Changes

Jump to navigation Jump to search
Line 50: Line 50:  
* [[RISG]] – The Registration Infrastructure Security Group is a non-profit organization for finding solutions and developing best practices for decreasing Internet security threats.
 
* [[RISG]] – The Registration Infrastructure Security Group is a non-profit organization for finding solutions and developing best practices for decreasing Internet security threats.
 
* [[US ISPA]] – United States Internet Service Providers Association
 
* [[US ISPA]] – United States Internet Service Providers Association
* [[WIPO]] - World Intellectual Property Organization, a UN agency that provides a global forum for intellectual property services, policies, and information.
+
* [[WIPO]] World Intellectual Property Organization, a UN agency that provides a global forum for intellectual property services, policies, and information.
* [[W3C]] An international industry consortium that develops protocols and guidelines to ensure the interoperability and growth of the World Wide Web.
+
* [[W3C]] An international industry consortium that develops protocols and guidelines to ensure the interoperability and growth of the World Wide Web.
    
===Panels===
 
===Panels===
Line 68: Line 68:     
===Task Forces===
 
===Task Forces===
* [[IETF]] – The Internet Engineering Task Force is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet.
+
* [[IETF]] – The Internet Engineering Task Force is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of Internet architecture and the smooth operation of the Internet.
 
* [[IRTF]] – The Internet Research Task Force has focused, long-term research groups on the evolution of Internet protocols, applications, architecture and technology.
 
* [[IRTF]] – The Internet Research Task Force has focused, long-term research groups on the evolution of Internet protocols, applications, architecture and technology.
   Line 85: Line 85:  
* [[CCWG-IG]] – Cross-Community Working Group on Internet Governance
 
* [[CCWG-IG]] – Cross-Community Working Group on Internet Governance
 
* [[FFWG]] – The Fast Flux Working Group was formed by ICANN in 2008 to deal with problems and gain expert opinion on the best use of fast flux and its scope for the GNSO.  
 
* [[FFWG]] – The Fast Flux Working Group was formed by ICANN in 2008 to deal with problems and gain expert opinion on the best use of fast flux and its scope for the GNSO.  
* [[IDN WG]] An Internationalized Domain Name Working Group formed by the IETF in 2000 to develop standards for the use of non-ASCII scripts or characters in domain names; ICANN established its IDN Working Group in 2001.
+
* [[IDN WG]] An Internationalized Domain Name Working Group formed by the IETF in 2000 to develop standards for the use of non-ASCII scripts or characters in domain names; ICANN established its IDN Working Group in 2001.
 
* [[JIG]] – The Joint ccNSO-GNSO IDN Working Group deals with the introduction of IDN ccTLDs under the Fast Track Implementation Process
 
* [[JIG]] – The Joint ccNSO-GNSO IDN Working Group deals with the introduction of IDN ccTLDs under the Fast Track Implementation Process
 
* [[M3AAWG]] – a global association of Internet service providers, telecom companies, email service providers, and social networking companies that targets abusive messaging, malware, and abuse by publishing best practices and training/educational materials on fighting abuse.  
 
* [[M3AAWG]] – a global association of Internet service providers, telecom companies, email service providers, and social networking companies that targets abusive messaging, malware, and abuse by publishing best practices and training/educational materials on fighting abuse.  
Line 94: Line 94:     
==Concepts==
 
==Concepts==
 +
* [[Accountability]]
 +
* [[Cyber Resiliency]]
 +
* [[Data Privacy]]
 
* [[End-to-end connectivity]] – the system principle that network features should be implemented as close to endpoints as possible.  
 
* [[End-to-end connectivity]] – the system principle that network features should be implemented as close to endpoints as possible.  
 +
* [[Global Public Interest]]
 +
* [[Internet governance]] – the development of norms and principles relating to how the Internet functions by a group of stakeholders including governments, organizations, and commissions and the regulation and administration of those principles by the parties involved.
 +
* [[Interoperability]]
 
* [[Multistakeholder Model]] – approach to governance or policymaking that brings together the primary stakeholders, such as businesses, civil society, governments, research institutions, and non-government organizations, to engage in the dialogue, decision-making, and implementation of solutions to common problems or goals.
 
* [[Multistakeholder Model]] – approach to governance or policymaking that brings together the primary stakeholders, such as businesses, civil society, governments, research institutions, and non-government organizations, to engage in the dialogue, decision-making, and implementation of solutions to common problems or goals.
 
* [[Net Neutrality]] – determining the degree to which Internet Service Providers can selectively promote certain Internet content and applications to their customers, whether through Zero-Rating, paid prioritization, or other means.
 
