FCC CSRIC III Working Group 4 Network Security Best Practices Rodney Joffe SVP and Senior Technologist, Neustar, Inc.

Slides:



Advertisements
Similar presentations
Business Practices Subcommittee Update April 30, 2012.
Advertisements

IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
Solutions Summit 2014 Corporate Rollout Jonathan Haynes, CPA, CGMA and Kelly Darren, CPA.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Working Group #3 E9-1-1 Location Accuracy December 16, 2011 Craig Frost, Verizon Wireless, Co-Chair Stephen J. Wisely, APCO International, Co-Chair.
Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting April 10, 2015 Information Security
Launch Methodology © LiveOps, Inc Proprietary and Confidential LiveOps Professional Services.
1. Construction/Safety Standards for Small Craft Webinar Presentation January 2014 Transport Canada Associate Assistant Deputy Minister Safety and Security.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
3 Dec 2003Market Operations Standing Committee1 Market Rule and Change Management Consultation Process John MacKenzie / Darren Finkbeiner / Ella Kokotsis,
Time schedule for ex ante evaluation and Strategic Environmental Assessment (SEA) Romania-Bulgaria Cross-Border Cooperation Operational Programme
Working Group #4: Network Security – Best Practices March 6, 2013 Presenters: Rod Rasmussen, Internet Identity Tony Tauber, Comcast WG #4.
PEACE III - Theme 1.1 Aid for Peace – Phases I & II 21 September 2011 Celeste McCallion.
BUYING PROCESS MAPS. 2 What is a BPM? A Buying Process Map (BPM) is a sales tool that maps the decision making process used to purchase a product, service.
Working Group 7: Botnet Remediation Status Update June 6, 2012 Michael O’Reirdan (MAAWG) - Chair Peter Fonash (DHS) – Vice-Chair.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
Draft-mickles-v6ops-isp-cases-01.txt September 19, 2002 Cleveland Mickles V6OPS ISP Breakout Session.
Victoria L. Ravenscroft Senior Policy Analyst Reliability Planning and Performance Analysis Information Sharing Policy Update March 25-26, 2014 Standing.
March 2014 Basic Content Management Tuffolo Group Perspective TUFFOLO.
ICANN Costa Rica March 2012 FOIWG. Presentation outline Scope of Framework Of Interpretation Process Topics for interpretation Activities since ICANN.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Presentation to the Chesapeake Bay and Water Resources Policy Committee July 30, 2010.
Working Group #4: Network Security Best Practices March 22, 2012 Presenter: Tony Tauber, Comcast WG #4 Member Via teleconference: Rod Rasmussen, Internet.
FCC CSRIC III Working Group 5 DNSSEC Implementation Practices Steve Crocker CEO, Shinkuro, Inc. March 6, 2013 Working Group 5: DNSSEC.
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
Working Group #4: Network Security Best Practices September 12, 2012 Presenter: Rod Rasmussen, Internet Identity WG #4 Co-Chair.
Working Group 1: NG9-1-1 December 16, 2011 Laurie Flaherty Brian Fontes WG 1 Co-Chairs.
OIRM Business Process Planning Overview for Business & Operations Advisory Committee May 27 – 28, 2015.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
Working Group 8 – E9-1-1 Best Practices September 23, 2011 Robin Howard Chair WG 8 – E911 Best Practices.
Information Architecture WG: Report of the Spring 2006 Meeting June 16, 2006 Dan Crichton, Chair NASA/JPL.
Working Group 1: Evolving 911 Services Status Update September 21, 2015 Jeff Cohen, Co-Chair (APCO International) Susan Sherwood, Co-Chair (Verizon)
Working Group 1: Evolving 911 Services Status Update December 3, 2015 Jeff Cohen, Co-Chair (APCO International) Susan Sherwood, Co-Chair (Verizon)
Working Group 3: Emergency Alert Systems Status Update September 21, 2015 Steve Johnson, Co-Chair National Cable & Telecommunications Association Kelly.
Working Group 6: Secure Hardware and Software – Security by Design Status Update September 21, 2015 Joel Molinoff, Co-Chair (CBS) Brian Scarpelli, Co-Chair.
Contractual Relationship Requirement for End Users Implementation update policy proposal
