Line 258: |
Line 258: |
| | | |
| ===Practices=== | | ===Practices=== |
| + | ====Accepted==== |
| * [[Data Escrow]] – storing data with a neutral third party in case of registry or registrar failure, accreditation termination, or accreditation relapse without renewal. | | * [[Data Escrow]] – storing data with a neutral third party in case of registry or registrar failure, accreditation termination, or accreditation relapse without renewal. |
| * [[Defensive Registration]] – registering domain names, often across multiple TLDs and in various grammatical formats, to protect intellectual property from DNS abuse. | | * [[Defensive Registration]] – registering domain names, often across multiple TLDs and in various grammatical formats, to protect intellectual property from DNS abuse. |
| * [[Delegation]] – entering a new TLD into the Root Zone of the Internet. | | * [[Delegation]] – entering a new TLD into the Root Zone of the Internet. |
| * [[Direct Navigation]] – visiting a website while bypassing online search engines to arrive at the desired domain. | | * [[Direct Navigation]] – visiting a website while bypassing online search engines to arrive at the desired domain. |
− | * [[Domain Locking]] (aka Registry or Registrar locking) – locking a domain name so that it cannot be transferred or altered without the explicit permission of the registrant. | + | * [[Domain Locking]] (aka registry or registrar locking) – locking a domain name so that it cannot be transferred or altered without the explicit permission of the registrant. |
| * [[Domain Monetization]] – purchasing domain names and then either selling, leasing, or parking them to earn money. | | * [[Domain Monetization]] – purchasing domain names and then either selling, leasing, or parking them to earn money. |
| * [[Domain Parking]] registering a domain name to a page that acts as a placeholder, perhaps to advertise the sale of the domain or as a standby page before the owner adds content. | | * [[Domain Parking]] registering a domain name to a page that acts as a placeholder, perhaps to advertise the sale of the domain or as a standby page before the owner adds content. |
| * [[Domain Privacy]] – service provided by registrars that prevents registrants' information from being listed in the WHOIS database. | | * [[Domain Privacy]] – service provided by registrars that prevents registrants' information from being listed in the WHOIS database. |
− | * [[Domain Slamming]] – sending fake renewal notices or bills to domain name registrants that are actually disguised service transfer notices
| |
| * [[Domain Tasting]] – using the free five-day grace period at the beginning of ICANN's registration process to test the marketability of a specific domain name. | | * [[Domain Tasting]] – using the free five-day grace period at the beginning of ICANN's registration process to test the marketability of a specific domain name. |
| * [[Drop-Catching]] – the auto-registration of domains at the moment of their deletion. | | * [[Drop-Catching]] – the auto-registration of domains at the moment of their deletion. |
| + | * [[SEO]] – Search Engine Optimization is a process undertaken by webmasters to increase the number of visitors to a particular website by trying to move up its ranking on a search engine's search results page. |
| + | * [[Vertical Integration]] – A single body handling the Registry Operator and the Registrar. |
| + | ====Discouraged==== |
| + | * [[Cybercrime]] – |
| + | * [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark |
| + | * [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available. |
| + | * [[Domain Slamming]] – sending fake renewal notices or bills to domain name registrants that are actually disguised service transfer notices |
| * [[Fast Flux]] – a technique to evade identification and thwart anti-crime efforts aimed at identifying and shutting down websites used for illegal purposes. | | * [[Fast Flux]] – a technique to evade identification and thwart anti-crime efforts aimed at identifying and shutting down websites used for illegal purposes. |
| * [[Reverse Domain Name Hijacking]] – using trademark protection mechanisms, such as ICANN's UDRP or the ACPA, in bad faith to acquire a domain name when the owner has legitimate rights to it. | | * [[Reverse Domain Name Hijacking]] – using trademark protection mechanisms, such as ICANN's UDRP or the ACPA, in bad faith to acquire a domain name when the owner has legitimate rights to it. |
− | * [[SEO]] – Search Engine Optimization is a process undertaken by webmasters to increase the number of visitors to a particular website by trying to move up its ranking on a search engine's search results page.
| |
| * [[Spam]] Sending unsolicited bulk emails, with substantively identical content, to recipients who have not granted permission for the message to be sent. | | * [[Spam]] Sending unsolicited bulk emails, with substantively identical content, to recipients who have not granted permission for the message to be sent. |
− | * [[Vertical Integration]] – A single body handling the Registry Operator and the Registrar.
| + | ====[[DNS Abuse]]==== |
− | ====DNS Abuse==== | |
| * [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator. | | * [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator. |
| * [[Cache Poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code. | | * [[Cache Poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code. |
− | * [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
| |
| * [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source. | | * [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source. |
| * [[Domain Name Hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested. | | * [[Domain Name Hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested. |
− | * [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
| |
| * [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems. | | * [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems. |
| * [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning. | | * [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning. |
Line 286: |
Line 289: |
| * [[Social Engineering Attacks]] – practices that exploit people’s inclinations to trust and help others, often in aid of DNS abuse. | | * [[Social Engineering Attacks]] – practices that exploit people’s inclinations to trust and help others, often in aid of DNS abuse. |
| * [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking. | | * [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking. |
| + | ====[[DNS Abuse Responses]]==== |
| + | * [[Cybersecurity]] – |
| | | |
| ==Roles== | | ==Roles== |