Trust: Difference between revisions
m added Category:Concepts using HotCat |
|||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
'''Trust''' is the belief and process leading to | '''Trust''' is the belief and process leading to a belief in the reliability, truth, ability, or strength of someone or something. Ensuring trust is a key issue in maintaining the value of the Internet, and several organizations are devoted to meeting this objective, including [[ICANN]] and the [[Internet Society]].<ref>[https://www.internetsociety.org/issues/trust/ On Trust, Internet Society]</ref> | ||
==Trusted Notifier== | ==Trusted Notifier== | ||
A [[Trusted Notifier]] is a designated entity for alerting Registries about illegal activity, content, and/or DNS | A [[Trusted Notifier]] is a designated entity for alerting [[Registries]] about [[Cybercrime|illegal activity]], content, and/or [[DNS Abuse]] associated with a [[Domain Name|domain name]].<ref>[https://www.ntia.gov/press-release/2020/commerce-department-announces-ntia-pilot-program-hhs-fda-fight-illegal-online#:~:text=The%20%E2%80%9Ctrusted%20notifier%E2%80%9D%20designation%20expedites,for%20suspending%20domain%20name%20registrations.&text=At%20the%20end%20of%20the,sale%20of%20unapproved%20opioids%20online. Commerce Department Announces NTIA Pilot Program with HHS, FDA to Fight Illegal Online Opioid Sales]</ref> | ||
==Computer Science== | ==Computer Science== | ||
Line 13: | Line 13: | ||
==RBLs== | ==RBLs== | ||
[[RBL|Blocklists]] or reputation data feeds play a significant role in cleaning up malicious activity and thus, maintaining trust in the Internet. | [[RBL|Blocklists]], or reputation data feeds, play a significant role in cleaning up [[Malicious Domain|malicious activity]] and thus, maintaining trust in the Internet. | ||
==Issues== | ==Issues== | ||
Trust has always played a role in human communication technology.<ref>Peters, John Durham. ''Speaking into the Air: A History of the Idea of Communication''. University of Chicago Press, 2012.</ref>, and [[Cybercrime|people have long been able to take advantage of the networks that allow communication]] in part because trust dramatically expedites the flow of information.<ref>Dutton, William H., and Adrian Shepherd. "Trust in the Internet as an experience technology." ''Information, Communication & Society 9'', no. 4 (2006): 433-451.</ref> | Trust has always played a role in human communication technology.<ref>Peters, John Durham. ''Speaking into the Air: A History of the Idea of Communication''. University of Chicago Press, 2012.</ref>, and [[Cybercrime|people have long been able to take advantage of the networks that allow communication]] in part because trust dramatically expedites the flow of information.<ref>Dutton, William H., and Adrian Shepherd. "Trust in the Internet as an experience technology." ''Information, Communication & Society 9'', no. 4 (2006): 433-451.</ref> | ||
===Social Engineering== | ===Social Engineering=== | ||
[[Social Engineering Attacks|Social engineering]] refers to malicious activities accomplished through human interactions that take advantage of social norms and expectations of trust. Such asttacks rely on psychological manipulation to trick users into making security mistakes or disclosing sensitive information.<ref>[https://www.icann.org/en/blogs/details/raising-security-awareness-one-security-term-at-a-time-15-6-2015-en Raising Security Awareness, ICANN Blog]</ref> | [[Social Engineering Attacks|Social engineering]] refers to malicious activities accomplished through human interactions that take advantage of social norms and expectations of trust. Such asttacks rely on psychological manipulation to trick users into making security mistakes or disclosing sensitive information.<ref>[https://www.icann.org/en/blogs/details/raising-security-awareness-one-security-term-at-a-time-15-6-2015-en Raising Security Awareness, ICANN Blog]</ref> | ||
Line 24: | Line 24: | ||
[[Category:Concepts]] | [[Category:Concepts]] | ||
[[Category:Cybersecurity]] |
Latest revision as of 16:27, 27 October 2021
Trust is the belief and process leading to a belief in the reliability, truth, ability, or strength of someone or something. Ensuring trust is a key issue in maintaining the value of the Internet, and several organizations are devoted to meeting this objective, including ICANN and the Internet Society.[1]
Trusted Notifier
A Trusted Notifier is a designated entity for alerting Registries about illegal activity, content, and/or DNS Abuse associated with a domain name.[2]
Computer Science
In computer science, trust refers to the generation of authorities or user access/privileges through Cryptography. An entity trusts another entity when the first one makes the assumption that the second one will behave exactly as the first entity expects.[3] Trust is predictability. Identification, authentication, accountability, authorization, and availability support confidence in predictability. Trust is a set of binary relationships based on individual identity or unique characteristic validation.[4] A trust model identifies the specific mechanisms necessary to respond to a specific threat profile.
- Zero Trust (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.[5]
- Cryptocurrencies use proof of work (PoW) to achieve trust.
- Trusted certificates create secure connections to a server via the Internet.
- Trusted Notifiers
RBLs
Blocklists, or reputation data feeds, play a significant role in cleaning up malicious activity and thus, maintaining trust in the Internet.
Issues
Trust has always played a role in human communication technology.[6], and people have long been able to take advantage of the networks that allow communication in part because trust dramatically expedites the flow of information.[7]
Social Engineering
Social engineering refers to malicious activities accomplished through human interactions that take advantage of social norms and expectations of trust. Such asttacks rely on psychological manipulation to trick users into making security mistakes or disclosing sensitive information.[8]
References
- ↑ On Trust, Internet Society
- ↑ Commerce Department Announces NTIA Pilot Program with HHS, FDA to Fight Illegal Online Opioid Sales
- ↑ ITU-T x.509
- ↑ Defining Trust, "Trust Modeling for Security Architecture Development," InformIT
- ↑ SP 800-207, NIST
- ↑ Peters, John Durham. Speaking into the Air: A History of the Idea of Communication. University of Chicago Press, 2012.
- ↑ Dutton, William H., and Adrian Shepherd. "Trust in the Internet as an experience technology." Information, Communication & Society 9, no. 4 (2006): 433-451.
- ↑ Raising Security Awareness, ICANN Blog