Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.

Avenue4 LLCRead Message Promoted Post

Home / Industry

TLD Security, Spec 11 and Business Implications

After successfully securing your new TLD, launching it, and executing on your meticulously devised marketing plan, the only other concern you face is Security.

Unfortunately, predicting exactly when and to what degree a security threat will occur can be difficult but you can take steps to make your new TLD a source of legitimacy and credibility.

You may ask: Why security? One obvious reason: Specification 11. As part of the ICANN Registry Agreement, registry operators are required to analyze and report on the security threats posed to their TLDs. To satisfy the requirement, you need to detect whether domains in your namespace are being used to perpetrate security threats.

Beyond Spec 11, there are substantial business reasons to make your TLD a safer neighborhood on the net. Abusive registrations and compromised domains hurt the reputation of your brand.

Your TLD is your brand. Malware and phishing are threats to its reputation, and abusive registrations and compromised domains hurt its value. As part of your brand, all the more reason to make it a safe and secure haven — and a trusted destination — for your customers.

Abuse can harm the growth of your business. Often brands site the damage to customer trust and their brand as the prevailing outcome of a security incident.

Making your TLD more secure sends a positive message. Taking action to protect the businesses and consumers within your namespace is a strong and positive message that resonates in today's business climate.

"Managing abuse in your namespace and meeting Specification 11 requirements is a valuable way for registry operators to distinguish their TLD," said Sean Baseri, a TLD security expert and registry security program manager for Neustar. "We've seen just how critical it is to include the detection of threats in our TLD services, which is why we offer it to our customers at no charge."

Bill Doshier, President of dotStrategy who runs .BUZZ, immediately realized the importance of leveraging automated tools and security investigators to identify and investigate malicious activity.

"Delivering a clean namespace and protecting our customers as well as the .BUZZ brand is of utmost importance to us," states Bill Doshier. "I know I can rely on our registry partner to conduct the technical analysis to assess security threats in accordance with ICANN Specification 11," he adds.

How do you make your namespace more secure from phishing sites, or sites that distribute malware or bots? Baseri suggests an ongoing effort that includes detection of security threats.

Detection. Reports from your customers and affected companies are a valuable source of intelligence. To gain better visibility, you can also actively monitor available sources of information about security threats, such as information from private security organizations and Internet, and external security data feeds from the information security community.

Investigation. After you've identified a site that may be a source of a security threat, you should verify it before taking any action. If a site is involved in a security threat, keep in mind that the site's owner may not be participating. A skilled attacker can compromise a legitimate website without the owner even knowing it. Often, notifying the registrar, who can contact the registrant, is a good next step.

Finally, make sure you document the actions and steps you took in order to create the necessary reports for ICANN, should they request them.

The only thing tougher than getting a new TLD is everything after. Neustar can help with everything after. Learn More

Neustar

About Neustar – Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. Visit Page

SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

DNS Security

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Mobile Internet

Sponsored byAfilias

Promoted Post

Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.