN directly manages or contracts 
to third parties (Example: XXX, XXX) 
• ICANN’s own corporate infrastructure 
• External-facing services such as websites and 
request management systems 
• DNS infrastructure of L.root-servers.net 
• Others? 
#ICANN51
Text 
Assets directly influenced by ICANN 
• Assets that ICANN can influence through 
contractual agreements (Example: Service Level 
Agreements, etc.) 
• Registries or registrars are guided by contracts that 
include Service Level Agreements 
• It is their remit as the asset owners to decide how 
they meet those SLAs and how to implement 
mitigation of their risks 
#ICANN51
Text 
• The Internet is a “network of networks” and each 
operator of a network or service is ultimately 
responsible for their own risk management 
• ICANN and the community can indirectly influence 
these through outreach and awareness efforts 
• ISOC’s Deploy360 is an excellent example of this 
#ICANN51 
Assets outside ICANN’s realm
Text 
SSR-001 DDOS (Example) 
#ICANN51
SSR001 Description (abridged) 
Text 
• User or organization deprived of service(s) or 
resource(s) they would normally have 
• Distributed denial-of-service (DDoS) attack: 
o Multitude of systems (compromised or otherwise) are 
used to attack a single target 
o Flood of incoming messages to the target system 
essentially forces it to shut down. This can take two forms: 
§ Resource Depletion 
§ Resource Disruption 
#ICANN51
What is the Risk? 
Text 
• This risk discusses the probability that parts of the 
DNS could be disabled for a sustained period 
• To ascertain the likelihood or the effect of such an 
attack, it’s important to first define the assets that 
are affected. This is also critical to understanding 
who owns the risk and who is able to best mitigate 
such risks 
#ICANN51
Look at DNS Assets from Both Sides 
Text 
• Publish the data on the authoritative servers (root 
servers, TLD servers, and registrants servers) 
• Query the data on the recursive servers (ISP’s, 
corporations, and DNS service providers) 
#ICANN51
Text 
Assets directly controlled by ICANN 
Authoritative 
• ICANN: 
o Operates L.root-servers.netICANN runs some infrastructure for TLDs (ARPA, int.) 
o Runs its own network DNS infrastructure 
Recursive 
• ICANN runs its own recursive servers for staff 
• Risks to these are covered in ICANN’s ERM 
#ICANN51
Text 
Assets directly influenced by ICANN 
Authoritative 
• ICANN has an advisory committee (RSSAC) that 
provides Service Level Recommendations for root 
servers 
• (Upcoming RSSAC002) 
• ICANN has contracts in place with many, but not all 
TLDs. Those contracts contain SLAs 
Recursive 
• ?? 
#ICANN51
Text 
Authoritative 
• Registrants’ DNS services 
Recursive 
• ISPs, corporations, homes and DNS service providers 
• Should the community work together to influence these? 
• We have SSAC and RSSAC that provide advice 
#ICANN51 
Assets outside ICANN’s realm
Can We Tackle the Root Causes? 
Text 
There are many efforts underway to reduce the 
severity of DDoS attacks 
o Source Address Validation (BCP38) 
o Open Resolver project 
o Botnet dismantling 
o Others 
Should ICANN staff and community 
members play a more active role? 
#ICANN51
Going Forward 
Text 
• For each of the 23 risks, we will: 
o Document assets 
o Identify existing mitigation strategies that are in place 
o Suggest areas where new or improved mitigation plans 
may be considered 
• How do we involve community expertise? 
o Dedicated workshops? 
o Working Groups? 
o Other suggestions? 
#ICANN51
GDD + Related Sessions 
Text 
Wednesday, 15 October 
o GDD Service Delivery, Customer Service & 
#ICANN51 
Service Level Agreements 
o Universal Acceptance 
Thursday, 16 October 
o DNSSEC Key Rollover Workshop 
o Thick WHOIS Implementation (Working 
Session) 
o Deploying the IETF’s WHOIS Replacement
Text Engage with ICANN on Web & Social Media 
twitter.com/icann 
facebook.com/icannorg 
linkedin.com/company/icann 
gplus.to/icann 
weibo.com/icannorg 
flickr.com/photos/icann 
youtube.com/user/ICANNnews icann.org

Contenu connexe

En vedette

Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 

En vedette (9)

Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 

Similaire à ICANN 51: DNS Risk Framework

ICANN 51: Name Collision
ICANN 51: Name CollisionICANN 51: Name Collision
ICANN 51: Name CollisionICANN
 
DNS Openness
DNS OpennessDNS Openness
DNS OpennessAPNIC
 
Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49ICANN
 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS OpennessAPNIC
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSecAFRINIC
 
ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017dotZADNA
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS SecurityThousandEyes
 
Revisiting the Root
Revisiting the RootRevisiting the Root
Revisiting the RootAPNIC
 
