Changes

Jump to navigation Jump to search
Line 15: Line 15:  
Definitions of DNS abuse can refer to the abuse of the protocol or the infrastructure or using DNS services or domain names to carry out other forms of abuse<ref>[https://www.icann.org/en/system/files/files/sac-115-en.pdf SAC115 pg. 5]</ref>. Manual mistakes, escalation of privileges, and compromised account access are all hallmarks of most breaches or attacks.<ref>[https://www.cisa.gov/sites/default/files/publications/CDM%20Success%20Story-CISA%20PAM%20Tool%20.pdf PAM Success Story, CISA]</ref>
 
Definitions of DNS abuse can refer to the abuse of the protocol or the infrastructure or using DNS services or domain names to carry out other forms of abuse<ref>[https://www.icann.org/en/system/files/files/sac-115-en.pdf SAC115 pg. 5]</ref>. Manual mistakes, escalation of privileges, and compromised account access are all hallmarks of most breaches or attacks.<ref>[https://www.cisa.gov/sites/default/files/publications/CDM%20Success%20Story-CISA%20PAM%20Tool%20.pdf PAM Success Story, CISA]</ref>
   −
According to the [[Internet and Jurisdiction Policy Network]], there are five broad categories of DNS abuse:<ref>[https://www.internetjurisdiction.net/uploads/pdfs/Papers/Domains-Jurisdiction-Program-Operational-Approaches.pdf Domains Jurisdiction Operational Approaches]</ref>
+
According to the [https://www.internetjurisdiction.net/ Internet and Jurisdiction Policy Network], there are five broad categories of DNS abuse:<ref>[https://www.internetjurisdiction.net/uploads/pdfs/Papers/Domains-Jurisdiction-Program-Operational-Approaches.pdf Domains Jurisdiction Operational Approaches]</ref>
 
* [[malware]], such as [[ransomware]],  
 
* [[malware]], such as [[ransomware]],  
 
* [[Botnet Attacks]],  
 
* [[Botnet Attacks]],  
Bureaucrats, Check users, lookupuser, Administrators, translator
14,927

edits

Navigation menu