of IP RESOURCES CYB ECOSYSTEM ER 1 2 3 4 5 7 9 THE CHALLENGES of IP Resources Technical Convenience The Checks & Balancers THE STAKEHOLDERS of IP Resources IETF Multi-Stakeholder Explained *The PUBLIC CORE of the INTERNET THE DISTRIBUTORS of IP Resources RIRS REGISTRAR IP Addresses & Autonomous System Numbers (ASN's) DIRECT ALLOCATION DIRECT ASSIGNMENT ORG ORGANIZATIONS Allocation & Assignment of IP Resources *The PUBLIC CORE of the INTERNET THE ROUTING PROVIDERS of IP Resources TIER 1 The Internet Backbone (IP Network) TIER 2 TIER 3 Backbone Backhaul provider Regional provider AS 64010 AS 64030 AS 64020 AS 64040 AS 65020 Pathway Providers of IP Resources *The PUBLIC CORE of the INTERNET THE INTERNET SERVICE & NETWORK PROVIDERS of IP Resources DNS Control Panel Change the DNS Pathway Reseller Account Root Alpha Master WHM C-Panel SERVER SPACE IP Resources Closest to Customers: TIER 3 & Local ISP’s THE ABUSERS of IP Resources Dedicated Managed Colocation Cluster Shared Virtual Private Server Abused Comprimised RUBY Business PHP Organization University Internet Access & Services Common IPS Network Switching & Routing Network PATHWAY PRODIVERS THE LAST MILE EXPLAINED Cloud computing: shared computing, software, storage and information resources are accessed as a service on demand. Home Wholesale and Resellers of hosting Reallocated & Reassigned Net-blocks, IP addresses Bandwidth, voip, domains sold as Public & Hybrid white labeled solutions. Data Center PYTHON Mobile User Wireless Access Point ATTACKS The Adversary Explained 1. Nation State - Warfare, Terrorism, Espionage 2. Hacktivist - Mischief 3. Cyber - Criminal 4. Competitors 5. Insiders THE COUNTERMEASURES of IP Resources CYBER DEFENSE & COUNTERMEASURES AUTOMATED MONITORING Application hardening, EPP, EDR, MDR, SIEM, MSSP,NGFW, DLP, IPS, IDS, SWG, CASB, ML, AI, Strategic Consulting, Threat Intelligence, RISK management, frameworks, guidelines, etc. 6 THE USERS of IP Resources Lor em The Last Mile. The ISP closes to clients & has the customer relationships Tor, dark web block chain, cryptocurrency- all used for good and bad. Bulletproof Hosting. AS 65040 AS 65030 AS 65050 AS 64020 AS 63090 AS 64010 AS 63080 Transit POP IXP, Peering Single homed Multihomed Local ISP last mile Infrastructure & Distribution Partnership Business Organization University Internet Access & Services AS 62090 AS 62070 AS 62080 AS 62060 AS 63070 AS 63050 AS 63060 AS 63040 Home AS 62050 AS 62030 AS 62040 AS 62020 AS 63030 AS 63010 AS 63020 AS 62090 Plus + AS 62020 AS 63090 Data Center AS 62040 AS 62020 AS 62030 AS 62010 AS 61090 AS 61070 AS 61080 AS 61060 Mobile User Wireless Access Point Digital Transformation from Old Distribution Tier Network to New Diversified Network External & Internal DNS Providers DYN Cloudflare Google AWS Alibabi OpenDNS Akama DYN & Others THE GLOBAL DISTRIBUTED AS 62010 AS 63080 AS 62080 AS 62060 AS 62070 AS 62050 AS 65020 AS 65040 AS 65030 AS 65050 AS 65020 AS 65040 AS 65030 AS 65050 Utilizing protocol BGP The pathway providers Announce, Control & Modify the Routing of Addresses and Domain Route of Data. Submarine & Terrestrial Cables Wireless Systems Satellite Internet Exchange Points (IPX) Infrastructure Layer (the backbone) Internet Routing Registry THE DATA PATHWAY EXPLAINED The Carriers, Network & Internet Service providers A place where all systems that enable connectivity and operability of physical facilities of providers of internet services. ORG REALLOCATION REASSIGNMENT CUSTOMER ORGANIZATIONS NUMBER RESOURCE ORGANIZATION (NRO) ORG CUSTOMER DOMAIN REGISTRY PROCESS ICANN ROOT SERVER OPERATOR TLD OPERATORS REGISTRY OPERATOR REGISTRY REGISTRAR REGISTRANT ARIN RIPE AFRNIC LACNIC APNIC DISTRIBUTION EXPLAINED RIRs recieve address space in large IP blocks from IANA. Allocate smaller IP resource blocks and Domain Name resources to organizations in their regions, who may then re-allocate or re-assign those IP resources to others. Internet Numbers Registry DNS EXPLAINED REGIONAL ISP The Domain Name Systems (DNS) is like a phone-book of the Internet. DNS uses technology like, CHAIN of TRUST, WEB OF TRUST, DNSSEC, TLS, PKI RPKI, DMARC, SPF,RPZ for security and authentication. CLIENT USER Request Response BACKBONE NETWORK SERVICE PROVIDER CONTENT DNS Lookup DNS Response DNS DATA CENTER or ISP WEB SERVER Civil Society Security IANA Psychological Social Trust Business Government Internet Users Transparency Accountability Privacy Economic Norms Academia NRO Technical A holistic view of the cyber ecosystem must be brought into the discussion CHALLENGES EXPLAINED Internet innovation, digital transformation and digital divide. Addressing the global coordination and norms as the internet operates without borders and governs differently in regions. Understanding that technology can be used for good and bad as we at times still struggle to define the difference. MULTI-STAKEHOLDER EXPLAINED ICANN: the coordination of the global internet’s unique identifiers. IANA: maintains the global internet number resources. Number Resource Organization: A coordinating body for the five regional internet registries (RIRS). Who else is involved? There are numerous other key governance actors and stakeholders. Your Home and Business Network - Explained Layers Application Endpoint OT/IOT Virtualization & Cloud Technology Data Center Infrastructure 8 9 THE RESPONDERS of IP Resources RECOVERY EXPLAINED Triage or full forensic gathering, analysis, recovery and reporting of data at rest, data in use and data in motion to get back up to a safe state. Business continuity, disaster recovery, cyber insurance. 10 THE CYBER DEFENSE EXPLAINED of IP Resources THE DEFENDERS INFORMATION SECURITY - PROTECTING DATA, PROCESSES & PEOPLE All have different priorities Government-Intelligence Law Enforcement - Prosecution CERTS (respond) Private Sector- Profit Driven Researchers & Academia Non-Government Organization TWO DISTINCT DISCIPLINES INFORMATION TECHNOLOGY - DEPLOY PEOPLE, PROCESSES & TECHNOLOGY DEFEND SECURITY VS PRIVACY of IP Resources SECURITY VS PRIVACY EXPLAINED VS Privacy relates to the appropriate use of your data, collect and misuse Security relates to the trust & confidence of your data, the use, storage and how its processed. LISTCRIME.COM THE