Line 30: |
Line 30: |
| | | |
| ===Governments/Intergovernmental Organizations=== | | ===Governments/Intergovernmental Organizations=== |
− | IGO responses generally see DNS Abuse as a facet of [[Cybercrime]]. Government responses tend to focus on what can be adjudicated; content abuse, such as child pornography; and outlining how and when electronic evidence can be collected. | + | IGO responses generally see DNS Abuse as a facet of [[Cybercrime]]. Government responses tend to focus on what can be adjudicated; include content abuse, such as child pornography; and outline how and when electronic evidence can be collected. |
− | ====Objective==== | + | ====Objectives==== |
| + | |
| =====Pro-Mitigation===== | | =====Pro-Mitigation===== |
| * [[Budapest Convention]] | | * [[Budapest Convention]] |
| | | |
− | * '''Domestic Legislation'''
| + | |
| | | |
| =====Pro-Privacy===== | | =====Pro-Privacy===== |
| *Pro-privacy legislation, such as the [[GDPR]], limits access to natural persons' data. | | *Pro-privacy legislation, such as the [[GDPR]], limits access to natural persons' data. |
| | | |
| + | ====Government Responses==== |
| + | =====Domestic Legislation===== |
| ====Case Type==== | | ====Case Type==== |
| =====Civil===== | | =====Civil===== |
Line 45: |
Line 48: |
| =====Criminal===== | | =====Criminal===== |
| | | |
| + | =====Responding to State-Sponsored Cyberattacks===== |
| + | * [[SolarWinds Hacking Attack]] |
| + | * [[Microsoft Email Systems Hacking Attack]] On July 19, 2021, the Biden administration formally condemned but did not inflict sanctions against the Chinese government for working with hackers to breaching Microsoft email systems.<ref>[https://www.nytimes.com/2021/07/19/us/politics/microsoft-hacking-china-biden.html?action=click&module=Spotlight&pgtype=Homepage US Govt Accuses China of Hacking Microsoft, NY Times]</ref> |
| ===Technical Community=== | | ===Technical Community=== |
| | | |
Line 67: |
Line 73: |
| ====End Users==== | | ====End Users==== |
| End users, even those who work in the DNS industry, need help managing DNS Abuse mainly because of the timeless effectiveness of [[Social Engineering Attacks]]. For instance, at the end of 2020, [[GoDaddy]] notoriously tested its workers to see if they would share sensitive information after clicking on dubious links from a spoofed email.<ref> [http://domainincite.com/26143-godaddy-pranks-employees-with-insensitive-phishing-test GoDaddy Pranks Employees DomainIncite]</ref> | | End users, even those who work in the DNS industry, need help managing DNS Abuse mainly because of the timeless effectiveness of [[Social Engineering Attacks]]. For instance, at the end of 2020, [[GoDaddy]] notoriously tested its workers to see if they would share sensitive information after clicking on dubious links from a spoofed email.<ref> [http://domainincite.com/26143-godaddy-pranks-employees-with-insensitive-phishing-test GoDaddy Pranks Employees DomainIncite]</ref> |
| + | |
| + | ==References== |
| | | |
| ==References== | | ==References== |
| | | |
| [[Category:Glossary]] | | [[Category:Glossary]] |