.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.

Slides:



Advertisements
Similar presentations
1 ICANNs Contractual Compliance Program David Giza, Senior Director, Contractual Compliance Stacy Burnette, Director, Contractual Compliance ICANN Policy.
Advertisements

Intellectual Property Constituency Jane Mutimear.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Governmental Advisory Committee New gTLD Program Briefing 19 June 2010.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Breaking Trust On The Internet
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
NewTLDs: Implications for Trademark Owners Mike Rodenbaugh Online Brand Management in the World of New gTLDs MelbourneIT Strategy Seminar November 21,
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
INTERNET and CODE OF CONDUCT
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Interim Report Review Inter-Registrar Domain Name Transfers ICANN DNSO Names Council Task Force on Transfers Public Discussion on Transfers of gTLD Names.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Интернет-безопасность в России глазами регистраторов доменных имен и хостинг- провайдеров Alina Legoydo Senior manager of international relations division.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyber Crimes.
The Sponsored.xxx TLD Promoting Online Responsibility: Policy Development Process.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
CcTLD/ICANN Contract for Services (Draft Agreements) A Comparison.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 17 E-Commerce and Digital Law
OECD - HCOPIL - ICC Conference on Building Trust in the Online Environment The Hague, December 11-12, 2000 THE ONLINE DISPUTE RESOLUTION EXPERIENCE OF.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Lesson 15 : Networks And The Internet
Registry Internet Safety Group
Governmental Advisory Committee Public Safety Working Group 1.
Review of CCWG-Acct 3 rd Proposal and ALAC Issues Alan Greenberg 04 December 2015.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
IRTP Part B PDP Final Report Overview. Background Inter-Registrar Transfer Policy (IRTP) Straightforward process for registrants to transfer domain names.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Important Information Provided by Information Technology Center
Botnets A collection of compromised machines
Managing Windows Security
Chapter 15 Internet Law and E-Commerce
Advanced Income Tax Law
Summary of the « New gTLD Program Safeguards » context before the Statistical Analysis of DNS Abuse in gTLD Farell FOLLY, Africa 2.0 Foundation .

ICANN’s Policy Development Activities
DNS Hijacking – KL Tech Meet-up - May 2015
Update on ICANN Domain Name Registrant Work
Botnets A collection of compromised machines
Computer Security.
Chapter 13 E-Commerce Contracts
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
The Domain Abuse Activity Reporting System (DAAR)
Presentation transcript:

.ORG, The Public Interest Registry

2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a response capability to defend itself against attacks on the TLD infrastructure or wide-scale abuse of its domains. 2) A commitment and service to the registrant and user community

3 Proprietary & Confidential The.ORG Abuse Policy GOALS »Phishing: Reduce average up-time of phish in.ORG. –Reduce maliciously registered domains. –Reduce total number of phish live in the.ORG zone »Fast-flux: Keep the.ORG zone free of fast-flux domains »Child Pornography: Eliminate all.ORG domains hosting child pornography »Spam: Prevent spam levels from increasing. Spam to be measured by number of.ORG domains on standard blacklists »Malware: difficult to quantify; Biggest wins come in taking down malicious domains that are distributing malware (as opposed to domains that are compromised/infected); Protect innocent registrants.

4 Proprietary & Confidential Pursuant to Section of the RRA, PIR reserves the right to deny, cancel or transfer any registration or transaction, or place any domain name(s) on registry lock, hold or similar status, that it deems necessary, in its discretion: (1) to protect the integrity and stability of the registry; (2) to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process;

5 Proprietary & Confidential Defining Abuse Illegal or fraudulent actions Spam Phishing Pharming Willful distribution of malware Fast flux hosting Botnet command and control Distribution of child pornography Illegal Access to Other Computers or Networks

6 Proprietary & Confidential How does.ORG make sure innocent registrants are protected? »Each suspected abusive domain is closely examined and all abuse will be double verified to ensure as close to 100% accuracy as possible. »First attempt to notify Registrar and provide reasonable time to remedy. »If it appears a website has been “hacked or compromised” and an innocent registrant’s domain is being abused, PIR will take steps to help and prevent further harm to the innocent victim and never suspend the site at Regsitry level. »Child Porn verified by Law Enforcement & NCMEC (under 14 years old known victims) »Audit of.Org abuse policy by 3 rd party to ensure compliance.

7 Proprietary & Confidential Does this policy prevent brand abuse? »This policy is not a replacement for the UDRP. UDRP »This policy is aimed at criminal activity, and is not a substitute for the current, effective policies and legal recourses that registrants may use to settle intellectual property disputes involving domain names.

8 Proprietary & Confidential What about a mistake? »All domains suspected of abuse on hold and not immediately deleted them. »In the extremely rare case that an innocent domain is suspended, it can quickly be restored.

9 Proprietary & Confidential

10 Proprietary & Confidential Success! »Spam: On a typical day, less than 100.ORG domains out of 7.5 million+ are involved in spamming NOTE:.ORG is an open global gTLD (no residency requirements and subject to ICANN’s open equal access Registrar policy »Since February we have been blocking about 55 Conficker domains a day. For 2009, that will be about 18,000 domains. »Since July over 3,100 abusive domains successfully addressed

11 Proprietary & Confidential Adam Palmer, Law & Policy Counsel The Public Interest Registry 1775 Wiehle Avenue, Suite 200 Reston, VA USA