Working Group 6: Secure Hardware and Software – Security by Design Status Update December 3, 2015 Joel Molinoff, Co-Chair (CBS) Brian Scarpelli, Co-Chair.
1. Our final product will be an interactive public website which will allow the user to view various aspects of our current and future infrastructure.
1 3gpp_trans/ / IPv6 Transition Solutions for 3GPP Networks draft-wiljakka-3gpp-ipv6-transition-00.txt Juha Wiljakka,
The Global Forum on Food Security and Nutrition A platform for inclusive, multistakeholder policy dialogue Rome December 2015.
Working Group 4: DNS/Routing Interim Solutions December 16, 2011 Rodney Joffe WG 4 Chair.
Doc.: IEEE /??r0 TG4a PresentationSlide 0 Ultra Wideband in Europe The final few regulatory processes May 2006.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Working Group 3: Emergency Alert Systems Status Update March 16, 2016 Kelly Williams, Co-Chair National Association of Broadcasters Steve Johnson, Co-Chair.
Working Group 8: Priority Services CSRIC V Meeting March 16, 2016 Thomas Anderson, Co-Chair (Cisco) Bill Reidway, Co-Chair (Neustar)
Working Group 1: Evolving 911 Services Status Update March 16, 2016 Jeff Cohen, Co-Chair (APCO International) Susan Sherwood, Co-Chair (Verizon)
Seite 1 Thematic Activities WP 4 and WP 5 Working Group Meeting, Halle 18 March 2014.
ITU Regional Standardization Forum For Arab Region SESSION 5 14:00-14:35 Guidelines for effective preparation.
REGION H Water Planning Group Freese and Nichols, Inc. | LBG-Guyton Associates | Ekistics Corporation DEVELOPING THE REGION H 2016 REGIONAL WATER PLAN.
IDMP Overview December 2015.
Insight Proprietary & Confidential. Do Not Copy or Distribute. © 2015 Insight Direct USA, Inc. All Rights Reserved. Insight Presentation Insight’s Tagline.
Working Group 1: Evolving 911 Services Status Update June 22, 2016 Jeff Cohen, Co-Chair (APCO International) Susan Sherwood, Co-Chair (Verizon)
The Aarhus Convention Reporting Mechanism National Implementation Reports 2011 Experience and lessons learned Aphrodite Smagadi, Aarhus Convention secretariat.
CBP Biennial Strategy Review System
<Student’s name>
Edwards Aquifer HCP Annual Report
Are we ready to move to the Design Phase?
CBP Biennial Strategy Review System ~Meetings Detail~ DRAFT August 29, /6/2018 DRAFT.
CBP Biennial Strategy Review System
ITU Regional Standardization Forum For Arab Region SESSION 5 14:00-14:35 Guidelines for effective preparation  
Secondary Use of EHR: UK Experience 11 October 2007
DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0
IEEE 802 EC Privacy Recommendation SG November, 2014, Report to 802 EC
4 + (-5) = A. Start at zero B. Move ______ spaces ___________ to get to the first number. C. From there, move _____ spaces __________ D. My final answer.
WG GES: Decision review progress
POWER CHALLENGES Several Ways To Solve 7 CHALLENGES.
Fire Emissions Joint Forum
Project Directors Report to 
Presentation transcript:

FCC CSRIC III Working Group 4 Network Security Best Practices Rodney Joffe SVP and Senior Technologist, Neustar, Inc.

The Problem 1© Neustar Inc. / Proprietary and Confidential Forging of DNS Answers and False Route Announcements allow fraudulent transactions to occur: Phishing Pharming DNS Cache Poisoning Traffic Hijacking

The Solution 2© Neustar Inc. / Proprietary and Confidential DNSSEC - Authentication of DNS answers WG5 BGPSEC - Authentication of routing announcements WG6 Both critical to solving significant issues that exist in the wild Challenge: Until they are fully implemented, the problem exists

WG4 Objective 3© Neustar Inc. / Proprietary and Confidential Identify interim solutions for providers to implement that will provide some level of effective security Dual Parallel Track

The Solution 4© Neustar Inc. / Proprietary and Confidential Phase 1, March 2012, Identify stakeholders detail problem space and challenges for all stakeholders E.G. (Service Providers, application developers end users, Etc) Phase 2, September 2012 Identify potential solutions Phase 3, December 2012 Draft Final Report on Recommendations for Best Practices, seek Committee input and comment Phase 4, March 2012 Final report

Thank You Rodney Joffe (202) © Neustar Inc. / Proprietary and Confidential