Security and Stability Advisory Committee

From ICANNWiki
Revision as of 23:07, 10 April 2011 by Caterina (talk | contribs)
Jump to navigation Jump to search

The Security and Stability Advisory Committee (SSAC) advises the ICANN Board on matters related to the security and integrity of domain names and the allocation of IP addresses, including but not limited to security assurance for operational matters, administrative matters and registrations matters. [1]

SSAC history

During the ICANN meeting from November 2001, the ICANN Board asked the Board President to assign a President for "security and stability of the Internet's naming and address allocation system" which has the responsibility to create a in-depth analysis of the risks and threats. In May 13 year 2002 the President of the committee for security and stability was converted to the President of the Security and Stability Advisory Committee (SSAC).[2]

There are currently 37 members of SSAC, with Patrik Fältström as the Chair.[3]

How does SSAC work?

SSAC conducts ongoing threat assessment and risk analysis for Internet allocation services to determine which are viable threats and how these threats could influence the stability of the Internet. SSAC advises the ICANN community based on the results of these assessments.

In order to fulfill its objective to advise ICANN, SSAC develops comments, reports and advisories on the issues which may concern the Internet community.

  • Reports are documents which contain substantive information and are developed in a few months' time. The reports represent a well-structured and in-depth analysis concerning a specific topic or issue, and includes recommendations for ICANN.
  • Comments are the responses received based on the reports created by ICANN groups or other eligible organizations. These comments are usually supplied to public calls.
  • Advisories are concise documents containing useful and clear advice for ICANN and the Internet community. The advisories supply recommendations and solutions for problems and ways to reduce risks and threats. [4]

References