ICANN 51: Universal Acceptance
ICANN 51: Universal AcceptanceICANN 51: Universal Acceptance
ICANN 51: Universal AcceptanceICANN
 
Fundamentals
FundamentalsFundamentals
Fundamentalsvamsi1986
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?GTCSYS
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware Dryden Geary
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 
Active Directory Fundamentals
Active Directory FundamentalsActive Directory Fundamentals
Active Directory FundamentalsAngie Miller
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 

Similaire à ICANN 51: DNS Risk Framework (20)

ICANN 51: Name Collision
ICANN 51: Name CollisionICANN 51: Name Collision
ICANN 51: Name Collision
 
DNS Openness
DNS OpennessDNS Openness
DNS Openness
 
Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49
 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS Openness
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017
 
Fundamentals
FundamentalsFundamentals
Fundamentals
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Revisiting the Root
Revisiting the RootRevisiting the Root
Revisiting the Root
 
ICANN 51: Universal Acceptance
ICANN 51: Universal AcceptanceICANN 51: Universal Acceptance
ICANN 51: Universal Acceptance
 
Fundamentals
FundamentalsFundamentals
Fundamentals
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Active Directory Fundamentals
Active Directory FundamentalsActive Directory Fundamentals
Active Directory Fundamentals
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 

Plus de ICANN

Call for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PTCall for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PTICANN
 
Call for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZHCall for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZHICANN
 
Call for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ESCall for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ESICANN
 
Call for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_ARCall for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_ARICANN
 
Call for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FRCall for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FRICANN
 
Call for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RUCall for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RUICANN
 
Call for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review TeamCall for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review TeamICANN
 
ICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | FrenchICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | FrenchICANN
 
ICANN Expected Standards of Behavior
ICANN Expected Standards of BehaviorICANN Expected Standards of Behavior
ICANN Expected Standards of BehaviorICANN
 
ICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | RussianICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | RussianICANN
 
ICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | ArabicICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | ArabicICANN
 
ICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | ChineseICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | ChineseICANN
 
ICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | SpanishICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | SpanishICANN
 
Policy Development Process Infographic Turkish
Policy Development Process Infographic TurkishPolicy Development Process Infographic Turkish
Policy Development Process Infographic TurkishICANN
 
Policy Development Process Infographic Russian
Policy Development Process Infographic RussianPolicy Development Process Infographic Russian
Policy Development Process Infographic RussianICANN
 
Policy Development Process Infographic Portuguese
Policy Development Process Infographic PortuguesePolicy Development Process Infographic Portuguese
Policy Development Process Infographic PortugueseICANN
 
Policy Development Process Infographic Spanish
Policy Development Process Infographic SpanishPolicy Development Process Infographic Spanish
Policy Development Process Infographic SpanishICANN
 
Policy Development Process Infographic French
Policy Development Process Infographic FrenchPolicy Development Process Infographic French
Policy Development Process Infographic FrenchICANN
 
Policy Development Process Infographic English
Policy Development Process Infographic EnglishPolicy Development Process Infographic English
Policy Development Process Infographic EnglishICANN
 
Policy Development Process Infographic Chinese
Policy Development Process Infographic ChinesePolicy Development Process Infographic Chinese
Policy Development Process Infographic ChineseICANN
 

Plus de ICANN (20)

Call for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PTCall for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PT
 
Call for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZHCall for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZH
 
Call for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ESCall for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ES
 
Call for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_ARCall for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_AR
 
Call for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FRCall for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FR
 
Call for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RUCall for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RU
 
Call for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review TeamCall for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review Team
 
ICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | FrenchICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | French
 
ICANN Expected Standards of Behavior
ICANN Expected Standards of BehaviorICANN Expected Standards of Behavior
ICANN Expected Standards of Behavior
 
ICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | RussianICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | Russian
 
ICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | ArabicICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | Arabic
 
ICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | ChineseICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | Chinese
 
ICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | SpanishICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | Spanish
 
Policy Development Process Infographic Turkish
Policy Development Process Infographic TurkishPolicy Development Process Infographic Turkish
Policy Development Process Infographic Turkish
 
Policy Development Process Infographic Russian
Policy Development Process Infographic RussianPolicy Development Process Infographic Russian
Policy Development Process Infographic Russian
 
Policy Development Process Infographic Portuguese
Policy Development Process Infographic PortuguesePolicy Development Process Infographic Portuguese
Policy Development Process Infographic Portuguese
 
Policy Development Process Infographic Spanish
Policy Development Process Infographic SpanishPolicy Development Process Infographic Spanish
Policy Development Process Infographic Spanish
 
Policy Development Process Infographic French
Policy Development Process Infographic FrenchPolicy Development Process Infographic French
Policy Development Process Infographic French
 