* [[Net Neutrality]] – determining the degree to which Internet Service Providers can selectively promote certain Internet content and applications to their customers, whether through Zero-Rating, paid prioritization, or other means.
Line 204: Line 210:  
* [[Local Area Network]] – a network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building.
 
* [[Local Area Network]] – a network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building.
 
* [[Proxy server]] – an application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.
 
* [[Proxy server]] – an application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.
* [[Domain Name Resolvers]] the computers used by ISPs to respond to a user request to resolve a domain name, that is, to translate it into an IP Address.
+
* [[Domain Name Resolvers]] the computers used by ISPs to respond to a user request to resolve a domain name, that is, to translate it into an IP Address.
 
* [[Virtual Private Network]] – uses public network infrastructures to provide connection or communication services for users who are traveling or in remote areas.
 
* [[Virtual Private Network]] – uses public network infrastructures to provide connection or communication services for users who are traveling or in remote areas.
 
* [[Wide Area Network]] – a data communications network in which computers, separated by a distance of more than half a mile, can be connected.
 
* [[Wide Area Network]] – a data communications network in which computers, separated by a distance of more than half a mile, can be connected.
Line 212: Line 218:  
* [[IANA]] – managing the DNS root zone, the .int registry, and the .arpa zone; coordinating and allocating the global IP respectively AS number space to Regional Internet Registries; and providing the main repository for number registries and protocol names.  
 
* [[IANA]] – managing the DNS root zone, the .int registry, and the .arpa zone; coordinating and allocating the global IP respectively AS number space to Regional Internet Registries; and providing the main repository for number registries and protocol names.  
 
* [[IANA Functions Stewardship Transition]] – a process and community discussion regarding the United States government's NTIA's provision of the IANA functions to the global Internet community, spearheaded by ICANN.
 
* [[IANA Functions Stewardship Transition]] – a process and community discussion regarding the United States government's NTIA's provision of the IANA functions to the global Internet community, spearheaded by ICANN.
* [[Internet governance]] – the development of norms and principles relating to how the Internet functions by a group of stakeholders including governments, organizations, and commissions and the regulation and administration of those principals by the parties involved.
+
* [[Internet Standards Process]] the IETF-recommended process that a specification undergoes involving developments, iterations of review, revision, and ultimately adoption and publication.
* [[Internet Standards Process]] the IETF-recommended process that a specification undergoes involving developments, iterations of review, revision, and ultimately adoption and publication.
   
* [[Name Resolution]] – the process of transforming a domain name to its corresponding IP address.
 
* [[Name Resolution]] – the process of transforming a domain name to its corresponding IP address.
 
* [[Routing]] – the process of selecting a path for traffic in a network or between or across multiple networks.
 
* [[Routing]] – the process of selecting a path for traffic in a network or between or across multiple networks.
Line 224: Line 229:  
==Processes==
 
==Processes==
 
* [[ICANN Reviews]] – bylaw-established processes to ensure that ICANN is performing its mission and check the health of the multistakeholder model, transparency and accountability, organizational effectiveness, and DNS security and stability.
 
* [[ICANN Reviews]] – bylaw-established processes to ensure that ICANN is performing its mission and check the health of the multistakeholder model, transparency and accountability, organizational effectiveness, and DNS security and stability.
* [[Organizational Review]]s – one type of ICANN Review; the periodic, independent assessment of the performance and operation of ICANN's SOs, ACs, and NomCom.  
+
* [[ICANN Reviews#Organizational Reviews|Organizational Reviews]] – one type of ICANN Review; the periodic, independent assessment of the performance and operation of ICANN's SOs, ACs, and NomCom.  
* [[Specific Reviews]] –  
+
* [[ICANN Reviews#Specific Reviews|Specific Reviews]] –  
 
   
 
   
 
===Mechanisms===
 
===Mechanisms===
Line 256: Line 261:     
===Practices===
 
===Practices===
 +
====Accepted====
 
* [[Data Escrow]] – storing data with a neutral third party in case of registry or registrar failure, accreditation termination, or accreditation relapse without renewal.
 
* [[Data Escrow]] – storing data with a neutral third party in case of registry or registrar failure, accreditation termination, or accreditation relapse without renewal.
 
* [[Defensive Registration]] –  registering domain names, often across multiple TLDs and in various grammatical formats, to protect intellectual property from DNS abuse.
 
* [[Defensive Registration]] –  registering domain names, often across multiple TLDs and in various grammatical formats, to protect intellectual property from DNS abuse.
 
