Hardening The Internet: Difference between revisions
Line 27: | Line 27: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
For a list of Best Current Practices, see the National Reliability and Interoperability Council’s Best Practices Selector at http://www.bell-labs.com/cgiuser/krauscher/bestp.pl | For a list of Best Current Practices, see the National Reliability and Interoperability Council’s Best Practices Selector at http://www.bell-labs.com/cgiuser/krauscher/bestp.pl | ||
Outline: | |||
ACKNOWLEDGEMENTS | |||
EXECUTIVE SUMMARY | |||
BACKGROUND | |||
RECOMMENDATION AREA I | |||
Recommendations: Adoption of Security Best Practices | |||
Recommendations: Awareness of Security Best Practices | |||
RECOMMENDATION AREA II | |||
Recommendations: Research and Development | |||
RECOMMENDATION AREA III | |||
Recommendations: Empowering Service Providers and Law Enforcement | |||
SECTION 2 – RECOMMENDATION DISCUSSION | |||
RECOMMENDATION AREA I | |||
Adoption of Security Best Practices | |||
1A: Measuring Best Practice Adoption | |||
1B: Route and Packet Filtering | |||
Awareness of Security Best Practices | |||
1C: End-User or General Public Education | |||
1D: Industry Continuing Education | |||
RECOMMENDATION AREA II | |||
2A: Routing Registries for Securing Inter-Domain Routing | |||
2B: Scalable Management and Anomaly Detection Tools | |||
2C: Forensics at High Data Rates | |||
2D: Scalable Vulnerability and Flow Analysis | |||
RECOMMENDATION AREA III | |||
3A: Empowering Internet Service Providers | |||
3B: Enhancement of Online Law Enforcement | |||
APPENDIX A: ORGANIZATIONAL RESOURCES | |||
APPENDIX B: DOCUMENTS AND RESEARCH PAPERS |
Revision as of 09:16, 26 July 2010
Full Title of Reference
Hardening The Internet : Final Report and Recommendations by the Council
Full Citation
Nat'l Infrastructure Advisory Council Hardening The Internet (2004). Web AltWeb
Categorization
- Resource by Type: US Government Reports and Documents
Key Words
Department of Homeland Security, Research & Development
Synopsis
The Council’s report focuses its recommendations in the following three areas:
1) Near-term Approaches: Encouraging the adoption of Best Current Practices as the most effective approach to harden existing defenses against attack. The Council centers these recommendations on education and awareness initiatives and research into the adoption of BCPs;
2) Long-term Approaches: With sufficient time for research and development, additional work on core Internet protocols can be used to harden the Internet and associated networks and devices against malicious attacks. The Council centers these recommendations on more robust research and development;
3) Empowerment: In the near and long term, Internet Service Providers (ISPs) and law enforcement agencies need on-going capabilities to investigate suspicious activity, prosecute cyber criminals, and harden their core operations. The Council centers these recommendations for empowering ISPs and law enforcement agencies on research and policy issues.
Additional Notes and Highlights
For a list of Best Current Practices, see the National Reliability and Interoperability Council’s Best Practices Selector at http://www.bell-labs.com/cgiuser/krauscher/bestp.pl
Outline:
ACKNOWLEDGEMENTS EXECUTIVE SUMMARY BACKGROUND RECOMMENDATION AREA I Recommendations: Adoption of Security Best Practices Recommendations: Awareness of Security Best Practices RECOMMENDATION AREA II Recommendations: Research and Development RECOMMENDATION AREA III Recommendations: Empowering Service Providers and Law Enforcement SECTION 2 – RECOMMENDATION DISCUSSION RECOMMENDATION AREA I Adoption of Security Best Practices 1A: Measuring Best Practice Adoption 1B: Route and Packet Filtering Awareness of Security Best Practices 1C: End-User or General Public Education 1D: Industry Continuing Education RECOMMENDATION AREA II 2A: Routing Registries for Securing Inter-Domain Routing 2B: Scalable Management and Anomaly Detection Tools 2C: Forensics at High Data Rates 2D: Scalable Vulnerability and Flow Analysis RECOMMENDATION AREA III 3A: Empowering Internet Service Providers 3B: Enhancement of Online Law Enforcement APPENDIX A: ORGANIZATIONAL RESOURCES APPENDIX B: DOCUMENTS AND RESEARCH PAPERS