Policy Development Process Infographic English
Policy Development Process Infographic EnglishPolicy Development Process Infographic English
Policy Development Process Infographic English
 
Policy Development Process Infographic Chinese
Policy Development Process Infographic ChinesePolicy Development Process Infographic Chinese
Policy Development Process Infographic Chinese
 

Dernier

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Dernier (9)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

ICANN 51: DNS Risk Framework

  • 1. Text DNS Risk Framework Update #ICANN51 14 October 2014 John Crain & Jacks Khawaja Chief SSR Officer; Enterprise Risk Director
  • 2. Agenda Text • History • Moving Forward #ICANN51
  • 8. Numbers Text • Examining Risk o Typically, step 1 = identify assets o Impractical to identify all individual elements of DNS • Our Approach Categorize assets by sphere of influence #ICANN51
  • 9. WTexth ere can ICANN: Implement Directly Influence Indirectly Influence ?
  • 10. Text Assets directly controlled by ICANN • Assets that ICANN directly manages or contracts to third parties (Example: XXX, XXX) • ICANN’s own corporate infrastructure • External-facing services such as websites and request management systems • DNS infrastructure of L.root-servers.net • Others? #ICANN51
  • 11. Text Assets directly influenced by ICANN • Assets that ICANN can influence through contractual agreements (Example: Service Level Agreements, etc.) • Registries or registrars are guided by contracts that include Service Level Agreements • It is their remit as the asset owners to decide how they meet those SLAs and how to implement mitigation of their risks #ICANN51
  • 12. Text • The Internet is a “network of networks” and each operator of a network or service is ultimately responsible for their own risk management • ICANN and the community can indirectly influence these through outreach and awareness efforts • ISOC’s Deploy360 is an excellent example of this #ICANN51 Assets outside ICANN’s realm
  • 13. Text SSR-001 DDOS (Example) #ICANN51
  • 14. SSR001 Description (abridged) Text • User or organization deprived of service(s) or resource(s) they would normally have • Distributed denial-of-service (DDoS) attack: o Multitude of systems (compromised or otherwise) are used to attack a single target o Flood of incoming messages to the target system essentially forces it to shut down. This can take two forms: § Resource Depletion § Resource Disruption #ICANN51
  • 15. What is the Risk? Text • This risk discusses the probability that parts of the DNS could be disabled for a sustained period • To ascertain the likelihood or the effect of such an attack, it’s important to first define the assets that are affected. This is also critical to understanding who owns the risk and who is able to best mitigate such risks #ICANN51
  • 16. Look at DNS Assets from Both Sides Text • Publish the data on the authoritative servers (root servers, TLD servers, and registrants servers) • Query the data on the recursive servers (ISP’s, corporations, and DNS service providers) #ICANN51
  • 17. Text Assets directly controlled by ICANN Authoritative • ICANN: o Operates L.root-servers.netICANN runs some infrastructure for TLDs (ARPA, int.) o Runs its own network DNS infrastructure Recursive • ICANN runs its own recursive servers for staff • Risks to these are covered in ICANN’s ERM #ICANN51
  • 18. Text Assets directly influenced by ICANN Authoritative • ICANN has an advisory committee (RSSAC) that provides Service Level Recommendations for root servers • (Upcoming RSSAC002) • ICANN has contracts in place with many, but not all TLDs. Those contracts contain SLAs Recursive • ?? #ICANN51
  • 19. Text Authoritative • Registrants’ DNS services Recursive • ISPs, corporations, homes and DNS service providers • Should the community work together to influence these? • We have SSAC and RSSAC that provide advice #ICANN51 Assets outside ICANN’s realm
  • 20. Can We Tackle the Root Causes? Text There are many efforts underway to reduce the severity of DDoS attacks o Source Address Validation (BCP38) o Open Resolver project o Botnet dismantling o Others Should ICANN staff and community members play a more active role? #ICANN51
  • 21. Going Forward Text • For each of the 23 risks, we will: o Document assets o Identify existing mitigation strategies that are in place o Suggest areas where new or improved mitigation plans may be considered • How do we involve community expertise? o Dedicated workshops? o Working Groups? o Other suggestions? #ICANN51
  • 22. GDD + Related Sessions Text Wednesday, 15 October o GDD Service Delivery, Customer Service & #ICANN51 Service Level Agreements o Universal Acceptance Thursday, 16 October o DNSSEC Key Rollover Workshop o Thick WHOIS Implementation (Working Session) o Deploying the IETF’s WHOIS Replacement
  • 23. Text Engage with ICANN on Web & Social Media twitter.com/icann facebook.com/icannorg linkedin.com/company/icann gplus.to/icann weibo.com/icannorg flickr.com/photos/icann youtube.com/user/ICANNnews icann.org