* [[Delegation]] – entering a new TLD into the Root Zone of the Internet.
 
* [[Delegation]] – entering a new TLD into the Root Zone of the Internet.
 
* [[Direct Navigation]] – visiting a website while bypassing online search engines to arrive at the desired domain.
 
* [[Direct Navigation]] – visiting a website while bypassing online search engines to arrive at the desired domain.
* [[Domain Locking]] (aka Registry or Registrar locking) – locking a domain name so that it cannot be transferred or altered without the explicit permission of the registrant.
+
* [[Domain Locking]] (aka registry or registrar locking) – locking a domain name so that it cannot be transferred or altered without the explicit permission of the registrant.
 
* [[Domain Monetization]] – purchasing domain names and then either selling, leasing, or parking them to earn money.
 
* [[Domain Monetization]] – purchasing domain names and then either selling, leasing, or parking them to earn money.
* [[Domain Parking]] registering a domain name to a page that acts as a placeholder, perhaps to advertise the sale of the domain or as a standby page before the owner adds content.
+
* [[Domain Parking]] registering a domain name to a page that acts as a placeholder, perhaps to advertise the sale of the domain or as a standby page before the owner adds content.
 
* [[Domain Privacy]] – service provided by registrars that prevents registrants' information from being listed in the WHOIS database.
 
* [[Domain Privacy]] – service provided by registrars that prevents registrants' information from being listed in the WHOIS database.
* [[Domain Slamming]] – sending fake renewal notices or bills to domain name registrants that are actually disguised service transfer notices
   
* [[Domain Tasting]] – using the free five-day grace period at the beginning of ICANN's registration process to test the marketability of a specific domain name.
 
* [[Domain Tasting]] – using the free five-day grace period at the beginning of ICANN's registration process to test the marketability of a specific domain name.
 
* [[Drop-Catching]] – the auto-registration of domains at the moment of their deletion.
 
* [[Drop-Catching]] – the auto-registration of domains at the moment of their deletion.
 +
* [[SEO]] – Search Engine Optimization is a process undertaken by webmasters to increase the number of visitors to a particular website by trying to move up its ranking on a search engine's search results page.
 +
* [[Vertical Integration]] – A single body handling the Registry Operator and the Registrar.
 +
 +
====Discouraged====
 +
* [[Cybercrime]] –
 +
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
 +
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
 +
* [[Domain Slamming]] – sending fake renewal notices or bills to domain name registrants that are actually disguised service transfer notices
 
* [[Fast Flux]] – a technique to evade identification and thwart anti-crime efforts aimed at identifying and shutting down websites used for illegal purposes.
 
* [[Fast Flux]] – a technique to evade identification and thwart anti-crime efforts aimed at identifying and shutting down websites used for illegal purposes.
 
* [[Reverse Domain Name Hijacking]] – using trademark protection mechanisms, such as ICANN's UDRP or the ACPA, in bad faith to acquire a domain name when the owner has legitimate rights to it.  
 
* [[Reverse Domain Name Hijacking]] – using trademark protection mechanisms, such as ICANN's UDRP or the ACPA, in bad faith to acquire a domain name when the owner has legitimate rights to it.  
* [[SEO]] – Search Engine Optimization is a process undertaken by webmasters to increase the number of visitors to a particular website by trying to move up its ranking on a search engine's search results page.
+
* [[Spam]] – Sending unsolicited bulk emails, with substantively identical content, to recipients who have not granted permission for the message to be sent.
* [[Spam]] Sending unsolicited bulk emails, with substantively identical content, to recipients who have not granted permission for the message to be sent.
+
 
* [[Vertical Integration]] – A single body handling the Registry Operator and the Registrar.
+
====[[DNS Abuse]]====
====DNS Abuse====
   
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
 
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
 
* [[Cache Poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
 
* [[Cache Poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
   
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
 
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
* [[DNS Hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.
+
* [[Domain Name Hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.  
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
   
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
 
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
 
* [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning.  
 
* [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning.  
Line 284: Line 294:  
* [[Social Engineering Attacks]] – practices that exploit people’s inclinations to trust and help others, often in aid of DNS abuse.
 
* [[Social Engineering Attacks]] – practices that exploit people’s inclinations to trust and help others, often in aid of DNS abuse.
 
* [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking.
 
* [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking.
 +
====[[DNS Abuse Responses]]====
 +
* [[Cybersecurity]] –
 +
* [[Cryptography]] –
    
==Roles==
 
==Roles==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,927

edits

Navigation menu