Changes

Jump to navigation Jump to search
no edit summary
Line 7: Line 7:     
'''Abuse ''via the'' DNS''': Harmful cyber activity that cannot take place without using the DNS, but where the threat actors' operations do not constitute abuse of the DNS.<ref>[https://www.icann.org/en/system/files/files/presentation-day2db-first-dns-abuse-sig-hausding-26may21-en.pdf FIRST DNS Abuse SIG, IDS 2021]</ref>
 
'''Abuse ''via the'' DNS''': Harmful cyber activity that cannot take place without using the DNS, but where the threat actors' operations do not constitute abuse of the DNS.<ref>[https://www.icann.org/en/system/files/files/presentation-day2db-first-dns-abuse-sig-hausding-26may21-en.pdf FIRST DNS Abuse SIG, IDS 2021]</ref>
      
==Related Articles==
 
==Related Articles==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,927

edits

Navigation menu